Professional Documents
Culture Documents
Table of Contents
LAB 01: Basic cable construction and testing (straight, cross-over, roll-over).2
LAB 02:Introduction to IP addressing....................................................................6
LAB 03: Building and testing a Peer-to-Peer network..................................................11
LAB 04:Building and testing Switch based network....................................................18
LAB 05: Introduction to Router and establishing a console session Using
HyperTerminal................................................................................................20
LAB 06: Router command line interface (CLI) fundamentals.........................25
LAB 07: Building and testing a Router based network...........................................32
LAB 08:Retrieving configurations from NVRAM and TFTP server...................36
LAB 09: Building and Testing VLAN....................................................................38
LAB 10: Configuring VTP in switch domain network..............................................41
LAB 11: Configuring RIP routing protocol between two routers...............................43
LAB 12: Configuring OSPF routing protocol between two routers............................45
LAB 13:Learning packet motion through DHCP server in a network . 47
LAB 14: Learning packet motion through DNS server in a network using packet tracer
.......................................................................................................................51
LAB 15: Demonstrating a full fledge campus area network.....................................54
LAB 1:
Basic cable construction and testing (straight, cross-over,
roll-over)
Introduction:
Cable is medium through which information usually moves from one network to
device to another network device. There are several types of cable which are
commonly used with LANs. The type of cable chosen for a network is related to the
network's topology, protocol, and size. Some common cable used in network are
following.
1. Unshielded Twisted Pair (UTP) Cable
2. Shielded Twisted Pair (STP) Cable (has a protective foil that surrounds the cable to
prevent strong sources of Electromagnetic Interference (EMI) and Radio Frequency Interference
(RFI))
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks (See fig. 1).
The cable has four pairs of wires inside the jacket. Each pair is twisted with a
different number of twists per inch to help eliminate interference from adjacent
pairs and other electrical devices
Categories of Ethernet cable:Commonly use Ethernet cable is cat5 other are given in table bellow
Objectives:
To familiarize the students with the type and construction of different cables used in
data networks.
Preparation:
Basically two different color schemes standards are used in the cable construction.
1) EIA/TIA 568 A (Electronic Industry Association/Telecommunication Industry
Association)
2) EIA/TIA 568 B
Equipment:
1.
2.
3.
Cat-5 Cable
Crimping Tool
Clipper
4. RJ45 Connectors
5. Cable Tester
Task:
1. Construct EIA/TIA 568A straight through and cross over cable
2. Test them with Cable Tester
LAB 2:
Introduction to IP addressing
Introduction:
IP (internet protocol)
One of the most important aspects of communications on an internetwork is the IP
addressing scheme.
IP addressing is the method used to identify hosts and network devices. While IP
addressing schemes have had to adapt, the basic IP address structure for IPv4
remains the same. To send and receive messages on an IP network, every network
host must be assigned a unique 32-bit IP address. Because large binary numbers
are difficult for people to read and understand, IP addresses are usually displayed in
dotted-decimal notation. In dotted-decimal notation, each of the four octets is
converted to a decimal number separated by a decimal point. For example, the IP
address:
11000000.10101000.00000001.01101010
is represented as 192.168.1.106 in dotted-decimal notation.
Classes of IP address
To create more possible network designations, the 32-bit address space was
organized into five classes. Three of these classes, A, B, and C, provide addresses
that can be assigned to individual hosts or networks. The other two classes, D and
E, are reserved for multicast and experimental use.
255.0.0.0
255.255.0.0
255.255.255.0
Subnetting:
A single Class A, B, or C network address space can be divided into multiple
subnetworks by using bits from the host address space to designate the subnet ID.
As an example, an organization using a Class C address space has two offices in
different buildings. To make the network easier to manage, the network
administrators want each location to have a logically separate network. Taking one
bits from the host address increases the subnet mask length from the default 24
bits to 25 bits, or 255.255.255.128.
