0% found this document useful (0 votes)
103 views

Dec30023 Computer Networking Fundamentals Pw2

PW2,DEC30023,COMPUTER NETWORKING FUNDAMENTALS,Politeknik Seberang Perai (PSP)

Uploaded by

JustShareIt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
103 views

Dec30023 Computer Networking Fundamentals Pw2

PW2,DEC30023,COMPUTER NETWORKING FUNDAMENTALS,Politeknik Seberang Perai (PSP)

Uploaded by

JustShareIt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 16

ELECTRICAL ENGINEERING DEPARTMENT

ACADEMIC SESSION: 1 2023/2024

DEC30023 – COMPUTER NETWORKING FUNDAMENTALS

PRACTICAL WORK : 2 INTRODUCTION TO NETWORKING


PRACTICAL WORK DATE :
LECTURER’S NAME:
GROUP NO. :

STUDENT ID & NAME :


TOTAL MARKS
(100%)

(1) NAME :
STUDENT ID :

(2) NAME :
STUDENT ID :

DATE SUBMIT : DATE RETURN :


1 LEARNING OUTCOMES (LO):

CLO2 : Construct a simple LAN or WLAN in accordance to IEEE or


TIA/EIA-568-A/B wiring standard and network
troubleshooting using network simulation or tools. (P4, PLO5)

PLO5 : Demonstrate awareness of the norm practice of professional


bodies such as IEEE or TIA/EIA-568-A/B during practical
work session.
CLO3
: Apply appropriate techniques, resources and modern
engineering and IT tools to well-defined engineering problems
with an awareness of the limitations. (A3, PLO8)
PLO8
: Understand and commit to professional ethics and responsibilities
and norms of technician practice

2 THEORY

This lab consists of two parts. The first part is to build a peer-to-peer network using
packet tracer, and the second part is to use the cable that students have already
prepared in previous lab.

Instructor may perform this lab in two different sessions. Students are needed to install
the Packet Tracer software on their laptop and for the second part, the following
resources are required:
• Two Window XP Professional PCs, each with an installed and functional
Network Interface Card (NIC).
• An Ethernet cable from lab work 1.

Packet Tracer Guidelines

Packet Tracer is a program used to illustrate at a basic level how networks work. Packet
Tracer has two different views:
• Logical Workspace
• Physical Workspace

Packet Tracer also has two modes of operation:


• Real time Mode
• Simulation Mode

At startup, you are in the Logical Workspace in Realtime Mode. You can build your
network and see it run in real time in this configuration. You can switch to Simulation
Mode to run controlled networking scenarios. You can also switch to the Physical
Workspace to arrange the physical aspects, such as location, of your devices.

2
You cannot run your network while you are in the Physical Workspace. You should
return to the Logical Workspace after you are done in the Physical Workspace.

1 - Menu Bar
This bar provides the File, Options, and Help menus. You will find basic commands
such as Open, Save, Print, and Preferences in these menus. You will also be able to
access the Activity Wizard from the File menu.

2 - Main Tool Bar


This bar provides shortcut icons to the File menu commands, including the Activity
Wizard. On the right, you will also find the Network Information button, which you can
use to enter a description for the current network or any text you wish to include.

3 - Common Tools Bar


This bar provides access to these commonly used workspace tools.
• Select
• Move Layout
• Place Note
• Delete
• Add Simple PDU
• Add Complex PDU

4 - Workspace Type Bar


You can toggle between the Physical Workspace and the Logical Workspace with the
tabs on this bar.

3
5 - Workspace
This area is where you will create your network, watch simulations, and view many
kinds of information and statistics.

6 - Realtime or Simulation Bar


You can toggle between Realtime Mode and Simulation Mode with the tabs on this bar.

7 - Network Component Box


This box is where you choose devices and connections to put onto the workspace
It contains the Device-Type Selection Box and the Device-Specific Selection Box.

8 - Device Type Selection Box


This box contains the type of devices and connections available in Packet Tracer. The
Device-Specific Selection Box will change depending on which type of devices you
clicked.

9 - Device Selection Box


This box is where you choose specifically which devices you want to put in your network
and which connections to make.

10 - Created Packet Window


This window manages the packets you put in the network during simulation scenarios.

4 EQUIPMENT / TOOLS

1. Cisco Packet Tracer


2. Computer running Windows 7 / Windows 10
3. Network Cable – Straight Through and Cross Over Cable

5 PROCEDURE

PART A : USING PACKET TRACER TO CREATE THE PEER-TO-PEER


NETWORK

Step 1: Choosing the appropriate device to create a peer-to-peer network

a. By Clicking the “end devices” icon on bottom left of the screen, choose the
‘generic’ icon of a PC. You can simply drag the icon on to the workspace or click
on the icon and click on the workspace. You need to have at least two PC to
create a peer-to-peer network.

4
b. Click on the “connections” (the thunder bolt icon) and choose appropriate cable
to link the PCs. Write down the correct type of cable to be used in Result section.

c. Click on the PC and choose the FastEthernet port.

d. Do the same step to the other PC. A correct connection will show a green color
on the cable.

