0% found this document useful (0 votes)
232 views

A Laboratory Manual For ACN

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
232 views

A Laboratory Manual For ACN

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 95

A Laboratory Manual for

Advanced Computer Network


(22520)
Fifth Semester
Diploma in Computer Engineering
Certificate
This is to certify that Mr. / Ms .......................................... Roll
No………of Second Semester of Diploma in………………………
Of Institute …………………………… (Code……….) has completed the term
work satisfactorily in subject AdvancedComputer Network
(22520) for the academic year 20…..to 20…..as prescribed in the
curriculum.

Place ………………. Enrollment No……………………


Date:…..................... Exam Seat No. ………………......

Subject Teacher Head of the Department Principal


Program Outcomes (POs) to be achieved through Practical’s of this Course:-

PO 1:-Basic and Discipline Specific knowledge Apply knowledge of basic mathematics, sciences and engineering
fundamentals and engineering specialization to solve the Computer Hardware and Maintenance related problems.

PO 2:-Problem analysis: Identify and analyze Computer Hardware and Maintenance related problems. Problems
using codified standards methods.

PO 3:-Design/ Development of solutions: Design solutions for well-defined technical problem and and assist with
the design of Computer Hardware and Maintenance components or processes to meet the specified needs.

PO 4:-Engineering Tools, Experimentation and Testing: Apply modern engineering tools and appropriate technique
to conduct standard test and measurements related to Computer Hardware and Maintenance

PO 5:-Engineering practices for society, sustainability and environment: Apply appropriate technology in context
of society, sustainability and environment and ethical practices.

PO 6:-Project management: Use engineering measurements principles individually, as a team member or a leader
to manage projects and effectively communicate about well-defined engineering.

PO 7:-Life-long learning: Analyze individual needs and engage in updation in the context of technology changes.
Practical- Course Outcome matrix

Course Outcomes (COs)


a. Implement Network Layer Protocols.
b. Configure IPv6 Network.
c. Choose routing protocol in the given network situation.
d. Implement different Transport Layer Protocols.
e. Configure various Application Layer Protocols.
S. CO CO CO CO CO
Title of the Practical
No. a. b. c. d. e.
Given an IP address, network mask, and
subnetwork mask, determine other
information and implement it.
about the IP address such as:
i. The subnet address of this subnet. √
ii. The broadcast address of this subnet.
1.
iii. The range of host addresses for this
subnet.
iv. The maximum number of subnets for
this subnet mask.
v. The number of hosts for each subnet.
vi. The number of subnet bits.
vii. The number of this subnet.
a) Capture ICMPv4 packets generated
by utility programs like ping,
traceroute and tabulate all the √ √
2. captured parameters.
b) Investigate IP Protocol by capturing IP
datagrams and tabulate all the captured
parameters.
3. Configure IPv6 network using any network √ √
simulator.
4. Configure IP static routing. √ √
5. Configure IP routing using RIP. √ √
6. Configure IP routing using OSPF. √
7. Configure User Datagram Protocol (UDP) √ √
Part-I.
8. Configure User Datagram Protocol (UDP) √ √
Part-II.
9. Configure Transmission Control Protocol √ √
(TCP).
10 Run different STCP commands.
11 Configure Dynamic Host Configuration √ √
Protocol (DHCP).
12 Configure Domain Name Server (DNS). √ √
a. Configure File Transfer Protocol (FTP).
√ √
13 b. Configure Hypertext Transfer Protocol
(HTTP).
a. Use Telnet to login a remote machine.
√ √
14 b. Connect remote machine using Secure
Shell (SSH).
15 Configure SMTP, POP3 and IMAP. √ √

16 Configure MIME and SNMP. √ √


Content Page
List of Practical’s and Progressive Assessment Sheet

Date of Date of Assess Remarks


S. Page Dated sign.
Title of the practical performa submi ment (if any)
No. No. of teacher
nce ssion marks(25)
Given an IP address, network
mask, and subnetwork mask,
determine other information
and implement it.
about the IP address such as:
i. The subnet address of this
subnet.
ii. The broadcast address of this
1. subnet.
iii. The range of host addresses
for this subnet.
iv. The maximum number of
subnets for this subnet mask.
v. The number of hosts for each
subnet.
vi. The number of subnet bits.
vii. The number of this subnet.
c) Capture ICMPv4 packets
generated by utility
programs like ping,
traceroute and tabulate
2. all the captured
parameters.
d) Investigate IP Protocol by
capturing IP datagrams and
tabulate all the captured
parameters.
Configure IPv6 network using
3. any network simulator.
4. Configure IP static routing.
5. Configure IP routing using RIP.
6. Configure IP routing using OSPF.
Configure User Datagram
7.
Protocol (UDP) Part-I.
Configure User Datagram
8.
Protocol (UDP) Part-II.
Configure Transmission Control
9. Protocol (TCP).
10. Run different STCP commands.
Configure Dynamic Host
11.
Configuration Protocol (DHCP).
Configure Domain Name Server
12.
(DNS).
Date of Date of Assess Remarks
S. Page Dated sign.
Title of the practical performa submi ment (if any)
No. No. of teacher
nce ssion marks(10)
c. Configure File Transfer
Protocol (FTP).
13.
d. Configure Hypertext Transfer
Protocol (HTTP).
c. Use Telnet to login a remote
machine.
14.
d. Connect remote machine
using Secure Shell (SSH).
Configure SMTP, POP3 and
15.
IMAP.
16. Configure MIME and SNMP.
17.
Total Marks
Total Marks (Scaled to 25 Marks)
Practical no. 1: Determine information about IP address from the given IP
address, Network mask and Subnetwork Mask.
Relevant Course Outcomes:
a. Implement Network Layer Protocols

Relevant Practical Outcomes:


a. Determine information about IP address from the given IP address, Network mask and
Subnetwork Mask

1. Background/Scenario
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into
network address and host address. Subnet Mask is made by setting network bits to all "1"s
and setting host bits to all "0"s. Within a given network, two host addresses are reserved for
special purpose, and cannot be assigned to hosts. The "0" address is assigned a network
address and "255" is assigned to a broadcast address, and they cannot be assigned to hosts.
Subnetting in Networking-
In networking, the process of dividing a single network into multiple sub networks is called
as subnetting. The sub networks so created are called as subnets.
Example-
Following diagram shows the subnetting of a big single network into 4 smaller subnets-

Subnet ID-
 Each subnet has its unique network address known as its Subnet ID.
 The subnet ID is created by borrowing some bits from the Host ID part of the IP Address.
 The number of bits borrowed depends on the number of subnets created.

Types of Subnetting-

Subnetting of a network may be carried out in the following two ways-


1. Fixed Length Subnetting
2. Variable Length Subnetting

1. Fixed Length Subnetting-


Fixed length subnetting also called as classful subnetting divides the network into subnets
where-
 All the subnets are of same size.
 All the subnets have equal number of hosts.
 All the subnets have same subnet mask.

2. Variable Length Subnetting-


Variable length subnetting also called as classless subnetting divides the network into
subnets where-
 All the subnets are not of same size.
 All the subnets do not have equal number of hosts.
 All the subnets do not have same subnet mask.

2.0 Objectives
Determine the following information of the given IP address and Subnetwork address.
Part 1: The subnet address of the subnet. Part 2: The
broadcast address of the subnet.
Part 3: The range of host addresses of the subnet
Part 4: The maximum no. of subnets of the subnet mask.Part 5:
The no. of hosts for each subnet.
Part 6: The no. of subnet bits.
Part 7: The no. of this subnet.

3.0 Procedure
Consider-
 We have a big single network having IP Address 200.1.2.0.
 We want to do subnetting and divide this network into 2 subnets.

