CN Lab Reports(1-5) - Lab Reports PDF

Title CN Lab Reports(1-5) - Lab Reports
Author Muhammad Fahad Siddiq
Course Computer Networks
Institution Air University
Pages 12
File Size 935.4 KB
File Type PDF
Total Downloads 645
Total Views 759

Summary

Warning: TT: undefined function: 32Lab#Introduction to Packet TracerObjective:The aim of Lab is to get familiarization with packet tracer, making connectionsbetween more than one devices and connectivity testing between the devicesIntroduction:Packet Tracer is a standalone, medium-fidelity, simulati...


Description

Lab#01 Introduction to Packet Tracer Objective: The aim of Lab is to get familiarization with packet tracer, making connections between more than one devices and connectivity testing between the devices

Introduction: Packet Tracer is a standalone, medium-fidelity, simulation-based learning environment for networking novices to design, configure, and troubleshoot computer networks at a CCNA-level of complexity

Workspace: Packet Tracer uses following two representation schemes for network:

 The Logical Workspace The Logical Workspace allows you to build a logical network topology, without regard to its physical scale and arrangement.

 The Physical Workspace It allows you to arrange devices physically in cities, buildings, and wiring closets. Distances and other physical measures will affect network performance and other characteristics if wireless connections are used.

End Devices: Following are end devices used in packet tracer End Devices PC

VOIP Devices

Laptop

TV

Server/Meraki Server

Wireless Tablet

Printer

Smart Devices

Phone / IP Phone

Sniffer

IP Phone

Generic Wired/Wireless

Procedure & Simulations: Click on Switch in lower left part, click on 2950T and then again click in the main window. The switch will appear in the main window. After it Place four PCs Generic (in End Devices) in the main window. Than Double-click on PC0 and go to Desktop Tab. Click on IP Configuration and enter 192.168.1.2 as the IP address and 255.255.255.0 as subnet mask. 192.168.1.3 forPC1. Enter any IP address for PC3 and PC4 (in same network).

Conclusion: In this Lab we are introduced to networking software known as Packet Tracer. We learned about its interface and end devices used in designing networks etc. It allow users to create network topologies and imitate modern computer networks

________________________

2|Page

Lab#02 Introduction to Hub, Switch and Router Objective: The aim of this lab is to understand the difference between Hub, Switch and Router.

Introduction: Hubs, switches, and routers are all devices which let you connect one or more computers to other computers, networked devices, or to other networks. Each has two or more connectors called ports into which you plug in the cables to make the connection.

Network Devices:  Hub A hub is typically the least expensive, least intelligent, and least complicated of the three. It works on the physical layer (Layer 1) of OSI model. Its job is very simple: anything that comes in one port is sent out to the others. It is a passive device without software and data transmission form in hub is in electrical signal or bits. It just connects multiple Ethernet devices together as a single segment

 Switch A switch is able to handle the data and knows the specific addresses to send the message. It works on the data link layer (Layer 2) of OSI Model. It is more efficient than the hub. It can decide which computer is the message intended for and send the message directly to the right computer. The efficiency of switch has been greatly improved, thus providing a faster network speed.

 Router(Gateway) A router is the smartest and most complicated of the bunch. It is a physical or virtual appliance that passes information between two or more packet-switched computer network . It works on the network layer (Layer 3) of OSI Model. A router inspects a given data packet's destination Internet Protocol address (IP address), calculates the best way for it to reach its destination and then forwards it accordingly. It usually connects at least two networks together, such as two LANs, two WANs or a LAN and its ISP network. It is intelligent and sophisticated to serve as an intermediate destination to connect multiple area networks together. The data transmission form in router is in form of packet

Connections:  Console 3|Page

It is used to view the network device's console from a PC/laptop. One end of the cable connects to the console port of a network device while the other one connects to the RS232 port on a PC/laptop.

 Copper Straight-through A copper straight through cable is standard configuration of network cable. It is a type of twisted pair cable that is used in local area networks to connect a computer to a network hub such as a router. It is also called a patch cable and is an alternative to wireless connections where one or more computers access a router through a wireless signal. The order of the colored wires inside the RJ45 connector in copper straight through cable is the same on both ends. It’s used for cabling Switch to router, Switch to PC or server and Hub to PC or server

 Copper cross-over An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. It uses two different wiring standards: one end uses the T568A wiring standard, and the other end uses the T568B wiring standard. The internal wiring of Ethernet crossover cables reverses the transmit and receive signals. It is most often used to connect two devices of the same type: e.g. two computers (via network interface controller) or two switches to each other. It’s used for cabling Switch to switch, Switch to hub, Hub to hub, Router to router, Router Ethernet port to PC NIC and PC to PC

Lab Tasks:

4|Page

Task#1

Task 2

Task 3

5|Page

Addressing Table: Device

IP Address

Subnet Mask

Default Gateway

PC 0

192.168.1.2

255.255.255.0

192.168.1.1

PC 1

192.168.1.3

255.255.255.0

192.168.1.1

PC 2

192.168.1.4

255.255.255.0

192.168.1.1

PC 3

192.168.1.5

255.255.255.0

192.168.1.1

PC 4

192.168.1.6

255.255.255.0

192.168.1.1

PC 5

192.168.1.7

255.255.255.0

192.168.1.1

PC 6

192.168.1.8

255.255.255.0

192.168.1.1

PC 7

192.168.1.9

255.255.255.0

192.168.1.1

PC 8

192.168.1.10

255.255.255.0

192.168.1.1

PC 9

192.168.1.11

255.255.255.0

192.168.1.1

PC 10

192.168.1.12

255.255.255.0

192.168.1.1

PC 11

192.168.1.13

255.255.255.0

192.168.1.1

PC 12

192.168.1.14

255.255.255.0

192.168.1.1

PC 13

192.168.1.15

255.255.255.0

192.168.1.1

PC 14

192.168.1.16

255.255.255.0

192.168.1.1

PC 15

192.168.1.17

255.255.255.0

192.168.1.1

PC 16

192.168.1.18

255.255.255.0

192.168.1.1

PC 17

192.168.1.19

255.255.255.0

192.168.1.1

PC 18

192.168.1.20

255.255.255.0

192.168.1.1

PC 19

192.168.1.21

255.255.255.0

192.168.1.1

Conclusion: In this Lab we have learned about networking devices which include Hub, Switch and Router. We have designed network using Hub and Switch and test the network by transmission of data packets. The packets have reached to their destination successfully.

