Professional Documents
Culture Documents
S.
No
1.
2.
3.
4.
5.
6.
7.
8.
9.
Objective
Making Straight, Rollover and Cross-Over cables
Cable & RJ-45 Jack outlet installation
Installation of NIC Card & using TCP/IP
IP Addressing & Sub-netting Concepts
Basic LAN Setup
Designing & Implementing LAN using sub-netting
Overview and Basic Configuration of Router
Router show Command
Implementation of Distance Vector Routing
Algorithm
Simulation & Study of Simple network using Hubs
P.
No
1
3
5
9
11
14
16
20
22
10.
11. Simulation & Study of Networks using router
12. Simulation & Study of Internetwork Communication
24
26
27
Using Routers
Simulation & Study of Dynamic Routing Using RIP
Protocol
Simulation & Study of Static Routing in Network
29
13.
14.
15. Simulation & Study of Using Access-lists
16. About Packet Tracer
Note:
Simulator: Packet Tracer
Distance Vector Algorithm: C
31
33
36
Sign.
11103044
Straight Over:
A straight through network cable acts as an extension enabling a device with a network
interface card to be attached to a network. A common form of network media is the UTP Cat5
(Unshielded Twisted Pair Category 5) cable.
The cables should have their sleeving trimmed back at each end by approximately 13mm
in order to expose the wires for sorting. The wires should then be flattened out and sorted into
the following order from left to right; White/Orange, Orange, White/Green, Blue, White/Blue,
Green, White/Brown, Brown.
At this point it is best to make sure that the wires are the same length and trim them as
necessary. Its a good idea to check the order of the wires before moving onto the next stage to
make sure that orange and brown have not been mixed up as some white wires dont have their
markings coloured clearly. Once the wires are confirmed to be in the correct order then it is time
to attach the RJ-45 connectors. This is a simple case of pushing the wires in as far as they will
go and then using a crimping tool to secure them into place.
Once one end is done simply repeat the process for the second end, after that be sure to test
the cable with an appropriate device before using it in your network. RJ-45 connectors are the
most common form of connectors used on UTP Cat5 cables. The RJ simply means Registered
Jack and the 45 designation specifies the pin numbering scheme. The cable itself contains 4
twisted pairs of wires making a total of 8 wires.
Roll Over:
Crossover wired cables (commonly called crossover cables) are very much like Straight-Through
cables with the exception that TX and RX lines are crossed (they are at opposite positions on
either end of the cable. Using the 568-B standard as an example below you will see that Pin 1 on
connector A goes to Pin 3 on connector B. Pin 2 on connector A goes to Pin 6 on connector B etc.
Crossover cables are most commonly used to connect two hosts directly. Examples would be
11103044
Cross Over:
Crossover wired cables (commonly called crossover cables) are very much like Straight-Through cables with
the exception that TX and RX lines are crossed (they are at opposite positions on either end of the cable.
Using the 568-B standard as an example below you will see that Pin 1 on connector A goes to Pin 3 on
connector B. Pin 2 on connector A goes to Pin 6 on connector B etc. Crossover cables are most commonly
used to connect two hosts directly. Examples would be connecting a computer directly to another computer,
connecting a switch directly to another switch, or connecting a router to a router.
11103044
PIN
COLOUR
1
Orange/White
Transmit Data +
Orange
Transmit Data -
white/Green
Receive Data +
Blue
Not Used-POE
White/Blue
Not Used-POE
Green
Receive Data -
White/ Brown
Not Used-POE
Brown
Not Used-POE
NAME
PAIR
11103044
4. Trim to 13mm
7. Completed Connection
11103044
Figure: The Adapter Properties dialog box lets us change the adapter's basic settings and test it. The
test only works if we have installed the TCP/IP protocol service.
If the new network adapter isn't shown in the Network Adapters list box, click on the Add button.
Using the Select Network Adapter dialog box, select the appropriate network adapter. If we don't see the
adapter we installed, click on the Have Disk button and insert the adapter's installation disk when prompted.
11103044
Note: Adding the adapter also installs the drivers for the adapter. Because of this, be sure that you use
the correct installation disk.
The dialog box we see next depends on the type of adapter we're installing. With most network interface
cards, we see the Adapter Properties dialog box shown in Figure.
Click on the Change button, then configure the adapter's basic settings, such as network speed and duplex
mode. If we've already configured the TCP/IP protocol service and the computer is attached to the network,
you can use the Test button to test the network card. Click OK to continue.
