You are on page 1of 59

Lab Manual

Data Communication and Networks


CEL-222

Department of Electrical Engineering


Bahria University Islamabad Campus

Bahria University, Islamabad

Data Communication and Computer Networks

Table of Contents
LAB 01: Basic cable construction and testing (straight, cross-over, roll-over).2
LAB 02:Introduction to IP addressing....................................................................6
LAB 03: Building and testing a Peer-to-Peer network..................................................11
LAB 04:Building and testing Switch based network....................................................18
LAB 05: Introduction to Router and establishing a console session Using
HyperTerminal................................................................................................20
LAB 06: Router command line interface (CLI) fundamentals.........................25
LAB 07: Building and testing a Router based network...........................................32
LAB 08:Retrieving configurations from NVRAM and TFTP server...................36
LAB 09: Building and Testing VLAN....................................................................38
LAB 10: Configuring VTP in switch domain network..............................................41
LAB 11: Configuring RIP routing protocol between two routers...............................43
LAB 12: Configuring OSPF routing protocol between two routers............................45
LAB 13:Learning packet motion through DHCP server in a network . 47

LAB 14: Learning packet motion through DNS server in a network using packet tracer
.......................................................................................................................51
LAB 15: Demonstrating a full fledge campus area network.....................................54

Bahria University, Islamabad

Data Communication and Computer Networks

INTRODUCTION OF THE COURSE LAB

WHAT TO DO TO BE SUCCESSFUL IN THIS LAB:


Safety comes first in any laboratory.
If in doubt about any procedure, or if it seems unsafe to you, STOP. Ask your
lab instructor for help.
A. What to bring to each laboratory session:
FOR EXAMPLE:
1. Bring a "scientific" calculator.
2. Bring this lab manual.
B. Prepare for each laboratory session:
Each laboratory consists of a series of related problems that can be
solved using the same basic concepts and principles. Sometimes all lab
groups will work on the same problem, other times groups will work on
different problems and share results.
1. Before beginning a new lab, carefully read the Introduction,
Objectives and Preparation sections.
2. Each lab contains several different experimental problems. Before
you come to a lab, complete the assigned Prediction and Warm-up.
The Warm-up helps you build a prediction for the given problem, so
it is usually helpful to complete the Warm-up before making the
prediction.
C. Attendance
Attendance is required at all labs without exception. If something
disastrous keeps you from your scheduled lab, contact your lab
instructor immediately. The instructor will arrange for you to attend
another lab section that same week. There are no make-up labs in
this course.

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 1:
Basic cable construction and testing (straight, cross-over,
roll-over)
Introduction:
Cable is medium through which information usually moves from one network to
device to another network device. There are several types of cable which are
commonly used with LANs. The type of cable chosen for a network is related to the
network's topology, protocol, and size. Some common cable used in network are
following.
1. Unshielded Twisted Pair (UTP) Cable
2. Shielded Twisted Pair (STP) Cable (has a protective foil that surrounds the cable to
prevent strong sources of Electromagnetic Interference (EMI) and Radio Frequency Interference
(RFI))

3. Coaxial Cable (use in TV cable)


4. Fiber Optic Cable

Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks (See fig. 1).
The cable has four pairs of wires inside the jacket. Each pair is twisted with a
different number of twists per inch to help eliminate interference from adjacent
pairs and other electrical devices

Figure 1 Unshielded Twisted Pair (UTP) Cable

Unshielded Twisted Pair Connector RJ-45


The standard connector for unshielded twisted pair cabling is an RJ-45 (Registered
Jack) connector. This is a plastic connector that looks like a large telephone-style
connector (See fig. 2). A slot allows the RJ-45 to be inserted only one way.

Bahria University, Islamabad

Data Communication and Computer Networks

Figure 2 RJ-45 Connector

Categories of Ethernet cable:Commonly use Ethernet cable is cat5 other are given in table bellow

Type of Connectivity:There are three type of connectivity


1) Straight through (To connect different type of devices e.g. Router to switch)
2) Cross over
(To connect Some type of devices e.g. Switch to switch)
3) Roll over (To configure router or switch)
Figure 3 show two standard used to make straight and cross cable

Bahria University, Islamabad

Data Communication and Computer Networks

Objectives:
To familiarize the students with the type and construction of different cables used in
data networks.

Preparation:
Basically two different color schemes standards are used in the cable construction.
1) EIA/TIA 568 A (Electronic Industry Association/Telecommunication Industry
Association)
2) EIA/TIA 568 B

Equipment:
1.
2.
3.

Cat-5 Cable
Crimping Tool
Clipper

Bahria University, Islamabad

Data Communication and Computer Networks

4. RJ45 Connectors
5. Cable Tester

Task:
1. Construct EIA/TIA 568A straight through and cross over cable
2. Test them with Cable Tester

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 2:
Introduction to IP addressing

Introduction:
IP (internet protocol)
One of the most important aspects of communications on an internetwork is the IP
addressing scheme.
IP addressing is the method used to identify hosts and network devices. While IP
addressing schemes have had to adapt, the basic IP address structure for IPv4
remains the same. To send and receive messages on an IP network, every network
host must be assigned a unique 32-bit IP address. Because large binary numbers
are difficult for people to read and understand, IP addresses are usually displayed in
dotted-decimal notation. In dotted-decimal notation, each of the four octets is
converted to a decimal number separated by a decimal point. For example, the IP
address:
11000000.10101000.00000001.01101010
is represented as 192.168.1.106 in dotted-decimal notation.

Bahria University, Islamabad

Data Communication and Computer Networks

Classes of IP address
To create more possible network designations, the 32-bit address space was
organized into five classes. Three of these classes, A, B, and C, provide addresses
that can be assigned to individual hosts or networks. The other two classes, D and
E, are reserved for multicast and experimental use.

Bahria University, Islamabad

Data Communication and Computer Networks

Bahria University, Islamabad

Data Communication and Computer Networks

Default subnet mask:


Class A
Class B
Class C

255.0.0.0
255.255.0.0
255.255.255.0

Subnetting:
A single Class A, B, or C network address space can be divided into multiple
subnetworks by using bits from the host address space to designate the subnet ID.
As an example, an organization using a Class C address space has two offices in
different buildings. To make the network easier to manage, the network
administrators want each location to have a logically separate network. Taking one
bits from the host address increases the subnet mask length from the default 24
bits to 25 bits, or 255.255.255.128.