Clearly, the given network belongs to class C.


Also Read- Classes of IP Address
For creating two subnets and to represent their subnet IDs, we require 1 bit.
So,
We borrow one bit from the Host ID part.
After borrowing one bit, Host ID part remains with only 7 bits.

 If borrowed bit = 0, then it represents the first subnet.


 If borrowed bit = 1, then it represents the second subnet.

IP Address of the two subnets are-


200.1.2.00000000 = 200.1.2.0
200.1.2.10000000 = 200.1.2.128

For 1st Subnet-


IP Address of the subnet = 200.1.2.0
Total number of IP Addresses = 27 = 128
Total number of hosts that can be configured = 128 – 2 = 126
Range of IP Addresses = [200.1.2.00000000, 200.1.2.01111111] = [200.1.2.0, 200.1.2.127]
Direct Broadcast Address = 200.1.2.01111111 = 200.1.2.127
Limited Broadcast Address = 255.255.255.255

For 2nd Subnet-


IP Address of the subnet = 200.1.2.128
Total number of IP Addresses = 27 = 128
Total number of hosts that can be configured = 128 – 2 = 126
Range of IP Addresses = [200.1.2.10000000, 200.1.2.11111111] = [200.1.2.128, 200.1.2.255]
Direct Broadcast Address = 200.1.2.11111111 = 200.1.2.255
Limited Broadcast Address = 255.255.255.255

4.0 Exercise
Determine the information given in Objectives section from the below IP and Subnet
addresses
1. IP Address: 201.70.64.0/27
Subnet Mask /Netmask: 255.255.255.224
2. IP Address: 192.168.10.0/25
Subnet Mask/Netmask: 255.255.255.128
3. IP Address: 192.168.10.0/25
Subnet Mask/Netmask: 255,255,255,192
4. What is the difference between Subnetting and Supernetting?
5. Why Subnetting is required?
Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical No. 2: a. Capture ICMPv4 packets generated by commands like ping
and traceroute and tabulate all required parameters.
b. Investigate IP protocol by capturing IP datagrams and tabulate all required
parameters.

Relevant Course Outcomes:


a. Implement Network Layer Protocols

Relevant Practical Outcomes:


a. Capture ICMPv4 packets generated by commands like ping and traceroute and tabulate all
required parameters.
b. Investigate IP protocol by capturing IP datagrams and tabulate all required parameters.

1.0 Topology:

2.0 Objectives

Part 1: Ping any PC from different network by issuing ping command or traceroute.Part 2:
Examine the Functionality and Parameters of ICMPv4 and IP datagrams

3.0 Background

This simulation activity is intended to provide a foundation for understanding the ICMP and IP
in detail. Simulation mode provides the ability to view the functionality of the different
protocols. As data moves through the network, it is broken down into smaller pieces and
identified in some fashion so that the pieces can be put back together. Each of these pieces
is assigned a specific name (protocol data unit [PDU]) and associated with a specific layer.
Packet Tracer Simulation mode enables the user to view each of the protocols and the
associated PDU. The steps outlined below lead the user through the process of requesting
services using various applications available on a client PC. This activity provides an
opportunity to explore the functionality of the ICMP and IP protocols and multiplexing .

Part 1: Ping any PC from different network


a. Enter into Simulation Mode
Select any PC from network 1, Go to Desktop -> Command prompt -> ping 20.0.0.1

Part 2: Examine the functionality of ICMP and IP protocols


b. You will see a PDU appearing on to the screen.
Go to Simulation Mode, select Edit Filters, select ICMP protocol.
Click the PDU, go to Inbound details and observe ICMP and IP headers like below.

Write down all the parameters of IP header


………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
Write down all the parameters of ICMP header
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..

c. Click on capture forward button till PDU arrived at switch. Note down PDU Inbound and
Outbound details
Write down all the parameters of IP header
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
Write down all the parameters of ICMP header
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..

d. Keep clicking Capture Forward button till packet arrives at destination PC


Note PDU Inbound and Outbound details:
Write down all the parameters of IP header
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..

Write down all the parameters of ICMP header


………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..

e. Keep clicking the forward capturing button till the packet arrives at the sender end with a
checkmark
Note down PDU Inbound details.
Write down all the parameters of IP header
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
Write down all the parameters of ICMP header
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………..
What is the difference between source IP and destination IP as compared to the details ofthe first
PDU?
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………….

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 3: Configure IPv6 Network

Relevant Course Outcomes:


a. Implement Network Layer Protocols
b. Configure IPv6 Network

Relevant Practical Outcomes:


Configure IPv6 Network

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Link Address Default Gateway

G 0/0 2001:DB8:A:A::1/64 FE80::1 N/A


R1
G 0/1 2001:DB8:A:B::1/64 FE80::1 N/A
PC0 NIC 2001:DB8:A:A::10/64 N/A FE80::1
PC1 NIC 2001:DB8:A:A::11/64 N/A FE80::1
PC2 NIC 2001:DB8:A:B::10/64 N/A FE80::1
PC3 NIC 2001:DB8:A:B::11/64 N/A FE80::1

3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign Link Local address to each interface of RouterPart 3:
Assign IPv6 address to each interface of Router.
Part 4: Verify the functionality of Network by sending sample packets between two
Networks.

4.0 Background/Scenario
An Internet Protocol Version 6 address is a numerical label that is used to identify a network
interface of a computer or a network node participating in an IPv6 computer network, and
locate it in the network. IP addresses are included in the packet header to indicate the source
and the destination of each packet.
In this practical, you will create a simple network topology based on Ipv6 addressing. You will
first enable IPv6 packet forwarding in Router. Secondly, you will assign Link Local address to
each interface of Router. You will then assign IPv6 address to each interface of Router. Finally,
you will assign IPv6 address corresponding to IPv6 address of Router interface andset default
gateway to each PC connected.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through cable to connect Switches with Routers and PC’s.

Part 2: a. Assign link local address to each interface of Router.


Router0> enable
Router0# configure terminal
Router0(config)# interface gigabitEthernet 0/0
Router0(config-if)# ipv6 address FE80::1 link-local
Router0(config-if)# no shutdown
Router0(config-if)# exit
Router0(config)# interface gigabitEthernet 0/1
Router0(config-if)# ipv6 address FE80::1 link-local
Router0(config-if)# no shutdown
Router0(config-if)# exit
Router0(config)# exit
Router0#write

b. Enable IPv6 packet traffic in Router


Router0> enable
Router0# configure terminal
Router0(config)# ipv6 unicast-routing
Router0(config)# exit
Router0# write

Part 3: Assign IP address to Router


Router0> enable
Router0# configure terminal
Router0(config)# interface gigabitEthernet 0/0
Router0(config-if)# ipv6 address 2000:DB8:A:A::1/64
Router0(config-if)# no shutdown
Router0(config-if)# exit
Router0(config)# interface gigabitEthernet 0/1
Router0(config-if)# ipv6 address 2000:DB8:A:B::1/64

Maharashtra State Board of Technical Education 22


Router0(config-if)# no shutdown
Router0(config-if)# exit
Router0(config)# exit
Router0#write

Part 4: Verify the functionality of Network


Router0> enable
Router0# configure terminal
Router0# show running-config

You can verify the functionality of the network by opening command prompt from any PC
and pinging another PC on the different network.
You can also transfer sample packet between two PC’s in Realtime Simulation

6.0 Resources Required


 2 Switches 2960
 4 PC’s
 1 Routers 1941
 Copper Straight Through Cable

7.0 Output (Created Network Topology)


8.0 Exercise
1. What is the command used enable IPv6 packet forwarding in Router?
2. What is the command used to view the current running IP configuration in Router?
3. What is the purpose of assigned Link Local addressing along with Ipv6 address to Router?
4. Why we assign Link Local Address to Router’s interface?
5. Construct the Link Local Address if Physical address= 00A0:ABCD:DCBA

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 4: Configure IP Static Routing

Relevant Course Outcomes:


a. Implement Network Layer Protocols
c. Choose Routing Protocols in a given Network situation.