Close the Network properties dialog box by clicking on the Close button. Windows NT installs the network
bindings for the network adapter. Afterward, if TCP/IP is installed on the computer, we'll see the Microsoft
TCP/IP Properties dialog box. We use this dialog box to configure the TCP/IP protocol service as detailed in
the section of this chapter titled "Configuring TCP/IP Networking."
Open Network Connections by clicking the Start button , and then clicking Control
Panel. In the search box, type adapter, and then, under Network and Sharing Center,
click View network connections.
2.
Properties. If you're
prompted for an administrator password or confirmation, type the password or provide
confirmation.
3.
Right-click the connection that you want to change, and then click
11103044
5.
To specify an IP address, click Use the following IP address, and then, in the IP
address, Subnet mask, and Default gateway boxes, type the IP address settings.
6.
To specify an IP address, click Use the following IPv6 address, and then, in the IPv6
address, Subnet prefix length, and Default gateway boxes, type the IP address settings.
11103044
Advanced.
11103044
Class A
Class B
128-191
Class C
192-223
11103044
a. Class A: 255.0.0.0
b. Class B: 255.255.0.0
c. Class C: 255.255.255.0
d. We cant have mix of 1s and 0s in subnet mask. Only consecutive 1s is followed by
consecutive 0s
Class A
1.0.0.1 to 126.255.255.254
Class B
128.1.0.1 to 191.255.255.254
Class C
192.0.1.1 to 223.255.254.254
Class D
224.0.0.0 to 239.255.255.255
Class E
240.0.0.0 to 254.255.255.254
Reserved.
5. Invalid IP address.
a. If the network part is all 0s, the address belongs to class A. But this is an invalid ip address
because for an IP address all the network or host part should not be all 1s or all 0s.
i. 0.0.0.0 is not valid. Routers use it internally.
b. If the network part is all 1s, this address belongs to class E. But due to presence of all 1s, it is
not valid. This represent broadcast to all networks.
i. 255.255.255.255 is not valid.
c. If the host part is all 0s, this represents network address. This is not a valid IP address.
d. If the host part is all 1s, this represents broadcast address. This is not a valid IP address.
e. We cant use the IP address represented within private address range as part of public IP
address.
i. Class A: 10.0.0.0 to 10.255.255.255
ii. Class B: 172.16.0.0 to 172.31.255.255
iii. Class C: 192.168.0.0 to 192.168.255.255
f. 127.0.0.0 network address is used for loop-back testing. This will help you to check the
network card of your own PC [local host].
.
6. Default subnet masks for standard IP address classes The following table lists the default subnet
masks for each available class of TCP/IP networks.
Address Class
Class A
Class B
Class C
Subnet Mask
255.0.0.0
255.255.0.0
255.255.255.0
10
11103044
Procedure:
On the host computer
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under
Dial-up / other network available.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to connect
through this computer's Internet connection check box.
11
11103044
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet
check box if you want to permit your computer to automatically connect to the Internet.
10. Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0.1. Your computer may lose connectivity with other computers on
your network. If these other computers have static IP addresses, it is a good idea to set
them
to obtain their IP addresses automatically. Are you sure you want to enable Internet
Connection Sharing?
11. Click Yes.
The connection to the Internet is shared to other computers on the local area network (LAN). The
network adapter that is connected to the LAN is configured with a static IP address of
192.168.0.1 and a subnet mask of 255.255.255.0
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
12
11103044
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet mask,
and default gateway:
8. IP Address 192.168.1.1
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
13
11103044
You might have more than one Internet connection listed here. You will need to determine which
adapter is your connection to the Internet if this is the case. Right click on your network adapter and choose
properties to open up the properties window of this internet connection.
Click Internet Protocol Version 4(TCP/IPv4) and then the Properties button
By default you will see the class C subnet mask 255.255.255.0. Since the last byte contains all 0s i.e.
there is no subnet bit(1s), you will have only one network and 28-2 hosts in this network. To subnet, you will
need to add 1s in the last byte which will depend on the need of your organization. e.g If an organization
needs 4 subnetworks with 57 pcs in each, you will set the first two bits of the last byte to 1(since 22=4
networks).
14
11103044
You repeat the above steps for each host in the network.
You can check your configuration settings by typing ipconfig command in cmd
15
11103044
Step 1
Step 2
Command
Purpose
enable
Example:
Router> enable
configure terminal
Example:
Router# configure terminal
configure terminal
2.
hostname name
3.
DETAILED STEPS
Command
Step 1 configure terminal
Example:
Router# configure terminal
Purpose
Enters global configuration mode when using the
console port.