Private addresses:
9

Bahria University, Islamabad

Data Communication and Computer Networks

In addition to creating separate classes, the Internet Engineering Task Force (IETF)
decided to reserve some of the Internet address space for use by private networks.
Private networks have no connection to public networks. Private network addresses
are not to be routed across the Internet. This allows multiple networks in various
locations to use the same private addressing scheme without creating addressing
conflicts. The use of private address space reduced the number of unique registered
IP addresses that were assigned to organizations.

10

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 03:
Building and testing a Peer-to-Peer network
Objectives

Design and build a simple peer-to-peer network using a crossover cable


supplied by the instructor.
Verify connectivity between the peers using the ping command.

Background / Preparation
In this hands-on lab, you will plan and build a simple peer-to-peer network using two
PCs and an Ethernet crossover cable.
The following resources are required:
Two Window XP Professional PCs, each with an installed and functional
Network Interface Card
(NIC)
An Ethernet crossover cable

Step 1: Diagram the network


a. A network diagram is a map of the logical topology of the network. In the
space below, sketch a simple peer-to-peer network connecting two PCs. Label
one PC with IP address 192.168.1.1 and the other PC with IP address
192.168.1.2. Use labels to indicate connecting media and any necessary
network devices.

b. A simple network like the one you designed can use a hub or switch as a
central connecting device, or the PCs may be directly connected. Which kind
of cable is required for a direct Ethernet connection between the two PCs?
_________________________________________________________

11

Bahria University, Islamabad

Data Communication and Computer Networks

Step 2: Document the PCs


a. Check the computer name settings for each PC and make adjustments as
necessary. For each PC, select Start and Control Panel. Double-click the
System icon, then click the Computer Name tab. Write down the computer
name that is displayed following Full computer name:

PC1 Name:
PC2 Name:

b. Check to see if the two PCs have the same name. If they do, change the
name of one PC by clicking the Change button, typing a new name in the
Computer name field, then clicking OK.

12

Bahria University, Islamabad

Data Communication and Computer Networks

c. Click OK to close the System Properties window.


d. Why is it important that each PC on a network have a unique name?

Step 3: Connect the Ethernet cable

a. Use the Ethernet crossover cable provided by the instructor. Plug one end of
the cable into the Ethernet NIC of PC1.
b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the
cable, you should hear a click which indicates that the cable connector is
properly inserted into the port.

Step 4: Verify physical connectivity

a. After the Ethernet crossover cable is connected to both PCs, take a close look
at each Ethernet port. A light (usually green or amber) indicates that physical
connectivity has been established between the two NICs. Try unplugging the
cable from one PC then reconnecting it to verify that the light goes off then
back on.
b. Go to the Control Panel, double click the Network Connections icon, and
confirm that the local area connection is established. The following figure
shows an active local area connection. If physical connectivity problems exist,
you will see a red X over the Local Area Connection icon with the words
Network cable unplugged.

13

Bahria University, Islamabad

Data Communication and Computer Networks

c. If the Local Area Connection does not indicate that it is connected,


troubleshoot by repeating Steps 3 and 4. You may also want to ask your
instructor to confirm that you are using an Ethernet crossover cable.
Step 5: Configure IP settings
a. Configure the logical addresses for the two PCs so that they are able to
communicate using TCP/IP. On one of the PCs, go to the Control Panel,
double click the Network Connections icon, and then right click the
connected Local Area Connection icon. Choose Properties from the pulldown menu.
b. Using the scroll bar in the Local Area Connection Properties window,
scroll down to highlight Internet Protocol (TCP/IP). Click the
Properties button.

14

Bahria University, Islamabad

Data Communication and Computer Networks

c. Select the Use the following IP address radio button and enter the
following information:
IP Address

192.168.1.1

Subnet
Mask

255.255.255.
0

15

Bahria University, Islamabad

Data Communication and Computer Networks

d. Click OK, which will close the Internet Protocol (TCP/IP) Properties
window. Click the Close button to exit the Local Area Connection
Properties window.
e. Repeat steps 5a 5d for the second PC using the following information:
IP Address 192.168.1.2
Subnet Mask 255.255.255.0
Step 6: Verify IP connectivity between the two PCs
NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must
be disabled temporarily on both
PCs. Windows Firewall should be re-enabled after the tests have been
completed.
a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select
Control Panel, and double-click Network Connections.
b. Right-click the Local Area Connection icon and select Properties. Click the
Advanced tab. Locate and click the Settings button.
c. Make a note of whether the firewall settings are ENABLED (ON) for the
Ethernet port or DISABLED (OFF) for the Ethernet port.
____________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio
button to disable the firewall. The setting will be re-enabled in a later step.
Click OK in this dialog box and the following to apply this setting.

16

Bahria University, Islamabad

Data Communication and Computer Networks

e. Now that the two PCs are physically connected and configured correctly with
IP addresses, we need to make sure they communicate with each other. The
ping command is a simple way to accomplish this task. The ping command
is included with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows
command prompt window will appear as shown in the figure below.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping
will verify the IP connectivity. It should produce results similar to those shown
in here.

h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.
i. Close the Windows command prompt window on both PCs.
Step 7: Verify connectivity using My Network Places
a. A PC can share its resources with other PCs on the network. PCs with shared
resources should be visible through My Network Places. On PC1, go to
Start, click My Network Places, and then click View workgroup
computers in the left panel.

17

Bahria University, Islamabad

Data Communication and Computer Networks

b. Do you see an icon for the other PC in your peer-to-peer network?


_______________________
c. What is the name of the other PC?
________________________________________________
d. Is it the same name you recorded in Step 2?
_________________________________________
e. Perform Step 7a on the second PC.
f. Close any open windows.
Step 8: (Optional Use only if the Firewall was originally ENABLED) Reenable the firewall
a. If you disabled the Windows Firewall in Step 6, click Start, select Control
Panel, and open the Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click
the Advanced tab. Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab
began), click the On radio button to enable the firewall. Click OK in this
dialog box and the following one to apply this setting.

