Вы находитесь на странице: 1из 20

List of Experiment ACN 1. Introduction to networking devices. 2.

Study of Ciscos Internetworking Operating System (IOS) modes and Command Line Interface (CLI) 3. Implementation of Static routing 4. Implementation of RIP routing 5. Implementation of OSPF routing 6. Installation of web Server 7. Installation of DHCP Server 8. Installation of DNS Server with WEB server and DHCP server 9. Study of ipconfig, ping and tracert commands 10. Packet grab and analysis tool: WIRESHARK

Experiment No. 6 Aim: Installation of web Server. Theory: Web server helps to deliver content that can be accessed through the internet. With web server we can access content like web pages, other data and information from anywhere as long as it is connected to the internet. Web servers are used to host websites, store data and to run enterprise applications. HTTP is the protocol used for communicating with web server. HTTP: standard web transfer protocol HTTP request: from browser to server HTTP response: from server to client browser Primary function of web server is to deliver web pages to clients. Common Features o o o o Virtual hosting: hosting many websites using single IP address Large file support: able to support large files of size greater than 2 GB Bandwidth Management: limit the speed of responses and serve more number of clients Server side scripting: able to generate dynamic web pages at runtimes

Not always web servers support WWW. Sometimes they can be used for serving local networks. (Printers, webcams etc.)

Implementation: Create following topology using packet tracer. o o o o o There are 3 networks. (10.0.0.0 , 20.0.0.0 and 30.0.0.0 network) Default gateway of 10.0.0.0 n/w is 10.0.0.1 Default gateway of 30.0.0.0 n/w is 30.0.0.1 One web server with IP address 30.0.0.255 Routing Protocol used is RIP

Click on server (30.0.0.255) goto config tab select HTTP. Now, make HTTP and HTTPS services ON. One can create, delete and modify webpages at here. Goto PC (10.0.0.2) click on itgoto Desktop tabopen web browser tool Just type IP address of server (i.e. http://30.0.0.255) and click GO. See the home page of website hosted at server (30.0.0.255)

Conclusion: Thus we have studied installation and functioning of web server.

Experiment No. 7 Aim: Installation of DHCP Server. Theory:

Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts. It allows easier

administration and works well in small to even very large network environments. All types of hardware can be used as a DHCP server, including a Cisco router. DHCP differs from BootP in that BootP assigns an IP address to a host but the hosts hardware address must be entered manually in a BootP table. One can think of DHCP as a dynamic BootP. DHCP server can provide lot of information to a host, when the host is requesting an IP address from the DHCP server. Heres a list of the information a DHCP server can provide: IP address Subnet mask Domain name Default gateway (routers) DNS WINS information A client that sends out a DHCP Discover message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3. The layer 2 broadcast is all Fs in hex, which looks like this: FF:FF:FF:FF:FF:FF. The layer 3 broadcast is 255.255.255.255, which means all networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also known as the Host-to-Host layer. The Data Link and Network layers are both sending out all hands broadcasts saying, HelpI dont know my IP address! ip helper-address: with help of this, router will change the destination IP of broadcast DHCP discover message from 255.255.255.255 to server ip address (i.e. 10.0.0.2 in our case). It is not a default service. Needed to be configured on each interface of router.

Procedure: create following topology o o o A switch, Server, PC, Laptop and network printer. Server ip address: 10.0.0.2 PC, Laptop and Printer will get IP through DHCP Configuration.

Go to Server Config tab select DHCP Start DHCP service (ON). Enter following information and click Add. Pool Name : Net1 Default Gateway : 10.0.0.1 DNS Server : 40.0.0.255

Start IP Address. : 10.0.0.3 Subnet mask : 255.0.0.0 Max no. of users: 15

Go to PC Desktop Tab IP configuration select DHCP PC will dynamically receive IP address, subnet mask, default gateway and DNS server information from DHCP server installed on network (server with IP address 10.0.0.2).

More complex networks with DHCP server are as follows. First, network with 2 routers and one DHCP server. There are 3 networks in this topology. RIP routing protocol at Router 1 and Static routing at Router 2.

Topology below shows 3 networks connected to single router. As all three networks are directly connected to router no need for any routing protocol.

