0% found this document useful (0 votes)
27 views33 pages

Data Communicationand Computer Networking Lab Manual

Computer Networks lab manual for degree students

Uploaded by

Ravi Potnuru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views33 pages

Data Communicationand Computer Networking Lab Manual

Computer Networks lab manual for degree students

Uploaded by

Ravi Potnuru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 33

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/362834215

Data Communication and Computer Networking Lab Manual

Technical Report · August 2022

CITATION
S READS

0 17,452

1 author:

Md. Humayun Kabir


New Vision Information Technology Limited
52 PUBLICATIONS 206 CITATIONS

SEE PROFILE

All content following this page was uploaded by Md. Humayun Kabir on 21 August 2022.

The user has requested enhancement of the downloaded file.


International Islamic University Chittagong (IIUC)
Department of Computer & Communication Engineering (CCE)

Lab Manual
Course Code: CCE – 4702
Course Title: Data Communication and Computer Networking
Sessional

Md. Humayun Kabir


Assistant Lecturer
Dept. of CCE, IIUC
Experiment No: 01
Experiment Name: Concept of Network Device, OSI Model, IP Address and
Subnetting
Objectives:
 To learn basics of Local Area Network (LAN)
 Understand different types of LAN devices
 To learn IP Address and Subnetting
Description:
Data Communication:
Data communications is the process of using computing and communication
technologies to transfer data from one place to another, or between
participating parties. It enables the movement of electronic or digital data
between two or more network nodes, regardless of geographical location,
technological medium or data contents.
Some common types of data communications technologies include
telecommunications, computer networking and radio/satellite
communication. Data communication usually requires the existence of a
transportation or communication medium between the nodes wanting to
communicate with each other, such as copper wire, fiber optic cables, or
wireless signals.
For example, a common example of data communications is a computer
connected to the Internet via a Wi-Fi connection, which uses a wireless
medium to send and receive data from one or more remote servers.
Some devices/technologies used in data communications are known as data
communication equipment (DCE) and data terminal equipment (DTE). DCE is
used at the sending node, and DTE is used at the receiving node. Data
communication also relies on various types of protocols, depending on the
environment in which the messages sent. Internet protocols like FTP, HTTP
and HTTPS.
New advances like the Internet of Things promise different connectivity and
different data communications models.
Computer Network:
A computer network is a system that connects numerous independent
computers in order to share information (data) and resources. The
integration of computers and other different devices allows users to
communicate more easily.
A computer network is a collection of two or more computer systems that are
linked together. A network connection can be established using either cable
or wireless media. Hardware and software are used to connect computers
and tools in any network.
A computer network consists of various kinds of nodes. Servers, networking
hardware, personal computers, and other specialized or general-purpose
hosts can all be nodes in a computer network. Hostnames and network
addresses are used to identify them.
Computer Network Types
A computer network can be categorized by their size. A computer network is
mainly of four types:
 LAN (Local Area Network)
 PAN (Personal Area Network)
 MAN (Metropolitan Area Network)
 WAN (Wide Area Network)
Local Area Network (LAN): A LAN is a network that covers an area of
around 10 kilometers. For example, a college network or an office network.
Depending upon the needs of the organization, a LAN can be a single office,
building, or Campus. We can have two PCs and one printer in-home office or
it can extend throughout a company and include audio and video devices.
Each host in LAN has an identifier, an address that defines hists in LAN. A
packet sent by the host to another host carries both the source host’s and
the destination host’s address.
Personal Area Network (PAN): Personal Area Network is a network
arranged within an individual person, typically within a range of 10 meters.
Personal Area Network is used for connecting the computer devices of
personal use is known as Personal Area Network. Personal Area Network
covers an area of 30 feet. Personal computer devices that are used to
develop the personal area network are the laptop, mobile phones, media
player and play stations.
There are two types of Personal Area Network:
 Wired Personal Area Network
 Wireless Personal Area Network
Wireless Personal Area Network: Wireless Personal Area Network is
developed by simply using wireless technologies such as WiFi, Bluetooth. It is
a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the
USB.
Metropolitan Area Network (MAN): A metropolitan area network is a
network that covers a larger geographic area by interconnecting a different
LAN to form a larger network. Government agencies use MAN to connect to
the citizens and private industries. In MAN, various LANs are connected to
each other through a telephone exchange line. MAN refers to a network that
covers an entire city. For example: consider the cable television network.
Wide Area Network (WAN): WAN refers to a network that connects
countries or continents. For example, the Internet allows users to access a
distributed system called
www from anywhere around the globe. WAN interconnects connecting
devices such as switches, routers, or modems. A LAN is normally privately
owned by an organization that uses it. We see two distinct examples of
WANs today: point-to-point WANs and Switched WANs.
Networking Devices:

Figure 1: Networking Devices

Basic hardware interconnecting network nodes, such as Network Interface


Cards (NICs), Bridges, Hubs, Switches, and Routers, are used in all networks.
In addition, a mechanism for connecting these building parts is necessary,
which is usually galvanic cable and optical cable are less popular (“optical
fiber”) The following are the network devices:
NIC (Network Interface Card): A network card, often known as a network
adapter or NIC (network interface card), is computer hardware that enables
computers to communicate via a network. It offers physical access to
networking media and, in many cases, MAC addresses serve as a low-level
addressing scheme. Each network interface card has a distinct identifier. This
is stored on a chip that is attached to the card.
Repeater: A repeater is an electrical device that receives a signal, cleans it
of unwanted noise, regenerates it, and retransmits it at a higher power level
or to the opposite side of an obstruction, allowing the signal to travel greater
distances without degradation. In the majority of twisted pair Ethernet
networks, Repeaters are necessary for cable lengths longer than 100 meters
in some systems. Repeaters are based on physics.
Hub: A hub is a device that joins together many twisted pairs or fiber optic
Ethernet devices to give the illusion as a formation of a single network
segment. The device can be visualized as a multiport repeater. A network
hub is a relatively simple broadcast device. Any packet entering any port is
regenerated and broadcast out on all other ports, and hubs do not control
any of the traffic that passes through them. Packet collisions
occur as a result of every packet being sent out through all other ports,
substantially impeding the smooth flow of communication.
Bridges: Bridges broadcast data to all the ports but not on the one that
received the transmission. Bridges, on the other hand, learn which MAC
addresses are reachable through specific ports rather than copying
messages to all ports as hubs do. Once a port and an address are associated,
the bridge will only transport traffic for that address to that port.
Switches: A switch differs from a hub in that it only forwards frames to the
ports that are participating in the communication, rather than all of the ports
that are connected. The collision domain is broken by a switch, yet the
switch depicts itself as a broadcast domain. Frame forwarding decisions are
made by switches based on MAC addresses.
Routers: Routers are networking devices that use headers and forwarding
tables to find the optimal way to forward data packets between networks. A
router is a computer networking device that links two or more computer
networks and selectively exchanges data packets between them. A router
can use address information in each data packet to determine if the source
and destination are on the same network or if the data packet has to be
transported between networks. When numerous routers are deployed in a
wide collection of interconnected networks, the routers share target system
addresses so that each router can develop a table displaying the preferred
pathways between any two systems on the associated networks.
Gateways: To provide system compatibility, a gateway may contain devices
such as protocol translators, impedance matching devices, rate converters,
fault isolators, or signal translators. It also necessitates the development of
administrative procedures that are acceptable to both networks. By
completing the necessary protocol conversions, a protocol
translation/mapping gateway joins networks that use distinct network
protocol technologies.
Modem: A modem is a hardware device that allows the computer to connect
to the internet over the existing telephone line. It stands for
Modulator/Demodulator. It converts the digital data into an analog signal
over the telephone lines. Based on the differences in speed and transmission
rate, a modem can be classified in the following categories:
 Standard PC modem or Dial-up modem
 Cellular Modem
 Cable modem
Cables and Connectors: Cable is a transmission media used for transmitting
a signal. There are three types of cables used in transmission:
 Twisted pair cable
 Coaxial cable
 Fibre-optic cable
Open System Interconnection (OSI) Model:
 The Open System Interconnection (OSI) reference model describes how
information from a software application in one computer moves
through a network medium to a software application in another
computer.
 The OSI reference model is a conceptual model composed of seven
layers, each specifying particular network functions.
 The OSI model divides the tasks involved with moving information
between networked computers into seven smaller, more manageable
task groups.
 A task or group of tasks is then assigned to each of the seven OSI layers.
The following list details the seven layers of the Open System Interconnection
(OSI) reference model:
Layer 7 — Application
Layer 6 —
Presentation Layer 5
— Session Layer 4
— Transport Layer 3
— Network Layer 2
— Data link Layer 1
— Physical

