0% found this document useful (0 votes)
13 views44 pages

CN Lab Final Print

The document outlines various experiments related to computer components, networking commands, IP address classification, subnetting, and setting up a Local Area Network (LAN). It details the specifications of computers and laptops, including hardware components like motherboards, processors, and memory types, as well as essential networking commands for troubleshooting. Additionally, it explains subnetting and supernetting concepts for efficient network management and provides step-by-step instructions for sharing an Internet connection in a LAN environment.

Uploaded by

prarit.work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Topics covered

  • Hard Disk Drive,
  • Motherboard,
  • RJ-45 Connector,
  • Network Devices,
  • Network Diagnostics,
  • Networking Commands,
  • Local Area Network,
  • Ports,
  • Memory,
  • RAM
0% found this document useful (0 votes)
13 views44 pages

CN Lab Final Print

The document outlines various experiments related to computer components, networking commands, IP address classification, subnetting, and setting up a Local Area Network (LAN). It details the specifications of computers and laptops, including hardware components like motherboards, processors, and memory types, as well as essential networking commands for troubleshooting. Additionally, it explains subnetting and supernetting concepts for efficient network management and provides step-by-step instructions for sharing an Internet connection in a LAN environment.

Uploaded by

prarit.work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Topics covered

  • Hard Disk Drive,
  • Motherboard,
  • RJ-45 Connector,
  • Network Devices,
  • Network Diagnostics,
  • Networking Commands,
  • Local Area Network,
  • Ports,
  • Memory,
  • RAM

EXPERIMENT 1

Aim : To study about the components and specifications of Computers


and Laptop.

● Computer :
A computer is a machine or device that performs processes, calculations
and operations based on instructions provided by a software or
hardware program. It is designed to execute applications and provides a
variety of solutions by combining integrated hardware and software
components.

● Computer Specifications :

● Motherboard :
The motherboard is the backbone of your PC and it provides the
electrical connections between every component so that they are able to
communicate with each other.
● Motherboard and their parts :

Diagram: Motherboard with Label Diagram

● Processors :
A processor (CPU) is the logic circuitry that responds to and processes
the basic instructions that drive a computer. The CPU is seen
as the main and most crucial integrated circuitry (IC) chip in
a computer, as it is responsible for interpreting most of
computers commands.
Mentioned computer’s processor has a speed of 2.90 GHz.

● Operating System :
An Operating System (OS) is an interface between a
computer user and computer hardware. An operating
system is a software which performs all the basic tasks like
file management, memory management, process
management, handling input and output, and controlling
peripheral devices such as disk drives and printers. The
computer has a Windows 10 & 64 bit operating system.
● Network Interface Card :
A network interface card (NIC) is a hardware component without
which a computer cannot be connected
over a network. It is a circuit board
installed in a computer that provides a
dedicated network connection to the
computer. It is also called network
interface controller, network adapter or
LAN adapter.

● SMPS :
Switched-Mode Power Supply (SMPS) is an electronic circuit which
converts the power using switching devices that are
turned on and off at high frequencies, and storage
components such as indicators or capacitors to supply
power when the switching device is in its non-conduction
state.

● Buses used in computer :


A bus is a high-speed internal connection. Buses are used to send control
signals and data between the processor and other
components. Three types of bus are used. Address bus -
carries memory addresses from the processor to other
components such as primary storage and input/output
devices.

● Memory :
It is used to store data and instructions. Computer memory is the
storage space in the computer, where data is to be processed and
instructions required for processing are stored. The memory is divided
into a large number of small parts called cells. Each location or cell has a
unique address, which varies from zero to memory size minus one.
➔ RAM : RAM is the working memory of your computer. The higher the RAM, the
more multi-tasking the
computer can do. The
computer mentioned has
16.00 GB RAM.

● Processor :
A processor is an integrated electronic circuit that performs the
calculations that run a Laptop. A processor performs
arithmetical, logical, input/output (I/O) and other basic
instructions that are passed from an operating system (OS).
Mentioned laptop has Intel core i3 processor with 3.00 Ghz
speed.

● Operating system : An operating system is a program that acts as an


interface between the user and the computer hardware and controls the
execution of all kinds of programs. Mentioned Laptop has Windows 10 & 64 bit
operating system.