Conclusion: Thus we have studied various configurations of DHCP server as 1. DHCP server with single network. 2. DHCP server with multiple networks.

Experiment No. 2 Aim: Study of Ciscos Internetworking Operating System (IOS) modes and Command Line Interface (CLI). Theory:
The IOS is what runs Cisco routers as well as Ciscos switches, and its what allows us to configure the devices as well. The Cisco IOS is a proprietary kernel that provides routing, switching, internetworking, and telecommunications features. The first IOS was written by William Yeager in 1986, and it enabled networked applications. It runs on most Cisco routers as well as Cisco Catalyst switches. Cisco router IOS software is responsible for: Carrying network protocols and functions Connecting high-speed traffic between devices Adding security to control access and stop unauthorized network use Providing scalability for ease of network growth and redundancy Supplying network reliability for connecting to network resources

Each Cisco device on CLI interface supports three access modes o User EXEC: Provides basic access to the IOS with limited command availability (basically simple monitoring and troubleshooting commands). o Privilege EXEC: Provides high-level management access to the IOS, including all commands available at User EXEC mode. o Configuration: Allows configuration changes to be made to the device. When user enters in CLI, it is in User access mode and prompt looks like as follows. Router> For privilege Access mode we have to put enable command in user access mode. Router> enable Router# To return to User EXEC mode from Privilege EXEC mode, use the exit command Router# exit Router> From privileged EXEC mode, we can enter global configuration mode using configure terminal command. Router# configure terminal Router(config)# specific configuration modes: o Interface: Supports commands that configure operations on a per-interface basis o Subinterface: Supports commands that configure multiple virtual interfaces on a single physical interface o Controller: Supports commands that configure controllers (for example, E1 and T1 controllers) o Line: Supports commands that configure the operation of a terminal line (for example, the console or the vty ports) o Router: Supports commands that configure an IP routing protocol If we enter the exit command at CLI, the router backs out one level. Router(config)#exit Router# Commands that affect the entire device are called global commands. The hostname and enable password commands are examples of global commands.

Various Router Modes


CLI Prompt Mode name User mode Privileged mode (also known as EXEC-level mode) Global configuration mode Interface mode Subinterface mode Line mode Router configuration mode

Router> Router# Router(config)# Router(config-if)# Router(config-subif)# Router(config-line)# Router(config-router)#

Conclusion: Thus we have studied Ciscos IOS and various CLI modes for Cisco devices. User EXEC mode : Limited to basic monitoring commands Privileged EXEC mode : Provides access to all other router commands Global configuration mode : Commands that affect the entire system Specific configuration modes : Commands that affect interfaces/processes only Setup mode : Interactive configuration dialog

Experiment No. 4 Aim: Implementation of RIP routing Protocol. Theory: Routing Information Protocol (RIP) is a standards-based, distance-vector, interior gateway protocol (IGP) used by routers to exchange routing information. RIP uses hop count to determine the best path between two locations. Hop count is the number of routers the packet must go through till it reaches the destination network. The maximum allowable number of hops a packet can traverse in an IP network implementing RIP is 15 hops. It has a maximum allowable hop count of 15 by default, meaning that 16 is deemed unreachable. RIP works well in small networks, but it's inefficient on large networks with slow WAN links or on networks with a large number of routers installed. In a RIP network, each router broadcasts its entire RIP table to its neighbouring routers every 30 seconds. When a router receives a neighbours RIP table, it uses the information provided to update its own routing table and then sends the updated table to its neighbours. RIPv1 A classful protocol, broadcasts updates every 30 seconds, hold-down period 180 seconds. Hop count is metric (Maximum 15). RIP supports up to six equal-cost paths to a single destination, where all six paths can be placed in the routing table and the router can load-balance across them. The default is actually four paths, but this can be increased up to a maximum of six. Remember that an equal-cost path is where the hop count value is the same. RIP will not load-balance across unequal-cost paths RIPv2 o o o o RIPv2 uses multicasts, version 1 use broadcasts, RIPv2 supports triggered updateswhen a change occurs, a RIPv2 router will immediately propagate its routing information to its connected neighbours. RIPv2 is a classless protocol. RIPv2 supports variable-length subnet masking (VLSM) RIPv2 supports authentication. You can restrict what routers you want to participate in RIPv2. This is accomplished using a hashed password value.