Figure 1: OSI Model


Internet Protocol (IP) Address:
An IP stands for internet protocol. An IP address is assigned to each device
connected to a network. Each device uses an IP address for communication.
It also behaves as an identifier as this address is used to identify the device
on a network. It defines the technical format of the packets. Mainly, both the
networks, i.e., IP and TCP, are combined together, so together, they are
referred to as a TCP/IP. It creates a virtual connection between the source
and the destination. We can also define an IP address as a numeric address
assigned to each device on a network. An IP address is assigned to each
device so that the device on a network can be identified uniquely. To
facilitate the routing of packets, TCP/IP protocol uses a 32-bit logical address
known as IPv4(Internet Protocol version 4). An IP address consists of two
parts, i.e., the first one is a network address, and the other one is a host
address.
The process of IP address works in the following way:
 Your computer, smartphone, or any other Wi-Fi-enabled device firstly
connects to a network that is further connected to the internet. The
network is responsible for giving your device access to the internet.
 While working from home, your device would be probably using that
network provided by your Internet Service Provider (ISP). In a
professional environment, your device uses your company network.
 Your ISP is responsible to generate the IP address for your device.
 Your internet request penetrates through the ISP, and they place the
requested data back to your device using your IP address. Since they
provide you access to the internet, ISP's are responsible for allocating
an IP address to your computer or respective device.
 Your IP address is never consistent and can change if there occur any
changes in its internal environment. For instance, if you turn your
modem or router on or off, it will change your IP address. Or the user
can also connect the ISP to change their IP address.
 When you are out of your home or office, mainly if you travel and carry
your device with you, your computer won't be accessing your home IP
address anymore. This is because you will be accessing the different
networks (your phone hotspot, Wi- Fi at a cafe, resort, or airport, etc.)
to connect the device with the internet. Therefore, your device will be
allocated a different (temporary) IP address by the ISP of the hotel or
cafe.
There are two types of IP addresses:
 IPv4
 IPv6
Classful Addressing
The 32-bit IP address is divided into five sub-classes. These are:
 Class A
 Class B
 Class C
 Class D (Multicast Address)
 Class E (Reserved)
IP Header Classes:
Max
Addres Subne Exampl Leadin
Class number of Application
s t e IP g
Range maskin bits networks
g
Used for large number
IP Class A 1 to 126 255.0.0.0 1.1.1.1 8 128
of hosts.
Used for medium size
IP Class B 128 to 191 255.255.0.0 128.1.1.1 16 16384
network.
Used for local area
IP Class C 192 to 223 255.255.255.0 192.1.11. 24 2097157
network.
IP Class D 224 to 239 NA NA NA NA Reserve for multi-tasking.
This class is reserved for
IP Class E 240 to 254 NA NA NA NA research and
Development
Purposes.
How to make RJ45 cable
RJ45 cable is used for connect the ALL HMI and engineer station through a
switch to communicated each other. It is used to download the any
modification and which is made in graphics in engineering station. RJ45 cable
also used for communicate the printer with computer.
Required tool and materials:
1. Ethernet Cable – Category 5e or CAT5e or CAT6
2. RJ-45 Crimping tool
3. RJ45 Crimp able Connectors

There are two kinds of Ethernet cable is used for communication.


1. Straight Through
2. Cross over cable
Straight Through cable:
STRAIGHT THROUGH Ethernet cables are the standard cable used for almost
all purposes, and are often called “patch cables”. It is highly recommended
you duplicate the color order as shown on the left. Note how the green pair is
not side-by-side as are all the other pairs. This configuration allows for longer
wire runs.
Important Instruction: Always remember that both end connector clip facing
away from you when check the color.
Crossover Cables –
The purpose of a Crossover Ethernet cable is to directly connect one computer
to another computer (or device) without going through a router, switch or hub.