Private addresses:
9
In addition to creating separate classes, the Internet Engineering Task Force (IETF)
decided to reserve some of the Internet address space for use by private networks.
Private networks have no connection to public networks. Private network addresses
are not to be routed across the Internet. This allows multiple networks in various
locations to use the same private addressing scheme without creating addressing
conflicts. The use of private address space reduced the number of unique registered
IP addresses that were assigned to organizations.
10
LAB 03:
Building and testing a Peer-to-Peer network
Objectives
Background / Preparation
In this hands-on lab, you will plan and build a simple peer-to-peer network using two
PCs and an Ethernet crossover cable.
The following resources are required:
Two Window XP Professional PCs, each with an installed and functional
Network Interface Card
(NIC)
An Ethernet crossover cable
b. A simple network like the one you designed can use a hub or switch as a
central connecting device, or the PCs may be directly connected. Which kind
of cable is required for a direct Ethernet connection between the two PCs?
_________________________________________________________
11
PC1 Name:
PC2 Name:
b. Check to see if the two PCs have the same name. If they do, change the
name of one PC by clicking the Change button, typing a new name in the
Computer name field, then clicking OK.
12
a. Use the Ethernet crossover cable provided by the instructor. Plug one end of
the cable into the Ethernet NIC of PC1.
b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the
cable, you should hear a click which indicates that the cable connector is
properly inserted into the port.
a. After the Ethernet crossover cable is connected to both PCs, take a close look
at each Ethernet port. A light (usually green or amber) indicates that physical
connectivity has been established between the two NICs. Try unplugging the
cable from one PC then reconnecting it to verify that the light goes off then
back on.
b. Go to the Control Panel, double click the Network Connections icon, and
confirm that the local area connection is established. The following figure
shows an active local area connection. If physical connectivity problems exist,
you will see a red X over the Local Area Connection icon with the words
Network cable unplugged.
13
14
c. Select the Use the following IP address radio button and enter the
following information:
IP Address
192.168.1.1
Subnet
Mask
255.255.255.
0
15
d. Click OK, which will close the Internet Protocol (TCP/IP) Properties
window. Click the Close button to exit the Local Area Connection
Properties window.
e. Repeat steps 5a 5d for the second PC using the following information:
IP Address 192.168.1.2
Subnet Mask 255.255.255.0
Step 6: Verify IP connectivity between the two PCs
NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must
be disabled temporarily on both
PCs. Windows Firewall should be re-enabled after the tests have been
completed.
a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select
Control Panel, and double-click Network Connections.
b. Right-click the Local Area Connection icon and select Properties. Click the
Advanced tab. Locate and click the Settings button.
c. Make a note of whether the firewall settings are ENABLED (ON) for the
Ethernet port or DISABLED (OFF) for the Ethernet port.
____________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio
button to disable the firewall. The setting will be re-enabled in a later step.
Click OK in this dialog box and the following to apply this setting.
16
e. Now that the two PCs are physically connected and configured correctly with
IP addresses, we need to make sure they communicate with each other. The
ping command is a simple way to accomplish this task. The ping command
is included with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows
command prompt window will appear as shown in the figure below.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping
will verify the IP connectivity. It should produce results similar to those shown
in here.
h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.
i. Close the Windows command prompt window on both PCs.
Step 7: Verify connectivity using My Network Places
a. A PC can share its resources with other PCs on the network. PCs with shared
resources should be visible through My Network Places. On PC1, go to
Start, click My Network Places, and then click View workgroup
computers in the left panel.
17
18
LAB 04:
Building and testing Switch based network
Objectives:
To familiarize students with the design and construction of a simple network using
the network devices Switch, and also with the tools that can be used to check the
network.