Relevant Practical Outcomes:


a. Configure IP Static Routing

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

Fa 0/0 10.0.0.10 255.0.0.0 N/A


Router0
Se 0/2/0 (DCE) 192.168.10.10 255.255.255.0 N/A
F 0/0 20.0.0.10 255.0.0.0 N/A
Router1
Se 0/2/0 (DCE) 192.168.10.11 255.255.255.0 N/A
PC0 NIC 10.0.0.1 255.0.0.0 10.0.0.10
PC1 NIC 10.0.0.2 255.0.0.0 10.0.0.10
PC2 NIC 10.0.0.3 255.0.0.0 10.0.0.10
PC3 NIC 20.0.0.1 255.0.0.0 20.0.0.10
PC4 NIC 20.0.0.2 255.0.0.0 20.0.0.10
PC5 NIC 20.0.0.3 255.0.0.0 20.0.0.10
3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP addressing to all the devices based on the Addressing TablePart 3:
Apply Static Routing to all the Routers.
Part 4: Verify the network functionality by sending packets from one network to another.

4.0 Background/Scenario
Static routing is a form of routing that occurs when a router uses a manually-configured
routing entry, rather than information from dynamic routing traffic. In many cases, static
routes are manually configured by a network administrator by adding in entries into arouting
table, though this may not always be the case. Unlike dynamic routing, static routes are fixed
and do not change if the network is changed or reconfigured.
In this scenario, you will create a simple network topology and manual assign routes to Router.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
a. Use Copper Straight Through cable to connect Switches with Routers and PC’s.
b. Use Serial DCE cable or Serial DTE cable to connect two Routers. (NOTE: If you are using
Serial DCE Cable then, you have to provide clock rate to Router). By default, Serial port is not
available in Router. To install it, turn off the router, drag and drop WIC-2T from Physical Ports
to router’s empty slot.

Part 2: Assign IP address to all the devices based on the Addressing Table
a. Assign IP address to Router0 (PUNE)
Select Router0, enter into CLI interface and assign the IP address as:
Router0> enable
Router0# configure terminal
Router0(config)# interface fastEthernet 0/0
Router0 (config-if)# ip address 10.0.0.10 255.0.0.0
Router0 (config-if)# clock rate 64000
Router0 (config-if)# no shutdown
Router0 (config-if)# exit
Router0 (config)# interface serialEthernet 0/2/0
Router0 (config-if)# ip address 192.168.10.10 255.255.255.0
Router0(config-if)# no shutdown
Router0(config-if)# exit
Router0(config)# exit
Router0# write

b. Assign IP address to Router1


Select Router1, enter into CLI interface and assign the IP address as:
Router1> enable
Router1# configure terminal
Router1 (config)# interface fastEthernet 0/0
Router1 (config-if)# ip address 20.0.0.10 255.0.0.0
Router1 (config-if)# no shutdown
Router1 (config-if)# exit
Router1 (config)# interface serialEthernet 0/2/0
Router1(config-if)# ip address 192.168.10.11 255.255.255.0
Router1(config-if)# no shutdown
Router1(config-if)# exit
Router1(config)# exit
Router1# write

Part 3: Apply Static Routing


a. Apply Static Routing to Router0
Router0> enable
Router0# configure terminal
Router0(config)# ip route 20.0.0.0 255.0.0.0 192.168.10.11
Router0(config)# exit
Router0#write

b. Apply Static Routing to Router1


Router1> enable
Router1# configure terminal
Router1(config)# ip route 10.0.0.0 255.0.0.0 192.168.10.10
Router1(config)# exit
Router1#write

Part 4: Verify the network functionality


You can verify the functionality of the network by opening command prompt from any PC
and pinging another PC on the different network.
You can also transfer sample packet between two PC’s in Realtime Simulation

6.0 Resources Required


 2 Switches 2960
 6 PC’s
 2 Routers 2811
 Copper Straight Through Cable
 Serial (DCE) cable
7.0 Output (Created Network Topology)
8.0 Exercise
1. What is the command used to view IP route?
2. Write the command used to set IP route?
3. Write the disadvantages of Static IP?
4. Compare Static IP and Dynamic IP?
5. List Dynamic IP protocols.

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 5: Configure IP Routing with Routing Interchange Protocol (RIP)

Relevant Course Outcomes:


a. Implement Network Layer Protocols
c. Choose Routing Protocols in a given Network situation

Relevant Practical Outcomes:


a. Configure IP Routing with RIP.

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

F 0/0 10.0.0.10 255.0.0.0 N/A


Router0 (PUNE)
Se 0/2/0 (DCE) 40.0.0.1 255.0.0.0 N/A
F 0/0 20.0.0.10 255.0.0.0 N/A
Router1
Se 0/2/0 (DCE) 40.0.0.2 255.0.0.0 N/A
(MUMBAI)
Se 0/2/1 (DCE) 50.0.0.1 255.0.0.0 N/A
Router2 F 0/0 30.0.0.10 255.0.0.0 N/A
(NAGPUR) Se 0/2/0 (DCE) 50.0.0.2 255.0.0.0 N/A
PC0 NIC 10.0.0.1 255.0.0.0 10.0.0.10
PC1 NIC 10.0.0.2 255.0.0.0 10.0.0.10
PC2 NIC 20.0.0.1 255.0.0.0 20.0.0.10
PC3 NIC 20.0.0.2 255.0.0.0 20.0.0.10
PC4 NIC 30.0.0.1 255.0.0.0 30.0.0.10
PC5 NIC 30.0.0.2 255.0.0.0 30.0.0.10
3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP addressing to all the devices based on the Addressing Table
 Assign IP address all the links of Router0 (PUNE), Router1 (MUMBAI) and Router2
(NAGPUR).
 Assign IP address and default mask to all the PC’s.

Part 3: Apply RIP protocol to all the Routers.


Part 4: Verify the network functionality by sending packets from one network to another.
4.0 Background/Scenario
Routing Interchange Protocol (RIP) is an Interdomain Routing Protocol based on Distance
Vector Protocol. In this protocol, each neighboring router’s share their Distance Vector with
each other and create their Routing Table.
In this practical, you will create a simple network topology with RIP protocol. You willconfigure
and assign IP address to each device connected and verify their functionality before applying
RIP. Once, the address allocation gets complete you will apply RIP protocolto all of the routers
and observe their routing table.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
a. Use Copper Straight Through cable to connect Switches with Routers and PC’s.
b. Use Serial DCE cable or Serial DTE cable to connect two Routers. (NOTE: If you are using
Serial DCE Cable then, you have to provide clock rate to Router). By default, Serial port is not
available in Router. To install it, turn off the router, drag and drop WIC-2T from Physical Ports
to router’s empty slot.