18

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 04:
Building and testing Switch based network
Objectives:
To familiarize students with the design and construction of a simple network using
the network devices Switch, and also with the tools that can be used to check the
network.
PROBLEM:
Designing of network using network devices

Tasks:
1. Connect five computers through switch with each other.
2. Assign static private IP addresses to all computers using same procedure in
previous lab
3. Ping all computers with each other (1,2), (1,3), (1,4), (1,5), (2,1), (2,3), (2,4),
(2,5), (3,1), (3,2), (3,4), (3,5), (4,1), (4,2), (4,3), (4,5)
4. Share the desktop through switch.
19

Bahria University, Islamabad

Data Communication and Computer Networks

5. Connect internet wire to the switch, you will find that all computers will have
internet connection. Check internet availability in all computers. Since DHCP
Server is installed in BU. [A DHCP Server assigns IP addresses to client
computers. This is very often used in enterprise networks to reduce
configuration efforts. All IP addresses of all computers are stored in a
database that resides on a server machine.]

Equipment:
1. Straight Through Cable
2. Hub
3. Switch
Procedure:
1.

Connect the PCs to Hub/Switch using the straight-through cable.

2.

Make necessary IP settings

3.

Check the network using the DOS prompt command, PING

Measurements:
1. PING command must work on the network

20

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 05:
Introduction to Router and establishing a console
session Using HyperTerminal
Introduction:
What is Router?
Router is a device that forwards data packets along networks. A router is connected
to at least two networks, commonly two LANs or WANs or a LAN and its ISP's
network. Routers are located at gateways, the places where two or more networks
connect.
What is Routing?
Routing refers to the process of choosing a path over which to send packets.
Computer panel:
You can see the COM ports (DB-9 connector) on the back side of CPU.

21

Bahria University, Islamabad

Data Communication and Computer Networks

Router Pannel:
Console Port is for direct connection to the router, to be able to configure router.
Serial Port is for WAN connectivity
Ethernet/ Fastethernet Port is for LAN connectivity
Auxiliary Port is for remote connectivity via modem. This port is used to remotely access the router.

Router back panel 1

Roll over cable


The two sides of the Rollover/Console Cable have two different connectors.
1) DB-9 connector (9 pin female side of console cable)
2) RJ-45 connector (8 pin connector)
Rollover cable (also known as Cisco console cable or a Yost cable) is a cable
that is often used to connect a computer terminal to a Routers console port. The
cable normally comes in light blue color to help distinguish it from other types of
networking cables.

22

Bahria University, Islamabad

Data Communication and Computer Networks

Procedure:STEP 1
Plug DB-9 connector (9 ping female side of console cable) into one of the COM ports
of the CPU and plug the RJ-45 connector (8 ping connector) into console port of the
Router.
STEP 2
You need to open HYPERTERMINAL Program by clicking on
Start > Programs > Accessories > Communications > HyperTerminal
In Location Information windows, input necessary details and click on OK button.
You may put dummy information.
In Connection Description window, type any name for the connection and click on OK button.

23

Bahria University, Islamabad

Data Communication and Computer Networks

In the Connect To window, select appropriate COM port (the COM port number of the PC where you
have plugged the Routers console cable) and Click OK to continue.

In the COM Properties window, Click on Restore Defaults button and then click OK to continue.

24

Bahria University, Islamabad

Data Communication and Computer Networks

Press Enter to get access to the Routers CLI.

NOTE: You will not find this Program in Windows 7. So you should either copy the
HyperTerminal Program from windows XP or use other programs to get access to
the Router. Other famous programs are TeraTerm, Putty, SecureCRT.

Very Important Router Parts


ROM (Read Only Memory)
This is a form of permanent memory used by the Router to store:

The "Power-On Self Test" that checks the Router on boot up.

The "Bootstrap Startup Program" that gets the Router going.


A very basic form of the Cisco IOS software (to change the ROM you have to
remove and replace chips).

Flash Memory

25

Bahria University, Islamabad

Data Communication and Computer Networks

An Electronically Erasable and Re-Programmable memory chip.


The "Flash" contains the full Operating System, or "Image". This allows you to
upgrade the OS without removing chips.

NVRAM (Non-Volatile RAM)


This stores your Router's "Startup Configuration File". Similar to Flash memory, this
retains data even when power is lost.
RAM (Random Access Memory)
This is a regular computer memory chips. These are the working memory of the
Router, and provide Caching, Packet Buffering, and hold Routing Tables. The RAM is
also where the Running Operating System lives when the Router is on. RAM loses
all its data when reset or powered off.
Interfaces
Interfaces - Where the Router meets the Outside World. Basically your Router will
have Serial interfaces, which are mostly used to connect long-distance as in a WAN
(Wide- Area Network)

LAB 06:
Router command line interface (CLI) fundamentals

Introduction:
In this experiment basic router commands are introduced to students so then that
will be used for other troubleshooting purposes.

Objectives:
To familiarize students with Router Command Line Interface

Preparation:
26

Bahria University, Islamabad

Data Communication and Computer Networks

Simple operating Instructions:


Ctrl-A: Moves the cursor to the beginning of the line.
Ctrl-E: Moves the cursor to the end of the line.
Esc-B: Moves the cursor back one word
Esc-F: Moves the cursor forward one word
Ctrl-B: Moves the cursor back one character
Ctrl-F: Moves the cursor forward one character
Ctrl-D: Deletes the single character
Backspace: Removes one character to the left of the cursor
Ctrl-R: Redisplays a line.
Ctrl-U: Erases a line
Ctrl-w: Erases a Word
Ctrl-Z: Ends configuration mode and returns to the EXEC mode
Tab: Completes a partially entered command if enough characters have been
entered to make it unambiguous

CLI Command Modes


The Cisco IOS supports two levels of access to the CLI: user EXEC mode and
privileged EXEC mode.
1. user EXEC mode:
When a router or other Cisco IOS device is powered up, the access level defaults to
user EXEC mode. This mode is indicated by the command line prompt:
Router>
Commands that can be executed in user EXEC mode are limited to obtaining
information about how the device is operating, and troubleshooting using some
show commands and the ping and traceroute utilities.

