Computer Networks SU
Computer Networks SU
Computer Networks SU
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter
the characteristics of your cable, or even worse render is useless. Check the wires, one more time
for nicks or cuts. If there are any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable must
only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this
point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made
cable, with one of the ends whacked off, you only have one end to install - the crossed over end.
Below are two diagrams, which show how you need to arrange the cables for each type of cable
end. Decide at this point which end you are making and examine the associated picture below.
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of the
OSI model. The device is a form of multiport repeater. Repeater hubs also participate in collision
detection, forwarding a jam signal to all ports if it detects a collision.
3. Switch: A network switch or switching hub is a computer networking device that connects
network segments. The term commonly refers to a network bridge that processes and routes data
at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the
network layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer
switches.
4. Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2) of the OSI model. In Ethernet networks, the term bridge formally means a device that behaves
according to the IEEE 802.1D standard. A bridge and switch are very much alike; a switch being
a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with
bridge .Bridges can analyze incoming data packets to determine if the bridge is able to send the
given packet to another segment of the network.
5. Router: A router is an electronic device that interconnects two or more computer networks,
and selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. Where multiple
routers are used in a large collection of interconnected networks, the routers exchange
information about target system addresses, so that each router can build up a table showing the
preferred paths between any two systems on the interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing with
another network that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching
devices, rate converters, fault isolators, or signal translators as necessary to provide
system interoperability. It also requires the establishment of mutually acceptable
administrative procedures between both networks.
• A protocol translation/mapping gateway interconnects networks with different network
protocol technologies by performing the required protocol conversions.
Experiment - 3
Aim: Study of network IP
• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA
As show in figure we teach how the Ip addresses are classified and when they are used.
• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet address.
• Super netting
Why we develop super netting and How to calculate super net mask and how to identify super net
address.
Experiment-4
Aim: Connect the computers in Local Area Network.
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under Dial-up
/ other network available.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to connect
through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection
whenever a computer on my network attempts to access the Internet check box if you
want to permit your computer to automatically connect to the Internet.
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address
192.168.0. 1. Your computer may lose connectivity with other computers on your network. If
these other computers have static IP addresses, it is a good idea to set them to obtain their IP
addresses automatically. Are you sure you want to enable Internet Connection Sharing?
The network adapter that is connected to the LAN is configured with a static IP address of
192.168.0. 1 and a subnet mask of 255.255.255.0
To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP
configuration, and then configure the client computer. To confirm the LAN adapter IP
configuration, follow these steps:
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
254. For example, you can assign the following static IP address, subnet mask, and default gateway:
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to
flash memory or permanent memory.
ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds, you
get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a
machine is alive. If there is no response, you know something is wrong.
Traceroute:
Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop'
from router to router takes.
Ns lookup:
Path ping:
A better version of tracert that gives you statics about packet lost and latency.
Getting Help
In any command mode, you can get a list of available commands by entering a question mark (?).
Router>?
To obtain a list of commands that begin with a particular character sequence, type in those
haracters followed immediately by the question mark (?).
Router #co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument.
Include a space before the question mark.
Router #configure ?
memory Configure from NV memory network Configure from a TFTP network host terminal
Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters to make
the command unique from other commands. For example, you can abbreviate the show
command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes to memory
because if you do not they will be lost if there is a system reload or power outage. There are two
types of configuration files: the running (current operating) configuration and the startup
configuration.
Use the following privileged mode commands to work with configuration files.
Experiment-6
Objectives
Perform an initial configuration of a Cisco Catalyst 2960 switch.
Background / Preparation
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
Host name
Console password
Vty password
Privileged EXEC mode password
Privileged EXEC mode secret
IP address on VLAN1 interface
Default gateway
Note: Not all commands are graded by Packet Tracer.
Switch>enable Switch
#configure terminal
Switch(con fig)#hostname Customer Switch
b. From line configuration mode, set the password to cisco and require the password to be entered
at login.
b. From line configuration mode, set the password to cisco and require the password to be entered
at login.
Switch#
Reflection
a. What is the significance of assigning the IP address to the VLAN1 interface instead of any of the
Fast Ethernet interfaces?
b. What command is necessary to enforce password authentication on the console and vty lines?
c. How many gigabit ports are available on the Cisco Catalyst 2960 switch that you used in the activity?
Experiment-7
Objectives
Configure the router host name.
Configure passwords.
Configure banner messages.
Verify the router configuration.
Background / Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a router, including host
name, passwords, a message-of-the-day (MOTD) banner, and other basic settings.
Note: Some of the steps are not graded by Packet Tracer.
Router>enable Router
#configure terminal
Router(con fig)#hostname Customer Router
Set the password to cisco123, require that the password be entered at login, and then exit line configuration mode.
Step 4: Configure the vty password to allow Telnet access to the router.
a. In global configuration mode, switch to line configuration mode to specify the vty
lines.
Set the password to cisco123, require that the password be entered at login, exit line configuration mode, and then
exit the configuration session.