Part 2: Assign IP address to all the devices based on the Addressing Table
a. Assign IP address to Router0 (PUNE)
Select Router0 (PUNE), and enter into CLI interface and assign the IP address as:
Router0> enable
Router0# configure terminal
Router0(config)# host name PUNE
PUNE(config)# interface fastEthernet 0/0
PUNE(config-if)# ip address 10.0.0.10 255.0.0.0
PUNE(config-if)# clock rate 64000
PUNE(config-if)# no shutdown
PUNE(config-if)# exit
PUNE(config)# interface serialEthernet 0/2/0
PUNE(config-if)# ip address 40.0.0.1 255.0.0.0
PUNE(config-if)# no shutdown
PUNE(config-if)# exit
PUNE(config)# exit
PUNE# write
b. Assign IP address to Router1 (MUMBAI)
Select Router1 (MUMBAI), and enter into CLI interface and assign the IP address as:
Router1> enable
Router1# configure terminal
Router1(config)# host name MUMBAI
MUMBAI(config)# interface fastEthernet 0/0
MUMBAI(config-if)# ip address 20.0.0.10 255.0.0.0
MUMBAI(config-if)# exit
MUMBAI(config)# interface serialEthernet 0/2/0
MUMBAI(config-if)# ip address 40.0.0.2 255.0.0.0
MUMBAI(config-if)# exit
MUMBAI(config)#interface serialEthernet 0/2/1
MUMBAI(config-if)# ip address 50.0.0.1 255.0.0.0
MUMBAI(config-if)# clock rate 64000
MUMBAI(config-if)# no shutdown
MUMBAI(config-if)# exit
MUMBAI(config)# exit
MUMBAI# write

c. Assign IP address to Router2 (NAGPUR)


Select Router2 (NAGPUR), and enter into CLI interface and assign the IP address as:
Router2> enable
Router2# configure terminal
Router2(config)# host name NAGPUR
NAGPUR(config)# interface fastEthernet 0/0
NAGPUR(config-if)# ip address 30.0.0.10 255.0.0.0
NAGPUR(config-if)# no shutdown
NAGPUR(config-if)# exit
NAGPUR(config)# interface serialEthernet 0/2/0
NAGPUR(config-if)# ip address 50.0.0.2 255.0.0.0
NAGPUR(config-if)# no shutdown
NAGPUR(config-if)# exit
NAGPUR(config)# exit
NAGPUR# write

d. Apply RIP protocol to Router0 (PUNE)


PUNE> enable
PUNE# configure terminal
PUNE#(config) router rip
PUNE#(config) network 10.0.0.0
PUNE#(config) network 40.0.0.0
PUNE#(config) exit
PUNE# write
e. Apply RIP protocol to Router1 (MUMBAI)
MUMBAI> enable
MUMBAI# configure terminal
MUMBAI(config)# router rip
MUMBAI(config)# network 20.0.0.0
MUMBAI(config)# network 40.0.0.0
MUMBAI(config)# network 50.0.0.0
MUMBAI(config)# exit
MUMBAI# write

d. Apply RIP protocol to Router2 (NAGPUR)


NAGPUR> enable
NAGPUR# configure terminal
NAGPUR(config)# router rip
NAGPUR(config)# network 50.0.0.0
NAGPUR(config)# network 30.0.0.0
NAGPUR(config)# exit
NAGPUR# write

e. Verify the network functionality


You can verify the functionality of the network by opening command prompt from any PC
and pinging another PC on the different network.
You can also transfer sample packet between two PC’s in Realtime Simulation

6.0 Resources Required


 3 Switches 2960
 6 PC’s
 3 Routers 2811
 Copper Straight Through Cable
 Serial (DCE) cable

7.0 Output (Created Network Topology)


8.0 Exercise
1. What is the command used to configure RIP protocol in Router?
2. What is the maximum no. of hops, a route can have in RIP protocol?
3. What does the first column of Routing table contains in RIP protocol?
4. What does the Next of Routing table contains in RIP protocol?
5. Choose the appropriate option:
What is shared among the neighboring routers in Distance Vector Routing Protocol?
a. Routing Table
b. Destination Column
c. Distance Vector
d. Next Column

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 6: Configure IP Routing with OSPF

Relevant Course Outcomes:


a. Implement Network Layer Protocols.
c. Choose Routing Protocols in a given Network situation.

Relevant Practical Outcomes:


a. Configure IP Routing with OSPF.

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

F 0/0 10.0.0.10 255.0.0.0 N/A


Router0 (PUNE)
Se 0/2/0 (DCE) 40.0.0.1 255.0.0.0 N/A
F 0/0 20.0.0.10 255.0.0.0 N/A
Router1
Se 0/2/0 (DCE) 40.0.0.2 255.0.0.0 N/A
(MUMBAI)
Se 0/2/1 (DCE) 50.0.0.1 255.0.0.0 N/A
Router2 F 0/0 30.0.0.10 255.0.0.0 N/A
(NAGPUR) Se 0/2/0 (DCE) 50.0.0.2 255.0.0.0 N/A
PC0 NIC 10.0.0.1 255.0.0.0 10.0.0.10
PC1 NIC 10.0.0.2 255.0.0.0 10.0.0.10
PC2 NIC 20.0.0.1 255.0.0.0 20.0.0.10
PC3 NIC 20.0.0.2 255.0.0.0 20.0.0.10
PC4 NIC 30.0.0.1 255.0.0.0 30.0.0.10
PC5 NIC 30.0.0.2 255.0.0.0 30.0.0.10
3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP addressing to all the devices based on the Addressing Table
 Assign IP address all the links of Router0 (PUNE), Router1 (MUMBAI) and Router2
(NAGPUR).
 Assign IP address and default mask to all the PC’s.

Part 3: Apply RIP protocol to all the Routers.


Part 4: Verify the network functionality by sending packets from one network to another.
4.0 Background/Scenario
Open Shortest Path Finder (OSPF) is an Interdomain Routing Protocol based on Link State
Routing Protocol. In this protocol, the whole autonomous system is divided into number of
areas. Router inside an area flood the area with the routing information.
In this practical, you will create a simple network topology with OSPF protocol. You will
configure and assign IP address to each device connected and verify their functionality before
applying OSPF. Once, the address allocation gets complete you will apply OSPF protocol to all
of the routers and observe their routing table.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
a. Use Copper Straight Through cable to connect Switches with Routers and PC’s.
b. Use Serial DCE cable or Serial DTE cable to connect two Routers. (NOTE: If you are using
Serial DCE Cable then, you have to provide clock rate to Router). By default, Serial port is not
available in Router. To install it, turn off the router, drag and drop WIC-2T from Physical Ports
to router’s empty slot.

Part 2: Assign IP address to all the devices based on the Addressing Table
a. Assign IP address to Router0 (PUNE)
Select Router0 (PUNE), and enter into CLI interface and assign the IP address as:
Router0> enable
Router0# configure terminal
Router0(config)# host name PUNE
PUNE(config)# interface fastEthernet 0/0
PUNE(config-if)# ip address 10.0.0.10 255.0.0.0
PUNE(config-if)# clock rate 64000
PUNE(config-if)# no shutdown
PUNE(config-if)# exit
PUNE(config)# interface serialEthernet 0/2/0
PUNE(config-if)# ip address 40.0.0.1 255.0.0.0
PUNE(config-if)# no shutdown
PUNE(config-if)# exit
PUNE(config)# exit
PUNE# write

b. Assign IP address to Router1 (MUMBAI)


Select Router1 (MUMBAI), and enter into CLI interface and assign the IP address as:
Router1> enable
Router1# configure terminal
Router1(config)# host name MUMBAI
MUMBAI(config)# interface fastEthernet 0/0
MUMBAI(config-if)# ip address 20.0.0.10 255.0.0.0
MUMBAI(config-if)# exit
MUMBAI(config)# interface serialEthernet 0/2/0
MUMBAI(config-if)# ip address 40.0.0.2 255.0.0.0
MUMBAI(config-if)# exit
MUMBAI(config)#interface serialEthernet 0/2/1
MUMBAI(config-if)# ip address 50.0.0.1 255.0.0.0
MUMBAI(config-if)# clock rate 64000
MUMBAI(config-if)# no shutdown
MUMBAI(config-if)# exit
MUMBAI(config)# exit
MUMBAI# write

c. Assign IP address to Router2 (NAGPUR)