Task 1: Create peer-to-peer network using correct cable in packet tracer


software.

Step 2: Configuring the PCs

a. Click on the PC and click the Config tab. Change the Display name into
Computer A.

5
b. On the left-hand side, there a FastEthernet option under INTERFACE tab, click
FastEthernet. Under IP Configuration section, choose the Static and write
down this information.

c. Click on another PC repeat step a-b but this time use 192.168.10.2 as the IP
address for Computer B. Do the same steps if you have more than 2 PC (e.g.
Computer C (192.168.10.3), Computer D (192.168.10.4) etc.)

Task 2: Configure IP address for PCs.

Step 3: Checking the connection using ping command

a. You can test the connection using two methods. First, you can ping Computer B
from Computer A. Click on Computer A and choose the Desktop tab. Click on
the Command Prompt.

6
b. Type in this line into the command prompt. This command prompt act as the real
command prompt on your computer. Type ping 192.168.10.2 and press Enter
button.
c. If the pings are successful, that means, Computer A and Computer B are
connected. If the command prompt display “Request Timed Out” the connection
is not established. You might use the wrong cable.
d. Take a screen shot of the result and submit it with the report.

Task 3: Test connection using ping command.

Step 4: Verify the connection by sending packet between two PCs


a. Click on the ‘envelope’ icon on the left side bar.

7
b. Click on Computer A, and then, click on computer B. (you can do vice versa)
c. Ping is successful when the bottom right column display this.

Task 4: Verify connection using simple packet data.

PART B : DESIGN PEER-TO-PEER NETWORK USING ETHERNET CABLE

Step 1: Diagram of the network

a. A network diagram is a map of the logical topology of the network. Sketch a


simple peer to peer network connecting two computers. Label one of the
computer with IP address 192.168.1.1 and the other computer with IP address
192.168.1.2. Sketch the diagram in the space provided in the result section.

Step 2: Document the Computers

a. Check the computer name setting for each PC and make adjustment is
necessary. To do this, right click This PC icon (Windows 10) and click on
Properties. Click Change Setting and then Change button to change
Computer Name. (You don’t need to click ‘change setting if you don’t want to
change your computer name. Remember to restart your PC after you changed
the Computer name)

8
b. Write down the computer name that will be used to create peer-to-peer network
in the Result section.
c. Click OK to close the System Properties Window.

Task 4: Identify the Computer Name

Step 3: Connect the Ethernet cable

a. Use the Ethernet cable you did in practical work 1. Remember to use the correct
cable. Plug one end of the cable into the Ethernet NIC Computer 1.
b. Plug the other end of the cable into Ethernet NIC of Computer 2. As you inserted
the cable, you should hear a click which indicated that the cable connector is
properly inserted into the port.

Step 4: Verify Physical connectivity

a. After the Ethernet crossover cable is connected to both computers, take a close
look at each Ethernet port. A light (usually green or amber) indicates that
physical connectivity has been established between the two NICs. Try
unplugging the cable from one computer then reconnecting it to verify that the
light goes off then back on.
b. Go to the Control Panel, double click the Network Connections icon, and confirm
that the local area connection is established. The following figure shows an
active local area connection. If physical connectivity problems exist, you will see
a red X over the Local Area Connection icon with the words Network cable
unplugged.

9
c. If the Local Area Connection does not indicate that it is connected, troubleshoot
by repeating Steps 3 and 4. You may also want to ask your instructor to confirm
that you are using the correct Ethernet cable.

Task 5: Identify the Computer Name

Step 5: Configure the IP Settings

a. Configure the logical addresses for the two computers so that they are able to
communicate using TCP/IP. On one of the computers, go to the Control Panel,
double click the Network Connections icon, and then right click the connected
Local Area Connection icon. Choose Properties from the pull-down menu.
b. Using the scroll bar in the Local Area Connection Properties window, scroll
down to highlight Internet Protocol Version 4 (TCP/IPv4). Click the Properties
button.

10
c. Select the ‘Use the following IP address’ radio button and enter the following
information.

IP Address 192.168.1.1
Subnet Mask 255.255.255.0

d. Click OK, which will close the Internet Protocol Version 4 (TCP/IPv4)
Properties window. Click the Close button to exit the Local Area Connection
Properties window.
e. Repeat step a-d for the second computer using the following information.

IP Address 192.168.1.2
Subnet Mask 255.255.255.0

11
Task 6: Configure IP address for computers.

Step 6: Verify IP connectivity between the two computers

NOTE: To test TCP/IP connectivity between the computers, Windows Firewall must
be disabled temporarily on both computers. Windows Firewall should be re-enabled
after the tests have been completed.

a. Now that the two computers are physically connected and configured correctly
with IP addresses, we need to make sure they can communicate with each other.
The ping command is a simple way to accomplish this task. The ping command
is included with the Windows operating system.
b. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows
command prompt window will appear as shown in the figure below.
c. At the >prompt, type ping 192.168.1.2 and press Enter. A successful ping will
verify the IP connectivity.
d. Repeat Steps 6a-6c on the second computer. The second PC will ping to the IP
address 192.168.1.1.
e. Close the command prompt window on both computers.
f. Take a screen shot of the result and submit it with the report.