27

Bahria University, Islamabad

Data Communication and Computer Networks

2. privileged EXEC mode:


To enter commands that can alter the operation of the device requires privileged
level access. Enable the privileged EXEC mode by entering enable or en at the
command prompt and pressing Enter.
The command line prompt changes to reflect the mode change. The prompt for
privileged EXEC mode is:
Router#
To disable the privileged mode and return to user mode, enter disable at the
command prompt.
Both modes can be protected with a password, or a username and password
combination.

Various configuration modes are used to set up a device. Configuring a Cisco IOS
device begins with entering privileged EXEC mode. From privileged EXEC mode, the
user can access the other configuration modes.
In most cases, commands are applied to the running configuration file using a
terminal connection. To use these commands, the user must enter global
configuration mode.

28

Bahria University, Islamabad

Data Communication and Computer Networks

3. Global Configuration Mode:


To enter global configuration, type the command configure terminal or config t.
Global configuration mode is indicated by the command line prompt:
Router(config)#
Any commands entered in this mode take effect immediately and can alter the
operation of the device.
From global configuration mode, the administrator can enter other sub-modes.
4. Interface Configuration mode
Interface configuration mode is used to configure LAN and WAN interfaces. To
access interface configuration mode, from global configuration type the command
interface [type] [number] (eg.interface fastethernet 0/0). Interface
configuration mode is indicated by the command prompt:
Router(config-if)#

29

Bahria University, Islamabad

Data Communication and Computer Networks

Help command
The context-sensitive help feature is especially useful when configuring a device.
Entering help or the ? at the command prompt displays a brief description of the
help system.
Router# help

Or

Router# ?

if an incorrect command is entered, the error message would read:


% Invalid input detected

Basic configuration
The initial configuration of a Cisco IOS device involves configuring the device name
and then the passwords that are used to control access to the various functions of
the device.
A device should be given a unique name as one of the first configuration tasks. This
task is accomplished in global configuration mode with the following command.
1) Host name
Router(config)# hostname [name]
When the Enter key is pressed, the prompt changes from the default host name,
which is Router, to the newly configured host name.
The next configuration step is to configure passwords to prevent access to the
device by unauthorized individuals.
2) Password and secret
The enable password and enable secret commands are used to restrict access to
privileged EXEC mode, preventing unauthorized users from making configuration
changes to the router.

30

Bahria University, Islamabad

Data Communication and Computer Networks

Router(config)# enable password [password]


Router(config)# enable secret [password]
The difference between the two commands is that the enable password is not
encrypted by default. If the enable password is set, followed by the enable secret
password, the enable secret command overrides the enable password command.

3).Banners
A banner is text that a user sees when initially logging on to the router.
There are two types of banners: message-of-the-day (MOTD) and login information.
To configure the banners, the commands are banner motd and banner login. For
both types, a delimiting character, such as a #, is used at the beginning and at the
end of the message.
Router(config)# banner motd # welcome to this area #

4).Configure interface
Configuring an interface on the router must be done in global configuration mode.
Following are commands to configure fastethernet and serial

31

Bahria University, Islamabad

Data Communication and Computer Networks

Show commands
The Cisco IOS CLI includes show commands that display relevant information about
the configuration and operation of the device.
Network technicians use the show commands extensively for viewing configuration
files, checking the status of device interfaces and processes, and verifying the
device operational status. The status of nearly every process or function of the
router can be displayed using a show command. Some of the more popular show
commands are:

show running-config
to show running configuration
show startup-config
to show startup configuration
show interfaces
to show interface setting e.g. IP and subnet mask
show ip route
to show routing table of router
show history
to show history of command which enter in current
session

Task:
1) Change host name
2) Set Banner
3) Assign IP to port 0/0 ,0/1 , 0/2
4) Assign IP to Serial port 0/0/0 clockrate 9600

32

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 07:
Building and testing a Router based network

Objectives

Configure the device host name for a router.


Configure Ethernet and serial interfaces, including description.
Configure a message of the day (MOTD) banner.
Verify connectivity between hosts and routers.

33

Bahria University, Islamabad

Data Communication and Computer Networks

Required Resources
The following resources are required:

Two routers, each with an Ethernet and serial interface.


Two Windows XP computers with HyperTerminal installed
Two straight-through Category 5 Ethernet cables (H1 to S1 and S1 to R2)
Crossover Category 5 Ethernet cable (H2 to R2)
Null serial cable (R1 to R2)
Console cables (H1 ro R1 and H2 to R2)
Access to the host H1 and H2 command prompt
Access to the host H1 and H2 network TCP/IP configuration

From each host computer, start a HyperTerminal session to the attached router.
Step 1: Configure host computer IP settings.
a. Make sure that the host computers are connected according to the
topology diagram.
b. Configure the hosts with static IP addresses using the following settings.
H1 attached to the S1 switch:

34

Bahria University, Islamabad

Data Communication and Computer Networks

IP address: 172.16.0.2
Subnet mask: 255.255.0.0
Default gateway: 172.16.0.1
H2 attached to R2 directly:
IP address: 172.18.0.2
Subnet mask: 255.255.0.0
Default gateway: 172.18.0.1
Step 2: Log in to each router and configure the basic settings.
Note: Perform each step for both routers.
a. Configure a host name for each of the two routers.
Router>enable
Router#configure terminal
Router(config)#hostname R1
Note: Use R2 for the name of the second router.
b. Configure a message-of-the-day (MOTD) banner using the banner motd
command. When a user connects to the router, the MOTD banner appears
before the login prompt. In this example, the number sign (#) is used to start
and end the message. The # is converted to ^C when the running-config is
displayed.
R1(config)#banner motd #Unauthorized Use Prohibited#
Step 3: Configure the serial interface on R1.
In global configuration mode, configure serial interface 0/0/0 on R1. See the
Router Interface Summary table at the end of the lab for the proper
designation of the serial interface on the router that you are using. Because
the R1 serial 0/0/0 interface is acting as the DCE for the WAN link, it is
necessary to configure the clock rate. When configuring an interface, always
use the no shutdown command to enable it.
R1(config)#interface serial 0/0/0
R1(config-if)#description WAN link to R2
R1(config-if)#ip address 172.17.0.1 255.255.0.0
R1(config-if)#clock rate 64000
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config-if)#exit
Step 4: Configure the serial interface on R2.
In global configuration mode, configure serial 0/0/0 on router R2. See the
Router Interface Summary table at the end of the lab for the proper
designation of the serial interface on the router that you are using.