_________________________

6|Page

Lab#03 Switch Administrative Function Objective: The aim of this lab is to understand the basic configuration commands on a Cisco Switch interacting through Cisco IOS.

Introduction: This lab introduces Cisco IOS (Internetwork Operating System) which is a package of routing, switching, internetworking and telecommunications functions tightly integrated with a multitasking operating system. Cisco devices have 4 types of memories present:    

ROM Flash NV-RAM RAM

Procedure: Starting the lab by placing 4 PCs’ and 1 Cisco Switch (2950-24) which has 24 ports in logical workspace of packet tracer. After it we assigned IP Addresses to PCS leading to connection of console wire to switch. Packet Transmission was checked, which was successful. Initially switch can be accessed by anyone. Running Configuration was checked and copied to startup configuration.MAC Address table was checked. After changing host name, we assigned it password in configuration mode using ‘enable password’ command but this password was unencrypted. To encrypt it we use ‘enable secret’ command and again copied running configuration to startup configuration. Encrypted password has dominance over normal password. After it we enable console line using ‘line con 0’ command. Through console wire switch is accessible from PC. We assigned password to console line in config-line mode. After this connection line is accessible via login. Then we moved to switch and copied running configuration to startup configuration. Finally, we go to command prompt of pc and using ‘ping’ command. Entering IP address of pc shows us successful transmission of packets which include (Max Ping, Min Ping, Avg Ping, Round Trip Time). At last we assigned gateway address to all pcs.

Simulation:

7|Page

Commented [MSSC1]:

Results:

8|Page

Conclusion: In this Lab we have learned and implemented administrative functions of switch.

Question/Answers: Q#1: How many Ethernet or Fast Ethernet interfaces does the switch have? A#1: 24. Q#2: What is the range of values shown for the VTY lines? A#2:0-15 Q#3: Why does the switch give this response? A#3: As data was stored in volatile memory and got erased when switch was turned off. Q#4: Are there any passwords set on the lines? A#4: Initially there was no password enabled and line can be accessed by anyone Q#5: What does the configuration show as the hostname of this switch? A#5: AUBEE7BPower Q#6: What is difference between enable password and enable secret? A#6: Enable password is used every time you move from User EXEC mode to Privileged EXEC mode. This password gives you security on your router, because Privileged EXEC mode is where all the dangerous commands are located but this password is stored in plain text in your configuration file, thus anyone who has access to your configuration file can easily read the password so we need to set secret password When you configure both an enable and a secret password, the secret password is the password that will be used to switch from User Exec mode to Priv Exec mode. Q#7: Which password takes precedence, the enable password or enable secret Password? A#7 Enable Secret Q#8: Why we set password on console port? A#8 So no one can access switch directly from his pc Q#9: Are all the changes that were entered recorded in the file? A#9: Yes Q#10: Were the pings successful? A#10: 24

_______________________

9|Page

Lab#04 The Cisco Router User Interface Objective: The aim of this lab is to get familiarize with routers, understand its basic configuration and modes.

Introduction: The Cisco Internetwork Operating System (IOS) is the kernel of Cisco routers and most switches. a kernel is the basic, indispensable part of an operating system that allocates resources and manages things such as low-level hardware interfaces and security. Cisco has created something called Cisco Fusion which is supposed to make all Cisco devices run the same operating system. Almost all Cisco routers run the same IOS, in contrast to about half of their switches.

Procedure: Following steps are to be followed while configuring the router:  Configuring a Cisco router:  Connecting to a Cisco Router(console port is usually an RJ-45)  Bringing Up a Router(power-on self-test (POST).)  Setup Mode(Would you like to enter basic management setup?[yes/no]: n)  Command-Line Interface(Would you like to enter the initial configuration dialog? [yes]:n)  Logging into the Router(Router>Router>enableRouter# Router>logout  Router)  CLI Prompts  Interfaces(Router(config)#interface ?)  Subinterfaces(Router(config-subif)#)  Line Commands (Router(config-line) # Router#config t)  Editing and Help Features (Router#?)

Conclusion: In this Lab we have learned about basic configuration of a router.

_________________________

10 | P a g e

Lab#05 Router Administrative Function Objective: The aim of this lab is to understand cisco router advanced configurations and Administrative Functions.

Introduction: Router Administrative Functions: The administrative functions that you can configure on a router and switch are:    

Hostnames Banners Password Interface descriptions

Procedure: You can set the identity of the router with the hostname command. Router#config t Router(config)#hostname

A little security notice. Router(config)#banner motd #

There are five passwords used to secure your Cisco routers: console, auxiliary (not available in Packet Tracer), telnet (VTY), enable password, and enable secret. Router(config)#enable secret todd Router(config)#enable password todd Router(config-line)# password todd1 Router(config-line)#line vty [ Router(config-line)#password todd2 ]

Simulations:

11 | P a g e

Conclusion: In this Lab we have learned about administrative functions of router

_________________________

12 | P a g e...


Similar Free PDFs