Procedure to make RJ45 cable:


Step 1: Cut into the plastic sheath about 1 inch (2.5 cm) from the end of the
cut cable. Do not cut deep which may cause damage the insulation of core.

Step 2: Unwind and pair the similar colors. Pinch the wires between your
fingers and straighten them out in a sequence of color as u want to make
cable (Straight cable or cross over cable). The color order is important to get
correct
Step 3: A straight cut across the 8 wires to shorten them to 1/2 Inch (1.3
cm) from the cut sleeve to the end of the wires by crimping tool. Carefully
push all 8 unstrapped colored wires into the connector. Plastic sleeve should
be inserted proper in connector.

Wrong way: The plastic sleeve is not inside the connector where it can be
locked into place. The wires are too long. The wires should extend only 1/2
inch from the blue cut sleeve. The wires do not go all the way to the end of
the connector. The wires are too short.

Crimping the cable: Carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing tabs on
the connector will pierce into each of the eight wires. There is also a locking
tab that holds the plastic sleeve in place for a tight compression fit. When
you remove the cable from the crimper, that end is ready to use.

Step 4: Repeat steps 1-3 for the other end of the cable.
Step 5: To make sure you've successfully terminated each end of the cable,
use a cable tester to test each pin. Check the continuity of both connectors
each other. Check the cable threw a cable tester or ping from a computer. To
check the cable through computer connects both connector in two
computers for cross cable and straight cable connect through a switch then
ping the computer.
Conclusion:

Questions:
1. What is network topology?
2. What are the types of enterprise computer networks?
3. List the advantages and disadvantages of the internet.
4. Compare the Internet & the World Wide Web.
5. What is the basic difference between the Internet and the network?
Experiment No: 02
Experiment Name: Introduction to Network Simulator – Packet Tracer and
Connect Computer using Different Network Topology with Wired Media
Objectives:
 Introduction to Packet Tracer Interface.
 To learn how to use different components and build a simple network.
 Understand to create Local Area Network (LAN) using star topology.
Description:
A peer-to-peer network is a type of decentralized and distributed network
architecture in which the individual nodes (computers, printers) act in the
networks act as both suppliers and consumers of resources. It differs from
the client server networking model where certain devices have the
responsibility of providing all serving data and other devices consumes or act
as a client. Computers in peer-to-peer network run the same networking
protocol and software. These networks are usually situated physically close
to each other. P2P networks are robust. If one attached device goes down,
the network continues. It is possible to configure computers in peer-to-peer
workgroups to allow sharing of files, printers, and other resources across all
the devices. Peer networks allow data to be shared easily in both directions,
whether for downloads to a computer or uploads from the same computer.
Since each device participates in routing traffic through the network, hackers
can easily launch denial of service attacks. P2P software acts as server and
client, which makes peer-to-peer networks more vulnerable to remote
attacks than client-server networks. Data that is corrupt can be shared on
P2P networks by modifying files that are already on the network to introduce
malicious code.

Figure 1: Peer-to-Peer Network


Topology types:
Following are different types of topologies which mainly used to connect
computers with each other to form a network.
Bus Topology:
 A bus topology consists of main System Bus with a terminator at each
end in which all computers (node) are connected to the cable.
 A signal from the source travels in both directions to all computers
connected on the bus cable until it finds the intended recipient. If the
computer address does not match the intended address for the data,
the computer ignores the data.

Figure 2: Bus Network Topology

Ring Topology:
 In this all the computers (nodes) are connected to each-other in such a
way that they make a closed loop.
 Each computer is connected to two other components on either side,
and it communicated with these two adjacent neighbors. Data is sent
around the ring until it reaches its final destination.

Figure 3: Ring Network Topology


Mesh Topology:
 This topology employs either or two schemes, called full mesh and partial mesh.
 In the full mesh topology, each computer is connected directly to each
of the others. In the partial mesh topology. some computers are
connected to all the others, and some are connected only to those
other nodes with which they exchange the most data.
 If there are n computers, there will be (n x (n-1)), 2 cables in the
network. For examples, if you have five computers in a mesh network,
it will use 5 x (5 - 1), 2, which equals 10 cables.