35

Bahria University, Islamabad

Data Communication and Computer Networks

R2(config)#interface serial 0/0/0


R2(config-if)#description WAN link to R1
R2(config-if)#ip address 172.17.0.2 255.255.0.0
R2(config-if)#no shutdown
R2(config-if)##exit
R2(config)#exit
Step 5: Verify that the serial connection is functioning.
a. Use the ping command to test connectivity to the serial interface of the
other router. From R1, ping the R2 router serial interface.
R1#ping 172.17.0.2
Does the ping work? _______
b. From R2, ping the R1 router serial interface.
R2#ping 172.17.0.1
Step 6: Configure the Fast Ethernet interface on R1.
In global configuration mode, configure the Fast Ethernet 0/0 interface on
router R1. See the Router Interface Summary table at the end of the lab for
the proper designation of the Ethernet interface on the router that you are
using.
R1(config)#interface FastEthernet 0/0
R1(config-if)#description R1 LAN Default Gateway
R1(config-if)#ip address 172.16.0.1 255.255.0.0
R1(config-if)#no shutdown
Step 7: Configure the Fast Ethernet interface on R2.
In global configuration mode, configure the Fast Ethernet 0/0 interface on R2.
Refer to the Router Interface Summary table at the end of the lab for the
proper designation of the Ethernet interface on the router that you are using.
R2(config)#interface FastEthernet 0/0
R2(config-if)#description R2 LAN Default Gateway
R2(config-if)#ip address 172.18.0.1 255.255.0.0
R2(config-if)#no shutdown
R2(config-if)#exit

36

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 08
Retrieving configurations from NVRAM and TFTP
server
Introduction
Any configuration that we type is stored in RAM (Running configuration) which has
the disadvantage in the sense that it is volatile, i.e data can be wash out in case of
any failure of the main supply. For the sake of storing the data we store the

37

Bahria University, Islamabad

Data Communication and Computer Networks

configuration into NVRAM (Running configuration) of the router / switch or save it


into the TFTP server.
Objective
To familiarize students with the concepts and procedure to store and then retrieve
configuration from NVRAM and TFTP server.

Problem
Storing and retrieving configurations from NVRAM and TFTP server.
Equipments
1. Router,
2. Necessary cables
3. TFTP server
Procedure
1. To store the data from DRAM into NVRAM, the procedure is given below:

38

Bahria University, Islamabad

Data Communication and Computer Networks

Router # copy running-config startup-config


Detination filename [ startup-config]?

Press enter

Router #
2. Now the data from DRAM into the TFTP server is stored as:
Router # copy running-config tftp
Address or name of remote host []? 192.168.1.2
Destination filename [Router-config]? File Bahria
Router #
3. The data from NVRAM into the TFTP server is stored as:
Router # copy running-config tftp
Address or name of remote host [] ? 192.168.1.2
Destination filename [Router-config] ? file-Bahria

Task:
1)
2)
3)
4)
5)
6)
7)

Draw above network diagram


Assign IP to all ports of Router and PC
Assign IP to TFTP serve
Copy running configuration of Router to TFPT server
Restart router
Establish connection of router to TFTP server
Copy configuration from TFTP server to router startup configuration

LAB 9:
Building and Testing VLAN
Introduction:
A VLAN is a switched network that is logically segmented by functions, project
teams, or applications without regard to the physical location of the users. For
example several end stations might be grouped as a department, such as
engineering or accounting. When the end stations are physically located close to
one another, you can group them into a LAN segment. If any of the end stations are
in different buildings (not the same physical LAN segment), you can group them
into a VLAN.

39

Bahria University, Islamabad

Data Communication and Computer Networks

Objectives:
To familiarize students with the design and construction of VLAN, and also with the tools that can be used
to check the network.

PROBLEM:
Designing of VLAN

Equipment:
1. Straight Cable
2. Switch

Procedure:
Step 1: Create VLANs on switch S1.
Use the vlan vlan-id command in global configuration mode to add a VLAN to
switch S1. There are four VLANS configured for this lab: VLAN 2 (Student);
VLAN 3 (Teacher); VLAN 4 (Management); and VLAN 5 (Staff). After you create
the VLAN, you will be in vlan configuration mode, where you can assign a
name to the VLAN with the name vlan name command.

40

Bahria University, Islamabad

Data Communication and Computer Networks

S1(config)#vlan2
S1(configvlan)#nameStudent
S1(configvlan)#vlan3
S1(configvlan)#nameTeacher
S1(configvlan)#vlan4
S1(configvlan)#namemanagement
S1(configvlan)#vlan5
S1(configvlan)#namestaff
S1(configvlan)#end
S1#

Step 2: Verify that the VLANs have been created on S1.


Use the show vlan brief command to verify that the VLANs have been created.
S1#showvlanbrief
VLANNameStatusPorts

1defaultactiveFa0/1,Fa0/2,Fa0/4,Fa0/5
Fa0/6,Fa0/7,Fa0/8,Fa0/9
Fa0/10,Fa0/11,Fa0/12,Fa0/13
Fa0/14,Fa0/15,Fa0/16,Fa0/17
Fa0/18,Fa0/19,Fa0/20,Fa0/21
Fa0/22,Fa0/23,Fa0/24,Gi0/1
Gi0/2
2studentactive
3teacheractive
4managementactive
5staffactive

Step 3: Assign switch ports to VLANs


Refer to the port assignment table on page 1. Ports are assigned to VLANs in
interface configuration mode, using the switchport access vlan vlan-id command.
You can assign each port individually or you can use the interface range command
to simplify this task, as shown here. Save your configuration when done.
S1(config)#interfacerangefa0/14
S1(configifrange)#switchportaccessvlan2
S1(configifrange)#interfacerangefa0/58
S1(configifrange)#switchportaccessvlan3
S1(configifrange)#interfacerangefa0/912
S1(configifrange)#switchportaccessvlan4
S1(configifrange)#interfacerangefa0/1316
S1(configifrange)#switchportaccessvlan5
S1(configifrange)#end
S1#copyrunningconfigstartupconfig
Destinationfilename[startupconfig]?[enter]
Buildingconfiguration...
[OK]

41

Bahria University, Islamabad

Data Communication and Computer Networks

Step 4: Assign IP to all PC


Assign IP address to PC with same network address in same VLAN
Step 5: verify connection
Use command prompt to verify connection. Apply ping command to computer in
same VLAN and in different VLAN. Which one is not successful?

