Title | CN Lab Reports(1-5) - Lab Reports |
---|---|
Author | Muhammad Fahad Siddiq |
Course | Computer Networks |
Institution | Air University |
Pages | 12 |
File Size | 935.4 KB |
File Type | |
Total Downloads | 645 |
Total Views | 759 |
Warning: TT: undefined function: 32Lab#Introduction to Packet TracerObjective:The aim of Lab is to get familiarization with packet tracer, making connectionsbetween more than one devices and connectivity testing between the devicesIntroduction:Packet Tracer is a standalone, medium-fidelity, simulati...
Lab#01 Introduction to Packet Tracer Objective: The aim of Lab is to get familiarization with packet tracer, making connections between more than one devices and connectivity testing between the devices
Introduction: Packet Tracer is a standalone, medium-fidelity, simulation-based learning environment for networking novices to design, configure, and troubleshoot computer networks at a CCNA-level of complexity
Workspace: Packet Tracer uses following two representation schemes for network:
The Logical Workspace The Logical Workspace allows you to build a logical network topology, without regard to its physical scale and arrangement.
The Physical Workspace It allows you to arrange devices physically in cities, buildings, and wiring closets. Distances and other physical measures will affect network performance and other characteristics if wireless connections are used.
End Devices: Following are end devices used in packet tracer End Devices PC
VOIP Devices
Laptop
TV
Server/Meraki Server
Wireless Tablet
Printer
Smart Devices
Phone / IP Phone
Sniffer
IP Phone
Generic Wired/Wireless
Procedure & Simulations: Click on Switch in lower left part, click on 2950T and then again click in the main window. The switch will appear in the main window. After it Place four PCs Generic (in End Devices) in the main window. Than Double-click on PC0 and go to Desktop Tab. Click on IP Configuration and enter 192.168.1.2 as the IP address and 255.255.255.0 as subnet mask. 192.168.1.3 forPC1. Enter any IP address for PC3 and PC4 (in same network).
Conclusion: In this Lab we are introduced to networking software known as Packet Tracer. We learned about its interface and end devices used in designing networks etc. It allow users to create network topologies and imitate modern computer networks
________________________
2|Page
Lab#02 Introduction to Hub, Switch and Router Objective: The aim of this lab is to understand the difference between Hub, Switch and Router.
Introduction: Hubs, switches, and routers are all devices which let you connect one or more computers to other computers, networked devices, or to other networks. Each has two or more connectors called ports into which you plug in the cables to make the connection.
Network Devices: Hub A hub is typically the least expensive, least intelligent, and least complicated of the three. It works on the physical layer (Layer 1) of OSI model. Its job is very simple: anything that comes in one port is sent out to the others. It is a passive device without software and data transmission form in hub is in electrical signal or bits. It just connects multiple Ethernet devices together as a single segment
Switch A switch is able to handle the data and knows the specific addresses to send the message. It works on the data link layer (Layer 2) of OSI Model. It is more efficient than the hub. It can decide which computer is the message intended for and send the message directly to the right computer. The efficiency of switch has been greatly improved, thus providing a faster network speed.
Router(Gateway) A router is the smartest and most complicated of the bunch. It is a physical or virtual appliance that passes information between two or more packet-switched computer network . It works on the network layer (Layer 3) of OSI Model. A router inspects a given data packet's destination Internet Protocol address (IP address), calculates the best way for it to reach its destination and then forwards it accordingly. It usually connects at least two networks together, such as two LANs, two WANs or a LAN and its ISP network. It is intelligent and sophisticated to serve as an intermediate destination to connect multiple area networks together. The data transmission form in router is in form of packet
Connections: Console 3|Page
It is used to view the network device's console from a PC/laptop. One end of the cable connects to the console port of a network device while the other one connects to the RS232 port on a PC/laptop.
Copper Straight-through A copper straight through cable is standard configuration of network cable. It is a type of twisted pair cable that is used in local area networks to connect a computer to a network hub such as a router. It is also called a patch cable and is an alternative to wireless connections where one or more computers access a router through a wireless signal. The order of the colored wires inside the RJ45 connector in copper straight through cable is the same on both ends. It’s used for cabling Switch to router, Switch to PC or server and Hub to PC or server
Copper cross-over An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. It uses two different wiring standards: one end uses the T568A wiring standard, and the other end uses the T568B wiring standard. The internal wiring of Ethernet crossover cables reverses the transmit and receive signals. It is most often used to connect two devices of the same type: e.g. two computers (via network interface controller) or two switches to each other. It’s used for cabling Switch to switch, Switch to hub, Hub to hub, Router to router, Router Ethernet port to PC NIC and PC to PC
Lab Tasks:
4|Page
Task#1
Task 2
Task 3
5|Page
Addressing Table: Device
IP Address
Subnet Mask
Default Gateway
PC 0
192.168.1.2
255.255.255.0
192.168.1.1
PC 1
192.168.1.3
255.255.255.0
192.168.1.1
PC 2
192.168.1.4
255.255.255.0
192.168.1.1
PC 3
192.168.1.5
255.255.255.0
192.168.1.1
PC 4
192.168.1.6
255.255.255.0
192.168.1.1
PC 5
192.168.1.7
255.255.255.0
192.168.1.1
PC 6
192.168.1.8
255.255.255.0
192.168.1.1
PC 7
192.168.1.9
255.255.255.0
192.168.1.1
PC 8
192.168.1.10
255.255.255.0
192.168.1.1
PC 9
192.168.1.11
255.255.255.0
192.168.1.1
PC 10
192.168.1.12
255.255.255.0
192.168.1.1
PC 11
192.168.1.13
255.255.255.0
192.168.1.1
PC 12
192.168.1.14
255.255.255.0
192.168.1.1
PC 13
192.168.1.15
255.255.255.0
192.168.1.1
PC 14
192.168.1.16
255.255.255.0
192.168.1.1
PC 15
192.168.1.17
255.255.255.0
192.168.1.1
PC 16
192.168.1.18
255.255.255.0
192.168.1.1
PC 17
192.168.1.19
255.255.255.0
192.168.1.1
PC 18
192.168.1.20
255.255.255.0
192.168.1.1
PC 19
192.168.1.21
255.255.255.0
192.168.1.1
Conclusion: In this Lab we have learned about networking devices which include Hub, Switch and Router. We have designed network using Hub and Switch and test the network by transmission of data packets. The packets have reached to their destination successfully.
