CCN LAB MANUAL
Experiment 1
Aim: To study basic networking commands.
Apparatus (Software): Command Prompt and Cisco Packet Tracer.
1. Ping
The ping command is used to test connectivity between two hosts. It sends ICMP echo request
messages to the destination. The destination host replies with ICMP reply messages. If the ping
command gets a reply from the destination host, it displays the reply along with round-trip times.
The ping command uses the following syntax.
ping destination host IP or name
The following command tests connectivity between the host computer and Google's server.
ping google.com
Attach screen shot of the command prompt
2. Ipconfig
This command displays all current TCP/IP network configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. This command
is mainly used to view the IP addresses on the computers that are configured to obtain their IP
address automatically.
Command to enter in Prompt: ipconfig
Attach screen shot of the command prompt
3. Netstat
This command displays active connections, ports on which the computer is listening, Ethernet
statistics, the IP routing table, and IP statistics.
The output of this command is organized in rows and columns. Each row represents a new
connection or an entry in the output. It contains four columns. These columns provide the
following information about the row.
Proto: - This column displays the name of the protocol (TCP or UDP).
Local Address: - This column displays the IP address of the local computer and the port number
being used. If the port is not yet established, the port number is shown as an asterisk (*).
Foreign Address: - This column displays the IP address and port number of the remote computer
to which the port is connected.
State: - This column displays the status of the connection.
Attach screen shot of the command prompt
4. NSLOOKUP
The NSLOOKUP command is used to troubleshoot network connectivity issues in the system.
Using the nslookup command, we can access the information related to our system’s DNS
server, i.e., domain name and IP address.
Command to enter in Prompt – nslookup
Attach screen shot of the command prompt
5. HOSTNAME
The HOSTNAME command displays the hostname of the system. The hostname command is
much easier to use than going into the system settings to search for it.
Command to enter in Prompt – hostname
Attach screen shot of the command prompt
Conclusion:
Experiment 2
Aim: To configure and compare different network topologies using Cisco Packet Tracer.
Apparatus (Software): Cisco Packet Tracer.
A star topology for a Local Area Network (LAN) is one in which each node is connected
to a central connection point, such as a hub or switch. Whenever a node tries to connect
with another node then the transmission of the message must be happening with the help
of the central node. The best part of star topology is the addition and removal of the node
in the network but too many nodes can cause suffering to the network.
In this experiment, we will discuss How to Implement Star Topology using Cisco Packet
Tracer.
A Cisco packet tracer is a simulation tool that is used for understanding the networks. The
best part of the Cisco packet tracer is its visualization you can see the actual flow of the
message and understand the workflow of the network devices. Implementation of Star
Topology using Cisco Packet Tracer is done using Switch.
Steps Implementing Star Topology using Cisco Packet Tracer:
Step 1: First, open the Cisco packet tracer desktop and select the devices given below:
S.NO Device Model name
1. PC PC
2. Switch PT-switch
We have taken a switch and linked it to five end devices.
Step 2: Link every device with the switch.
Step 3: Provide the IP address to each device.
Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP addressing
table.
To assign an IP address in PC0, click on PC0.
Then, go to desktop and then IP configuration and there you will enter IPv4 configuratio n.
Fill IPv4 address and subnet mask.
Repeat the same procedure with other PCs to configure them thoroughly
Step 4: Verify the connection by pinging the IP address of any host in PC0.
Use the ping command to verify the connection.
We will check if we are getting any replies or not.
Here we get replies from a targeted node on both PCs.
Hence the connection is verified.
Step 5: Click on the simulation panel
Click on edit filters click on all filters choose ICMP filter. Now give a PDU to one of the PC and
check for data transmission.
Transfer message from one device to another and check the Table for Validation.
Repeat the above method for ring topology.
Ring Topology
Here each device has a dedicated connection with two devices on either side. The signal is passed
in one direction from device to device until it reaches the destination and each device have repeater.
When one device received signals instead of intended another device, its repeater then regenerates
the data and passes them along.
To add or delete a device requires changing only two connections.
Conclusion: the star and ring topology has been studied and compared
Experiment 3
Aim: To configure static routes in a network using Cisco Packet Tracer.
Apparatus (Software): Cisco Packet Tracer.
Create a network with pcs, switch and router.
Step 1: First, open the Cisco packet tracer desktop and select the devices. Connect all the
devices and assign the ip address to the pc and router. Configure the router 0 and router 1 as
shown below.
1. Click on the router 0.
2. Go to config.
3. Select fastethernet 0/1.
4. Mark port status ON.
5. Enter IP address and mask.
6. Repeat the steps 1 to 5 for router 1.
Step 2: Provide the IP address to each device.
Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP addressing
table.
To assign an IP address in PC0, click on PC0.
Then, go to desktop and then IP configuration and there you will enter IPv4 configuration.
Fill IPv4 address and subnet mask.
Fill default gateway it will be address of router
Repeat above procedure for all the pcs.
Step 3: Now provide the static routes to the router
1. Click on the router and look into routing table.
2. Add the next hop to the routing table as given in the figure below
1. Click on the router
2. Go to config
3. Select static tab in the routing
4. Enter network address
5. Enter mask
6. Enter next hop
7. Click on add, the network will be added
8. And the routing table will be updated
Repeat the above steps for router 1 also.
Step 4: Verify the connection by pinging the IP address of any host in PC0.
Use the ping command to verify the connection.
We will check if we are getting any replies or not.
Here we get replies from a targeted node on both PCs.
Hence the connection is verified
Step 5: Give a PDU to the pcs and check the successful transmission of packets
Conclusion: The configuration of router was studied and static routes were provide and routing
table was updated.