➔ Types of Memory Used:

● Cache Memory : It is an extremely fast memory type that acts as a buffer


between RAM and the CPU. It holds frequently requested
data and instructions so that they are immediately available
to the CPU when needed. Cache memory is used to reduce
the average time to access data from the Main memory.
Mentioned Laptop has 8 MB cache Size.

● RAM : RAM (Random Access Memory) is the internal


memory of the CPU for storing data, program, and
program result. It is a read/write memory which stores
data until the machine is working. Mentioned Laptop has
8GB RAM.
● Hard disk drive : HDD is used in computers to facilitate
the user to store data permanently as it is non volatile.
Mentioned Laptop has 1 TB HDD Size.

● Solid State Drive : It is a new generation of


storage device .It is faster but expensive than HDD.

● Screen resolution : Mentioned Laptop has 1920 x 1080 screen resolution.

● Ports in Laptop : Laptops generally


have 5 types of ports.
○ Charging port (used to charge
laptop).
○ USB type C port (used for
Bidirectional data transfer, taking
power supply).
○ RJ-45 port for Ethernet
connection.
○ HDMI port.
○ Headphone 2.0 port

● Touch : It allows you to complete intuitive control.


EXPERIMENT 2

Aim : To study the basic networking commands.

NETWORKING COMMANDS:

C:\>arp –a : ARP is a short form of address resolution protocol. It will show


the IP address of your computer along with the IP address and MAC address of
your router.

C:\>hostname : This is the simplest of all TCP/IP commands. It simply


displays the name of your computer.
C:\>ipconfig : The ipconfig command displays information about the
host (the computer you're sitting at) computer TCP/IP configuration.
C:\>ipconfig /all : This command displays detailed configuration
information about your TCP/IP connection including Router, Gateway, DNS,
DHCP, and type of Ethernet adapter in your system.
C:\>ipconfig /renew : Using this command will renew all your IP
addresses that you are currently (leasing) borrowing from the DHCP server. This
command is a quick problem solver if you are having connection issues, but
does not work if you have been configured with a static IP address.
C:\>ipconifg /release : This command allows you to drop the IP lease
from the DHCP server.

C:\>nbtstat –a : This command helps solve problems with NetBIOS


name
resolution. (nbt stands for NetBIOS over TCP/IP)
C:\>netdiag : Netdiag is a network testing utility that performs a variety
of network diagnostic tests, allowing you to pinpoint problems in your network.
Netdiag isn’t installed by default, but can be installed from the Windows XP CD
after saying no to the install. Navigate to the CD ROM drive letter and open the
support\tools folder on the XP CD and click the setup.exe icon in the
support\tools folder.

C:\>nslookup : nslookup is used for diagnosing DNS problems. If you can


access a resource by specifying an IP address but not its DNS you have a DNS
problem.

C:\>pathping : Pathping is unique to Windows, and is basically a


combination of the Ping and Tracert commands. Pathping traces the route to
the destination address then launches a 25 second test of each router along the
way, gathering statistics on the rate of data loss along each hop.
C:\>netstat : Netstat displays a variety of statistics about a computer's
active TCP/IP connections. This tool is most useful when you’re having trouble
with TCP/IP applications such as HTTP, and FTP.
C:\>ping : Ping is the most basic TCP/IP command, and it’s the same as
placing a phone call to your best friend. You pick up your telephone and dial a
number, expecting your best friend to reply with “Hello” on the other end.
Computers make phone calls to each other over a network by using a Ping
command. The Ping commands main purpose is to place a phone call to
another computer on the network, and request an answer. Ping has 2 options it
can use to place a phone call to another computer on the network. It can use
the computer's name or IP address.
C:\>route : The route command displays the computer's routing table. A
typical computer, with a single network interface, connected to a LAN, with a
router is fairly simple and generally doesn’t pose any network problems. But if
you’re having trouble accessing other computers on your network, you can use
the route command to make sure the entries in the routing table are correct.
C:\>tracert : The tracert command displays a list of all the routers that a
packet has to go through to get from the computer where tracert is run to any
other computer on the internet.
EXPERIMENT 3

Aim : Study of network IP


● Classification of IP address
● Subnetting
● Super netting

Apparatus (Software) : N/A

Procedure : Following is required to be studied under this practical.


● Classification of IP address
As shown in figure we teach how the IPv4 addresses are classified and
when they are used.

