Data Communicationand Computer Networking Lab Manual
Data Communicationand Computer Networking Lab Manual
net/publication/362834215
CITATION
S READS
0 17,452
1 author:
SEE PROFILE
All content following this page was uploaded by Md. Humayun Kabir on 21 August 2022.
Lab Manual
Course Code: CCE – 4702
Course Title: Data Communication and Computer Networking
Sessional
Step 2: Unwind and pair the similar colors. Pinch the wires between your
fingers and straighten them out in a sequence of color as u want to make
cable (Straight cable or cross over cable). The color order is important to get
correct
Step 3: A straight cut across the 8 wires to shorten them to 1/2 Inch (1.3
cm) from the cut sleeve to the end of the wires by crimping tool. Carefully
push all 8 unstrapped colored wires into the connector. Plastic sleeve should
be inserted proper in connector.
Wrong way: The plastic sleeve is not inside the connector where it can be
locked into place. The wires are too long. The wires should extend only 1/2
inch from the blue cut sleeve. The wires do not go all the way to the end of
the connector. The wires are too short.
Crimping the cable: Carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing tabs on
the connector will pierce into each of the eight wires. There is also a locking
tab that holds the plastic sleeve in place for a tight compression fit. When
you remove the cable from the crimper, that end is ready to use.
Step 4: Repeat steps 1-3 for the other end of the cable.
Step 5: To make sure you've successfully terminated each end of the cable,
use a cable tester to test each pin. Check the continuity of both connectors
each other. Check the cable threw a cable tester or ping from a computer. To
check the cable through computer connects both connector in two
computers for cross cable and straight cable connect through a switch then
ping the computer.
Conclusion:
Questions:
1. What is network topology?
2. What are the types of enterprise computer networks?
3. List the advantages and disadvantages of the internet.
4. Compare the Internet & the World Wide Web.
5. What is the basic difference between the Internet and the network?
Experiment No: 02
Experiment Name: Introduction to Network Simulator – Packet Tracer and
Connect Computer using Different Network Topology with Wired Media
Objectives:
Introduction to Packet Tracer Interface.
To learn how to use different components and build a simple network.
Understand to create Local Area Network (LAN) using star topology.
Description:
A peer-to-peer network is a type of decentralized and distributed network
architecture in which the individual nodes (computers, printers) act in the
networks act as both suppliers and consumers of resources. It differs from
the client server networking model where certain devices have the
responsibility of providing all serving data and other devices consumes or act
as a client. Computers in peer-to-peer network run the same networking
protocol and software. These networks are usually situated physically close
to each other. P2P networks are robust. If one attached device goes down,
the network continues. It is possible to configure computers in peer-to-peer
workgroups to allow sharing of files, printers, and other resources across all
the devices. Peer networks allow data to be shared easily in both directions,
whether for downloads to a computer or uploads from the same computer.
Since each device participates in routing traffic through the network, hackers
can easily launch denial of service attacks. P2P software acts as server and
client, which makes peer-to-peer networks more vulnerable to remote
attacks than client-server networks. Data that is corrupt can be shared on
P2P networks by modifying files that are already on the network to introduce
malicious code.
Ring Topology:
In this all the computers (nodes) are connected to each-other in such a
way that they make a closed loop.
Each computer is connected to two other components on either side,
and it communicated with these two adjacent neighbors. Data is sent
around the ring until it reaches its final destination.
Star Topology:
In this every node (computer workstation or any other peripheral) is
connected to central node or device called hub or switch)
All the data on the star topology passes through the central device
before reaching the intended destination.
A hub forwards data packets to all the ports. A switch is more
intelligent. It recognizes which computer is connected to which port
based on the MAC address and saves this information in a table. When
a switch receives a data packet, it determines the recipient and
forwards the packet to the correct computer.
An advantage of the star topology is the simplicity of adding additional
nodes. The primary disadvantage of the star topology is that the
hub/switch represents a single point of failure.
Extended Star topology uses the star topology to be created. It links
individual stars together by linking the hubs/switches. this will extend
the length of the network.
Figure 5: Star Network Topology
Hybrid Topology:
The combination of various different topologies is known as Hybrid
topology. A Hybrid topology is a connection between different links and
nodes to transfer the data.
When two or more different topologies are combined together is
termed as Hybrid topology and if similar topologies are connected with
each other will not result in Hybrid topology.
For example, if there exist a ring topology in one branch of ICICI bank
and bus topology in another branch of ICICI bank, connecting these two
topologies will result in Hybrid topology.