Select Router2 (NAGPUR), and enter into CLI interface and assign the IP address as:
Router2> enable
Router2# configure terminal
Router2(config)# host name NAGPUR
NAGPUR(config)# interface fastEthernet 0/0
NAGPUR(config-if)# ip address 30.0.0.10 255.0.0.0
NAGPUR(config-if)# no shutdown
NAGPUR(config-if)# exit
NAGPUR(config)# interface serialEthernet 0/2/0
NAGPUR(config-if)# ip address 50.0.0.2 255.0.0.0
NAGPUR(config-if)# no shutdown
NAGPUR(config-if)# exit
NAGPUR(config)# exit
NAGPUR# write

d. Apply OSPF protocol to Router0 (PUNE)


PUNE> enable
PUNE# configure terminal
PUNE#(config) router ospf 10
PUNE#(config) network 10.0.0.0 255.0.0.0 area 0
PUNE#(config) network 40.0.0.0 255.0.0.0 area 0
PUNE#(config) exit
PUNE# write

e. Apply RIP protocol to Router1 (MUMBAI)


MUMBAI> enable
MUMBAI# configure terminal
MUMBAI(config)# router ospf 10
MUMBAI(config)# network 20.0.0.0 255.0.0.0 area 0
MUMBAI(config)# network 40.0.0.0 255.0.0.0 area 0
MUMBAI(config)# network 50.0.0.0 255.0.0.0 area 0
MUMBAI(config)# exit
MUMBAI# write

d. Apply RIP protocol to Router2 (NAGPUR)


NAGPUR> enable
NAGPUR# configure terminal
NAGPUR(config)# router rip
NAGPUR(config)# network 50.0.0.0 255.0.0.0 area 0
NAGPUR(config)# network 30.0.0.0 255.0.0.0 area 0
NAGPUR(config)# exit
NAGPUR# write

e. Verify the network functionality


You can verify the functionality of the network by opening command prompt from any PC
and pinging another PC on the different network.
You can also transfer sample packet between two PC’s in Realtime Simulation

6.0 Resources Required


 3 Switches 2960
 6 PC’s
 3 Routers 2811
 Copper Straight Through Cable
 Serial (DCE) cable

7.0 Output (Created Network Topology)


8.0 Exercise
1. What is the command used to configure OSPF protocol in Router?
2. Who can assign the metric (cost to each route) in OSPF protocol?
3. What is the number of area which connects one autonomous system with other?
4. OSPF protocol implements which algorithm to find the shortest path between the no. of
routes available?
5. What is the significance of providing process ID and area number while configuring OSPF?
6. Write the command used to view the all the routing paths of a router.

Space for answers


………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 7,8 and 9 – Configure UDP and TCP Protocols
Relevant Course Outcomes:
a. Implement Network Layer Protocols
b. Implement different Transport Layer Protocols

Relevant Practical Outcomes:


a. Configure UDP and TCP Protocols

Topology:

Objectives

Part 1: Generate Network Traffic in Simulation Mode


Part 2: Examine the Functionality of the TCP and UDP Protocols

Background

This simulation activity is intended to provide a foundation for understanding the TCP and UDP
in detail. Simulation mode provides the ability to view the functionality of the different
protocols. As data moves through the network, it is broken down into smaller pieces and
identified in some fashion so that the pieces can be put back together. Each of these pieces
is assigned a specific name (protocol data unit [PDU]) and associated with a specific layer.
Packet Tracer Simulation mode enables the user to view each of the protocols and the
associated PDU. The steps outlined below lead the user through the process of requesting
services using various applications available on a client PC. This activity provides an
opportunity to explore the functionality of the TCP and UDP protocols, multiplexing and the
function of port numbers in determining which local application requested the data or is
sending the data.

Part 1: Generate Network Traffic in Simulation Mode

Step 1: Generate traffic to populate Address Resolution Protocol (ARP) tables.

Perform the following tasks task to reduce the amount of network traffic viewed in the
simulation.

a. Click MultiServer and click the Desktop tab > Command Prompt.
b. Enter the ping 192.168.1.255 command. This will take a few seconds as every device on
the network
responds to MultiServer.
c. Close the MultiServer window.

Step 2: Generate web (HTTP) traffic.


a. Switch to Simulation mode.
b. Click HTTP Client and click the Desktop tab > Web Browser.
c. In the URL field, enter 192.168.1.254 and click Go. Envelopes (PDUs) will appear in the
simulation
window.
d. Minimize, but do not close, the HTTP Client configuration window.

Step 3: Generate FTP traffic.


a. Click FTP Client and click the Desktop tab > Command Prompt.
b. Enter the ftp 192.168.1.254 command. PDUs will appear in the simulation window.
c. Minimize, but do not close, the FTP Client configuration window.
Step 4: Generate DNS traffic.
a. Click DNS Client and click the Desktop tab > Command Prompt.
b. Enter the nslookup (your domain name) command Ex: nslookup multiserver.pt.ptu. A PDU
will appear in the simulation window.
c. Minimize, but do not close, the DNS Client configuration window.

Step 5: Generate Email traffic.


a. Click E-Mail Client and click the Desktop tab > E Mail tool.
b. Click Compose and enter the following information:
1) To: any entity followed by domain name (Ex: [email protected])
2) Subject: Personalize the subject line
3) E-Mail Body: Personalize the Email
c. Click Send.
d. Minimize, but do not close, the E-Mail Client configuration window.

Step 6: Verify that the traffic is generated and ready for simulation.
Every client computer should have PDUs listed in the Simulation Panel.

Part 2: Examine Functionality of the TCP and UDP Protocols

Step 1: Examine multiplexing as all of the traffic crosses the network.

You will now use the Capture/Forward button and the Back button in the Simulation Panel.
a. Click Capture/Forward once. All of the PDUs are transferred to the switch.
b. Click Capture/Forward again. Some of the PDUs disappear. What do you think happened
to them?
....................................................................................................................................................

c. Click Capture/Forward six times. All clients should have received a reply. Note that only
one PDU can cross a wire in each direction at any given time. What is this called?

....................................................................................................................................................

d. A variety of PDUs appears in the event list in the upper right pane of the simulation
window. Why are they so many different colors?

……………………………………………………………………………………………………………………………………………….

e. Click Back eight times. This should reset the simulation.

NOTE: Do not click Reset Simulation any time during this activity; if you do, you will needto repeat
the steps in Part 1.

Step 2: Examine HTTP traffic as the clients communicate with the server.
a. Filter the traffic that is currently displayed to display only HTTP and TCP PDUs filter the
traffic that is currently displayed:
1) Click Edit Filters and toggle the Show All/None check box.
2) Select HTTP and TCP. Click anywhere outside of the Edit Filters box to hide it. The Visible
Events should now display only HTTP and TCP PDUs.
b. Click Capture/Forward. Hold your mouse above each PDU until you find one that
originates from HTTP
Client. Click the PDU envelope to open it.
c. Click the Inbound PDU Details tab and scroll down to the last section. What is the section
labeled?

……………………………………………………………………………………………………………………………………………….

Are these communications considered to be reliable?

……………………………………………………………………………………………………………………………………………….

d. Record the SRC PORT, DEST PORT, SEQUENCE NUM, and ACK NUM values. What is written
in the field to the left of the WINDOW field?

……………………………………………………………………………………………………………………………………………….

e. Close the PDU and click Capture/Forward until a PDU returns to the HTTP Client with a
checkmark.
f. Click the PDU envelope and select Inbound PDU Details. How are the port and sequence
numbers different than before?
……………………………………………………………………………………………………………………………………………….

g. There is a second PDU of a different color, which HTTP Client has prepared to send to
MultiServer. This is the beginning of the HTTP communication. Click this second PDU envelope
and select Outbound PDU Details.
h. What information is now listed in the TCP section? How are the port and sequence numbers
different from the previous two PDUs?
……………………………………………………………………………………………………………………………………………….

i. Click Back until the simulation is reset.