LAB 10:
Configuring VTP in switch domain network

Introduction:
You can configure a switch to operate in any one of these VTP modes:

42

Bahria University, Islamabad

Data Communication and Computer Networks

Server

-In VTP: server mode, you can create, modify, and delete VLANs
and specify other configuration parameters, such as VTP version and VTP
pruning, for the entire VTP domain. VTP servers advertise their VLANS
configuration to other switches in the same VTP domain and synchronize
their VLAN configuration with other switches based on advertisements
received over trunk links .VTP server is the default mode.
Client-VTP :client behave the same way ass VTP servers, but you cannot
create, change, or delete VLANS on a VTP client.

Transparent-VTP:

transport switches do not participate in VTP. A VTP


transport switch does not advertise its VLAN configuration and does not
synchronize its VLAN configuration based on received advertisement, but
transparent switches do forward VTP advertisements that they receive out
their trunk ports in VTP Version 2.
Off

(configurable only in CatOS switches) In the three described modes,


VTP advertisements are received and transmitted as soon as the switch
enters the management domain state. In the VTP off mode, switches behave
the same as in VTP transport mode with the exception that VTP
advertisements are not forwarded.
VTP V2
VTP Vr 2 is not much different than VTP VI .The major difference is that VTP
V2 introduces support for Token Ring VLANS. If you use Token Ring VLANS,
you must enable VTP V2.0therwise, there is no reason to use VTP V2.
VTP Password
If you configure a password for VTP, you must configure the password on all
switches in the VTP domain. The password must be the same password on all
those switches. The VTP password that you configure is translated by
algorithm into a 16-byte word (MD5 value) that is carried in all summaryadvertisement VTP packets.
VTP Pruning
VTP ensures that the all switches in the VTP domain are aware of all VLANs.
However, there are occasions when VTP can create unnecessary traffic. VTP
pruning takes effects several seconds after you enable it. VTP pruning does
not prune traffic from VLANs that are pruning- ineligible. VLAN 1 and VLANs
1002 to 1005 are always pruning- ineligible: traffic from these VLANs cannot
be pruned. Extended-range VLANs (VLAN IDs greater than 1005) are also
pruning-ineligible.

Objectives:
The purpose for performing this experiment is to establish a central management
mechanism for spreading the configured VLANS throughout the switched domain
while it is configured only once in a server switch.

43

Bahria University, Islamabad

Data Communication and Computer Networks

PROBLEM:
VTP Security Configuring

Equipment:
1. Atleast two switches,
2. and a number of PC'

LAB 11:
Configuring RIP routing protocol between two routers

Introduction:

44

Bahria University, Islamabad

Data Communication and Computer Networks

The Routing Information Protocol (RIP) is a relatively old, but still commonly used,
interior gateway protocol (IGP) created for use in small, homogeneous networks. It
is a classical distance-vector routing protocol. RIP is documented in RFC 1058.
RIP uses broadcast User Datagram Protocol (UDP) data packets to exchange routing
information. The Cisco IOS software sends routing information updates every 30
seconds; this process is termed advertising. If a router does not receive an update
from another router for 180 seconds or more, it marks the routes served by the nonupdating router as being unusable. If there is still no update after 240 seconds, the
router removes all routing table entries for the no updating router.
The metric that RIP uses to rate the value of different routes is hop count. The hop
count is the number of routers that can be traversed in a route. A directly connected
network has a metric of zero; an unreachable network has a metric of 16. This small
range of metrics makes RIP an unsuitable routing protocol for large networks.
If the router has a default network path, RIP advertises a route that links the router
to the pseudo network 0.0.0.0. The network 0.0.0.0 does not exist; RIP treats 0.0.0.0
as a network to implement the default routing feature. The Cisco IOS software will
advertise the default network if a default was learned by RIP, or if the router has a
gateway of last resort and RIP is configured with a default metric.
RIP sends updates to the interfaces in the specified networks. If an interface's
network is not specified, it will not be advertised in any RIP update.

Objectives:
To enable communication between two hosts that are connected not to a single
router but with the different routers

PROBLEM:

Establish link using RIP protocol

Equipment:
1. Four routers
2. Four switches
3. Four PCs

45

Bahria University, Islamabad

Data Communication and Computer Networks

Procedure:
Step1: Assign IP address on all ports of R1, R2, R3 and R4
Assign IP addresses to all port of Router shown in figure above.
Step2: Configure RIP protocol on all router
ExampleName#config
ExampleName(config)#router rip
ExampleMame(config-router)#network aa.bb.cc.dd
ExampleName(config-router)# network ee.ff.gg.hh
ExampleName(config-router)#
Step3: Assign IP address to all computer
Assign IP address to computer with same network that assign to their
respective port
Step4: confirm connection
Use ping command to confirm connection of each PC.
Step5: check routing protocol
ExampleName(config)# show ip route

46

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 12:
Configuring OSPF routing protocol between two routers

Introduction:
Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol
(IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet
Engineering Task Force (IETF). The working group was formed in 1988 to design an
IGP based on the Shortest Path First (SPF) algorithm for use in the Internet. Similar
to the Interior Gateway Routing Protocol (IGRP), OSPF was created because in the
mid-1980s, the Routing Information Protocol (RIP) was increasingly incapable of
serving large, heterogeneous internetworks. This chapter examines the OSPF
routing environment, underlying routing algorithm, and general protocol
components.
OSPF has two primary characteristics. The first is that the protocol is open, which
means that its specification is in the public domain. The OSPF specification is
published as Request for Comments (RFC) 1247. The second principal characteristic
is that OSPF is based on the SPF algorithm, which sometimes is referred to as the
Dijkstra algorithm, named for the person credited with its creation.
OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LS As) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables is included in
OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF
algorithm to calculate the shortest path to each node.
As a link-state routing protocol, OSPF contrasts with RIP and IGRP, which are
distance- vector routing protocols. Routers running the distance-vector algorithm
send all or a portion of their routing tables in routing-update messages to their
neighbors.
Objectives:
To enable communication between two hosts that are connected not to a single
router but with the different routers in such a way that the reflection of the network
change is sudden and not instantaneous.