Questions:
1. What is Network topology?
2. What is use of physical and logical topology?
3. Which topology required terminator at both the ends of cable?
4. State why topology required in laboratory.
5. List out names of transmission media and network devices required to form star
topology.
6. Give the meaning of extended star topology.
7. What is difference between hub and switch?
8. Give the use of NIC card. Is it required to connect computers in star topology?
9. Write a formula to calculate how many cables are required to connect n
computers in mesh topology?
10.Complete the following table by writing type of the cable required to connect two
devices:
Device Switch Router Computer Hub
Switch
Router
Computer
Hub
Experiment No: 03
Experiment Name: Basic Router Configuration
Objectives:
Understanding Basic Networking Commands
Configuring the Router Configuration Commands
Description:
A router is a layer 3 device used to forward packets from one network to
another. It forwards the packet through one of its ports on the basis of
destination IP address and the entry in the routing table. By using a routing
table, it finds an optimized path between the source and destination
network.
Figure 1: Cisco Router Port
Types of Ports in Cisco Router
Ethernet Port
Auxilary Port
Console Port
WIC slot 0 (WIC0)
WIC slot 1 (WIC1)
Functions of ports in Cisco Router
Connector/slot Label/color Description
The router is connected to the local
Ethernet network through this port.
10/100 ETHERNET u
Ethernet port The port senses the speed and the
(yellow)
duplex mode of the device and
then operates at
the same speed and mode.
Connects to the modem for remote
Auxiliary port AUX (black)
configuration
Connects to a terminal or PC for
Console port CONSOLE (blue)
local configuration
WIC slot 0
No label Supports one Cisco WIC
(WICO)
WIC slot 1
No label Supports one Cisco WIC
(WIC1)
When you first power up a new Cisco Router, you have the option of using the
“setup”
utility which allows you to create a basic initial configuration.
However, in this post I will show you how to do this basic setup with the
Command Line Interface (CLI).
Mastering the Cisco Router CLI is essential for more complex configuration
tasks and it is the most important knowledge you should acquire if you want
to become a Cisco network administrator.
CLI Configuration Modes
The basic CLI modes that we will be referring below are as following:
Modes Access method Prompt Exit method
User Execution
login router> use logout command
Mode
use enable use disable command
Privilege Mode router#
command in to enter user mode
user mode
Global
use configure use the exit command
Configuration router(config)#
terminal to enter into privilege
Mode
command mode
use the exit command
use interface
to enter into global
command and
Interface Mode router(config-if)# configuration mode or
specify an interface
use
in global
the end command to
configuration mode
enter into privilege mode.
I assume that you already have some basic knowledge of CLI and how to
navigate between different configuration modes (user mode, privileged exec
mode etc), so let’s get started:
Here, we will talk about Cisco router’s basic commands like assigning an IP address to
an
interface, bringing up an interface, applying to enable and secret passwords.
Administrative
Configuration:
Configuration – 1
1. The user execution mode:
router>
2. Entering into privilege mode from user execution mode:
router>enable
router#
3. Entering in global configuration mode from privilege mode:
router#configure terminal
router(config)#
4. Entering into interface mode from global configuration mode. Here we have
to
specify the router’s interface.
router(config)#interface
fa0/0 router(config-if)#
5. Exiting from interface mode to global configuration mode to privilege
mode to user execution mode.
router(config-
if)#exit
router(config)#exit
router#exit
router>
Configuration – 2: Setting Hostname & Banner to the Router
1. Giving hostname to the router –
It is used to set a name to a device stating an identity to a device. This
is important as these hostnames are used in WAN for authentication
purposes. We can set the hostname as:
router>enable
router#configure
router(config)#hostname
BTCL BTCL(config)#
2. Giving banner to the router-
Applying banners – These are specifically used to give a small security
notice to the user who wants to access the router. We can customize it
According to our needs as like asking for credentials needed for the
login.
BTCL>enable
BTCL#configure
BTCL(config)#banner motd #No unauthorized access allowed.
Enter your credentials!! #
Here motd means a message of the day and # means delimiter i.e
message should end with the symbol provided. This message will be
shown while entering into the router’s user execution mode.
Configuration – 3: Setting password –
There are three passwords used to secure a Cisco device:
1. Enable password – The enable password is used for securing
privilege mode. This password will be shown in clear text by the
command “show running- configuration”. These are replaced by secret
passwords nowadays.
BTCL>enable
BTCL#configure
BTCL(config)#enable password Cisco12345
2. Enable secret password – This is also used for securing privilege
mode but the d the difference is that it will be displayed as a cipher in
“show running- configuration”. This password will override the enable
password if both passwords are set.