Step 5: Configure password encryption, a MOTD banner, and turn off domain server lookup.
a. Currently, the line passwords and the enable password are shown in clear text when you show
the running configuration. Verify this now by entering the show running-con fig command.
To avoid the security risk of someone looking over your shoulder and reading the passwords, encrypt
all clear text passwords.
Use the show running-con fig command again to verify that the passwords are encrypted.
To provide a warning when someone attempts to log in to the router, configure a MOTD banner.
Customer Router>enable
Translating "enable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS lookups from the router
CLI.
Reflection
Which Cisco IOS CLI commands did you use most?
How can you make the customer router passwords more secure?
Experiment-8
Objectives
Establish console connection to the switch.
Configure the host name and VLAN1.
Use the help feature to configure the clock.
Configure passwords and console/Telnet access.
Configure login banners.
Configure the router.
Solve duplex and speed mismatch problems.
Configure port security.
Secure unused ports.
Manage the switch configuration file.
Background / Preparation
In this Packet Tracer Skills Integration Challenge activity, you will configure basic switch management,
including general maintenance commands, passwords, and port security. This activity provides you an
opportunity to review previously acquired skills.
Addressing Table
Device Interface IP Address Subnet Mask
R1 Fa0/0 172.17.99.1 255.255.255.0
S1 Fa0/1 172.17.99.11 255.255.255.0
PC1 NIC 172.17.99.21 255.255.255.0
PC2 NIC 172.17.99.22 255.255.255.0
Server NIC 172.17.99.31 255.255.255.0
d. Configure the default gateway for S1 and then test connectivity. S1 should be able to ping R1.
e. Check results.
Your completion percentage should be 31%. If not, click Check Results to see which required components are
not yet completed. Also, make sure that interface VLAN 1 is active.
S1#
c. Force S1 to learn the MAC address for PC1. Send a ping from PC1 to S1. Then verify that S1
added the MAC address for PC1 to the running configuration.
!
interface FastEthernet0/18
<output omitted>
Switch port port-securitymac-address sticky 0060.3EE6.1659
<output omitted>
!
d. Test port security. Remove the Fast Ethernet connection between S1 and PC1. Connect PC2 to
Fa0/18. Wait for the link lights to turn green. If necessary, send a ping from PC2 to S1 to cause the
port to shut down. Port security should show the following results: (the Last Source Address may be
different)
e. Viewing the Fa0/18 interface shows that line protocol is down (err-disabled), which also indicates
a security violation.
f. Reconnect PC1 and re-enable the port. To re-enable the port, disconnect PC2 from Fa0/18 and
reconnect PC1. Interface Fa0/18 must be manually reenabled with the no shutdown command
before returning to the active state.
g. Check results.
Your completion percentage should be 77%. If not, click Check Results to see which required components are
not yet completed.
Connecting a Switch
Topology Diagram
Objectives
Connect a switch to the network.
Verify the configuration on the switch.
Background / Preparation
In this activity, you will verify the configuration on the customer Cisco Catalyst 2960 switch. The switch is
already configured with all the basic necessary information for connecting to the LAN at the customer site. The
switch is currently not connected to the network. You will connect the switch to the customer workstation, the
customer server, and customer router. You will verify that the switch has been connected and configured
successfully by pinging the LAN interface of the customer router.
Reflection
a. What is the significance of the enable secret command compared to the enable password?
b. If you want to remove the requirement to enter a password to access the console, what
commands do you issue from your starting point in privileged EXEC mode?
Experiment-10
Objectives
Configure WEP security between a workstation and a Linksys wireless router.
Background / Preparation
You have been asked to go back to a business customer and install a new Linksys wireless router for the
customer office. The company has some new personnel who will be using wireless computers to save money
on adding additional wired connections to the building. The business is concerned about the security of the
network because they have financial and highly classified data being transmitted over the network. Your job is
to configure the security on the router to protect the data.
In this activity, you will configure WEP security on both a Linksys wireless router and a workstation.
Reflection
a. What is the purpose of using WEP on a wireless network?
b. What is the significance of the key that you used to secure WEP?
Objectives
Use the Cisco IOS show commands.
Background / Preparation
The Cisco IOS show commands are used extensively when working with Cisco equipment. In this activity, you
will use the show commands on a router that is located at an ISP.
Note: This activity begins by showing 100% completion, because the purpose is only to explore the Cisco IOS
show commands. This activity is not graded.
a. Why do you need to be in privileged EXEC mode to explore the Cisco IOS show commands
that were used in this activity?
Objective
The show commands are very powerful commands for troubleshooting and monitoring networks. They
give a static image of the network at a given time. The use of a variety of show commands will give a
clear picture of how the networking is communicating and transferring data.