Task 7: Verify connectivity between computers using ping command.

Step 7: Sharing resources between two computers

a. Try to share a folder from one computer. To share a folder in Windows 7, right
click any folder with the mouse pointer. Select Share with →Specified people…

To share a folder in Windows 10, right click any folder with the mouse pointer.
Select Give access to →Specified people…

12
b. Now click the drop-down menu arrow and select Everyone then click Add.
c.

The Permission Level can be set according to what you want to give to other
computers based on the following guidelines.

Permission Description
Permits the user(s) to:
- view the file names
and subfolder names
Read - navigate to subfolders
- open files
- copy and view data in
the folder's files
The Read permissions,
plus permits the user(s) to:
Read / Write - create folders
- add new files
- delete files

d. Put any file (audio, video, picture etc.) into the folder you just shared on one of
the connected computers and try to access it from the others computers.

13
Task 8: Share resource to other computers.

6 RESULT

Part A: Step 1
The cable used is a ________________________________ cable.

Part A: Step 3
Result screenshot.

Part B : Step 1

Network Diagram
Part B : Step 2

Computer 1 Name:
Computer 2 Name :

Part B : Step 6

Result screenshot

7 Discussion
8 Conclusion

14
PRACTICAL SKILL ASSESSMENT (PLO5/P4/CLS3a, 3c/CLO2)

COURSE : DEC30023 COMPUTER NETWORKING FUNDAMENTALS


EXPERIMENT NO. :2
EXPERIMENT TITLE : INTRODUCTION TO NETWORKING
DATE : ___________________________________________
LECTURER’S NAME : ___________________________________________
NAME : ___________________________________________
REGISTRATION NO. : ___________________________________________
CLASS /GROUP : ___________________________________________

Marks Competency Description


5 Outstanding Student can understand and follow all instruction and task has been completed
successfully without any assistance.
4 Highly Student can understand and follow all instruction and complete all tasks
Competent assigned with some error.
3 Competent Student has been completed task successfully after being assisted.

2 Not Yet Student can understands and follow the instruction but completes only some of
Competent the tasks with a little error.
1 Not Achieved Having difficulties to complete the task and totally being assisted to complete the
task given.

Task Skill / Aspect Marks Obtain


1. Create peer-to-peer network using correct cable in packet tracer software. /5

2. Configure IP address for PCs. /5

3. Test connection using ping command. /5

4. Verify connection using simple packet data. /5

5. Identify the Computer Name. /5

6. Configure IP address for computers. /5

7. Verify connectivity between computers using ping command. /5

/5
8. Share resource to other computers.

9. Result (Submitted result / Screen shot) /5

10. Discussion & Conclusion /5


TOTAL / 50
TOTAL / 100

15
GENERIC SKILL ASSESSMENT (PLO8/A3/CLS5/CLO3)

CLO3: Demonstrate awareness of the norm practice of professional bodies such as IEEE or TIA/EIA 568
A/B during practical work session.

Score Description

SCORE
Attribute Sub-Attribute
1 2 3 4 5

Does not Perform Perform Perform Perform


perform assigned assigned assigned assigned
assigned tasks within tasks within tasks within tasks
tasks within by the scope by the scope by the beyond the
Work by the of work with of work and scope of scope of
Responsibil scope of close meets work and work and
ity work even supervision expectation exceeds beyond
with close expectation expectation
supervision
Has a Has a less Has a Has a good Has a well-
disharmonio harmonious satisfactory relationship acknowledg
us relationship relationship with co- ed
relationship with co- with co- workers and relationship
Work with co- workers and workers and within, with co-
Relation workers and within, within institution, workers and
within, institution, institution, work groups within,
institution, work groups work groups and institution,
work groups and and community work groups
and community community when at and
community when at work when at work work community
when at when at
Ethics and work work
Profession Practice Practice less Practice good Practice Always
inappropriat appropriate working good practice
alism Work e working working culture such working excellent
Ethics culture such culture such as good culture such working
as bad as moral, as good culture such
behavior, no inconsistent timeliness as moral, as good
punctuality behavior, well as being timeliness moral,
as well as less efficient, as well as timeliness
not being punctuality as productive being as well as
efficient, well as being and ethical at efficient, being
productive less efficient, work in productive efficient,
and ethical productive general and ethical productive
at work in all and ethical at at work in and ethical
situations work in many most at work in all
situations situations situations
Always
Perform a
Perform a Perform a perform a
Perform a task with
task with task with task with
task with trust,
lack of trust, acceptable trust,
Integrity limited trust, honesty,
honesty, trust, honesty,
honesty, sincerity and
sincerity and honesty, sincerity and
sincerity and transparent
transparenc sincerity and transparent
transparency in most
y transparency in any
situations
situation
TOTAL 20

16

You might also like