Class First First IP address Subnet mask No. of No. of


Octal Octal range networks host per
Decima Binary network
l Range Range

Class A 0-127 00000000-


01111111
0.0.0.0 to
127.255.255.255
255.0.0.0 27 224 - 2
Class B 128-191 10000000-
10111111
128.0.0.0 to
191.255.255.255
255.255.0.0 214 216 - 2
Class C 192-223 11000000-
11011111
192.0.0.0 to
223.255.255.255
255.255.255.0 221 28 - 2
Class D 224-239 11100000- 224.0.0.0 to Reserved for multicast groups
11101111 239.255.255.255

Class E 240-255 11110000- 240.0.0.0 to


11111111 255.255.255.255 Reserved

● Subnetting:
Why we Develop subnetting and how to calculate subnet mask and how
to identify subnet address.
When a bigger network is divided into smaller networks, to maintain
security, then that is known as Subnetting. So, maintenance is easier for
smaller networks. For example, if we consider a class A address, the
possible number of hosts is 224 for each network. It is obvious that it is
difficult to maintain such a huge number of hosts, but it would be quite
easier to maintain if we divide the network into small parts.
● Uses of Subnetting
Subnetting helps in organizing the network in an efficient way which
helps in expanding the technology for large firms and companies.
Subnetting is used for specific staffing structures to reduce traffic and
maintain order and efficiency. Subnetting divides domains of the
broadcast so that traffic is routed efficiently, which helps in improving
network performance. Subnetting is used in increasing network security.
The network can be divided into two parts: To divide a network into two
parts, you need to choose one bit for each Subnet from the host ID part.
In class C the first 3 octets are network bits so it remains as it is.
For Subnet-1: The first bit which is chosen from the host id part is zero
and the range will be from (193.1.2.00000000 till you get all 1's in the host
ID part i.e, 193.1.2.01111111) except for the first bit which is chosen zero
for subnet id part. Thus, the range of subnet 1 is: 193.1.2.0 to 193.1.2.127
Subnet id of Subnet-1 is: 193.1.2.0
The direct broadcast id of Subnet-1 is: 193.1.2.127
The total number of hosts possible is: 126 (Out of 128)

Build a bigger network that has a single Network ID.


First, let's check whether three conditions are satisfied or not:
● Contiguous: You can easily see that all networks are contiguous all
having size 256 IP Addresses( or 254 Hosts)..
Range of first Network from 200.1.0.0 to 200.1.0.255. If you add 1 in the
last IP address of the first network, that is 200.1.0.255 +0.0.0.1, you will
get the next network id which is 200.1.1.0.
Similarly, check that all networks are contiguous.
● Equal size of all networks: As all networks are of class C, so all of them
have a size of 256 which is in turn equal to 28.
● First IP address exactly divisible by total size: When a binary
number is divided by 2n then last n bits are the remainder. Hence in order
to prove that the first IP address is exactly divisible by the size of the
Supernet Network, you can check that if the last n (n here refers to the
number of bits required to represent the Total Size of the Supernet) bits
are 0 or not. In the given example first IP is 200.1.0.0 and whole size of
supernet is 4*28 = 210. If the last 10 bits of the first IP address are zero
then the IP will be divisible.

11001000 00000001 00000000 00000000

200 1 0 0

Last 10 bits of the first IP address are zero. So the 3rd condition is also
satisfied.

Advantages of Supernetting
● Control and reduce network traffic
● Helpful to solve the problem of lacking IP addresses
● Minimizes the routing table i.e, it cannot cover a different area of the
network when combined and all the networks should be in the same class
and all IP should be contiguous

Conclusion
In conclusion, supernetting is a networking technique that consolidates multiple
smaller networks into a larger one, simplifying routing and reducing the size of
routing tables. It's a valuable tool in managing the growth of internet routing
tables and optimizing network performance. However, it requires careful
consideration of network characteristics and adherence to specific conditions
for effective implementation.
EXPERIMENT 4

Aim : To Connect the computers in Local Area Network.

