Home > Documents > DCN Manual

DCN Manual

Date post: 07-Apr-2015
Category:
Author: anaea-ozair
View: 159 times
Download: 3 times
Share this document with a friend
Embed Size (px)
of 32 /32
Computer Communication and Networks Lab Manual
Transcript

Computer Communication and Networks Lab Manual

Department of Telecommunication Engineering, Government College University, Faisalabad.

List of Experiments

Exp. No. 1. 2. 3. 4. (a) (b) (c) 5. 6. 7. 8. 9.

Experiment Name How to wire Ethernet cables? Understanding network devices. Basic router configuration. Extended basic configuration Setting up Passwords Understanding the copy command. Configuring interfaces Understanding the Cisco Discovery Protocol. Assignment of IP addresses and the use of PING. Viewing an ARP table. Understanding the Routing Information Protocol. How to make a Virtual LAN?

EXPERIMENT NO. 01 OBJECTIVE: How to wire Ethernet Cables? APPARATUS: CAT 5 Cable - bulk Category 5, cable, RJ45 Ends, Crimper for RJ45, Wire Cutters - to cut and strip the cable if necessary, Cable Tester. THEORY: Twisted Pair Cables: Twisted pair cables are the most common transmission medium for subscriber loop. These are readily installed in buildings during construction and the most ubiquitous application is local area network. Amplifiers are required after every 2 or 3 kilometers. Twisted pair cables are used where the distance, bandwidth and data rate requirements are limited.

Fig. 1.1: Twisted Pair Cable RJ-45 Connectors: The RJ45 end is a 8-position modular connector.

Fig. 1.2: RJ-45 Ends

Color Coding for cables: The twisted pair is arranged in such a way so as to make it straight-through or cross-over in accordance with the coding provided by the Electronic Industries Association (EIA).

Table 1.1: Color coding for straight through cable. RJ45 Pin # 1 2 3 4 5 6 7 8 Wire Color White/Green Green White/Orange Blue White/Blue Orange White/Brown Brown 10Base-T Signal 100Base-TX Signal Transmit+ TransmitReceive+ Unused Unused ReceiveUnused Unused 1000Base-T Signal BI_DA+ BI_DABI_DB+ BI_DC+ BI_DCBI_DBBI_DD+ BI_DD-

Table 1.2: Color coding for a crossover cable. RJ45 Pin Wire Color #(End 1) 1 2 3 4 5 6 7 8 White/Orange Orange White/Green Blue White/Blue Green White/Brown Brown RJ45 Pin# Wire Color (End 2) 1 2 3 4 5 6 7 8 White/Green Green White/Orange White/Brown Brown Orange Blue White/Blue

PROCEDURE: 1. Strip off about 2 inches of the cable sheath. 2. Untwist the pairs - don't untwist them beyond what you have exposed 3. Align the colored wires according to the diagrams above.

4. Trim all the wires to the same length, about 1/2" to 3/4" left exposed from the sheath. 5. Insert the wires into the RJ45 end - make sure each wire is fully inserted to the front of the RJ45 end and in the correct order. 6. Verify the wires ended up the right order and that the wires extend to the front of the RJ45 end and make good contact with the metal contacts in the RJ45 end. 7. Crimp the RJ45 end with the crimper tool 8. Cut the cable to length - make sure it is more than long enough for your needs 9. Repeat the above steps for the second RJ45 end. RESULTS: The cable tester verified that the wire was absolutely right.

EXPERIMENT NO. 02 OBJECTIVE: Understanding network devices. APPARATUS: Modem, hub, switch, Ethernet, repeater, router, RJ-45 connector. THEORY: Modem: It is a computer peripheral that allows you to connect and communicate with other computer via telephone line. Modem changes the digital data from your computer into analog data, a format that can be carried over telephone lines. In the same way the modem receiving the call then changes the analog signal back into digital data that the computer can understand.

Fig. 2.1: Modem. Ethernet card: The type of Ethernet card given below is developed by Xerox Corp. along with DEC and Intel. It uses a Bus or Star topology. Supports data transfer rates of up to 10 Mbps. It is also called a LAN card. The address assigned to it is called a physical address. It is in a 48 bit address format. e.g. 0F.38.6E.55.4A.AE.

Fig. 2.2: Ethernet Card.

RJ-45 Connector: The Registered Jack-45 connector is commonly used for network cabling and for telephony applications. It is an eight wire connector which is commonly used to connect

computers on the local area networks, especially Ethernets. It is similar to telephone connector RJ-11 except that it has eight wires as compared to 4 in RJ-11.