RIP Timers RIP uses four different kinds of timers to regulate its performance:

Route update timer


Sets the interval (typically 30 seconds) between periodic routing updates in which the router sends a complete copy of its routing table out to all neighbours.

Route invalid timer


Determines the length of time that must elapse (180 seconds) before a router determines that a route has become invalid. It will come to this conclusion if it hasnt heard any updates about a particular route for that period. When that happens, the router will send out updates to all its neighbours letting them know that the route is invalid.

Holddown timer
This sets the amount of time during which routing information is suppressed. Routes will enter into the holddown state when an update packet is received that indicated the route is unreachable. This continues either until an update packet is received with a better metric or until the holddown timer expires. The default is 180 seconds.

Route flush timer


Sets the time between a route becoming invalid and its removal from the routing table (240 seconds). Before it's removed from the table, the router notifies its neighbours of that route's impending failure. The value of the route invalid timer must be less than that of the route flush timer. This gives the router enough time to tell its neighbours about the invalid route before the local routing table is updated.

Implementation:

Router
R1 R2

FastEthernet 0/0
10.0.0.1 30.0.0.1

Serial 2/0
20.0.0.1 20.0.0.2

PC
PC1 PC2

IP Address
10.0.0.2 30.0.0.2

To configure and enable rip routing on R1 follow these commands exactly. Router>enable Router#configure terminal Router(config)#hostname R1 R1(config)#interface fastethernet 0/0 R1(config-if)#ip address 10.0.0.1 255.0.0.0 R1(config-if)#no shutdown R1(config-if)#exit R1(config)#interface serial 2/0 R1(config-if)#ip address 20.0.0.1 255.0.0.0 R1(config-if)#clock rate 64000 R1(config-if)#no shutdown R1(config-if)#exit R1(config)#router rip R1(config-router)#network 10.0.0.0 R1(config-router)#network 20.0.0.0 R1(config-router)#network 50.0.0.0 To configure and enable rip routing on R2 follow these commands exactly. Router>enable Router#configure terminal Router(config)#hostname R2 R2(config)#interface fastethernet 0/0 R2(config-if)#ip address 30.0.0.1 255.0.0.0 R2(config-if)#no shutdown R2(config-if)#exit R2(config)#interface serial 2/0 R2(config-if)#ip address 20.0.0.2 255.0.0.0 R2(config-if)#no shutdown R2(config-if)#exit R2(config)#router rip R2(config-router)#network 30.0.0.0 R2(config-router)#network 40.0.0.0 R2(config-router)#network 50.0.0.0 R2(config-router)#exit

Experiment No. 3 Aim: Implementation of Static routing. Theory: The term routing is used for taking a packet from one device and sending it through the network to another device on a different network. To be able to route packets, a router must know, at a minimum, the following: Destination address Neighbour routers from which it can learn about remote networks Possible routes to all remote networks The best route to each remote network How to maintain and verify routing information The router learns about remote networks from neighbour routers or from an administrator. The router then builds a routing table (a map of the internetwork) that describes how to find the remote networks. If a network is directly connected, then the router already knows how to get to it. If a network isnt directly connected to the router, the router must use one of two ways to learn how to get to the remote network: static routing or dynamic routing. Static Routing Static routing occurs when you manually add routes in each routers routing table. Static routing has the following benefits: o There is no overhead on the router CPU, which means you could possibly buy a cheaper router than you would use if you were using dynamic routing. o There is no bandwidth usage between routers, which means you could possibly save money on WAN links. o It adds security because the administrator can choose to allow routing access to certain networks only. Static routing has the following disadvantages: o The administrator must really understand the internetwork and how each router is connected in order to configure routes correctly. o If a network is added to the internetwork, the administrator has to add a route to it on all routersby hand. o Its not feasible in large networks because maintaining it would be a full -time job in itself. Command syntax for adding static route to routing table is as follows:

ip route [destination_network] [mask] [next-hop_address]


Where,
ip route: The command used to create the static route. destination_network: The network youre placing in the routing table. mask: The subnet mask being used on the network. next-hop_address: The address of the next-hop router that will receive the packet and forward it to the remote network.