Background / Preparation
The physical topology of the network has been designed using Frame Relay. To test the network
connectivity, use a variety of show commands.
a. Click on Branch1 and use various show commands to view the connectivity to the network.
b. Use the show running-configuration command to view the router configuration.
c. Use the show ip interface brief command to view the status of the interfaces.
d. Use the various show frame-relay map, show frame-relay pvc, and show frame-relay lmi
commands to see the status of the Frame-relay circuit.
e. Click on Branch 2 and use various show commands to view the connectivity to the network.
f. Use the show running-configuration command to view the router configuration.
g. Use the show ip interface brief command to view the status of the interfaces.
h. Use the various show frame-relay map, show frame-relay pvc, and show frame-relay lmi
commands to see the status of the Frame-relay circuit.
Step 2: Examine the configuration of Main.
a. Click on Main and use a variety of show commands to view the connectivity to the network.
b. Use the show running-configuration command to view the router configuration.
c. Use the show ip interface brief command to view the status of the interfaces.
d. To view the status of the frame-relay configurations use the show frame-relay lmi, show frame-
relay map, and show frame-relay pvc commands.
Reflection
b. What beneficial information can be obtained from the various show commands?
Experirment-13
Objectives
Distinguish the difference between successful and unsuccessful ping attempts.
Distinguish the difference between successful and unsuccessful trace route attempts.
Background / Preparation
In this activity, you will test end-to-end connectivity using ping and trace route. At the end of this activity, you
will be able to distinguish the difference between successful and unsuccessful ping and trace route attempts.
Note: Before beginning this activity, make sure that the network is converged. To converge the network
quickly, switch between Simulation mode and Real time mode until all the link lights turn green.
Step 1: Test connectivity using ping from a host computer and a router.
Click N-Host, click the Desktop tab, and then click Command Prompt. From the Command Prompt window, ping
the Cisco server at www.cisco.com.
Packet Tracer PC Command Line 1.0
PC>ping www.cisco.com
PC>
From the output, you can see that N-Host was able to obtain an IP address for the Cisco server. The IP address was
obtained using (DNS). Also notice that the first ping failed. This failure is most likely due to lack of ARP
convergence between the source and destination. If you repeat the ping, you will notice that all pings succeed.
From the Command Prompt window on N-Host, ping E-Host at 192.168.4.10. The pings fail. If you do not want to
wait for all four unsuccessful ping attempts, press Ctrl +C to abort the command, as shown below.
PC>ping 192.168.4.10
Request timed
out.
Request timed
out.
Control-C
^C
PC>
Click the N-Branch router, and then click the CLI tab. Press Enter to get the router prompt. From the router prompt,
ping the Cisco server at www.cisco.com.
N-Branch>ping www.cisco.com
Translating "www.cisco.com"...domain server
(64.100.1.242) Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 64.100.1.185, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 210/211/213
ms N-Branch>
As you can see, the ping output on a router is different from a PC host. Notice that the N-Branch router resolved
the domain name to the same IP address that N-Host used to send its pings. Also notice that the first ping fails,
which is indicated by a period (.), and that the next four pings succeed, as shown with an exclamation point (!).
From the CLI tab on N-Branch, ping E-Host at 192.168.4.10. Again, the pings fail. To not wait for all the
failures, press Ctrl +C.
N-Branch>ping 192.168.4.10
(0/4) N-Branch>
Step 2: Test connectivity using trace route from a host computer and a router.
a. Click N-Host, click the Desktop tab, and then click Command Prompt. From the Command Prompt
window, trace the route to the Cisco server at www.cisco.com.
PC>tracert www.cisco.com
1 92 ms 77 ms 86 ms 192.168.1.1
2 91 ms 164 ms 84 ms 64.100.1.101
3 135 ms 168 ms 151 ms 64.100.1.6
4 185 ms 261 ms 161 ms 64.100.1.34
5 257 ms 280 ms 224 ms 64.100.1.62
6 310 ms 375 ms 298 ms 64.100.1.185
Trace complete.
PC>
The above output shows that you can successfully trace a route all the way to the Cisco server at 64.100.1.185. Each
hop in the path is a router responding three times to trace messages from N-Host. The trace continues until the
destination for the trace (64.100.1.185) responds three times.
From the Command Prompt window on N-Host, trace a route to E-Host at 192.168.4.10. The trace fails, but notice
that the tracert command traces up to 30 hops. If you do not want to wait for all 30 attempts to time out, press Ctrl
+C.
PC>tracert 192.168.4.10
1 103 ms 45 ms 91 ms 192.168.1.1
2 56 ms 110 ms 125 ms 64.100.1.101
3 174 ms 195 ms 134 ms 64.100.1.6
4 246 ms 183 ms 179 ms 64.100.1.34
5 217 ms 285 ms 226 ms 64.100.1.62
6 246 ms 276 ms 245 ms 64.100.1.154
7 * * * Request timed out.
8 * * * Request timed out.