Step 3: Examine FTP traffic as the clients communicate with the server.
a. In the Simulation Panel, change Edit Filters to display only FTP and TCP.
b. Click Capture/Forward. Hold your cursor above each PDU until you find one that originates
from FTP Client. Click that PDU envelope to open it.
c. Click the Inbound PDU Details tab and scroll down to the last section. What is the section
labeled?
……………………………………………………………………………………………………………………………………………….

Are these communications considered to be reliable?


……………………………………………………………………………………………………………………………………………….
d. Record the SRC PORT, DEST PORT, SEQUENCE NUM, and ACK NUM values. What is written
in the field to the left of the WINDOW field?
……………………………………………………………………………………………………………………………………………….

e. Close the PDU and click Capture/Forward until a PDU returns to the FTP Client with a
checkmark.
f. Click the PDU envelope and select Inbound PDU Details. How are the port and sequence
numbers different than before?
……………………………………………………………………………………………………………………………………………….

g. Click the Outbound PDU Details tab. How are the port and sequence numbers different
from the previous two results?
……………………………………………………………………………………………………………………………………………….

h. Close the PDU and click Capture/Forward until a second PDU returns to the FTP Client. The
PDU is a different color.
i. Open the PDU and select Inbound PDU Details. Scroll down past the TCP section. What is
the message from the server?
May say either “Username ok, need password” or “Welcome to PT Ftp server”
j. Click Back until the simulation is reset.

Step 4: Examine DNS traffic as the clients communicate with the server.
a. In the Simulation Panel, change Edit Filters to display only DNS and UDP.
b. Click the PDU envelope to open it.
c. Click the Inbound PDU Details tab and scroll down to the last section. What is the section
labeled?
……………………………………………………………………………………………………………………………………………….

Are these communications considered to be reliable?


……………………………………………………………………………………………………………………………………………….

d. Record the SRC PORT and DEST PORT values. Why is there no sequence and
acknowledgement number?
……………………………………………………………………………………………………………………………………………….

e. Close the PDU and click Capture/Forward until a PDU returns to the DNS Client with a
checkmark.
f. Click the PDU envelope and select Inbound PDU Details. How are the port and sequence
numbers different than before?
……………………………………………………………………………………………………………………………………………….

g. What is the last section of the PDU called?


……………………………………………………………………………………………………………………………………………….

h. Click Back until the simulation is reset.

Step 5: Examine email traffic as the clients communicate with the server.
a. In the Simulation Panel, change Edit Filters to display only POP3, SMTP and TCP.
b. Click Capture/Forward. Hold your cursor above each PDU until you find one that originates
from E-mail Client. Click that PDU envelope to open it.
c. Click the Inbound PDU Details tab and scroll down to the last section. What transport layer
protocol does email traffic use?
……………………………………………………………………………………………………………………………………………….

Are these communications considered to be reliable?


……………………………………………………………………………………………………………………………………………….

d. Record the SRC PORT, DEST PORT, SEQUENCE NUM, and ACK NUM values. What is written
in the field to the left of the WINDOW field?
……………………………………………………………………………………………………………………………………………….

e. Close the PDU and click Capture/Forward until a PDU returns to the E-Mail Client with a
checkmark.
f. Click the PDU envelope and select Inbound PDU Details. How are the port and sequence
numbers different than before?
……………………………………………………………………………………………………………………………………………….

g. Click the Outbound PDU Details tab. How are the port and sequence numbers different
from the previous two results?
……………………………………………………………………………………………………………………………………………….

h. There is a second PDU of a different color that HTTP Client has prepared to send to
MultiServer. This is the beginning of the email communication. Click this second PDU envelope
and select Outbound PDU Details.
i. How are the port and sequence numbers different from the previous two PDUs?
……………………………………………………………………………………………………………………………………………….

j. What email protocol is associated with TCP port 25? What protocol is associated with TCP
port 110?
……………………………………………………………………………………………………………………………………………….

k. Click Back until the simulation is reset.


Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 11: Configure Dynamic Host Configuration Protocol (DHCP)

Relevant Course Outcomes:


a. Implement Network Layer Protocols
b. Implement Application Layer Protocols.

Relevant Practical Outcomes:


a. Configure DHCP Server

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask

G 0/0 10.0.0.10 255.0.0.0


R1
G 0/1 20.0.0.10 255.0.0.0
DHCP1 Fa 0/0 10.0.0.11 255.0.0.0
DHCP2 Fa 0/0 20.0.0.11 255.0.0.0

3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP address to each interface of Router
Part 3: Assign IP address to DHCP Server corresponding to IP address of the appropriate interface
of Router.
Part 4: Assign IP address to PC dynamically.
Part 4: Verify the network functionality by sending packets from one network to another.

4.0 Background/Scenario
The Dynamic Host Configuration Protocol (DHCP) is a network protocol that lets network
administrators manage and automate the assignment of IP addresses. Without DHCP, the
administrator must manually assign and configure IP addresses, preferred DNS servers, and
default gateways. As the network grows in size, this becomes an administrative problem when
devices are moved from one internal network to another.
In this scenario, you will create two networks and setup DHCP in each network.
You will configure DHCP in such a way that it will provide IP address as well as Default Gateway
dynamically as a host request it.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through Cable to connect all the devices in the given topology

Part 2: Assign IP address to each interface of Router


Router0> enable
Router0# configure terminal
Router0(config)# interface gigabitEthernet 0/0
Router0(config-if)# ip address 10.0.0.10 255.0.0.0
Router0(config-if)# no shutdown
Router0(config-if)# exit
Router0(config)# interface gigabitEthernet 0/1
Router0(config-if)# ip address 20.0.0.10 255.0.0.0
Router0(config-if)# no shutdown
Router0(config-if)# exit
Router0(config)# exit
Router0# write
Part 3: Configure DHCP Server
After assigning IP address, configure DHCP Server1 as below:

After assigning IP address, configure DHCP Server2 as below:


Part 4. Assign IP address to PC dynamically
Go to Desktop -> IP Configuration -> Select DHCP

6.0 Resources Required


 2 Switches 2960
 4 PC’s
 1 Routers 1941
 Copper Straight Through Cable
 2 Generic Servers

7.0 Output (Created Network Topology)


8.0 Exercise
1. Describe the function of DHCP Server?
2. Why DHCP is require?
3. IP address assigned by DHCP Server to a PC changes periodically. Explain.
4. What is the difference between DHCP and DHCPv6?
5. What is a generic Server?

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 12: Configure Domain Name Server (DNS) Server

Relevant Course Outcomes:


a. Implement Network Layer Protocols
b. Implement Application Layer Protocols.

Relevant Practical Outcomes:


a. Configure DNS Server

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask

DNS HTTP Fa 0/0 10.0.0.10 255.0.0.0


PC0 Fa 0/1 10.0.0.1 255.0.0.0
PC1 Fa 0/2 10.0.0.2 255.0.0.0

3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP address and DNS address to Server and PC’s.Part 3:
Configure Server on top of HTTP Service.
Part 4: Configure Server on top of DNS Service.
Part 5: Download a file from FTP Server into PC.
Part 5: Verify the network functionality by accessing a webpage with its URL

4.0 Background/Scenario
A DNS server is a computer server that contains a database of public IP addresses and their
associated hostnames, and in most cases serves to resolve, or translate, those names to IP
addresses as requested. DNS servers run special software and communicate with each other
using special protocols.
In this practical, you will apply both HTTP and DNS Services on a Generic Server. You will map
the Servers address into a URL which can be used to access HTTP content. You will to configure
DNS Server in such a way that user should be able to access to HTTP content with respect to
URL.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through Cable to connect all the devices in the given topology

Part 2: Assign IP address and DNS Server address to Server and PC


Assign appropriate IP address to Server by selecting them, go to Desktop -> IP Configuration.
Assign appropriate IP address to PC by selected it, go to Desktop -> IP Configuration.
NOTE: DNS Address should be same as Server’s IP Address

Part 3: Configure Server on top of HTTP Service


Now, select Server, go to Services tab and start HTTP service
You can edit your index.html page from Edit section to view it as per your creation in
different PC’s.