Fig. 2.3: RJ-45 Connector. Hub: It is used to connect several computers together. In this network device the information flow is accumulated and then distributed to various groups and users. It can be between users on the same LAN and users on different LANs. It is often used in Star or Ring topology. All the devices connected to a hub are said to be in the same collision domain. Collision domain: Two devices are said to be in the same collision domain if simultaneous transmission from them results in a collision. In other words, being in the same collision domain, they cannot transmit simultaneously.

Fig. 2.4: Hub. Switch: A network switch is a computer networking device that connects network segments. Network switches appear nearly identical to network hubs, but a switch contains more "intelligence" (and comes with a correspondingly slightly higher price tag) than a network hub. Network switches are capable of inspecting data packets as they are received, determining the source and destination device of that packet, and forwarding it appropriately. By delivering each message only to the connected device it was intended for, a network switch conserves network bandwidth and offers generally better performance than a hub. Switches differ from hubs in that they can have ports of different speed.

Fig. 2.5: Switch

Bridges: Bridges provide the ability to expand beyond a single LAN. Further they provide interconnection to other LANs/WANs. Bridges are a simpler choice than routers to connect similar LANs and are used with identical protocols for physical and link layers.

Fig. 2.5: Functionality of a bridge. Repeater: It is a device that amplifies and restores the power of a signal being transmitted on the network. It is used in long network lines. Router: A router is a computer whose software and hardware are usually tailored to the tasks of routing and forwarding. This device routes the information packet between two or more physically or logically connected networks. It is different from Bridge as this uses logical address while bridge uses physical address.

Fig. 2.6: Router Broadcast Domain: All devices on a network segment that hear all broadcasts sent on that segment are said to be in the same broadcast domain. Routers break broadcast domains by default.

Router Advantages: There are four basic advantages of routers: y Packet switching y Packet Filtering y Internetwork communication y Path Selection Gateway: This device usually a server is used to communicate between dissimilar networks i.e. networks with different protocols. e.g. to connect a LAN with Novell Netware with another LAN with Microsoft NT. In enterprises, the gateway is the computer that routes the traffic from the workstation to the outside world. In homes, the gateway is the ISP that connects the user to the Internet. RESULTS: I learned from this experiment about different network devices.

EXPERIMENT NO. 03 OBJECTIVE: To learn basic router operating commands. APPARATUS: Boson simulator, (Router 1 and Router 2). DIAGRAM:

PROCEDURE AND COMMANDS: Firstly, I launched boson simulator and designed a net-map consisting of two routers and made a serial connection between them keeping router 1 as DCE. Then, I loaded the netmap in to the simulator. After that I logged on to router 1 and pressed enter to get in to user prompt: Router> The symbol (>) indicates that we are in the user mode. Now type (?) to see the list of commands in the user mode: Router>? Type enable to get in to the privileged mode. The symbol (#) indicates that we are in the privileged mode: Router>enable Router# Now type (?) to see the list of commands in the user mode. Notice that there are more commands in the privileged mode than the user mode. Router#? Now, go in to the configure mode by the configure terminal command. Router# configure terminal Router (config)#

Here, you can change the name of your of your router through the hostname command: Router (config)# hostname R1 R1(config)# Type (?) to see the list of commands in the configuration mode. To exit from configuration mode to privilege mode type ctrl ^ z. R1 (config)# ctrl ^ z R1# To exit from privileged mode to user mode type disable. R1# disable R1> RESULTS: The basic router configuration commands were successfully run.

EXPERIMENT NO. 04 OBJECTIVE: Extended basic configuration. APPARATUS: Boson simulator, (Router 1 and Router 2). DIAGRAM:

(a) Setting up passwords THEORY: An enable password is required to prevent unauthorized to the privileged mode. The enable secret command is used to encrypt the password. PROCEDURE AND COMMANDS: Firstly, I launched boson simulator and designed a net-map consisting of two routers and made a serial connection between them keeping router 1 as DCE. Then, I loaded the netmap in to the simulator. After that I logged on to router1 typed the following commands: Router> enable Router# config Router (config)# hostname R1 R1 (config)# enable password boson R1 (config)# enable secret cisco

(b) Setting up the banner motd THEORY: The banner message of the day displays a message when logging in to a router. PROCEDURE AND COMMANDS: Repeat the steps as in 4 (a), and then type the following command to set the banner. R1 (config)# banner motd z This is r1 z R1 (config)# The command followed by the z is displayed as message and end the message using the letter z again. (c) Using the copy command THEORY: The copy command is used to copy the running configuration to the start-up configuration. Running configuration is where the configuration is being done and startup configuration is where the configuration would be in case of a power failure. The former configuration is in the volatile RAM whereas the later configuration is in the Nonvolatile RAM. PROCEDURE AND COMMANDS: Use the following commands to copy running configuration to the start-up configuration. R1# copy running-config start-up config Then use the following show commands to view the configurations: R1# show running-config R1# show start-up config (d) Basic Interface Configuration THEORY: In a serial connection one router is selected at Data Circuit-Terminating Equipment (DCE), and the other side turns out to be Data Terminating Equipment (DTE). The basic difference in configurations is that the clock rate is provided at the DCE.