Figure 4: Mesh Network Topology

Star Topology:
 In this every node (computer workstation or any other peripheral) is
connected to central node or device called hub or switch)
 All the data on the star topology passes through the central device
before reaching the intended destination.
 A hub forwards data packets to all the ports. A switch is more
intelligent. It recognizes which computer is connected to which port
based on the MAC address and saves this information in a table. When
a switch receives a data packet, it determines the recipient and
forwards the packet to the correct computer.
 An advantage of the star topology is the simplicity of adding additional
nodes. The primary disadvantage of the star topology is that the
hub/switch represents a single point of failure.
 Extended Star topology uses the star topology to be created. It links
individual stars together by linking the hubs/switches. this will extend
the length of the network.
Figure 5: Star Network Topology

Hybrid Topology:
 The combination of various different topologies is known as Hybrid
topology. A Hybrid topology is a connection between different links and
nodes to transfer the data.
 When two or more different topologies are combined together is
termed as Hybrid topology and if similar topologies are connected with
each other will not result in Hybrid topology.
 For example, if there exist a ring topology in one branch of ICICI bank
and bus topology in another branch of ICICI bank, connecting these two
topologies will result in Hybrid topology.

Figure 6: Hybrid Network Topology


Exercises 1:
1. Design a Bus, Ring, Star topology using 4 PC and a Switch with
following IP address:
Host IP Address Subnet Mask
PC1 192.68.1.10 255.255.255.0
PC2 192.68.1.11 255.255.255.0
PC3 192.68.1.12 255.255.255.0
PC4 192.68.1.13 255.255.255.0
2. Design a Hybrid topology using following PC and a Switch with
following IP address:
Host IP Address Subnet Mask Host IP Address Subnet Mask
PC1 192.68.1.10 255.255.255.0 PC6 192.68.1.15 255.255.255.0
PC2 192.68.1.11 255.255.255.0 PC7 192.68.1.16 255.255.255.0
PC3 192.68.1.12 255.255.255.0 PC8 192.68.1.17 255.255.255.0
PC4 192.68.1.13 255.255.255.0 PC9 192.68.1.18 255.255.255.0
PC5 192.68.1.14 255.255.255.0 PC10 192.68.1.19 255.255.255.0
3. Observe the flow of data from host to host by creating network traffic.
Conclusion:

Questions:
1. What is Network topology?
2. What is use of physical and logical topology?
3. Which topology required terminator at both the ends of cable?
4. State why topology required in laboratory.
5. List out names of transmission media and network devices required to form star
topology.
6. Give the meaning of extended star topology.
7. What is difference between hub and switch?
8. Give the use of NIC card. Is it required to connect computers in star topology?
9. Write a formula to calculate how many cables are required to connect n
computers in mesh topology?
10.Complete the following table by writing type of the cable required to connect two
devices:
Device Switch Router Computer Hub
Switch
Router
Computer
Hub
Experiment No: 03
Experiment Name: Basic Router Configuration
Objectives:
 Understanding Basic Networking Commands
 Configuring the Router Configuration Commands
Description:
A router is a layer 3 device used to forward packets from one network to
another. It forwards the packet through one of its ports on the basis of
destination IP address and the entry in the routing table. By using a routing
table, it finds an optimized path between the source and destination