PROBLEM:
Designing of network using network devices
Tasks:
1. Connect five computers through switch with each other.
2. Assign static private IP addresses to all computers using same procedure in
previous lab
3. Ping all computers with each other (1,2), (1,3), (1,4), (1,5), (2,1), (2,3), (2,4),
(2,5), (3,1), (3,2), (3,4), (3,5), (4,1), (4,2), (4,3), (4,5)
4. Share the desktop through switch.
19
5. Connect internet wire to the switch, you will find that all computers will have
internet connection. Check internet availability in all computers. Since DHCP
Server is installed in BU. [A DHCP Server assigns IP addresses to client
computers. This is very often used in enterprise networks to reduce
configuration efforts. All IP addresses of all computers are stored in a
database that resides on a server machine.]
Equipment:
1. Straight Through Cable
2. Hub
3. Switch
Procedure:
1.
2.
3.
Measurements:
1. PING command must work on the network
20
LAB 05:
Introduction to Router and establishing a console
session Using HyperTerminal
Introduction:
What is Router?
Router is a device that forwards data packets along networks. A router is connected
to at least two networks, commonly two LANs or WANs or a LAN and its ISP's
network. Routers are located at gateways, the places where two or more networks
connect.
What is Routing?
Routing refers to the process of choosing a path over which to send packets.
Computer panel:
You can see the COM ports (DB-9 connector) on the back side of CPU.
21
Router Pannel:
Console Port is for direct connection to the router, to be able to configure router.
Serial Port is for WAN connectivity
Ethernet/ Fastethernet Port is for LAN connectivity
Auxiliary Port is for remote connectivity via modem. This port is used to remotely access the router.
22
Procedure:STEP 1
Plug DB-9 connector (9 ping female side of console cable) into one of the COM ports
of the CPU and plug the RJ-45 connector (8 ping connector) into console port of the
Router.
STEP 2
You need to open HYPERTERMINAL Program by clicking on
Start > Programs > Accessories > Communications > HyperTerminal
In Location Information windows, input necessary details and click on OK button.
You may put dummy information.
In Connection Description window, type any name for the connection and click on OK button.
23
In the Connect To window, select appropriate COM port (the COM port number of the PC where you
have plugged the Routers console cable) and Click OK to continue.
In the COM Properties window, Click on Restore Defaults button and then click OK to continue.
24
NOTE: You will not find this Program in Windows 7. So you should either copy the
HyperTerminal Program from windows XP or use other programs to get access to
the Router. Other famous programs are TeraTerm, Putty, SecureCRT.
The "Power-On Self Test" that checks the Router on boot up.
Flash Memory
25
LAB 06:
Router command line interface (CLI) fundamentals
Introduction:
In this experiment basic router commands are introduced to students so then that
will be used for other troubleshooting purposes.
Objectives:
To familiarize students with Router Command Line Interface
Preparation:
26
27
Various configuration modes are used to set up a device. Configuring a Cisco IOS
device begins with entering privileged EXEC mode. From privileged EXEC mode, the
user can access the other configuration modes.
In most cases, commands are applied to the running configuration file using a
terminal connection. To use these commands, the user must enter global
configuration mode.
28
29
Help command
The context-sensitive help feature is especially useful when configuring a device.
Entering help or the ? at the command prompt displays a brief description of the
help system.
Router# help
Or
Router# ?
Basic configuration
The initial configuration of a Cisco IOS device involves configuring the device name
and then the passwords that are used to control access to the various functions of
the device.
A device should be given a unique name as one of the first configuration tasks. This
task is accomplished in global configuration mode with the following command.
1) Host name
Router(config)# hostname [name]
When the Enter key is pressed, the prompt changes from the default host name,
which is Router, to the newly configured host name.
The next configuration step is to configure passwords to prevent access to the
device by unauthorized individuals.
2) Password and secret
The enable password and enable secret commands are used to restrict access to
privileged EXEC mode, preventing unauthorized users from making configuration
changes to the router.
30
3).Banners
A banner is text that a user sees when initially logging on to the router.
There are two types of banners: message-of-the-day (MOTD) and login information.
To configure the banners, the commands are banner motd and banner login. For
both types, a delimiting character, such as a #, is used at the beginning and at the
end of the message.