BTCL>enable
BTCL#configure
BTCL(config)#enable secret Cisco12345
3. Service password-encryption – The first method of encryption that
Cisco provides is through the command service password-encryption.
You enable this feature from global configuration mode.
BTCL>enable
BTCL#configure
BTCL(config)# service password-encryption
Configuration – 4: Configure IP addresses for Router
Interfaces
This is an essential step in order for your router to be able to forward
packets in the network. The most basic parameter for a Router
Interface is the IP address. In this example, BTCL router in the topology
diagram will be configured with initial settings. the Cisco 1841 router is
equipped with two First-Ethernet interfaces:
FirstEthernet 0/0 (f0/0)
FirstEthernet 0/1 (f0/1)
From Global Configuration Mode you need to enter into Interface
Configuration Mode:
2. Observe the flow of data from host to host by creating network traffic.
Conclusion:
Experiment No: 04
Experiment Name: Configuring a Cisco Router as a DHCP (Dynamic Host
Configuration Protocol) Server
Objectives:
Configure a router for Dynamic Host Configuration Protocol (DHCP) to
dynamically assign addresses to attached hosts.
Description:
DHCP is a service. It allows devices to acquire their IP configuration
dynamically. It works in the server/client model. The server offers and
delivers IP configurations. Clients request and acquire their IP configurations.
DHCP (Dynamic Host Configuration Protocol) configuration is performed on
routers to assign an IP address, subnet mask, gateway address ad DNS
server address to the host systems. With this configuration, the dynamic IP
address is assigned, which enables the administrator to easily connect a new
host in the configured network.
DHCP Address Allocation Methods:
To provide an IP configuration, a DHCP server can use three mechanisms.
These mechanisms are the following.
Lab Task 1:
In this lab, there are two networks: Left_network and Right_Network.
Both networks are connected to the router's Fast Ethernet 0/0 and 0/1
interfaces, respectively. Now our objective is to configure the following IP
configuration on both networks.
Configuration Left_Network Right_Network
IP addresses 192.168.1.0 to 192.168.2.0 to 192.168.2.255
192.168.1.255
Available IP
192168.1.10 to 192.168.2.10 to 192.168.2.254
addresses for
192.168.1.254
hosts
Subnet mask 255.255.255.0 255.255.255.0
Default Gateway 192.168.1.1 192.168.2.1
DNS Server 192.168.1.2 192.168.2.2
Reserved 192.168.1.4 to 192.168.1.10 192.168.2.4 to 192.168.2.10
Lab Task 1:
In this lab, there are four networks: CCE_network, ETE_Network,
CSE_Network and EEE_Network. Both networks are connected to the
router's Fast Ethernet 0/0 and 0/1 interfaces, Ethernet 0/0/0 and 0/1/0
interfaces respectively. Now our objective is to configure the following IP
configuration on both networks.
Configuration CCE_Network ETE_Network
IP addresses 10.10.1.0 to 10.10.1.255 150.10.2.0 to 150.10.2.255
Available IP
10.10.1.10 to 10.10.1.254 150.10.2.10 to 150.10.2.254
addresses for
hosts
Subnet mask 255.0.0.0 255.255.0.0
Default Gateway 10.10.1.1 150.10.2.1
DNS Server 10.10.1.2 150.10.2.2
Reserved 10.10.1.0 to 10.10.1.10 150.10.2.0 to 150.10.2.10
Configuration CSE_Network EEE_Network
IP addresses 192.168.1.0 to 210.168.2.0 to 210.168.2.255
192.168.1.255
Available IP
192168.1.10 to 210.168.2.10 to 210.168.2.254
addresses for
192.168.1.254
hosts
Subnet mask 255.255.255.0 255.255.255.0
Default Gateway 192.168.1.1 210.168.2.1
DNS Server 192.168.1.2 210.168.2.2
Reserved 192.168.1.4 to 192.168.1.10 210.168.2.0 to 210.168.2.10
Conclusion:
Questions:
1. What is the purpose of DHCP on the customer network?
2. Describe the process of installing a DHCP server in an AD infrastructure?
3. Process of DHCP (DORA)?
4. What is an IP Lease?
5. What is the default duration of a lease?
6. How does it work?
7. How can I prevent unauthorized laptops from using a network that
uses DHCP for dynamic addressing?
8. What IP address is assigned to the workstation after its IP address is renewed?
9. What other DHCP options can be defined on the Cisco 1841 ISR router
that are not configured in this activity?
View publication stats