9 * * * Request timed
out. 10
Control-C
^C
PC>
The tracert command can be helpful in finding the potential source of a problem. The last device to
respond was 64.100.1.154, so you would start troubleshooting by determining which device is
configured with the IP address 64.100.1.154. The source of the problem might not be that device, but
the trace has given you a starting point, whereas a ping simply tells you that the destination is either
reachable or unreachable.
Click the N-Branch router, and then click the CLI tab. Press Enter to get the router prompt. From the router prompt,
trace the route to the Cisco server at www.cisco.com.
N-Branch>trace route www.cisco.com
Translating "www.cisco.com"...domain server
(64.100.1.242) Type escape sequence to abort.
Tracing the route to 64.100.1.185
As you can see, trace route output on a router is very similar to the output on a PC host. The only
difference is that on a PC host, the IP address is listed after the three millisecond outputs.
From the CLI tab on N-Branch, trace the route to E-Host at 192.168.4.10. The trace fails at the same IP address as
it failed when tracing from N-Host. Again, you can use Ctrl +C to abort the command.
Objective
Background / Preparation
VLANs can be added to a network for security purposes and traffic control. Devices on separate VLANs
are unable to communicate unless a router has been configured to help with this communication.
Observe how packet filtering and route summarization traverse the network using simulation mode.
Step 3: Test connectivity between the network devices using Simulation mode
Reflection
c. Why can’t PC0 communicate with PC1 but PC1 can communicate with PC0’s default gateway?
e. Why must a router be in the topology to have communication between the VLANs?
Experirment-15
Placing ACLs
Objectives
Verify network connectivity
Examine the Access Control Lists (ACLs) that are configured on the routers
Determine the appropriate interface to apply the ACLs
Examine the affects of the ACL
Background / Preparation
This activity demonstrates how the flow of network traffic is affected by applying an ACL to permit or
deny traffic in the network. The network administrator has decided that all external web traffic goes only
to the Web server. Also, in order to protect the data o their employees, the HR server is only accessible to
HR employees. Therefore, ACLs will need to be implemented on the network. Another network
technician has already configured the necessary ACLs on both the Gateway and Distribution2 routers.
However, the ACLs have not been applied to an interface. You have been asked to apply the ACLs and
verify that the appropriate traffic is permitted or denied.
a. Verify that all of the PCs can communicate with each other and with the servers.
b. Verify that the Internet Host can access the Web server (192.168.0.3), Sales server
(192.168.10.2) and HR server (192.168.40.2) using the browser.
Step 2: Examine the Access Control Lists that are configured on the routers
a. Access the Distribution1 router. Use the following commands to view the ACL that has been
configured on the Distribution1 router:
show running-con fig
show access-lists 1
b. Access the Gateway router. Use the following commands to view the ACL that has
been configured on the Gateway router:
show running-con fig
show access-lists 100
a. After examining the ACLs determine on which interface the ACLs should be applied
b. The ACL must be applied to an interface or sub interface before it will affect the network traffic
c. The extended ACL should be placed closest to the source and the standard ACL should be
closest to the destination.
d. Remember that only one ACL per port, per protocol, per direction is allowed.
e. Apply the ACL to the appropriate interface or sub interface.
a. Internet Host should be able to ping any device in the network, except HR1 or HR server.
b. Internet Host should be able to access Web server (192.168.0.3) using the browser.
c. Internet Host should not be able to access either the HR server (192.168.40.1) or Sales
server (192.168.10.2) using the browser.
d. HR2 should be able to access HR server (192.168.40.1) using ping or the browser.
e. RandD2 should not be able to access HR server (192.168.40.1) using ping or the browser.
Reflection
Objectives
Determine the cable types to use to connect all devices to the switch.
Add appropriate modules to switches and routers.
Connect the devices to the switch using the appropriate cable types.
Background / Preparation
The results of a site survey for an ISP customer indicate that the customer needs to upgrade the LAN to
include a new standalone switch. The network has an existing router (Router0) and a Linksys 300N router. It is
necessary to determine which interfaces are needed on the new switch to provide connectivity to the router, the
Linksys device, and the customer PCs. The customer wants to use copper cabling.
Note: Links created with the switch may take a minute to change from amber to green. Switch between
Simulation mode and Real time mode to speed up this process.
Click the Linksys 300N. Using the picture on the Physical tab, determine what type of cable is necessary to
connect to the new switch.
Which interface is available on the Linksys 300N to connect to the new switch? What type of cable is required?
Step 2: Configure the new switch with the required options.
a. Click Switch0.
On the Physical tab, explore each switch module available under the Modules option.
Choose the appropriate interfaces to connect to Router0 and the Linksys 300N router.
Choose the appropriate interfaces to connect to the existing PCs.
Power down the switch using the power button in the Physical Device View window on the Physical tab.
Choose the appropriate modules for the switch. Add the four necessary interfaces to the switch.
Power up the switch using the power button shown in the Physical Device View window on the Physical tab.
Click the Con fig tab. Select each interface and ensure that the On box is checked.
Objectives
Subnet an address space based on the host requirements.