Router(config)# banner motd # welcome to this area #
4).Configure interface
Configuring an interface on the router must be done in global configuration mode.
Following are commands to configure fastethernet and serial
31
Show commands
The Cisco IOS CLI includes show commands that display relevant information about
the configuration and operation of the device.
Network technicians use the show commands extensively for viewing configuration
files, checking the status of device interfaces and processes, and verifying the
device operational status. The status of nearly every process or function of the
router can be displayed using a show command. Some of the more popular show
commands are:
show running-config
to show running configuration
show startup-config
to show startup configuration
show interfaces
to show interface setting e.g. IP and subnet mask
show ip route
to show routing table of router
show history
to show history of command which enter in current
session
Task:
1) Change host name
2) Set Banner
3) Assign IP to port 0/0 ,0/1 , 0/2
4) Assign IP to Serial port 0/0/0 clockrate 9600
32
LAB 07:
Building and testing a Router based network
Objectives
33
Required Resources
The following resources are required:
From each host computer, start a HyperTerminal session to the attached router.
Step 1: Configure host computer IP settings.
a. Make sure that the host computers are connected according to the
topology diagram.
b. Configure the hosts with static IP addresses using the following settings.
H1 attached to the S1 switch:
34
IP address: 172.16.0.2
Subnet mask: 255.255.0.0
Default gateway: 172.16.0.1
H2 attached to R2 directly:
IP address: 172.18.0.2
Subnet mask: 255.255.0.0
Default gateway: 172.18.0.1
Step 2: Log in to each router and configure the basic settings.
Note: Perform each step for both routers.
a. Configure a host name for each of the two routers.
Router>enable
Router#configure terminal
Router(config)#hostname R1
Note: Use R2 for the name of the second router.
b. Configure a message-of-the-day (MOTD) banner using the banner motd
command. When a user connects to the router, the MOTD banner appears
before the login prompt. In this example, the number sign (#) is used to start
and end the message. The # is converted to ^C when the running-config is
displayed.
R1(config)#banner motd #Unauthorized Use Prohibited#
Step 3: Configure the serial interface on R1.
In global configuration mode, configure serial interface 0/0/0 on R1. See the
Router Interface Summary table at the end of the lab for the proper
designation of the serial interface on the router that you are using. Because
the R1 serial 0/0/0 interface is acting as the DCE for the WAN link, it is
necessary to configure the clock rate. When configuring an interface, always
use the no shutdown command to enable it.
R1(config)#interface serial 0/0/0
R1(config-if)#description WAN link to R2
R1(config-if)#ip address 172.17.0.1 255.255.0.0
R1(config-if)#clock rate 64000
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config-if)#exit
Step 4: Configure the serial interface on R2.
In global configuration mode, configure serial 0/0/0 on router R2. See the
Router Interface Summary table at the end of the lab for the proper
designation of the serial interface on the router that you are using.
35
36
LAB 08
Retrieving configurations from NVRAM and TFTP
server
Introduction
Any configuration that we type is stored in RAM (Running configuration) which has
the disadvantage in the sense that it is volatile, i.e data can be wash out in case of
any failure of the main supply. For the sake of storing the data we store the
37
Problem
Storing and retrieving configurations from NVRAM and TFTP server.
Equipments
1. Router,
2. Necessary cables
3. TFTP server
Procedure
1. To store the data from DRAM into NVRAM, the procedure is given below:
38
Press enter
Router #
2. Now the data from DRAM into the TFTP server is stored as:
Router # copy running-config tftp
Address or name of remote host []? 192.168.1.2
Destination filename [Router-config]? File Bahria
Router #
3. The data from NVRAM into the TFTP server is stored as:
Router # copy running-config tftp
Address or name of remote host [] ? 192.168.1.2
Destination filename [Router-config] ? file-Bahria
Task:
1)
2)
3)
4)
5)
6)
7)
LAB 9:
Building and Testing VLAN
Introduction:
A VLAN is a switched network that is logically segmented by functions, project
teams, or applications without regard to the physical location of the users. For
example several end stations might be grouped as a department, such as
engineering or accounting. When the end stations are physically located close to
one another, you can group them into a LAN segment. If any of the end stations are
in different buildings (not the same physical LAN segment), you can group them
into a VLAN.