Part 4. Configure Server on top of DNS Service


Go to Services tab and start DNS service. Configure DNS service as below:

In Name field, type a URL into which you will to map your website IP address.
In Address field, type IP address of the website.
Click Add to add your configuration details in DNS Server.

Part 5: Verify the network functionality by accessing a webpage with its URL.
Select any PC, go to Desktop -> Web Brower. Type your website URL in the address field of
web browser.
Your website should appear as above on Web Browser.

6.0 Resources Required


 1 Switch (2960)
 1 Generic Server
 2 PC’s

7.0 Output (Created Network Topology and accessed Webpage)


8.0 Exercise
1. Describe the function of DNS Server?
2. How to configure DNS Server?
3. What is DNS Spoofing?
4. What is Round Robin DNS? What is the purpose of it?
5. What are different types of records in DNS Server?

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 14: a. Configure File Transfer Protocol (FTP)

Relevant Course Outcomes:


a. Implement Network Layer Protocols.
e. Configure different Application Layer Protocols.

Relevant Practical Outcomes:


a. Configure File Transfer Protocol(FTP).

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask

File Server Fa 0/0 10.0.0.10 255.0.0.0


PC0 Fa 0/1 10.0.0.1 255.0.0.0
PC1 Fa 0/2 10.0.0.2 255.0.0.0

3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP address to Server and PC’s.
Part 3: Configure Server on top of FTP Service.
Part 4: Upload a file into the FTP Server from PC.
Part 5: Download a file from FTP Server into PC.
Part 6: Perform manipulation of Files on FTP Server.

4.0 Background/Scenario
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of
computer files between a client and server on a computer network. FTP is built on a client-
server model architecture using separate control and data connections between the client and
the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally
in the form of a username and password, but can connect anonymously if theserver is
configured to allow it.
In this practical, you will create a File Server with Authentication and Authorization. You will
create different users who can access the File Server based of Role based Security. This means
that you have the privileges to access different rights to different users. You will also upload
files to the Server from and download it from different PC’s. You can also manipulate the files
stored in Server.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through Cable to connect all the devices in the given topology

Part 2: Assign IP address to Server and PC


Assign appropriate IP address to PC’s by selecting them, go to Desktop -> IP Configuration.
Assign appropriate IP address to Server by selecting it, go to Desktop -> IP Configuration.

Part 3: Configure Server on top of FTP Service


Now, select Server go to Services tab and start FTP service.
Create different users to can access FTP contents and also assign them different Permissions
to retrieve file.
Part 4. Upload a file to FTP Server from PC
You can upload a file to FTP server by the following command:
put <file-name along with extention>
First, you need to create a file. So, select a PC->Desktop->Text Editor. Create a text file and
save it with any name.

Upload the file into FTP as below:

View if the File is uploaded into FTP by dir command:


Part 5: Download a file from FTP to PC.
You can download a file from FTP by the following command:
get <file-name along with extension>
Download the uploaded file on PC as:

Part 6: Perform manipulation of Files on FTP Server.


You can perform manipulation of Files on FTP Server by the following commands:
rename <file-name along with extension> <new-file name>
delete <file-name along with extension>

6.0 Resources Required


 1 Switch (2960)
 1 Generic Server
 2 PC’s

7.0 Outputs
8.0 Exercise
1. Describe the function of FTP Server.
2. How users are created in FTP Server?
3. Write the command to upload and download file from Web Server.
4. What is TFTP? How it is different from FTP?
5. How to deny user access to FTP Server?

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 13: b. Configure Hyper Text Transfer Protocol (HTTP)

Relevant Course Outcomes:


a. Implement Network Layer Protocols.
e. Configure different Application Layer Protocols.

Relevant Practical Outcomes:


a. Configure HTTP Protocol

1.0 Topology

2.0 Addressing Table

Device Interface IP Address DNS Server Subnet Mask

Google Server Fa 0/0 10.0.0.1 N/A 255.0.0.0


DNS Server Fa 0/1 10.0.0.2 N/A 255.0.0.0
PC0 Fa 0/2 10.0.0.10 10.0.0.2 255.0.0.0
PC1 Fa 0/3 10.0.0.11 10.0.0.2 255.0.0.0

3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP address to Server and PC’s.
Part 3: Configure HTTP Server.
Part 4: Configure DNS Server.
Part 5: Access a webpage from the PC’s by its IP address and its URL.

4.0 Background/Scenario
A web server is server software, or hardware dedicated to running this software, that can
satisfy client requests on the World Wide Web. A web server can, in general, contain one or
more websites. A web server processes incoming network requests over HTTP and several
other related protocols.
In this practical, you will create a HTTP and DNS Server, configure it and try to access the
HTTP content from different PC’s based on the IP address of HTTP Server and mapped URL.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through Cable to connect all the devices in the given topology

Part 2: Assign IP address to Server and PC


Assign appropriate IP address to PC’s by selecting them, go to Desktop -> IP Configuration.
Assign DNS Server’s IP address to PC’s by selecting them, go to Desktop -> IP Configuration.
Assign appropriate IP address to both Servers by selecting them, go to Desktop -> IP
Configuration.

Part 3: Configure HTTP Server


Now, select HTTP Server go to Services tab and start HTTP service.
You can edit the index.html file by clicking on edit in Edit tab.

Part 4: Configure DNS Server.


Select DNS Server go to Services tab and start DNS service
Type your desired URL in Name field.
Type your HTTP Server’s IP address in the Address field and click ADD button.

Part 5: Access a webpage from the PC’s by its IP address and its URL.
Select any PC, go to Desktop->Web Browser. Type HTTP Servers IP address to retrieve the
HTTP content. Type mapped URL from DNS Server to retrieve the same HTTP content.

6.0 Resources Required


 1 Switch (2960)
 2 Generic Servers
 2 PC’s
7.0 Outputs
8.0 Exercise
1. Describe the function of HTTP Server.
2. What is the software which runs inside the HTTP Server?
3. Can multiple Website be stored on to a single Web Server?
4. Write the difference between HTTP and HTTPS?
5. What is the default port for HTTP and HTTPS?

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 14: a. Use TELNET to login a remote machine.
b. Connect Remote Machine using Secure Shell (SSH).

Relevant Course Outcomes:


a. Implement Network Layer Protocols
e. Configure different Application Layer Protocols

Relevant Practical Outcomes:


a. User Telnet to login a remote machine.
b. Connect Remote machine using SSH

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask

Router0 G 0/0 10.0.0.1 255.0.0.0


PC0 Fa 0/1 10.0.0.2 255.0.0.0
PC1 Fa 0/2 10.0.0.3 255.0.0.0

3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP address to Server and PC’s.
Part 3: Configure Telnet on Router.Part 4:
Secure Telnet with SSH.
Part 5: Access Router using any of the connected PC.