network.
Figure 1: Cisco Router Port
Types of Ports in Cisco Router
 Ethernet Port
 Auxilary Port
 Console Port
 WIC slot 0 (WIC0)
 WIC slot 1 (WIC1)
Functions of ports in Cisco Router
Connector/slot Label/color Description
The router is connected to the local
Ethernet network through this port.
10/100 ETHERNET u
Ethernet port The port senses the speed and the
(yellow)
duplex mode of the device and
then operates at
the same speed and mode.
Connects to the modem for remote
Auxiliary port AUX (black)
configuration
Connects to a terminal or PC for
Console port CONSOLE (blue)
local configuration
WIC slot 0
No label Supports one Cisco WIC
(WICO)
WIC slot 1
No label Supports one Cisco WIC
(WIC1)
When you first power up a new Cisco Router, you have the option of using the
“setup”
utility which allows you to create a basic initial configuration.
However, in this post I will show you how to do this basic setup with the
Command Line Interface (CLI).
Mastering the Cisco Router CLI is essential for more complex configuration
tasks and it is the most important knowledge you should acquire if you want
to become a Cisco network administrator.
CLI Configuration Modes
The basic CLI modes that we will be referring below are as following:
Modes Access method Prompt Exit method
User Execution
login router> use logout command
Mode
use enable use disable command
Privilege Mode router#
command in to enter user mode
user mode
Global
use configure use the exit command
Configuration router(config)#
terminal to enter into privilege
Mode
command mode
use the exit command
use interface
to enter into global
command and
Interface Mode router(config-if)# configuration mode or
specify an interface
use
in global
the end command to
configuration mode
enter into privilege mode.
I assume that you already have some basic knowledge of CLI and how to
navigate between different configuration modes (user mode, privileged exec
mode etc), so let’s get started:
Here, we will talk about Cisco router’s basic commands like assigning an IP address to
an
interface, bringing up an interface, applying to enable and secret passwords.
Administrative
Configuration:
Configuration – 1
1. The user execution mode:
router>
2. Entering into privilege mode from user execution mode:
router>enable
router#
3. Entering in global configuration mode from privilege mode:
router#configure terminal
router(config)#
4. Entering into interface mode from global configuration mode. Here we have
to
specify the router’s interface.
router(config)#interface
fa0/0 router(config-if)#
5. Exiting from interface mode to global configuration mode to privilege
mode to user execution mode.
router(config-
if)#exit
router(config)#exit
router#exit
router>
Configuration – 2: Setting Hostname & Banner to the Router
1. Giving hostname to the router –
It is used to set a name to a device stating an identity to a device. This
is important as these hostnames are used in WAN for authentication
purposes. We can set the hostname as:
router>enable
router#configure
router(config)#hostname
BTCL BTCL(config)#
2. Giving banner to the router-
Applying banners – These are specifically used to give a small security
notice to the user who wants to access the router. We can customize it
According to our needs as like asking for credentials needed for the
login.
BTCL>enable
BTCL#configure
BTCL(config)#banner motd #No unauthorized access allowed.
Enter your credentials!! #
Here motd means a message of the day and # means delimiter i.e
message should end with the symbol provided. This message will be
shown while entering into the router’s user execution mode.
Configuration – 3: Setting password –
There are three passwords used to secure a Cisco device:
1. Enable password – The enable password is used for securing
privilege mode. This password will be shown in clear text by the
command “show running- configuration”. These are replaced by secret
passwords nowadays.
BTCL>enable
BTCL#configure
BTCL(config)#enable password Cisco12345
2. Enable secret password – This is also used for securing privilege
mode but the d the difference is that it will be displayed as a cipher in
“show running- configuration”. This password will override the enable
password if both passwords are set.
BTCL>enable
BTCL#configure
BTCL(config)#enable secret Cisco12345
3. Service password-encryption – The first method of encryption that
Cisco provides is through the command service password-encryption.
You enable this feature from global configuration mode.
BTCL>enable
BTCL#configure
BTCL(config)# service password-encryption
Configuration – 4: Configure IP addresses for Router
Interfaces
This is an essential step in order for your router to be able to forward
packets in the network. The most basic parameter for a Router
Interface is the IP address. In this example, BTCL router in the topology
diagram will be configured with initial settings. the Cisco 1841 router is
equipped with two First-Ethernet interfaces:
FirstEthernet 0/0 (f0/0)
FirstEthernet 0/1 (f0/1)
From Global Configuration Mode you need to enter into Interface
Configuration Mode:

Figure 2: Network Topology 1


BTCL>enable
BTCL#configure
BTCL(config)#interface fastEthernet 0/0
BTCL(config-if)#ip address 192.168.10.1
255.255.255.0 BTCL(config-if)#no shutdown
BTCL(config-if)#exit
BTCL(config)#interface fastEthernet
0/1
BTCL(config-if)#ip address 192.168.11.1
255.255.255.0 BTCL(config-if)#no shutdown
BTCL(config-if)#exit
BTCL(config)#exit
BTCL#show ip interface
brief
Observe the flow of data from host to host by creating network
traffic. Lab Task 1:
1. Design a network topology using following IP address:
Network 1 IP Address Mother Switch 1 Child Switch 2
A1: 192.168.10.10 A2: 192.168.10.20
192.168.10.1 B1: 192.168.10.11 B2: 192.168.10.21
C1: 192.168.10.12 C2: 192.168.10.22
Network 2 IP Address Mother Switch 1 Child Switch 2
A1: 192.168.11.10 A2: 192.168.11.20
192.168.11.1 B1: 192.168.11.11 B2: 192.168.11.21
C1: 192.168.11.12 C2: 192.168.11.22
2. Observe the flow of data from host to host by creating network traffic.
Lab Task 2:
1. Design a network topology using following IP address:
Network 1 IP Address Mother Switch 1 Child Switch 2
A1: 192.168.10.10 AA2: 192.168.10.20
192.168.10.1 B1: 192.168.10.11 BB2: 192.168.10.21
C1: 192.168.10.12 CC2: 192.168.10.22
Network 2 IP Address Mother Switch 1 Child Switch 2
AAA1: 192.168.11.10 AAAA2: 192.168.11.20
BBB1: 192.168.11.11 BBBB2: 192.168.11.21
192.168.11.1
CCC1: 192.168.11.12 CCCC2: 192.168.11.22
Network 3 IP Mother Switch 1 Child Switch 2
Address
PC1: 192.168.12.10 PC4: 192.168.12.20
192.168.12.1 PC2: 192.168.12.11 PC5: 192.168.12.21
PC3: 192.168.12.12 PC6: 192.168.12.22

2. Observe the flow of data from host to host by creating network traffic.
Conclusion:
Experiment No: 04
Experiment Name: Configuring a Cisco Router as a DHCP (Dynamic Host
Configuration Protocol) Server
Objectives:
 Configure a router for Dynamic Host Configuration Protocol (DHCP) to
dynamically assign addresses to attached hosts.
Description:
DHCP is a service. It allows devices to acquire their IP configuration
dynamically. It works in the server/client model. The server offers and
delivers IP configurations. Clients request and acquire their IP configurations.
DHCP (Dynamic Host Configuration Protocol) configuration is performed on
routers to assign an IP address, subnet mask, gateway address ad DNS
server address to the host systems. With this configuration, the dynamic IP
address is assigned, which enables the administrator to easily connect a new
host in the configured network.
DHCP Address Allocation Methods:
To provide an IP configuration, a DHCP server can use three mechanisms.
These mechanisms are the following.

Figure 1: DHCP Address Allocation Methods


Static Allocation
In this method, the administrator configures an allocation table on the DHCP
server. In this table, the administrator fills the MAC addresses of all clients
and assigns an IP configuration to each client.
The DHCP server uses the allocation table to provide IP configurations. When
a client requests an IP configuration, the DHCP server checks the table and
finds a match. If the DHCP server finds a match, the DHCP server offers the
IP configuration that is associated with the MAC address of the client in the
match.
Dynamic Allocation
In this method, the administrator configures a range of IP addresses on the
DHCP server. The DHCP server assigns an IP configuration from the
configured range to each client that requests an IP configuration.
In this method, the DHCP offers the IP configuration only for a specific time.
This specific time is known as the lease. The IP configuration remains valid
until the lease duration is over. Once the lease duration is over, the client is
required to obtain a new IP configuration from the server.
Automatic Allocation
Same as the dynamic method, in this method, the administrator also
configures a range of IP addresses on the DHCP server and the DHCP server
assigns an IP configuration from the configured range to each client that
requests an IP configuration.
Unlike the dynamic method, in this method, the DHCP server assigns the IP
configuration permanently. To assigns an IP configuration permanently, the
DHCP server sets the lease duration to infinite. As a result, once the DHCP
server chooses an IP configuration from the pool and assigns the IP
configuration to a client, the IP configuration remains with that same client
indefinitely.
DHCP works
When a host (DHCP client) needs an IP configuration, it connects to a DHCP
server and requests for an IP configuration. A DHCP server contains several
pre-configured IP configurations. When it receives a DHCP request from a
DHCP client, it provides an IP configuration to the client from all available IP
configurations.
This entire process goes through the four steps: Discover, Offer, Request,
and Acknowledgment. In this tutorial, we will understand these four steps in
detail. The following image shows all four steps of DHCP communication.