39
Objectives:
To familiarize students with the design and construction of VLAN, and also with the tools that can be used
to check the network.
PROBLEM:
Designing of VLAN
Equipment:
1. Straight Cable
2. Switch
Procedure:
Step 1: Create VLANs on switch S1.
Use the vlan vlan-id command in global configuration mode to add a VLAN to
switch S1. There are four VLANS configured for this lab: VLAN 2 (Student);
VLAN 3 (Teacher); VLAN 4 (Management); and VLAN 5 (Staff). After you create
the VLAN, you will be in vlan configuration mode, where you can assign a
name to the VLAN with the name vlan name command.
40
S1(config)#vlan2
S1(configvlan)#nameStudent
S1(configvlan)#vlan3
S1(configvlan)#nameTeacher
S1(configvlan)#vlan4
S1(configvlan)#namemanagement
S1(configvlan)#vlan5
S1(configvlan)#namestaff
S1(configvlan)#end
S1#
1defaultactiveFa0/1,Fa0/2,Fa0/4,Fa0/5
Fa0/6,Fa0/7,Fa0/8,Fa0/9
Fa0/10,Fa0/11,Fa0/12,Fa0/13
Fa0/14,Fa0/15,Fa0/16,Fa0/17
Fa0/18,Fa0/19,Fa0/20,Fa0/21
Fa0/22,Fa0/23,Fa0/24,Gi0/1
Gi0/2
2studentactive
3teacheractive
4managementactive
5staffactive
41
LAB 10:
Configuring VTP in switch domain network
Introduction:
You can configure a switch to operate in any one of these VTP modes:
42
Server
-In VTP: server mode, you can create, modify, and delete VLANs
and specify other configuration parameters, such as VTP version and VTP
pruning, for the entire VTP domain. VTP servers advertise their VLANS
configuration to other switches in the same VTP domain and synchronize
their VLAN configuration with other switches based on advertisements
received over trunk links .VTP server is the default mode.
Client-VTP :client behave the same way ass VTP servers, but you cannot
create, change, or delete VLANS on a VTP client.
Transparent-VTP:
Objectives:
The purpose for performing this experiment is to establish a central management
mechanism for spreading the configured VLANS throughout the switched domain
while it is configured only once in a server switch.
43
PROBLEM:
VTP Security Configuring
Equipment:
1. Atleast two switches,
2. and a number of PC'
LAB 11:
Configuring RIP routing protocol between two routers
Introduction:
44
The Routing Information Protocol (RIP) is a relatively old, but still commonly used,
interior gateway protocol (IGP) created for use in small, homogeneous networks. It
is a classical distance-vector routing protocol. RIP is documented in RFC 1058.
RIP uses broadcast User Datagram Protocol (UDP) data packets to exchange routing
information. The Cisco IOS software sends routing information updates every 30
seconds; this process is termed advertising. If a router does not receive an update
from another router for 180 seconds or more, it marks the routes served by the nonupdating router as being unusable. If there is still no update after 240 seconds, the
router removes all routing table entries for the no updating router.
The metric that RIP uses to rate the value of different routes is hop count. The hop
count is the number of routers that can be traversed in a route. A directly connected
network has a metric of zero; an unreachable network has a metric of 16. This small
range of metrics makes RIP an unsuitable routing protocol for large networks.
If the router has a default network path, RIP advertises a route that links the router
to the pseudo network 0.0.0.0. The network 0.0.0.0 does not exist; RIP treats 0.0.0.0
as a network to implement the default routing feature. The Cisco IOS software will
advertise the default network if a default was learned by RIP, or if the router has a
gateway of last resort and RIP is configured with a default metric.