_________________________
6|Page
Lab#03 Switch Administrative Function Objective: The aim of this lab is to understand the basic configuration commands on a Cisco Switch interacting through Cisco IOS.
Introduction: This lab introduces Cisco IOS (Internetwork Operating System) which is a package of routing, switching, internetworking and telecommunications functions tightly integrated with a multitasking operating system. Cisco devices have 4 types of memories present:
ROM Flash NV-RAM RAM
Procedure: Starting the lab by placing 4 PCs’ and 1 Cisco Switch (2950-24) which has 24 ports in logical workspace of packet tracer. After it we assigned IP Addresses to PCS leading to connection of console wire to switch. Packet Transmission was checked, which was successful. Initially switch can be accessed by anyone. Running Configuration was checked and copied to startup configuration.MAC Address table was checked. After changing host name, we assigned it password in configuration mode using ‘enable password’ command but this password was unencrypted. To encrypt it we use ‘enable secret’ command and again copied running configuration to startup configuration. Encrypted password has dominance over normal password. After it we enable console line using ‘line con 0’ command. Through console wire switch is accessible from PC. We assigned password to console line in config-line mode. After this connection line is accessible via login. Then we moved to switch and copied running configuration to startup configuration. Finally, we go to command prompt of pc and using ‘ping’ command. Entering IP address of pc shows us successful transmission of packets which include (Max Ping, Min Ping, Avg Ping, Round Trip Time). At last we assigned gateway address to all pcs.
Simulation:
7|Page
Commented [MSSC1]:
Results:
8|Page
Conclusion: In this Lab we have learned and implemented administrative functions of switch.
Question/Answers: Q#1: How many Ethernet or Fast Ethernet interfaces does the switch have? A#1: 24. Q#2: What is the range of values shown for the VTY lines? A#2:0-15 Q#3: Why does the switch give this response? A#3: As data was stored in volatile memory and got erased when switch was turned off. Q#4: Are there any passwords set on the lines? A#4: Initially there was no password enabled and line can be accessed by anyone Q#5: What does the configuration show as the hostname of this switch? A#5: AUBEE7BPower Q#6: What is difference between enable password and enable secret? A#6: Enable password is used every time you move from User EXEC mode to Privileged EXEC mode. This password gives you security on your router, because Privileged EXEC mode is where all the dangerous commands are located but this password is stored in plain text in your configuration file, thus anyone who has access to your configuration file can easily read the password so we need to set secret password When you configure both an enable and a secret password, the secret password is the password that will be used to switch from User Exec mode to Priv Exec mode. Q#7: Which password takes precedence, the enable password or enable secret Password? A#7 Enable Secret Q#8: Why we set password on console port? A#8 So no one can access switch directly from his pc Q#9: Are all the changes that were entered recorded in the file? A#9: Yes Q#10: Were the pings successful? A#10: 24
_______________________
9|Page
Lab#04 The Cisco Router User Interface Objective: The aim of this lab is to get familiarize with routers, understand its basic configuration and modes.
Introduction: The Cisco Internetwork Operating System (IOS) is the kernel of Cisco routers and most switches. a kernel is the basic, indispensable part of an operating system that allocates resources and manages things such as low-level hardware interfaces and security. Cisco has created something called Cisco Fusion which is supposed to make all Cisco devices run the same operating system. Almost all Cisco routers run the same IOS, in contrast to about half of their switches.
Procedure: Following steps are to be followed while configuring the router: Configuring a Cisco router: Connecting to a Cisco Router(console port is usually an RJ-45) Bringing Up a Router(power-on self-test (POST).) Setup Mode(Would you like to enter basic management setup?[yes/no]: n) Command-Line Interface(Would you like to enter the initial configuration dialog? [yes]:n) Logging into the Router(Router>Router>enableRouter# Router>logout Router) CLI Prompts Interfaces(Router(config)#interface ?) Subinterfaces(Router(config-subif)#) Line Commands (Router(config-line) # Router#config t) Editing and Help Features (Router#?)
Conclusion: In this Lab we have learned about basic configuration of a router.
_________________________
10 | P a g e
Lab#05 Router Administrative Function Objective: The aim of this lab is to understand cisco router advanced configurations and Administrative Functions.
Introduction: Router Administrative Functions: The administrative functions that you can configure on a router and switch are:
Hostnames Banners Password Interface descriptions
Procedure: You can set the identity of the router with the hostname command. Router#config t Router(config)#hostname
A little security notice. Router(config)#banner motd #
There are five passwords used to secure your Cisco routers: console, auxiliary (not available in Packet Tracer), telnet (VTY), enable password, and enable secret. Router(config)#enable secret todd Router(config)#enable password todd Router(config-line)# password todd1 Router(config-line)#line vty [ Router(config-line)#password todd2 ]
Simulations:
11 | P a g e
Conclusion: In this Lab we have learned about administrative functions of router
_________________________
12 | P a g e...