If you are connecting to the router using a remote
terminal, use the following:
telnet router name or address
Login: login id
Password: *********
Router> enable
Example:
Router(config)# hostname
Router
Router(config)# enable
secret cr1ny5ho
EXAMPLE
Router#config t
Enter configuration commands, one per line. End with
CNTL/Z.
Router(config)#service password-encryption
16
11103044
2.
3.
no shutdown
4.
exit
DETAILED STEPS
Command
Step 1 interface type number
Example:
Purpose
Enters the configuration mode for a Fast Ethernet
WAN interface on the router.
Router(config)# interface
fastethernet 0/0
Router(config-if)# ip
address 192.168.12.2
255.255.255.0
Step 3 no shutdown
Example:
Router(config-if)# no
shutdown
Step 4 exit
Example:
Router(config-if)# exit
Router(config)#
17
11103044
SUMMARY STEPS
1.
2.
end
DETAILED STEPS
Command
Purpose
Example:
Router(config)# ip route 192.168.1.0
255.255.0.0 10.10.10.2
Step 2 end
Example:
Router(config)# end
Router#
CISCO COMMAND
Router(config)#line con 0
Router(config-line)#login
Router(config-line)#password cisco
Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password cisco
Enable an interface
Router(config-if)#no shutdown
To disable an interface
Router(config-if)#shutdown
18
11103044
To add an IP address to a
interface
Router(config)#router rip
Router(config-router)#network 172.16.0.0
Disable RIP
19
11103044
1) Sh ip route:
The command show ip route shows the IP routing table, the metric used, and the interface used to find
a remote network.
2) Sh ip int brief:
This command displays a brief summary of the interfaces on a device. Its useful for quickly checking
the status of the device.
20
11103044
3) Sh ip rip database:
To display summary address entries in the Routing Information Protocol (RIP) routing database entries if
relevant are routes being summarized based upon a summary address, use the show ip rip
database command in privileged EXEC mode.
show ip rip database [ip-address mask]
4) Sh access- lists:
Displays all access lists and their parameters configured on the router. This command doesn't show
which interface the list is configured on.
5) Sh access-lists:
Shows only the parameters for the access list specified. This command does not show you the
interface the list is configured on.
Eg:
Router#sh access-lists 101
Extended IP access list 101
deny icmp host 10.10.10.21 host 10.10.10.6 echo
permit icmp any any echo
21
11103044
22
11103044
INPUT GRAPH:
(Router 2)
(Router 3)
(Router 1)
(Router 4)
(Router 5)
OUTPUT:
23
11103044
An Ethernet hub, active hub, network hub, repeater hub or hub is a device for connecting multiple
twisted pair or fiber optic Ethernet devices together and making them act as a single network segment.
Hubs work at the physical layer (layer 1) of the OSI model. The device is a form of multiport repeater.
Repeater hubs also participate in collision detection, forwarding a jam signal to all ports if it detects a collision.
Hubs also often come with a BNC and/or Attachment Unit Interface (AUI) connector to allow
connection to legacy 10BASE2 or 10BASE5 network segments. The availability of low-priced network
switches
has largely rendered hubs obsolete but they are still seen in older installations and more specialized
applications.
Technical information:
A network hub is a fairly unsophisticated broadcast device. Hubs do not manage any of the traffic
that comes through them, and any packet entering any port is regenerated and broadcast out on all other
ports. Since every packet is being sent out through all other ports, packet collisions resultwhich greatly
impedes the smooth flow of traffic.
Hubs are classified as Layer 1 (physical layer) devices in the OSI model. At the physical layer, hubs support
little in the way of sophisticated networking. Hubs do not read any of the data passing through them and are
not aware of their source or destination. A hub simply receives incoming Ethernet frames, regenerates the
electrical signal, and broadcasts these packets out to all other devices on the network
24
11103044
25
11103044
Destination address
Neighbor routers from which it can learn about remote networks
Possible routes to all remote networks
The best route to each remote network
How to maintain and verify routing information
Configuring interfaces:
To display the configuration of the interface you use the command:
26
11103044
27
11103044
28
11103044
Routing protocols determine the best path to each network, which is then added to the routing table. One of
the primary benefits of using a dynamic routing protocol is that routers
exchange routing information whenever there is a topology change. This exchange allows
routers to automatically learn about new networks and also to find alternate paths if there is
a link failure to a current network.
Compared to static routing, dynamic routing protocols require less administrative overhead.
However, the expense of using dynamic routing protocols is dedicating part of a routers
resources for protocol operation, including CPU time and network link bandwidth.