Procedure:
Step1: Assign IP address on all ports of R1, R2, R3 and R4
Assign IP addresses to all port of Router shown in figure above.

47

Bahria University, Islamabad

Data Communication and Computer Networks

Step2: Configure OSPF protocol on all router


ExampleName#config
Example Name(config)#router OSPF process 1
Example Name(config-router)#network 192.168.1.0
0.0.0.7
area 0
Example Name(config-router)#network 192.168.1.8
0.0.0.7
area 1
Example Name(config-router)#
Step3: Assign IP address to all computer
Assign IP address to computer with same network that assign to their
respective port
Step4: confirm connection
Use ping command to confirm connection of each PC.
Step5: check routing protocol
ExampleName(config)# show ip route

48

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 13:
Learning packet motion through DHCP server in a network using packet tracer

Introduction:
DHCP was created by the Dynamic Host Configuration Working Group of the Internet Engineering Task
Force (IETF; a volunteer organization which defines protocols for use on the Internet). As such, it's
definition is recorded in an Internet RFC and the Internet Activities Board (IAB) is asserting its status as to
Internet Standardization. As of this writing (June 1998), DHCP is an Internet Draft Standard Protocol and
is Elective. BOOTP is an Internet Draft Standard Protocol and is recommended. For more information on
Internet standardization, see RFC2300 (May 1998) DHCP is based on BOOTP and maintains some
backward compatibility. The main difference is that BOOTP was designed for manual pre-configuration of
the host information in a server database, while DHCP allows for dynamic allocation of network
addresses and configurations to newly attached hosts. Additionally, DHCP allows for recovery and

49

Bahria University, Islamabad

Data Communication and Computer Networks

reallocation of network addresses through a leasing mechanism. RARP is a protocol used by Sun and
other vendors that allows a computer to find out its own IP number, which is one of the protocol
parameters typically passed to the client system by DHCP or BOOTP. RARP doesn't support other
parameters and using it, a server can only serve a single LAN. DHCP and BOOTP are designed so they
can be routed

Objectives
1
2
3

Configure a customer router for DHCP using the Cisco IOS CLI.
Configure a DHCP client.
Verify DHCP functionality

Step 1: Restart the Customer router to remove the DHCP commands added by SDM.
a. Because you did not save the DHCP configuration created using SDM to NVRAM, restarting the router
restores the basic configuration created in Task 1, Step 2. On the Customer router, issue the reload
command.
b. When prompted to save the configuration, respond with no.
c. When prompted with Proceed with reload? [confirm], press Enter.
d. Press Enter at the Press RETURN to get started! prompt. You should now see the Customer>
prompt.

Step 2: Check the host DHCP client H2 IP configuration.


a. Open a command prompt window on H2 and issue the ipconfig /release and ipconfig /renew
commands. Because there is no DHCP server currently configured, it may take a while to timeout.
b. At the command prompt, now issue the ipconfig command. What is the IP address and subnet mask
for H2? ____________________________________________________________________________

Step 3: Configure the DHCP server excluded addresses on the Customer router.
To prevent certain addresses from being assigned they must be excluded from the pool. This
includes the IP address of the router Fast Ethernet 0/0 interface (the default gateway). In this lab,
also exclude addresses from 192.168.1.101 through 192.168.1.254 to reserve them for other
purposes, such as servers and printers, which need to have a fixed IP address.
a. To exclude addresses, issue the ip dhcp excluded-address command.
Customer(config)#ip dhcp excluded-address 192.168.1.1
Customer(config)#ip dhcp excluded-address 192.168.1.101
192.168.1.254
b. Why do you want to exclude addresses before the DHCP pool is even created?
__________________________________________________________________________
____
__________________________________________________________________________
____

50

Bahria University, Islamabad

Data Communication and Computer Networks

Step 4: Configure the DHCP pool.


On the Customer router, configure a DHCP pool for the internal clients.
Customer(config)#ip dhcp pool INTERNAL
Customer(dhcp-config)#network 192.168.1.0 255.255.255.0
Customer(dhcp-config)#domain-name abc-widgets.inc
Customer(dhcp-config)#default-router 192.168.1.1
Customer(dhcp-config)#dns-server 192.168.1.200

Step 5: Test the DHCP pool for H2.


a. On H2, open a command prompt and issue the ipconfig /release and ipconfig /renew commands.
b. On H2, issue the ipconfig /all command.
c. What IP address is issued to H2? __________________________
d. What is the subnet mask of H2? __________________________.
e. What is the default gateway of H2? __________________________
f. What is the connection-specific DNS suffix (domain name) of host H2? ________________________
g. What is the DHCP server IP address? __________________________
h. What is the DNS server IP address? __________________________
i. What is the MAC address of H2? ____________________________
j. From H2, ping the default gateway (the router Ethernet interface). Does the ping succeed? _______
Troubleshoot as necessary, and do not proceed until the ping is successful.

Step 6: Test the DHCP pool for H1.


a. On H1, choose Start > Settings > Control Panel > Network Connections > Local Area Connection
and change the IP configuration from static to dynamic to make H1 a DHCP client like host H2. Click the
Properties button, and then click Internet Protocol (TCP/IP) Properties. Select Obtain an IP address
automatically and Obtain a DNS server address automatically. Click OK to exit the configuration
window.
b. Open a command prompt on H1 and issue the ipconfig /release and ipconfig /renew commands.
Because there is no DHCP server currently configured, it may take a while to timeout.
c. At the command prompt, now issue the ipconfig command.
d. What IP address is issued to H1? __________________________

Step 7: Display the DHCP binding on the Customer router.


a. To see the IP address and host hardware (MAC) address combination assigned by the DHCP server,
issue the show ip dhcp binding command on the Customer router.
Customer#show ip dhcp binding
IP address Client-ID/ Lease expiration Type
Hardware address
192.168.1.2 0100.0bdb.04a5.cd Feb 22 2008 11:19 AM Automatic
192.168.1.3 0100.07e9.63ce.53 Feb 22 2008 11:27 AM Automatic
b. Do the hardware addresses displayed match those recorded for hosts H1 and H2 in Task 1, Step 1?
______