Assign host addresses to devices.
Configure devices with IP addressing.
Verify the addressing configuration.
Background / Preparation
In this activity, you will subnet the private address space 192.168.1.0/24 to provide enough host addresses
for the two LANs attached to the router. You will then assign valid host addresses to the appropriate devices
and interfaces. Finally, you will test connectivity to verify your IP address implementation.
For a better view of the commands, you can increase the size of the window. To resize the window,
place your mouse pointer over the bottom border of the window. When the cursor turns into a double-
headed arrow, click and drag.
Check results. On the Assessment Items tab, your configurations for Customer Router should have green
checkmarks. If not, read the provided feedback for a hint on how to correct the problem.
Step 4: Verify the addressing configuration.
a. Test connectivity between Host A, Host B, ISP Workstation, and ISP Server. You can use the Add
Simple PDU tool to create pings between the devices. You can also click Host A or Host B, then the
Desktop tab, and then Command Prompt. Use the ping command to test connectivity to other
devices. To obtain the IP address of another device, place your mouse pointer over the device.
b. Check results. On the Connectivity Tests tab, the status of each test should be successful.
Reflection
a. How many subnets are still available for future expansion?
b. What would be the two subnet addresses if the host requirement was 80 hosts per LAN?
c. Challenge: Create your own Packet Tracer network using the same topology, but implement an
addressing scheme based on 80 hosts per LAN. Have another student or your instructor check
your work.
Experirment-18
Objectives
Examine NAT processes as traffic traverses a NAT border router.
Background / Preparation
In this activity, you will use Packet Tracer Simulation mode to examine the contents of the IP header as traffic
crosses the NAT border router.
Step 2: Send an HTTP request from an inside host to an outside web server.
Click Customer PC. Click the Desktop tab and then Web Browser. In the URL field, type the web
address for the ISP server (www.ispserver.com). Make sure that you are in Simulation mode, and then
click Go.
In the event list, notice that Customer PC queues a DNS request and sends out an ARP request. You can view
the contents of the ARP request by either clicking on the packet in the topology or clicking on the packet color
under Info in the Event List window.
In the PDU Information at Device: Customer PC window, which IP address is Customer PC attempting to find
a MAC address for?
In the Event List window, click Capture/Forward twice. Which device answers the ARP request from Customer
PC? Which MAC address is placed inside the ARP reply?
In the Event List window, click Capture/Forward twice. Customer PC accepts the ARP replay and then builds
another packet. What is the protocol for this new packet? If you click Outbound PDU Details for this packet,
you can see the details of the protocol.
In the Event List window, click Capture/Forward twice. Click the packet at the www.customerserver.com server.
Then click the Outbound PDU Details tab. Scroll down to the bottom to see the Application Layer data. What is the
IP address for the ISP server?
In the Event List window, click Capture/Forward twice. Customer PC now formulates another ARP request. Why?
In the Event List window, click Capture/Forward 10 times until Customer PC formulates an HTTP request packet.
Customer PC finally has enough information to request a web page from the ISP server.
In the Event List window, click Capture/Forward three times. Click the packet at Customer Router to examine the
contents. Customer Router is a NAT border router. What is the inside local address and the inside global address
for Customer PC?
In the Event List window, click Capture/Forward seven times until the HTTP reply reaches Customer Router.
Examine the contents of the HTTP reply and notice that the inside local and global addresses have changed again as
the packet is forwarded on to Customer PC.
Step 3: Send an HTTP request from an outside host to an inside web server.
Customer Server provides web services to the public (outside addresses) through the domain name
www.customerserver.com. Follow a process similar to Step 2 to observe an HTTP request on ISP Workstation.
a. Click ISP Workstation. Click the Desktop tab, and then Web Browser. In the URL field, type the
Customer Server web address (www.customerserver.com). Make sure that you are in Simulation
mode, and then click Go.
b. You can either click Auto Capture/Play or Capture/Forward to step through each stage of the
process. The same ARP and DNS processes occur before the ISP Workstation can formulate an
HTTP request.
c. When the HTTP request arrives at Customer Router, check the packet contents. What is the
inside local address? What is the inside global address?
Experirment-19
Objective
Observe the network behavior using static and default routing only and compare it to the behavior of
dynamic routing.
Background / Preparation
In this exercise, you will observe what the adaptability of dynamic routing compared to static and default
routing. The Ticket Sales Office network is currently configured using static and default routing.
a. Configure EIGRP (AS 10) on the BR2 and ISP2 routers. Be sure to include all directly
connected networks and turn off auto-summary.
b. Do a third trace from PC0 to the Edge1 Fast Ethernet 0/0 interface. (It should be successful again.)
c. Did the path change? If so, how?
Reflection
What are the advantages of using dynamic routing? Static and default routing?
The static routes in this lab were set with an administrative distance of 130. What
would have happened if they were set at 30? At 230?
Experiment-20
Objectives
Configure a LAN Ethernet interface.