4.0 Background/Scenario
Telnet, developed in 1969, is a protocol that provides a command line interface for
communication with a remote device or server, sometimes employed for remote
management but also for initial device setup like network hardware. Because it was developed
before the mainstream adaptation of the internet, Telnet on its own does not employ any
form of encryption, making it outdated in terms of modern security. It has largely been
overlapped by Secure Shell (SSH) protocol, at least on the public internet, but for instances
where Telnet is still in use, there are a few methods for securing your communications.
In this practical, you will use Telnet to access remote Router from PC. You will also Secure Shell
Protocol (SSH) to secure your Telnet communication.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through Cable to connect all the devices in the given topology

Part 2: Assign IP address to Router and PC


Assign appropriate IP address to Router from IOS command line.
Assign appropriate IP address to PC’s by selecting them, go to Desktop -> IP Configuration.

Part 3: Configure Telnet on Router


a. Assign Password to Router
>enable
#configure terminal
#enable password (give your password here)

b. Configure Telnet
Go to IOS Command line of any Router on which you want to install Telnet and type the
following:

>enable
#configure terminal
#line vty 0 (max-users who can access router (in integer) )
#password (set telnet password here)
#login
#exit
#exit
#write

c. Access Router from any PC


Go to Command prompt from any PC and type:
>telnet (IP of router)

Part 4: Configure Telnet with any Router.


Go to IOS Command line of Router:
>enable
#configure terminal
#hostname (any host-name)
#ip domain-name (any domain-name)
#crypto key generate rsa
[You will be asked to select size of crypto key choose any size, usually 512 is chosen]
#line vty 0 (max-no of users access Router)
#transport input ssh
#login local
#username (any user-name) password (any password)

Part 5: Access Router from any PC.


Go to Command Prompt of any PC, and type the following:
>ssh -l (your set username during ssh configuration) (IP address of Router)

echnical Education
6.0 Resources Required
 1 Switch (2960)
 1 Router (1941)
 2 PC’s

7.0 Outputs
8.0 Exercise
1. Write the command used to set crypto keys in SSH Protocol.
2. What is the maximum no. of users with which Telnet can be set?
3. Write the command to display the generated crypto key in SSH.
4. Why hostname and ip-domain name is required to set before configuring SSH protocol?
5. What is the default port for Telnet?

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 15: Configure SMTP, POP3 and IMAP

Relevant Course Outcomes:


a. Implement Network Layer Protocols
e. Configure different Application Layer Protocols

Relevant Practical Outcomes:


a. Configure SMTP, POP3, IMAP.
b. Implement Application Layer Protocols.

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask

Email Server Fa 0/0 10.0.0.1 255.0.0.0


PC0 Fa 0/1 10.0.0.2 255.0.0.0
PC1 Fa 0/2 10.0.0.3 255.0.0.0

3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP address to Server and PC’s.
Part 3: Configure Email Server.
Part 4: Send and Receive Emails from two PC’s.

4.0 Background/Scenario
Within the Internet email system, a message transfer agent or mail transfer agent or mail relay
is software that transfers electronic mail messages from one computer to another using
SMTP. The terms mail server, mail exchanger, and MX host are also used in some contexts. At
the sender end, SMTP protocol to send messages and at the receiver end POP3 or IMAP
protocols is used to retrieve messages stored on Server to local Machine.
In this practical, you will set up an Email Server and send and receive emails from different
PC’s. On the backend, Sender PC will use SMTP protocol and receiver PC will use POP3 or IMAP
provided by Mail Server software to retrieve messages.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through Cable to connect all the devices in the given topology

Part 2: Assign IP address to Server and PC


Assign appropriate IP address to Server by selecting it, go to Desktop -> IP Configuration.
Assign appropriate IP address to PC’s by selecting them, go to Desktop -> IP Configuration.

Part 3: Configure Email Server


a. Start Email SMTP and POP3 Service.
b. Assign a domain name to Email Server in Domain Name field and click SET.
c. Create Users by setting their name and password in User and Password field and Click ‘+’
button.
Part 5: Send and Receive Emails from different PC’s.
a. Select PC0, go to Desktop -> Configure Email. Create a new User by entering the details of
one of the registered users in Email Server.
b. Select PC1, go to Desktop -> Configure Email. Create a new User by entering the details of
one of the registered users in Email Server.
c. After creating a new user, click Compose to send Email to another user.
d. Send an email from PC1 to PC0.

Message at Sender end:

Message received at Receiver end:

6.0 Resources Required


 1 Switch (2960)
 1 Generic Server
 2 PC’s

7.0 Outputs
8.0 Exercise
1. Write protocols used at Email sender end.
2. Write protocols used at Email receiver end.
3. Write difference between POP3 and IMAP.
4. If we want to send an email with attachments (images ,doc ,xlx files) then which protocol
is to be used at sender end, along with SMTP?
5. What is the default port for SMTP?

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)
Practical no. 16: Configure SNMP and MIME

Relevant Course Outcomes:


a. Implement Network Layer Protocols
e. Configure different Application Layer Protocols

Relevant Practical Outcomes:


a. Configure SNMP and MIME

1.0 Topology

2.0 Addressing Table

Device Interface IP Address Subnet Mask

Router0 Fa 0/0 10.0.0.1 255.0.0.0


PC0 Fa 0/1 10.0.0.2 255.0.0.0
PC1 Fa 0/2 10.0.0.3 255.0.0.0

3.0 Objectives
Part 1: Cable the network as per the given topology.
Part 2: Assign IP address to Server and PC’s.
Part 3: Register the Router to SNMP Server community.
Part 4: Get details (such as Router name ,location, etc) from Management Information
Base (MIB) in PC.
Part 5: Set details (such as Router name, location, etc) from Management Information Base (MIB) in
PC.

4.0 Background/Scenario
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting
and organizing information about managed devices on IP networks and for modifying that
information to change device behavior. SNMP is widely used in network management for
network monitoring. SNMP exposes management data in the form of variables on the
managed systems organized in a management information base (MIB) which describe the
system status and configuration.
In this practical, you will register the Router into SNMP server’s community and try to
retrieve and change some router parameters.

5.0 Procedure
Part 1: Cable the Network as shown in Topology
Use Copper Straight Through Cable to connect all the devices in the given topology

Part 2: Assign IP address to Server and PC


Assign appropriate IP address to Server by selecting it, go to Desktop -> IP Configuration.
Assign appropriate IP address to PC’s by selecting them, go to Desktop -> IP Configuration.

Part 3: Register the Router to SNMP Server community


You can register the Router to SNMP community by typing to below command in IOS
Command line of Server:
>enable
#configure terminal
#snmp-server community (password) ro
#snmp-server community (password) rw
#exit
#write

Part 4: Get details (such as Router name ,location, etc) from Management InformationBase (MIB) in
PC.
a. Select any PC, go to Desktop -> MIB Browser.
b. In the Address field, type the IP address of Router
c. Click Advanced button. Type read and write password provided before while configuring
Router with SNMP protocol and click OK.
d. Keep expanding MIB Tree until you get System node.
e. Inside System node, you will find all the basic information about Router.
f. Click .sysName to get the name of the Router

Part 5: Set details (such as Router name, location, etc) from Management Information Base(MIB) in PC.
a. Select the Value attribute, and select Set from the list of Operations.
b. Type a new router name in Name field of SNMP set dialog.
The Router name will be changed as below

6.0 Resources Required


 1 Switch (2960)
 1 Router (1941)
 2 PC’s
7.0 Outputs
8.0 Exercise
1. MIME protocol is used at Sender end or Receiver end?
2. Why SNMP protocol is used?
3. Write the command used to register a Router to SNMP protocol.
4. SNMP protocol operates at which layer in TCP/IP protocol?
5. MIME protocol operates at which layer in TCP/IP protocol?

Space for answers

………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………

Dated signature of
Marks Obtained
Teacher
Process Product Total
Related(30) Related(20) (50)

You might also like