Procedure :
On the host computer, follow these steps to share the Internet connection.
● Log on to the host computer as Administrator or as Owner.
● Click Start, and then click the Control Panel.
● Click Network and Internet Connections.
● Click Network Connections.
● Right-click the connection that you use to connect to the Internet. For
example, if you connect to the Internet by using a modem, right-click the
connection that you want under Dial-up / other network available.
● Click Properties.
● Click the Advanced tab.
● Under Internet Connection Sharing, select the Allow other network users
to connect through this computer's Internet connection check box.
● If you are sharing a dial-up Internet connection, select Establish a
dial-up connection whenever a computer on my network attempts to
access the Internet check box if you want to permit your computer to
automatically connect to the Internet.
● Click OK. You receive the following message:
● When Internet Connection Sharing is enabled, your LAN adapter will be
set to use IP address 192.168.0.1. Your computer may lose connectivity
with other computers on your network. If these other computers have
static IP addresses, it is a good idea to set them to obtain their IP
addresses automatically. Are you sure you want to enable Internet
Connection Sharing?
● Click Yes. The connection to the Internet is shared to other computers on
the local area network (LAN). The network adapter that is connected to
the LAN is configured with a static IP address of 192.168.0.1 and a subnet
mask of 255.255.255.0

On the client computer :

● To connect to the Internet by using the shared connection, you must


confirm the LAN adapter IP configuration, and then configure the client
computer. To confirm the LAN adapter IP configuration, follow these
steps.
● Log on to the client computer as Administrator or as Owner.
● Click Start, and then click the Control Panel.
● Click Network and Internet Connections.
● Click Network Connections.
● Right-click Local Area Connection and then click Properties.
● Click the General tab, click Internet Protocol (TCP/IP) in the connection
using the following items list, and then click Properties.
● In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an
IP address automatically (if it is not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of
192.168.0.2 to 192.168.0.254. For example, you can assign the following
static IP address, subnet mask, and default gateway.
● IP Address 192.168.31.202
● Subnet mask 255.255.255.0
● Default gateway 192.168.31.1
● In the Local Area Connection Properties dialog box, click OK.
● Quit Control Panel.
EXPERIMENT 5

Aim : Familiarization with Transmission media and Tools Coaxial cable,


UTP Cable, Crimping Tools, Connectors etc.

Transmission medium :
A communication channel that is used to carry the data from one
transmitter to the receiver through the electromagnetic signals .The main
function of this is to carry the data in the bits form through the Local Area
Network(LAN). In data communication, it works like a physical path between
the sender & receiver. For instance, in a copper cable network the bits are in the
form of electrical signals whereas in a fiber network ,the bits are available in
the form of light pulses. The quality as well as characteristics of data
transmission, can be determined from the characteristics of medium & signal.
The properties of different transmission media are delay, bandwidth,
maintenance, cost and easy installation.

Bounded/Guided Transmission Media :


This kind of transmission media is also known as wired otherwise bounded
media. In this type, the signals can be transmitted directly & restricted in a thin
path through physical links. The types of Bounded /Guided transmission are
discussed below.
● Coaxial cable : Coaxial cable (or coax) carries signals of higher
frequency ranges than those in twisted pair cable. It has a central core
conductor of solid or stranded wire (usually copper) enclosed in an
insulating sheath, which is, in turn, encased in an outer conductor of
metal foil, braid, or a combination of the two. The outer conductor is also
enclosed in an insulating sheath, and the whole cable is protected by a
plastic cover.

Applications:
➢ Coaxial cable was widely used for both analog and digital data
transmission.
➢ It has higher bandwidth.
➢ Inexpensive when compared to fiber optical cables.
➢ It is used for longer distances at higher data rates.
➢ Excellent noise immunity.
➢ Used in LAN and Television distribution.

Disadvantages:
➢ Single cable failure can fail the entire network.
➢ Difficult to install and expensive when compared with twisted
pairs.
➢ If the shield is imperfect, it can lead to a grounded loop.

● Fiber optic cable : A fiber optic cable is a network cable that


contains strands of glass fibers inside an insulated casing. They're
designed for long-distance, high-performance data networking, and
telecommunications. Compared to wired cables, fiber optic cables
provide higher bandwidth and transmit data over longer distances. Fiber
optic cables support much of the world's internet, cable television, and
telephone systems.

Advantages of Fiber optics cables:


➢ The loss of signal in optical fiber is less than that in copper wire.
➢ Optical Fibers usually have a longer life cycle for over 100 years.

Disadvantages:
➢ It is expensive.
➢ Difficult to install.

● Twisted pair cable : A twisted pair cable is a type of cable made by


putting two separate insulated wires together in a twisted pattern and
running them parallel to each other. This type of cable is widely used in
different kinds of data and voice infrastructures.