Experiment 4
Aim: To configure a network with Distance Vector Routing Protocol-RIP using Cisco Packet
Tracer.
Apparatus (Software): Cisco Packet Tracer.
Routing Information Protocol (RIP) is an active routing protocol that operates hop count as a
routing metric to find the most suitable route between the source and the destination network. It
is a distance-vector routing protocol that has an AD value of 120 and works on the Network
layer of the OSI model.
Step 1: First, open the Cisco packet tracer desktop and select the devices
Then, create a network topology as shown below the image.
Use an Automatic connecting cable to connect the devices with others.
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressing table given above.
To assign an IP address in PC0, click on PC0.
Then, go to desktop and then IP configuration and there you will IPv4 configuration.
Fill IPv4 address and subnet mask.
Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Configure router with IP address and Subnet mask.
IP Addressing Table Router:
S.NO Device Interface IPv4 Address Subnet mask
FastEthernet0/0 192.168.10.1 255.255.255.0
router0
1. Serial2/0 10.0.0.1 255.0.0.0
FastEthernet0/0 192.168.20.1 255.255.255.0
router1 Serial2/0 10.0.0.2 255.0.0.0
2. Serial3/0 11.0.0.1 255.0.0.0
FastEthernet0/0 192.168.30.1 255.255.255.0
router2
3. Serial2/0 11.0.0.2 255.0.0.0
To assign an IP address in router0, click on router0.
Then, go to config and then Interfaces.
Make sure to turn on the ports.
Then, configure the IP address in FastEthernet and serial ports according to IP addressing
Table.
Fill IPv4 address and subnet mask.
Repeat the same procedure with other routers to configure them thoroughly.
Step 4: After configuring all of the devices we need to assign the routes to the routers.
To assign RIP routes to the particular router:
First, click on router then Go to Config.
Select RIP under Routing field.
Add all the network
After above step click on settings and select NVRAM and save.
To assign RIP routes to the another router
First, click on router then Go to CLI.
Then type the commands and IP information given below.
CLI command
Router (config-if) #exit
Router (config) # router rip
Router (config- router) # network <network id>
Router (config- router) # network <network id>
Router (config- router) # network <network id>
Repeat above steps to add all network
Then again type exit
After above step click on settings and select NVRAM and save.
Conclusion: Distance Vector Routing Protocol-RIP was studied and its performance was
observed and the status of routing table was checked.
Experiment 5
Aim: To perform sub netting using Cisco Packet Tracer.
Apparatus (Software): Cisco Packet Tracer.
A subnet, or subnetwork, is a part of a larger network. Subnets are a logical part of an IP network
into multiple, smaller network components. The Internet Protocol (IP) is the method for
transmitting data from one computer to another over the internet network. Each computer, or
host, on the internet, has at least one IP address as a unique identifier.
Steps to Configure and Verify Router Connections in Cisco Packet Tracer:
Step 1: First, open the Cisco packet tracer desktop and select the devices
Then, create a network topology as shown in the image.
Use an Automatic connecting cable to connect the devices with others.
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask To assign an IP address
in PC0, click on PC0.
Then, go to desktop and then IP configuration and there you will IPv4 configuration.
Fill IPv4 address and subnet mask.
Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Configure router with IP address and subnet mask for the first subnet.
To assign an IP address in router, click on router.
Then, go to config and then Interfaces.
Then, configure the IP address in FastEthernet 0/0
Fill IPv4 address and subnet mask.
Repeat the same procedure with the router to configure the second subnet.
For second subnet select FastEthernet 0/1
Step 4: After configuring all of the devices we need to assign the routes to the routers.
To assign static routes to the particular router:
Step 5: Verifying the network by pinging the IP address of any PC. We will use the ping
command to do so.
First, click on PC0 then Go to the command prompt
Then type ping <IP address of targeted node>
As we can see in the below image we are getting replies which means the connection is
working very fine
Example : ping 192.168.2.2
A simulation of the experiment is given below we are sending PDU from PC0 to PC2 and
PC1 to PC3:
Attach final output screen shot
Conclusion: In this experiment we have created & studied different networks and applied
subnetting and transferred files from end device to another.
Experiment 8
Aim: To Simulate and study the implementation of TCP/IP stack using Wireshark.
Apparatus (Software): Wireshark
TCP or Transmission Control Protocol is one of the most important protocols or standards for
enabling communication possible amongst devices present over a particular network. It has
algorithms that solve complex errors arising in packet communications, i.e. corrupted packets,
invalid packets, duplicates, etc. Since it is used with IP (Internet Protocol), many times it is also
referred to as TCP/IP. In order to start a communication, the TCP first establishes a connection
using the three-way-handshake. TCP’s efficiency over other protocols lies in its error detecting
and correction attribute. Not only this, it organizes packets and segments larger data into a
number of packets without disrupting the integrity of the data.
In order to analyze TCP, you first need to launch Wireshark and follow the steps given below:
From the menu bar, select capture -> options -> interfaces.
In the interfaces, choose a particular Ethernet adapter and note down its IP, and click the start
button of the selected adapter.
Now we shall be capturing packets.
Stop the capture by selecting stop from the capture menu.
Since we are concerned here with only TCP packets as we are doing TCP analysis, we shall
be filtering out TCP packets from the packet pool. You can apply a filter in any of the
following ways:
In the display filter bar on the screen, enter TCP and apply the filter.
From analyzing the menu in the menu bar select display filters or from capture select capture
filters and then TCP only and ok.
Here you will have the list of TCP packets. The first three packets of this list are part of
the three-way handshake mechanism of TCP to establish a connection.
Conclusion: The TCP and IP header were studied the traffic was observed and from the data
available the source address, destination address, synchronization number and
acknowledgement number can be identified.