51

Bahria University, Islamabad

Data Communication and Computer Networks

c. On the Customer router, display the characteristics of the DHCP pool using the show ip dhcp pool
command.
Customer#show ip dhcp pool
Pool INTERNAL :
Utilization mark (high/low) : 100 / 0
Subnet size (first/next) : 0 / 0
Total addresses : 254
Leased addresses : 2
Pending event : none
1 subnet is currently in the pool :
Current index IP address range Leased addresses
192.168.1.4 192.168.1.1 - 192.168.1.254 2
d. How many addresses have been leased? ______
e. In the output from the command, what do you think Current Index means?
________________________________________________________________________________

52

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 14:
Learning packet motion through DNS server in a network using packet tracer

Introduction:
The Domain Name System (DNS) is a hierarchical naming system for computers,
services, or any resource participating in the Internet. It associates various
information with domain names assigned to such participants. Most importantly, it
translates domain names meaningful to humans into the numerical (binary)
identifiers associated with networking equipment for the purpose of locating and
addressing these devices world-wide. An often used analogy to explain the Domain
Name System is that it serves as the "phone book" for the Internet by translating
human-friendly computer hostnames into IP addresses. For example, www.example.com
translates to 208.77.188.166.
The Domain Name System makes it possible to assign domain names to groups of
Internet users in a meaningful way, independent of each user's physical location.
Because of this, World-Wide Web (WWW) hyperlinks and Internet contact
information can remain consistent and constant even if the current Internet routing
arrangements change or the participant uses a mobile device. Internet domain
names are easier to remember than IP addresses such as 208.77.188.166(IPv4) or
2001:db8:lf70::999:de8:7648:6e8 (IPv6). People take advantage of this when they
recite meaningful URLs and e-mail addresses without having to know how the
machine will actually locate them.
The Domain Name System distributes the responsibility of assigning domain names
and mapping those names to IP addresses by designating authoritative name
servers for each domain. Authoritative name servers are assigned to be responsible
for their particular domains, and in turn can assign other authoritative name servers
for their sub-domains. This mechanism has made the DNS distributed, fault tolerant,
and helped avoid the need for a single central register to be continually consulted
and updated

Objectives

Observe the conversion of a URL to an IP address.


Observe DNS lookup using the nslookup command.

Background / Preparation
Domain Name System (DNS) is invoked when you type a Uniform Resource Locator
(URL), such as

53

Bahria University, Islamabad

Data Communication and Computer Networks

http://www.cisco.com, into a web browser. The first part of the URL describes
which protocol is being used.
Common ones are HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer
Protocol over Secure
Socket Layer), and FTP (File Transfer Protocol).
DNS uses the second part of the URL, which in this example is www.cisco.com. DNS
translates the domain name (like www.cisco.com) to an IP address in order to allow
the source host to reach the destination host.
Work in pairs to complete this lab.
The following resources are required:

Windows-based computer with Internet connectivity

Access to the Run command


Step 1: Observe DNS conversion
a. Click the Start button, select Run, type cmd, and then click OK. The
command prompt window appears.
b. At the command prompt, type ping www.cisco.com. The computer needs to
translate www.cisco.com into an IP address so it knows where to send the
Internet Control Message Protocol (ICMP) packets. Ping is a type of ICMP
packet.
c. The first line of the output shows www.cisco.com converted to an IP address
by DNS. You should be able to see the effect of DNS even if your school has a
firewall that prevents pinging, or if Cisco has prevented people from pinging
their web server.

d. Which IP address is shown on the screen?


_________________________________________
e. Is it the same as the one shown in the figure? _________ Why do you think this
occurred?
____________________________________________________________________________
f. Work together with another student and discuss one or two other instances
(besides the ping command) in which the computer would use DNS.
____________________________________________________________________________
Step 2: Verify DNS operation using the nslookup command
a. At the command prompt, type the nslookup command.

54

Bahria University, Islamabad

Data Communication and Computer Networks

b. What is the default DNS server being used?


_________________________________________
c. Notice how the command prompt changed. This is the NSLOOKUP prompt.
From this prompt, you can enter commands related to DNS.
d. At the prompt, type ? to see a list of all the available commands that you can
use in NSLOOKUP mode.
e. Write three commands that you can use with NSLOOKUP.
_____________________________
____________________________________________________________________________
____________________________________________________________________________
f. At the NSLOOKUP prompt, type www.cisco.com.
g. What is the translated IP address?
________________________________________________
h. Is it the same as the IP address shown with the ping command?
_________________________
i. At the prompt, type the IP address of the Cisco web server that you just
found. You can use NSLOOKUP to get the domain name of an IP address if
you do not know the URL. Using the previous procedures, find an IP address
associated with www.google.com.
____________________________________________________________________________
Step 3: Identify mail servers using the nslookup command
a. At the prompt, type set type=mx to have NSLOOKUP identify mail servers.
b. At the prompt, type www.cisco.com.
c. What is the primary name server, the responsible mail address, and the
default Time to Live (TTL)?
______________________________________________________________________________
__________________________________________________________________________
d. At the prompt, type exit to return to the regular command prompt.
e. At the prompt, type ipconfig /all.
f. Write the IP addresses of all the DNS servers that your school uses
___________________________________________________________________________
g. Type exit to close the command prompt window.
Step 4: Reflection
a. If your school did not have a DNS server, what effect would this have on your
use of the Internet?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. Some companies do not dedicate a single server for DNS. Instead, the DNS
server provides other functions as well. Which functions do you think might
be included on a DNS server? Use the ipconfig/all command to help you with
this.
____________________________________________________________________________

55

Bahria University, Islamabad

Data Communication and Computer Networks

LAB 15:
Demonstrating a full fledge campus area network

Objectives:
The objective of performing this lab is to demonstrate student how a real network
works in a practical environment. This very lab is the collection summary of all the
previous labs and is a sort of assignment for students

56

Bahria University, Islamabad

Data Communication and Computer Networks

57

You might also like