RIP sends updates to the interfaces in the specified networks. If an interface's
network is not specified, it will not be advertised in any RIP update.
Objectives:
To enable communication between two hosts that are connected not to a single
router but with the different routers
PROBLEM:
Equipment:
1. Four routers
2. Four switches
3. Four PCs
45
Procedure:
Step1: Assign IP address on all ports of R1, R2, R3 and R4
Assign IP addresses to all port of Router shown in figure above.
Step2: Configure RIP protocol on all router
ExampleName#config
ExampleName(config)#router rip
ExampleMame(config-router)#network aa.bb.cc.dd
ExampleName(config-router)# network ee.ff.gg.hh
ExampleName(config-router)#
Step3: Assign IP address to all computer
Assign IP address to computer with same network that assign to their
respective port
Step4: confirm connection
Use ping command to confirm connection of each PC.
Step5: check routing protocol
ExampleName(config)# show ip route
46
LAB 12:
Configuring OSPF routing protocol between two routers
Introduction:
Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol
(IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet
Engineering Task Force (IETF). The working group was formed in 1988 to design an
IGP based on the Shortest Path First (SPF) algorithm for use in the Internet. Similar
to the Interior Gateway Routing Protocol (IGRP), OSPF was created because in the
mid-1980s, the Routing Information Protocol (RIP) was increasingly incapable of
serving large, heterogeneous internetworks. This chapter examines the OSPF
routing environment, underlying routing algorithm, and general protocol
components.
OSPF has two primary characteristics. The first is that the protocol is open, which
means that its specification is in the public domain. The OSPF specification is
published as Request for Comments (RFC) 1247. The second principal characteristic
is that OSPF is based on the SPF algorithm, which sometimes is referred to as the
Dijkstra algorithm, named for the person credited with its creation.
OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LS As) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables is included in
OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF
algorithm to calculate the shortest path to each node.
As a link-state routing protocol, OSPF contrasts with RIP and IGRP, which are
distance- vector routing protocols. Routers running the distance-vector algorithm
send all or a portion of their routing tables in routing-update messages to their
neighbors.
Objectives:
To enable communication between two hosts that are connected not to a single
router but with the different routers in such a way that the reflection of the network
change is sudden and not instantaneous.
Procedure:
Step1: Assign IP address on all ports of R1, R2, R3 and R4
Assign IP addresses to all port of Router shown in figure above.
47
48
LAB 13:
Learning packet motion through DHCP server in a network using packet tracer
Introduction:
DHCP was created by the Dynamic Host Configuration Working Group of the Internet Engineering Task
Force (IETF; a volunteer organization which defines protocols for use on the Internet). As such, it's
definition is recorded in an Internet RFC and the Internet Activities Board (IAB) is asserting its status as to
Internet Standardization. As of this writing (June 1998), DHCP is an Internet Draft Standard Protocol and
is Elective. BOOTP is an Internet Draft Standard Protocol and is recommended. For more information on
Internet standardization, see RFC2300 (May 1998) DHCP is based on BOOTP and maintains some
backward compatibility. The main difference is that BOOTP was designed for manual pre-configuration of
the host information in a server database, while DHCP allows for dynamic allocation of network
addresses and configurations to newly attached hosts. Additionally, DHCP allows for recovery and
49
reallocation of network addresses through a leasing mechanism. RARP is a protocol used by Sun and
other vendors that allows a computer to find out its own IP number, which is one of the protocol
parameters typically passed to the client system by DHCP or BOOTP. RARP doesn't support other
parameters and using it, a server can only serve a single LAN. DHCP and BOOTP are designed so they
can be routed
Objectives
1
2
3
Configure a customer router for DHCP using the Cisco IOS CLI.
Configure a DHCP client.