➔ Twisted pair is of two types:


◆ Shielded twisted pair (STP)
◆ Unshielded twisted pair (UTP)
★ Shielded Twisted pair (STP) : Shielded Twisted Pair (STP)
cables additionally have an overall conducting metallic shields
covering four twisted pair wires. There may be another conducting
metallic shields covering individual twisted pairs also. These
metallic shields block out electromagnetic interference to prevent
unwanted noise from the communication circuit.
○ Advantage of Shielded Twisted Pair :
■ The cost of the shielded twisted pair cable is not very
high and not very low.
■ Installation of STP is easy.
■ It has higher capacity as compared to unshielded
twisted pair cable.
■ It has a higher attenuation.
■ It is shielded and provides a higher data transmission
rate.
○ Disadvantages :
■ It is more expensive as compared to UTP and coaxial
cable.
■ It has a higher attenuation rate.

★ Unshielded Twisted pair (STP) : An unshielded twisted pair


is widely used in telecommunication. It is the most common type
when compared with shielded twisted pair cable which consists of
two conductors, usually copper, each with its own colour plastic
insulator.
○ Categories :
■ Category 1: Category 1 is used for telephone lines
that have low-speed data.
■ Category 2: It can support up to 4Mbps.
■ Category 3: It can support up to 16Mbps.
■ Category 4: It can support up to 20Mbps. Therefore,
it can be used for long-distance communication.
■ Category 5: It can support up to 200Mbps.
■ Category 6: It can support up to 1000Mbps
○ Advantage of Unshielded Twisted Pair :
■ It is cheap.
■ Installation of the unshielded twisted pair is easy.
■ It can be used for high-speed LAN
○ Disadvantages :
■ This cable can only be used for shorter distances
because of attenuation.

Unbounded/Unguided Transmission Media: Unguided medium


transport electromagnetic waves without using a physical conductor. This
type of communication is often referred to as wireless communication.
Signals are normally broadcast through free space and thus are available to
anyone who has a device capable of receiving them.
Types of unguided Transmission media :
● Radio Transmission : Its frequency is between 10Khz to 1Ghz. It is
simple to install and has high attenuation. These waves are used for
multicast communication.
○ Types of propagation:
■ Troposphere
■ Ionosphere
○ Microwaves: It is a line of sight transmission i.e. the sending and
receiving antennas need to be properly aligned with each other.
The distance covered by the signal is directly proportional to the
height of the antenna. Frequency Range:1GHz–300GHz. These are
majorly used for mobile phone communication and television
distribution.
○ Infrared : Infrared waves are used for very short distance
communication. They cannot penetrate through obstacles. This
prevents interference between systems. Frequency Range:300GHz
– 400THz. It is used in TV remotes, wireless mouse, keyboard,
printer, etc.

★ Crimping tool : A crimping tool is a device used to conjoin two pieces


of metal by deforming one or both of them to hold each other. The result
of the tool's work is called a crimp. An example of crimping is affixing a
connector to the end of a cable. For instance, network cables and phone
cables are created using a crimping tool (shown below) to join RJ-45 and
RJ-11 connectors to both ends of phone or Cat 5 cable.
★ Connector : A device that terminates a segment of cabling or provides
a point of entry for networking devices such as computers, hubs, and
routers. Connectors can be distinguished according to their physical
appearance and mating properties, such as jacks and plugs (male
connectors) or sockets and ports (female connectors).
EXPERIMENT 6

Aim : Preparing the UTP cable for cross and direct connection using
Crimping Tools.

Requirements : Crimping tools, UTP Cable, RJ-45 connector, Cable


tester.

Procedure :
● CRIMPING TOOLS: A crimping tool is a device used to conjoin
two pieces of metal by deforming one or both of them to hold each other.
The result of the tool's work is called a crimp. An example of crimping is
affixing a connector to the end of a cable. For instance, network cables
and phone cables are created using a crimping tool (shown below) to join
RJ-45 and RJ-11 connectors to both ends of phone or Cat 5 cable.

● UTP CABLE: UTP stands for Unshielded Twisted Pair cable.


UTP cable is a 100 ohm copper cable that consists of 2 to 1800
unshielded twisted pairs surrounded by an outer jacket. They have
no metallic shield. This makes the cable small in diameter but
unprotected against electrical interference. The twist helps to
improve its immunity to electrical noise and EMI.

● RJ-45 Connector: RJ-45 connector is a tool that we put on


the end of the UTP cable. With this we can plug the cable in the
LAN port.