Figure 2: DHCP Address Allocation Process


The following table summarizes messages that are used in each stage.
Discover The DHCP client broadcasts this message to find a DHCP
server.
The DHCP server broadcasts this message to lease an
Offer
IP configuration to the DHCP client.
The DHCP client uses this message to notify the DHCP
Request
server whether it accepts the proposed IP
configuration or not.
The DHCP server uses this message to confirm the DHCP
Acknowledgmen
client that it can use the offered IP
configuration.
t
LAB Setup for the practice of DHCP Server

Figure 3: Lab Setup 1


Router>enable
Router#configure
terminal
Router(config)#interface fastEthernet 0/0
Router(config-if)#ip address 192.168.1.1
255.255.255.0 Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#ip dhcp pool
Network_1
Router(dhcp-config)#network 192.168.1.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.1.1
Router(dhcp-config)#dns-server
192.168.1.10 Router(dhcp-config)#exit
Router(config)#ip dhcp excluded-address 192.168.1.0
192.168.1.10 Router(config)#exit
Router#wr
Building configuration...
[OK]
Verifying the DHCP Server
Router# show ip dhcp binding

Router# show ip dhcp pool

Lab Task 1:
In this lab, there are two networks: Left_network and Right_Network.
Both networks are connected to the router's Fast Ethernet 0/0 and 0/1
interfaces, respectively. Now our objective is to configure the following IP
configuration on both networks.
Configuration Left_Network Right_Network
IP addresses 192.168.1.0 to 192.168.2.0 to 192.168.2.255
192.168.1.255
Available IP
192168.1.10 to 192.168.2.10 to 192.168.2.254
addresses for
192.168.1.254
hosts
Subnet mask 255.255.255.0 255.255.255.0
Default Gateway 192.168.1.1 192.168.2.1
DNS Server 192.168.1.2 192.168.2.2
Reserved 192.168.1.4 to 192.168.1.10 192.168.2.4 to 192.168.2.10
Lab Task 1:
In this lab, there are four networks: CCE_network, ETE_Network,
CSE_Network and EEE_Network. Both networks are connected to the
router's Fast Ethernet 0/0 and 0/1 interfaces, Ethernet 0/0/0 and 0/1/0
interfaces respectively. Now our objective is to configure the following IP
configuration on both networks.
Configuration CCE_Network ETE_Network
IP addresses 10.10.1.0 to 10.10.1.255 150.10.2.0 to 150.10.2.255
Available IP
10.10.1.10 to 10.10.1.254 150.10.2.10 to 150.10.2.254
addresses for
hosts
Subnet mask 255.0.0.0 255.255.0.0
Default Gateway 10.10.1.1 150.10.2.1
DNS Server 10.10.1.2 150.10.2.2
Reserved 10.10.1.0 to 10.10.1.10 150.10.2.0 to 150.10.2.10
Configuration CSE_Network EEE_Network
IP addresses 192.168.1.0 to 210.168.2.0 to 210.168.2.255
192.168.1.255
Available IP
192168.1.10 to 210.168.2.10 to 210.168.2.254
addresses for
192.168.1.254
hosts
Subnet mask 255.255.255.0 255.255.255.0
Default Gateway 192.168.1.1 210.168.2.1
DNS Server 192.168.1.2 210.168.2.2
Reserved 192.168.1.4 to 192.168.1.10 210.168.2.0 to 210.168.2.10

Conclusion:

Questions:
1. What is the purpose of DHCP on the customer network?
2. Describe the process of installing a DHCP server in an AD infrastructure?
3. Process of DHCP (DORA)?
4. What is an IP Lease?
5. What is the default duration of a lease?
6. How does it work?
7. How can I prevent unauthorized laptops from using a network that
uses DHCP for dynamic addressing?
8. What IP address is assigned to the workstation after its IP address is renewed?
9. What other DHCP options can be defined on the Cisco 1841 ISR router
that are not configured in this activity?
View publication stats

You might also like