Configure a WAN serial interface.
Verify the interface configurations.
Background / Preparation
In this activity, you will configure the LAN Ethernet interface and the WAN serial interface on the Customer
Cisco 1841 router.
Use the show ip route command to verify your configuration. This is a partial example of the output.
<output omitted>
Use the ping command to verify connectivity to the WAN interface on the ISP router. This is a partial example
of the output.
Use the ping command to verify connectivity to the customer switch. This is a partial example of the output.
b. Click the Check Results button at the bottom of this instruction window to check your work.
Reflection
a. When you ping the LAN IP address of the ISP router, what happens and why?
b. Which of the following Cisco ISO CLI modes do you need to be in to configure the description
of an interface?
Customer Router#
Customer Router>
Customer Router(con fig)#
Customer Router(con fig-if)#
c. You configured the Fast Ethernet 0/0 interface with the no shutdown command and
verified the configuration. However, when you rebooted the router, the interface was
shutdown. You reconfigured the Fast Ethernet 0/0 interface and verified that the
configuration works. Explain what most likely happened.
Experiment-21
Objectives
Configure a default route on a router.
Background / Preparation
In this activity, you will configure a default route on the Cisco 1841 Customer router. The default route
configuration uses the WAN IP address on the Cisco 1841 ISP router. This is the next-hop router from the Cisco
1841 Customer router.
Step 1: Verify reach ability from Customer Router to the LAN IP address on the ISP router.
a. Use terminal emulation software on the Customer PC to connect to the customer Cisco
1841 router. Use cisco123 for the console password.
b. Use the ping command to verify if the LAN IP address 209.165.201.1 on the ISP router
is reachable from the Customer Router
FastEthernet0/0
209.165.200.0/27 is sub netted, 1 subnets
C 209.165.200.224 is directly connected,
Serial0/1/0 S* 0.0.0.0/0 [1/0] via 209.165.200.226
b. Use the ping command to verify connectivity to the LAN IP address on the ISP router
b. Click the Check Results button at the bottom of this instruction window to check your work.
Reflection
You can now access the entire ISP network. Write down some issues and considerations to discuss with your
classmates about this configuration. Here are two questions to begin with:
Is this type of access to the ISP LAN likely to happen in the real world?
Why has the student activity been configured to allow this type of access?
Experirment-22
Objectives
Configure static routes on each router to allow communication between all clients.
Test connectivity to ensure that each device can fully communicate with all other devices.
Background / Preparation
This topology represents a small WAN. Each device in this network has been configured with IP addresses;
however, no routing has been configured. The company management wants to use static routes to connect the
multiple networks.
Step 1: Test connectivity between the PCs and the default gateway.
To determine if there is connectivity from each PC to its configured gateway, first use a simple ping test.
a. Click BO pc and go to Desktop > Command Prompt.
b. From the command prompt, type the ip con fig command. Note the IP address for BOpc and the
default gateway address. The default gateway address is the IP address for the Fast Ethernet interface
on Branch Office.
c. Ping 192.168.1.1, the default gateway address for the Branch Office LAN, from the command
prompt on BO pc. This ping should be successful.
d. Click PN pc and go to Desktop > Command Prompt.
e. From the command prompt, type the ip con fig command. Note the IP address for PN pc and the
default gateway address. The default gateway address is the IP address for the Fast Ethernet interface
on Partner Net.
f. Ping 192.168.3.1, the default gateway address for the Partner Net LAN, from the command prompt
on PN pc. This ping should be successful.
g. Repeat steps a, b, and c for MO pc and its respective default gateway, the Fast Ethernet interface
on Main Office. Each of these ping tests should be successful.
g. Does each router know how to route to all networks in the topology? After comparing the
routing tables, close the window for each routing table by clicking the x in the upper right corner
of each window.
Step 4: Configure default routes on the Branch Office and Partner Net routers.
To configure static routes for each router, first determine which routes need to be added for each device. For the
Branch Office and the Partner Net routers, a single default route allows these devices to route traffic for all
networks not directly connected. To configure a default route, you must identify the IP address of the next hop
router, which in this case is the Main Office router.
a. From the Common toolbar, click the Select tool.
b. Move the cursor over the red serial link between the Branch Office router and the Main
Office router. Notice that the interface of the next hop is S3/0.
c. Move the cursor over the Main Office router and note that the IP address for Serial 3/0
is 10.10.10.1.
d. Move the cursor over the red serial link between the Partner Net router and the Main Office
router. Notice that the interface of the next hop is S2/0.
e. Move the cursor over the Main Office router and note that the IP address for Serial 2/0
is 10.10.10.5.
f. Configure the static routes on both the Branch Office and Partner Net routers using the CLI.