● Cable test : A cable tester is an electronic device used to verify


the electrical connections in a signal cable or other wired
assembly. Basic cable testers are continuity testers that verify the
existence of a conductive path between ends of the cable, and
verify the correct wiring of connectors on the cable.
● Straight cable : A straight-through cable is a type of twisted
pair cable that is used in local area networks to connect a
computer to a network hub such as a router. This type of cable is
also sometimes called a patch cable and is an alternative to
wireless connections where one or more computers access a router
through a wireless signal. On a straight-through cable, the wired
pins match. Straight- through cable use one wiring standard: both
ends use T568A wiring standard or both ends use T568B wiring
standard.
● Cross cable : An Ethernet crossover cable is a type of Ethernet
cable used to connect computing devices together directly. Unlike
straight-through cable, crossover cables use two different wiring
standards: one end uses the T568A wiring standard, and the other
end uses the T568B wiring standard. The internal wiring of Ethernet
crossover cables reverses the transmit and receive signals. It is
most often used to connect two devices A cable tester is an
electronic device used to verify the electrical connections in a
signal cable or other wired assembly. Basic cable testers are
continuity tester that verify the existence of a conductive path
between ends of the cable, and verify the correct wiring of
connectors on the cable. of the same type: eg. two computers (via
network interface controller) or two switches to each other.

➔ Making Straight UTP Cable:


➢ Peel the end of the UTP cable, approximately 2 cm.
➢ Open the cable strands, align and follow the arrangement as in
the standard cable image shown below.
➢ Once the order is according to the standard, cut and flatten the
ends of the cable.
➢ Put the cable straight and aligned into the RJ45 connector, and
make sure all cables are in the correct position as follows:
○ Orange White
○ Orange
○ Green White
○ Blue
○ Blue White
○ Green
○ White Brown
○ Brown
○ Make crimping using crimp tools, press crimping tool and
make sure all the pins (brass on the RJ-45 connector has "
bite " of each cable. usually when done will sound "click".
Once finished at the end of this one, do it again at the other
end cable.
➢ The final step is to check the cable that you created earlier using
the LAN tester, enter each end of the cable (RJ-45) to each LAN
port available on the tester, turn and make sure all of the LEDs
light up according to the order of the wires we created.

➔ Making Cross UTP Cable:


➢ Creating a cross cable has almost the same steps as a straight
cable, the difference lies only in the colour sequence from both
ends of the cable. Unlike the straight cable that has the same
colour sequence at both ends of the cable, the cross cable has a
different colour sequence at both ends of the cable.
➢ The first ends is same with straight cable
○ Orange White
○ Orange
○ Green White
○ Blue
○ Blue White
○ Green
○ White Brown
○ Brown

➢ For the second end of the cable, the colour composition is different
from the first. The colour arrangement is as follows :
○ Green White
○ Green
○ Orange White
○ Blue
○ Blue White
○ Orange
○ White Brown
○ Brown
EXPERIMENT 7

Aim : Create a LAN using Hubs, Switches and crossover cable

Objective :
➢ Create a simple peer-to-peer network between two PCs
➢ Identify the proper cable to connect the two PCs
➢ Configure workstation IP address information
➢ Test connectivity using the ping command

Background/Preparation:
This lab focuses on the ability to connect two PCs to create a simple

peer-to-peer Ethernet LAN between two workstations. The workstations


will be directly connected to each other without using a hub or switch in
addition to the Layer 1 physical and Layer 2 data link connections, the
computers must also be configured with the correct IP network settings,
which is Layer 3, so that they can communicate. A basic Category 5/5e
UTP crossover cable is all that is needed. A crossover cable is the same
type

that would be used as backbone or vertical cabling to connect switches

together Connecting the PCs in this manner can be very useful for
transferring files at high speed and for troubleshooting interconnecting
devices between PCs. If the two PCs can relate to a single cable and are
able to communicate, then any networking problems are not with the
PCs themselves. Start this lab with the equipment turned off and with

cabling disconnected Work in teams of two with one person per PC. The
following resources will be required.

➔ Two workstations with an Ethernet 10/100 NIC installed

➔ Several Ethernet cables, which are both straight-through


and crossover, to choose from for connecting the two
workstations
Step 1:- Identify the proper Ethernet cable and connect the two PCS
The connection between the two PCs will be accomplished using
a Category 5 or 5e crossover cable Locate a cable that is long
enough to reach from one PC to the other and attach one end to
the NIC in each of the PCs. Be sure to examine the cable ends
carefully and select only a crossover cable

Step 2:- Verify the physical connection

Plug in and turn on the computers. To verify the computer


connections, ensure that the link lights on both NICs are lit. Are
both link lights lit?