PROCEDURE AND COMMANDS: Repeat the steps as in 4 (a), and then type the following commands to configure the interfaces: R1: R1 (config)# interface s0 R1 (config-if)# clock rate 64000 R1 (config-if)# no shut No shut command is used to turn the link up. Then, log on to R2: Router> enable Router# config Router (config)# hostname R2 R2 (config)# interface s0 R2 (config-if)# no shut RESULTS: After this lab, I could successfully set enable passwords, set the banner motd, use the copy command and configure interface as beginner level.

EXPERIMENT NO. 05 OBJECTIVE: Understanding the Cisco Discovery Protocol (CDP). APPARATUS: Boson simulator, (Router 1 and Router 2). DIAGRAM:

THEORY: Cisco Discovery Protocol (CDP) is a Data Link Layer Protocol and is used in Cisco devices for neighbor discovery and knowing neighbor parameters. Two terms need to be defined here: Holdtime: The time for which a router has to keep the update from a specific neighbor saved with it. Timer: The interval defined by the timer is the time after which the CDP packets should be sent to keep CDP running.

PROCEDURE AND COMMANDS: Repeat the steps as in 4 (d), log onto R1 and type the following commands: R1# show cdp interface The above command shows the interfaces that broadcasting and receiving updates to and from the neighbors respectively. R1# show cdp neighbors

The above command shows details of neighbors such as device ID, local interface, hold time and some other details. R1# show cdp neighbors detail The above command gives a more detailed analysis of the neighbors. R1# show cdp entry R2 The above command gives detailed information of a specific router in case of multiple routers connected to R1. R1# show cdp The above command shows the cdp holdtime and the timer settings for R1. R1 (config)# cdp timer 45 The above command changes the timer interval to 45 seconds. R1 (config)# cdp holdtime 60 The above command changes the holdtime of R1 to 60 seconds. R1# show cdp The above command shows the changed cdp settings of R1. R1 (config)# no cdp run The above command shuts cdp protocol down. R1# cdp run The above command turns back cdp on. RESULTS: I was able to learn what CDP is and all the commands were successfully run.

EXPERIMENT NO. 06 OBJECTIVE: Assignment of IP addresses and the use of PING. APPARATUS: Boson simulator, (Router 1 and Router 2). DIAGRAM:

THEORY: An IP address is a numeric identifier assigned to each machine on an IP network. PING is a command use to check connectivity with another machine. PROCEDURE AND COMMANDS: Repeat the same steps at both routers until entrance in to the configuration mode. Then, use the following commands: At R1: R1 (config)# interface s0 R1 (config-if)# ip address 172.16.1.3 255.255.0.0 R1 (config-if)# clock rate 64000 R1 (config-if)# no shut At R2: R2 (config)# interface s0 R2 (config-if)# ip address 172.16.1.4 255.255.0.0 R2 (config-if)# no shut Now go to R1 and PING R2 using its IP address: R1 # ping 172.16.1.4 Similarly you may go to R2 and PING R1 using its IP address:

R2 # ping 172.16.1.3 RESULTS: I successfully assigned the IP addresses to the routers and was able to PING them successfully from the other router.

EXPERIMENT NO. 07 OBJECTIVE: Viewing an ARP table. APPARATUS: Boson simulator, (Router 1, Router 2 and Router 4). DIAGRAM:

THEORY: ARP is the Address Resolution Protocol which works as follows: When a packet arrives at router, the router views the IP address and maps it to a specific MAC address. If the routing table does not contain the MAC address of the destination machine, it broadcasts an ARP query over the network. The addressed machine receives the ARP query and responds with its MAC address back to the router so that it can send the packet to that MAC address. PROCEDURE AND COMMANDS: Connect Router 1 with Router 4 serially keeping Router 1as DCE and with Router 2 through Fast Ethernet. Repeat configuration steps as in the previous experiments till the entrance in to configuration mode. Then go to all routers and type the following commands: At R1:

Configuring s0: Router1 (config)# interface s0 Router1 (config-if)# ip address 172.16.10.1 255.255.255.0 Router1 (config-if)# clock rate 64000 Router1 (config-if)# no shut Configuring f0/0: Router1 (config)# interface f0/0 Router1 (config-if)# ip address 10.1.1..1 255.255.255.0 Router1 (config-if)# no shut At R2: Router2 (config)# interface f0/0 Router2 (config-if)# ip address 10.1.1.2 255.255.255.0 Router2 (config-if)# no shut At R4: Router4 (config)# interface s0 Router4 (config-if)# ip address 172.16.10.2 255.255.255.0 Router4 (config-if)# clock rate 64000 Router4 (config-if)# no shut Now, go to R1 and check its connectivity with R2 and R4. Router1# ping 10.1.1.2 Router1# ping 172.16.10.2 If the links are running, continue with the following command to view the ARP table: Router1# show arp Running this command will show the local IP and MAC address and the IP and MAC addresses of the routers connected through the fast Ethernet port. Now, type clear arp to delete the neighbors information from the ARP table. Router1# clear arp RESULTS: The links in the network were successfully enabled and ARP table was successfully viewed and cleared.

EXPERIMENT NO. 08 OBJECTIVE: Understanding the Routing Information Protocol (RIP). APPARATUS: Boson simulator, (Router 1, Router 2 and Router 4). DIAGRAM:

THEORY: RIP is a distance-vector routing protocol in which the nodes learn about their directly connected networks and using this information they are able to establish connectivity with indirectly connected routers. PROCEDURE AND COMMANDS: Repeat the procedure as in experiment no. 7, and then use the following commands to make the routers about their directly connected networks. At Router1: Router1 (config)# router rip Router1 (config-router)# network 10.0.0.0 Router1 (config-router)# network 172.16.0.0

At Router2: Router2 (config)# router rip Router2 (config-router)# network 10.0.0.0 At Router4: Router4 (config)# router rip Router4 (config-router)# network 172.16.0.0 Now go to Router2 and Router4 and check connectivity with Router4 and Router2 respectively. Router2# ping 172.16.10.2 Router4# ping 10.1.1.2 RESULTS: After making the routers learn about their directly connected networks, I was able to ping indirectly connected routers.

EXPERIMENT NO. 09 OBJECTIVE: How to make a Virtual LAN (VLAN)? APPARATUS: Boson simulator, (Router, Switch, PC-1 and PC-2). DIAGRAM:

THEORY: A VLAN is a LAN with in a LAN. These are required in large scale networks where separating some of the nodes to create a separate domain with in a LAN is desired. PROCEDURE AND COMMANDS: Configure the router as follows: Router> enable Router# Router# config Router (config)# hostname R1 R1 (config)# interface f0/0 R1 (config-if)# ip address 24.17.2.1 255.255.255.0 R1 (config-if)# no shut Connect to PC-1 and set the IP address to 24.17.2.3/24 with router as the default gateway. i.e. ip address 24.17.2.1.

C:>winipcfg Connect to PC-2 and set the IP address to 24.17.2.4/24 with router as the default gateway. i.e. ip address 24.17.2.1. C:>winipcfg Now, ping router and PC-1 from PC-2. The pings will be successful. C:> ping 24.17.2.1 C:> ping 24.17.2.3 Now, connect to switch and set the VLAN up. Start by creating the VLAN. >enable #config t (config)# VLAN 22 name pcs Now, assign port e0/1 for PC-1 to the new VLAN. (config)# interface e0/1 (config-if)# vlan membership-static 22 C:> ping 24.17.2.1 Now, ping router and PC-1 from PC-2. The ping to router will be successful and the one to PC-1 will be unsuccessful. C:> ping 24.17.2.1 C:> ping 24.17.2.3 Connect back to switch and assign port e0/2 for PC-2 to the new VLAN. (config)# interface e0/2 (config-if)# vlan membership-static 22 Again, ping router and PC-1 from PC-2. The ping to router will be unsuccessful and the one to PC-1 will be successful. C:> ping 24.17.2.1 C:> ping 24.17.2.3 Finally, connect back to switch and assign port f0/26 for the router to the new VLAN. (config)# interface f0/26

(config-if)# vlan membership-static 22 Now, ping the router and PC-1 from PC-2.Both pings will be successful showing that all nodes have been successfully shifted to a new VLAN. Connect to switch and try some new show commands: (config)# end # show VLAN # show VLAN membership RESULTS: The VLAN was successfully created.


Recommended