Click the Branch Office router, and click the CLI tab.
g. At the Branch Office> prompt, type enable to enter privileged EXEC mode.
h. At the Branch Office# prompt, type configure terminal.
i. The syntax for a default route is ip route 0.0.0.0. 0.0.0.0 next _hop ip address. Type ip
route 0.0.0.0 .0.0.0.0 10.10.10.1.
j. Type end to get back to the Branch Office# prompt.
k. Type copy run start to save the configuration change.
l. Repeat steps f through k on the Partner Net router, using 10.10.10.5 as the next hop IP address.
Configuring RIP
Topology Diagram
Objectives
Configure routers using basic interface configuration commands.
Enable RIP.
Verify the RIP configuration.
Background / Preparation
A simple routed network has been set up to assist in reviewing RIP routing behavior. In this activity, you will
configure RIP across the network and set up end devices to communicate on the network.
Objectives
Place firewalls in appropriate locations to satisfy security requirements.
Background / Preparation
You are a technician who provides network support for a medium-sized business. The business has grown and
includes a research and development department working on a new, very confidential project. The livelihood of
the project depends on protecting the data used by the research and development team.
Your job is to install firewalls to help protect the network, based on specific requirements. The Packet Tracer
topology that you will use includes two preconfigured firewalls. In the two scenarios presented, you will replace
the existing routers with the firewalls. The firewalls need to be configured with the appropriate IP address
configurations, and the firewalls should be tested to ensure that they are installed and configured correctly.
Firewall_1#show run
Building configuration...
hostname Firewall_1
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 209.165.200.225 255.255.255.224
ip access-group 100 in
ip nat outside
duplex auto
speed auto
!
interface Vlan1
no ip address
shutdown
!
ip nat inside source list 1 interface FastEthernet0/0 overload
ip classless
ip route 192.168.2.0 255.255.255.0 192.168.1.2
ip route 192.168.3.0 255.255.255.0 192.168.1.3
!
access-list 1 permit 192.168.0.0 0.0.255.255
access-list 100 deny ip any host
209.165.200.225
<output omitted>
!
end
b. From PC_B, ping 209.165.200.225 to verify that the internal computer can access the Internet.
PC>ping 209.165.200.225
c. From privileged EXEC mode on Firewall_1, save the running configuration to the startup
configuration using the copy run start command.
Firewall_2#show run
Building configuration...
...
!
interface FastEthernet0/0
ip address 192.168.3.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.3 255.255.255.0
ip access-group 100 in
ip nat outside
duplex auto
speed auto
!
access-list 1 permit 192.168.3.0 0.0.0.255
access-list 100 permit ip host 192.168.2.10 any
access-list 100 permit ip host 192.168.1.1 any
<output omitted>
!
end
b. From the command prompt on PC_B, use the ping command to verify that the computers on Subnet
B cannot access the computers on Subnet C.
PC>ping 192.168.3.10
Request timed
out. Request
timed out.
Request timed
out. Request
timed out.
c. From the command prompt on PC_C, use the ping command to verify that the computers on Subnet C
can access the server on Subnet B.
PC>ping 192.168.2.10
d. From the command prompt on PC_C, use the ping command to verify that the computers on Subnet C
can access the Internet.
PC>ping 209.165.200.225
e. From privileged EXEC mode on Firewall_2, save the running configuration to the startup
configuration using the copy run start command.
f. Click the Check Results button at the bottom of this instruction window to check your work.
Reflection
a. Why would you install a firewall on the internal network?
b. How does a router that is configured to use NAT help protect computer systems on the inside of the
NAT router?
c. Examine the location of Firewall_1 and Firewall_2 in the completed network topology. Which networks
are considered trusted and un trusted for Firewall_1? Which networks are considered trusted and un
trusted for Firewall_2?
Experiment-25
Objectives
Configure the customer Cisco 1841 ISR as a DHCP server.
Background / Preparation
In this activity, you will continue to configure the Cisco 1841 ISR router for the customer network by
configuring the DHCP service. The customer has several workstations that need to be automatically configured
with IP addresses on the local subnet and appropriate DHCP options to allow access to the Internet.
The DHCP pool will use the 192.168.1.0/24 network but the first 49 addresses are excluded. The default
gateway and DNS server also need to be configured as 192.168.1.1 and 192.168.1.10.
For this activity, both the user and privileged EXEC passwords are cisco.
Note: Packet Tracer does not currently support the domain name and lease period options. These options are not
used in this activity.
Reflection
a. What is the purpose of DHCP on the customer network?
c. What other DHCP options can be defined on the Cisco 1841 ISR router that are
not configured in this activity?