Step 3:- Access the IP settings window

Note: Be sure to write down the existing IP settings, so that they can
be restored at the end of the lab. These include IP address, subnet
mask, default gateway, and DNS servers If the workstation is a DHCP
client, it is not necessary to record this information.
Windows 95/98/Me/ users should do the following:

➢ Click on Start Settings Control Panel and then click the Network icon.
➢ Select the TCP/IP protocol icon that is associated with the NIC in
this PC and click on Properties.
➢ Click on the IP Address tab and the Gateway tab.

Windows NT/2000 users should do the following:


➢ Click on Start Settings > Control Panel and then open the
Network and Dial- up Connections folder.
➢ Click and open the Local Area Connection icon.
➢ Select the TCP/IP protocol icon that is associated with the
NIC in this PC.
➢ Click on Properties and click on Use the following IP address.

Windows XP users should do the following:

➢ Click on Start Settings > Control Panel and then


click the Network Connection icon.
➢ Select the Local Area Network Connection and
click on Change settings of this connection.
➢ Select the TCP/IP protocol icon that is
associated with the NIC in this PC.
➢ Click on Properties and click on Use the
following IP address See the example below.

Step 4:- Configure TCP/IP settings for the two PCS

➢ Set the IP address information for each PC according to


the information in the table:
➢ Note that the default gateway IP address is not
required, since these computers are directly connected.
The default gateway is only required on local area
networks that are connected to a router.

Step 5:- Access the Command or MS-DOS prompt


➢ Use the Start menu to open the Command Prompt (MS-DOS-
like) window

Windows 95/98/Me users should do the following


➔ Start > Programs > MS-DOS Prompt

Windows NT/2000 users should do the following

➔ Start > Programs > Accessories > Command Prompt

Windows XP users should do the following

➔ Start > Programs > Accessories Command Prompt

Step 6:- Verify that the PCs can communicate


➔ Test connectivity from one PC to the other by pinging the IP
address of the opposite computer

➔ Look for results like those shown below. If not, check the PC
connections and TCP/IP settings for both PCs. What was the ping
result?
Step 7:- Confirm the TCP/IP network settings

Windows 95/98/Me users should do the following


● Type the winipcfg command from the MS-DOS Prompt. Record the
results

Windows NT/2000/XP users should do the following


● Type the ipconfig command from the Command
Prompt. Record the results

Step 8:- Restore the PCs to their original IP


settings, disconnect the equipment, and
store the cables..
EXPERIMENT 8

Aim : Performing an Initial Switch Configuration.

TOPOLOGY DIAGRAM

Objectives: Perform an initial configuration of a Cisco Catalyst 2960


switch.

Background / Preparation: Configure settings on the Cisco Catalyst 2960


switch:
❖ Host name
❖ Console password
❖ vty password
❖ Privileged EXEC mode password
❖ Privileged EXEC mode secret
❖ IP address on VLAN1 interface
❖ Default gateway
Note: Not all commands are graded by Packet Tracer.

Step 1: Configure the switch host name


● From the Customer PC, use a console cable and terminal
emulation software to connect to the console of the customer
Cisco Catalyst 2960 switch
● Set the hostname on the switch to Customer Switch
using these commands

● Switch>enable

● Switch#configure terminal
● Switch(config)#hostname CustomerSwitch

Step 2: Configure the privileged mode password and secret.


● From global configuration mode, configure the
password as cisco
CustomerSwitch(config)#enable password cisco
● From global configuration mode, configure the
secret as cisco123.
CustomerSwitch(config)#enable secret cisco123

Step 3: Configure the console password.


● From global configuration mode, switch to configuration
mode to configure the console line.
CustomerSwitch(config)#line console 0
● From line configuration mode, set the password to cisco
and require the password to be entered at login.

CustomerSwitch(config-line)
#password cisco
CustomerSwitch(config-line)
#login
CustomerSwitch(config-line)
#exit

Step 4: Configure the vty password.


● From global configuration mode, switch to the configuration
mode for the vty lines 0 through 15.
CustomerSwitch(config)#line vty 0 15
● From line configuration mode, set the password to cisco
and require the password to be entered at login.

CustotherSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 5: Configure an IP address on interface VLAN1.