Verify DHCP functionality
Step 1: Restart the Customer router to remove the DHCP commands added by SDM.
a. Because you did not save the DHCP configuration created using SDM to NVRAM, restarting the router
restores the basic configuration created in Task 1, Step 2. On the Customer router, issue the reload
command.
b. When prompted to save the configuration, respond with no.
c. When prompted with Proceed with reload? [confirm], press Enter.
d. Press Enter at the Press RETURN to get started! prompt. You should now see the Customer>
prompt.
Step 3: Configure the DHCP server excluded addresses on the Customer router.
To prevent certain addresses from being assigned they must be excluded from the pool. This
includes the IP address of the router Fast Ethernet 0/0 interface (the default gateway). In this lab,
also exclude addresses from 192.168.1.101 through 192.168.1.254 to reserve them for other
purposes, such as servers and printers, which need to have a fixed IP address.
a. To exclude addresses, issue the ip dhcp excluded-address command.
Customer(config)#ip dhcp excluded-address 192.168.1.1
Customer(config)#ip dhcp excluded-address 192.168.1.101
192.168.1.254
b. Why do you want to exclude addresses before the DHCP pool is even created?
__________________________________________________________________________
____
__________________________________________________________________________
____
50
51
c. On the Customer router, display the characteristics of the DHCP pool using the show ip dhcp pool
command.
Customer#show ip dhcp pool
Pool INTERNAL :
Utilization mark (high/low) : 100 / 0
Subnet size (first/next) : 0 / 0
Total addresses : 254
Leased addresses : 2
Pending event : none
1 subnet is currently in the pool :
Current index IP address range Leased addresses
192.168.1.4 192.168.1.1 - 192.168.1.254 2
d. How many addresses have been leased? ______
e. In the output from the command, what do you think Current Index means?
________________________________________________________________________________
52
LAB 14:
Learning packet motion through DNS server in a network using packet tracer
Introduction:
The Domain Name System (DNS) is a hierarchical naming system for computers,
services, or any resource participating in the Internet. It associates various
information with domain names assigned to such participants. Most importantly, it
translates domain names meaningful to humans into the numerical (binary)
identifiers associated with networking equipment for the purpose of locating and
addressing these devices world-wide. An often used analogy to explain the Domain
Name System is that it serves as the "phone book" for the Internet by translating
human-friendly computer hostnames into IP addresses. For example, www.example.com
translates to 208.77.188.166.
The Domain Name System makes it possible to assign domain names to groups of
Internet users in a meaningful way, independent of each user's physical location.
Because of this, World-Wide Web (WWW) hyperlinks and Internet contact
information can remain consistent and constant even if the current Internet routing
arrangements change or the participant uses a mobile device. Internet domain
names are easier to remember than IP addresses such as 208.77.188.166(IPv4) or
2001:db8:lf70::999:de8:7648:6e8 (IPv6). People take advantage of this when they
recite meaningful URLs and e-mail addresses without having to know how the
machine will actually locate them.
The Domain Name System distributes the responsibility of assigning domain names
and mapping those names to IP addresses by designating authoritative name
servers for each domain. Authoritative name servers are assigned to be responsible
for their particular domains, and in turn can assign other authoritative name servers
for their sub-domains. This mechanism has made the DNS distributed, fault tolerant,
and helped avoid the need for a single central register to be continually consulted
and updated
Objectives
Background / Preparation
Domain Name System (DNS) is invoked when you type a Uniform Resource Locator
(URL), such as
53
http://www.cisco.com, into a web browser. The first part of the URL describes
which protocol is being used.
Common ones are HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer
Protocol over Secure
Socket Layer), and FTP (File Transfer Protocol).
DNS uses the second part of the URL, which in this example is www.cisco.com. DNS
translates the domain name (like www.cisco.com) to an IP address in order to allow
the source host to reach the destination host.
Work in pairs to complete this lab.
The following resources are required:
54
55
LAB 15:
Demonstrating a full fledge campus area network
Objectives:
The objective of performing this lab is to demonstrate student how a real network
works in a practical environment. This very lab is the collection summary of all the
previous labs and is a sort of assignment for students
56
57