29
11103044
30
11103044
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 10.10.10.0 255.255.255.252 10.10.10.33
Router(config)#
(For Router3)
31
11103044
32
11103044
Access lists are essentially lists of conditions that control access. Theyre powerful tools that control access
both to and from network segments. They can filter unwanted packets and be used to implement security
policies. With the right combination of access lists, network managers willbe armed with the power to enforce
nearly any access policy they can invent.
There are a few important rules a packet follows when its being compared
with an access list:
1) Its always compared with each line of the access list in sequential order, i.e., itll always start with line
1, then go to line 2, then line 3, and so on.
2) Its compared with lines of the access list only until a match is made. Once the packet matches a line
of the access list, its acted upon, and no further comparisons take place.
3) There is an implicit deny at the end of each access listthis means that if a packet doesnt match up
to any lines in the access list, itll be discarded.
33
11103044
Applying To Interface:
Inbound access lists:
Packets are processed through the access list before being routed to the outbound interface.
Outbound access lists:
Packets are routed to the outbound interface and then processed through the access list.
Definition
100-199
{permit|deny}
Used to specify the nature of the access list either a permit or deny statement.
{ip|tcp|udp|icmp} The IP protocol to be filtered can be IP (includes all protocols in the TCP/IP
suite) TCP,UDP,ICMP,or others.
source
source-mask
[lt|gt|eq|neq]
Can contain lt (less than), gt (greater than), eq (equal to), or neq (not equal to).
It is used if an extended list filters by a specific port number or range of ports.
[source-port]
destination
dest-mask
[lt|gt|eq|neq]
Can contain lt (less than), gt (greater than), eq (equal to), or neq (not equal to).
It is used if an extended list filters by a specific port number or range of ports.
[dest-port]
[log]
34
11103044
35
11103044
1
Menu Bar:
This bar provides the File, Edit, Options, View, Tools, Extensions, and Help menus.
You will find basic commands such as Open, Save, Save as Pkz, Print, and Preferences in these menus. You
will also be able to access the Activity Wizard from the Extensions menu.
2
Main Tool Bar:
This bar provides shortcut icons to the File and Edit menu commands. This
bar also provides buttons for Copy, Paste, Undo, Redo, Zoom, the Drawing Palette, and the Custom Devices
Dialog. On the right, you will also find the Network Information button, which you can use to enter a description
for the current network (or any text you wish to include).
3
Common Tools Bar: This bar provides access to these commonly used workspace tools: Select,
Move Layout, Place Note, Delete, Inspect, Resize Shape, Add Simple PDU, and Add Complex PDU. See
"Workspace Basics" for more information.
4
Logical/Physical Workspace and Navigation Bar:
You can toggle between the Physical
Workspace and the Logical Workspace with the tabs on this bar. In Logical Workspace, this bar also allows
you to go back to a previous level in a cluster, create a New Cluster, Move Object, Set Tiled Background, and
Viewport. In Physical Workspace, this bar allows you to navigate through physical locations, create a New
City, create a New Building, create a New Closet, Move Object, apply a Grid to the background, Set
Background, and go to the Working Closet.
5
Workspace:
This area is where you will create your network, watch simulations, and view many
kinds of information and statistics.
6
Realtime/Simulation Bar:
You can toggle between Realtime Mode and Simulation Mode with
the tabs on this bar. This bar also provides buttons to Power Cycle Devices and Fast Forward Time as well as
the Play Control buttons and the Event List toggle button in Simulation Mode. Also, it contains a clock that
displays the relative Time in Realtime Mode and Simulation Mode.
7
Network Component Box:
This box is where you choose devices and connections to put into the
workspace. It contains the Device-Type Selection Box and the Device-Specific Selection Box.
8
Device-Type Selection Box: This box contains the type of devices and connections available in
Packet Tracer. The Device-Specific Selection Box will change depending on which type of device you choose.
9
Device-Specific Selection Box:
This box is where you choose specifically which devices you
want to put in your network and which connections to make.
36
11103044
10
User Created Packet Window: This window manages the packets you put in the network during
simulation scenarios. See the "Simulation Mode" section for more details.
37
11103044
8. Click Capture/Forward button again. The Server has already sent an echo reply to the PC therefore,
there are no more ICMP events left to capture.
38
11103044
8. Click on Reset Simulation again. Now click on Auto Capture/Play. The echo request and echo reply
are automatically captured. Click on the Back Button to rewind the animation one step at a time. Now
click on the Capture/Forward button to forward the packet through the animation. Note the change in
the event list and the workspace. Remember that at any time, a PDU Information Window can be
opened by clicking directly on the envelope on the workspace, or by clicking the Info column in the
Event List.
9. Click on the Back Button twice to rewind the animation. Now click Auto Capture/Play and the
packet animation will automatically occur.
39