● From global configuration mode, switch to interface
configuration mode for VLANI, and assign the IP address
192.168.1.5 with the subnet mask of 255.255.255.0.
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown
CustomerSwitch(config-if)#exit

Step 6: Configure the default gateway.


● From global configuration mode, assign the default
gateway to 192.168.1.1. CustomerSwitch(config)#ip
default-gateway 192.168.1.1
Click the Check Results button at the bottom of this instruction window

to check your work.

Step 7: Verify the configuration.

● The Customer Switch should now be able to ping the


ISP Server as 209.165.201.10. The first one or two pings
may fail while ARP converges
Customer
Switch(config)#end
CustomerSwitch#ping
209.165.201.10
● Type escape sequence to abort
Sending 5, 100-byte ICMP Echos to 209. 165.201.10, timeout is 2 seconds:
…..!!!!
Success rate is 60 percent (3/5), round-trip

min/avg/max 181/189/197 ms Customer Switch#

Common questions

Powered by AI

Unbounded/unguided transmission media, such as radio waves, microwaves, and infrared, offer the advantage of wireless communication, eliminating physical infrastructure and allowing mobility and connectivity over large areas. However, they are prone to interference, security risks, and attenuation over distances or through obstacles. These media are suitable for mobile communications and short-range applications like TV remotes .

A crimping tool is used to conjoin a connector to the end of a cable by deforming the metal pieces to hold each other. This ensures a secure and reliable connection between network devices, reducing signal loss and interference. By affixing connectors like RJ-45 to cables accurately, crimping tools play a critical role in maintaining network integrity and ensuring effective data transmission .

To set the console password on a Cisco Catalyst 2960 switch, enter the global configuration mode using the 'line console 0' command, then set the password with 'password [password]' and require it at login with 'login'. This step is crucial for securing access to switch configuration settings from the console port, preventing unauthorized changes and ensuring network security .

To establish a dial-up Internet connection shared over a LAN, log onto the host computer, enable Internet Connection Sharing, configure the LAN adapter to use IP address 192.168.0.1, and ensure client computers are set to obtain IP addresses automatically or within the range 192.168.0.2 to 192.168.0.254. The primary setting change involves configuring the IP and subnet mask to facilitate shared access, maintaining connectivity .

Supernetting helps manage network performance by consolidating multiple smaller networks into a larger one, which simplifies routing and reduces the size of routing tables. This optimization is beneficial in controlling network traffic and solving the problem of IP address shortages. For effective implementation, networks must be contiguous and of equal size, and the first IP address must be exactly divisible by the total size of the supernet. These conditions ensure that the networks can be combined without issues .

To create a cross-over UTP cable, you need a crimping tool, UTP cable, RJ-45 connectors, and a cable tester. The cable is configured by crimping two RJ-45 connectors onto the ends of a twisted pair cable, with each end using a different wiring standard (T568A and T568B). Cross-over cables are typically used to directly connect two computing devices, such as PCs or switches, by reversing the transmit and receive signals .

Coaxial cables are inexpensive and provide good noise immunity, making them suitable for longer distances at higher data rates, but they are more challenging to install and may lead to network failure if a single cable fails. Fiber optic cables, while more expensive and difficult to install, offer higher bandwidth capacities and can transmit data over longer distances without significant signal loss, making them ideal for high-performance networking .

To verify connectivity, use a command prompt to 'ping' the IP address of the opposite computer. Successful communication will be indicated by responses showing packets sent and received without loss. The 'ipconfig' (for Windows NT/2000/XP) or 'winipcfg' (for Windows 95/98/Me) commands can be used to confirm the TCP/IP settings on each computer, ensuring correct network configuration .

Shielded twisted pair (STP) cables have an additional metallic shield which provides enhanced protection against electromagnetic interference, allowing for higher data transmission rates, while being more expensive and having higher attenuation. Conversely, unshielded twisted pair (UTP) cables are more common due to their lower cost and easier installation but are less effective at preventing interference over longer distances. STP is typically used in industrial settings, whereas UTP is common in office LANs .

It is recommended to set computers to obtain IP addresses automatically to prevent connectivity issues when Internet Connection Sharing is enabled, as the LAN adapter is configured to use a static IP address of 192.168.0.1. If other computers on the network have static IP addresses, they may lose network connectivity due to IP address conflicts. Setting them to obtain IP addresses automatically helps mitigate such conflicts .

You might also like