/*
Implementation of Bit stuffing Using C
*/
#include< stdio.h>
#include<conio.h>
#include<string.h>
void main() {
int i, j,count=0,nl;
char str[100];
clrscr();
printf("enter the bit string: ");
gets(str);
for (i=0;i<strlen(str);i++) {
count=0;
//the following code search the six ones in given string
for (j=i;j<=(i+5);j++) {
if(str[j]=='1') {
count++;
}
}
//if there is six ones then folling code execute to bit stuffing after five ones
if(count==6) {
nl=strlen(str)+2;
for (;nl>=(i+5);nl--) {
str[nl]=str[nl-1];
}
str[i+5]='0';
i=i+7;
}
}
puts(str);
getch();
}
/*
Name: Dijkstra's Algorithm For Shortest Paths
*/
#include "stdio.h"
#include "conio.h"
#define infinity 999
void dij(int n,int v,int cost[10][10],int dist[])
{
int i,u,count,w,flag[10],min;
for(i=1;i<=n;i++)
flag[i]=0,dist[i]=cost[v][i];
count=2;
while(count<=n)
{
min=99; for(w=1;w<=n;w+
+) if(dist[w]<min && !
flag[w]) min=dist[w],u=w;
flag[u]=1;
count++;
for(w=1;w<=n;w++)
if((dist[u]+cost[u][w]<dist[w]) && !flag[w])
dist[w]=dist[u]+cost[u][w];
}
}
void main()
{
int n,v,i,j,cost[10][10],dist[10];
clrscr();
printf("\n Enter the number of nodes:");
scanf("%d",&n);
printf("\n Enter the cost matrix:\n");
for(i=1;i<=n;i++)
for(j=1;j<=n;j++)
{
scanf("%d",&cost[i][j]);
if(cost[i][j]==0) cost[i]
[j]=infinity;
}
printf("\n Enter the source matrix:");
scanf("%d",&v);
dij(n,v,cost,dist);
printf("\n Shortest path:\n");
for(i=1;i<=n;i++)
if(i!=v) printf("%d->%d,cost=%d\n",v,i,dist[i]);
getch();
}
/*
Name: Distance Vector Routing in this program is implemented using Bellman Ford Algorithm:-
*/
#include<stdio.h>
struct node
{
unsigned dist[20];
unsigned from[20];
} r t[10];
int main()
{
int costmat[20][20];
int nodes,i,j,k,count=0;
printf("\nEnter the number of nodes : ");
scanf("%d",&nodes);//Enter the nodes
printf("\nEnter the cost matrix :\n");
for(i=0;i<nodes;i++)
{
for(j=0;j<nodes;j++)
{
scanf("%d",&costmat[i][j]);
costmat[i][i]=0;
rt[i].dist[j]=costmat[i][j];//initialise the distance equal to cost matrix
rt[i].from[j]=j;
}
}
do
{
count=0;
for(i=0;i<nodes;i++)//We choose arbitary vertex k and we calculate the direct distance from the
node i to k using the cost matrix
//and add the distance from k to node j
for(j=0;j<nodes;j++)
for(k=0;k<nodes;k++)
if(rt[i].dist[j]>costmat[i][k]+rt[k].dist[j])
{//We calculate the minimum distance
rt[i].dist[j]=rt[i].dist[k]+rt[k].dist[j];
rt[i].from[j]=k;
count++;
}
}while(count!=0);
for(i=0;i<nodes;i++)
{
printf("\n\n For router %d\n",i+1);
for(j=0;j<nodes;j++)
{
printf("\t\nnode %d via %d Distance %d ",j+1,rt[i].from[j]+1,rt[i].dist[j]);
}
}
printf("\n\n");
getch();
}
/*
C Program to implement prims algorithm using greedy method for minimum spanning tree
*/
#include<stdio.h>
#include<conio.h>
int n, cost[10][10];
void prim() {
int i, j, startVertex, endVertex;
int k, nr[10], temp, minimumCost = 0, tree[10][3];
void main() {
int i, j;
clrscr();
#include<stdio.h>
#include<conio.h>
#include<stdlib.h>
int i,j,k,a,b,u,v,n,ne=1;
int min,mincost=0,cost[9][9],parent[9];
int find(int);
int uni(int,int);
void main()
{
clrscr();
printf("\n\n\tImplementation of Kruskal's algorithm\n\n");
printf("\nEnter the no. of vertices\n");
scanf("%d",&n);
printf("\nEnter the cost adjacency matrix\n");
for(i=1;i<=n;i++)
{
for(j=1;j<=n;j++)
{
scanf("%d",&cost[i][j]);
if(cost[i][j]==0)
cost[i][j]=999;
}
}
printf("\nThe edges of Minimum Cost Spanning Tree are\n\n");
while(ne<n)
{
for(i=1,min=999;i<=n;i++)
{
for(j=1;j<=n;j++)
{
if(cost[i][j]<min)
{
min=cost[i][j];
a=u=i;
b=v=j;
}
}
}
u=find(u);
v=find(v);
if(uni(u,v))
{
printf("\n%d edge (%d,%d) =%d\n",ne++,a,b,min);
mincost +=min;
}
cost[a][b]=cost[b][a]=999;
}
printf("\n\tMinimum cost = %d\n",mincost);
getch();
}
int find(int i)
{
while(parent[i])
i=parent[i];
return i;
}
int uni(int i,int j)
{
if(i!=j)
{
parent[j]=i;
return 1;
}
return 0;
}