Example:

>ip route 172.16.3.0 255.255.255.0 192.168.2.4


Where, 1. The ip route command tells us simply that it is a static route. 2. 172.16.3.0 is the remote network we want to send packets to. 3. 255.255.255.0 is the mask of the remote network. 4. 192.168.2.4 is the next hop, or router, we will send packets to.

Implementation:

Router
R1 R2

FastEthernet 0/0
10.0.0.0 30.0.0.1

Serial 2/0
20.0.0.1 20.0.0.2

PC
PC1 PC2

IP Address
10.0.0.2 30.0.0.2

To configure and enable static routing on R1 follow these commands exactly. Router>enable Router#configure terminal Router(config)#hostname R1 R1(config)#interface fastethernet 0/0 R1(config-if)#ip address 10.0.0.1 255.0.0.0 R1(config-if)#no shutdown R1(config-if)#exit R1(config)#interface serial 2/0 R1(config-if)#ip address 20.0.0.1 255.0.0.0 R1(config-if)#clock rate 64000 R1(config-if)#no shutdown R1(config-if)#exit R1(config)#ip route 30.0.0.0 255.0.0.0 20.0.0.2 To configure and enable static routing on R2 follow these commands exactly. Router>enable Router#configure terminal Router(config)#hostname R2 R2(config)#interface fastethernet 0/0 R2(config-if)#ip address 30.0.0.1 255.0.0.0 R2(config-if)#no shutdown R2(config-if)#exit R2(config)#interface serial 2/0 R2(config-if)#ip address 20.0.0.2 255.0.0.0 R2(config-if)#no shutdown R2(config-if)#exit R2(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1

Experiment No. 5 Aim: Implementation of OSPF routing Protocol. Theory: Open Shortest Path First (OSPF) is an open standard routing protocol thats been implemented by a wide variety of network vendors. OSPF works by using the Dijkstra algorithm. First, a shortest path tree is constructed, and then the routing table is populated with the resulting best paths. OSPF converges quickly, although perhaps not as quickly as EIGRP, and it supports multiple, equalcost routes to the same destination. Like EIGRP, it does support both IP and IPv6 routed protocols. OSPF provides the following features: Consists of areas and autonomous systems Minimizes routing update traffic Allows scalability Supports VLSM/CIDR Has unlimited hop count Allows multi-vendor deployment (open standard) OSPF is the first link-state routing protocol. Comparison of OSPF with RIP i.e. Link state routing versus Distance vector routing Characteristic Type of protocol Classless support VLSM support Path metric Route propagation Hop count limit Convergence Hierarchical network Updates Route computation algorithm OSPF Link state Yes Yes Bandwidth Multicast on change None Fast Yes (using areas) Event triggered Dijkstra RIP Distance vector No No Number of Hops Periodic broadcast 15 Slow No (flat only) Route table updates Bellman-Ford

OSPF is a fast, scalable, and robust protocol that can be actively deployed in thousands of production networks. OSPF is supposed to be designed in a hierarchical fashion, which basically means that you can separate the larger internetwork into smaller internetworks called areas. This is the best design for OSPF. The following are reasons for creating OSPF in a hierarchical design: To decrease routing overhead To speed up convergence To confine network instability to single areas of the network Simple OSPF Design: Each router connects to the backbone, called area 0, or the backbone area. OSPF must have an area 0, and all other areas should connect to this area. Routers that connect other areas to the backbone area within an AS are called Area Border Routers (ABRs). Still, at least one interface of the ABR must be in area 0.

Implementation:

Router R1 R2 PC PC1 PC2

FastEthernet 0/0 10.0.0.0 30.0.0.1 IP Address 10.0.0.2 30.0.0.2

Serial 2/0 20.0.0.1 20.0.0.2

To configure and enable OSPF routing on R1 follow these commands exactly. Router>enable Router#configure terminal Router(config)#hostname R1 R1(config)#interface fastethernet 0/0 R1(config-if)#ip address 10.0.0.1 255.0.0.0 R1(config-if)#no shutdown R1(config-if)#exit R1(config)#interface serial 2/0 R1(config-if)#ip address 20.0.0.1 255.0.0.0 R1(config-if)#clock rate 64000 R1(config-if)#no shutdown R1(config-if)#exit R1(config)#router ospf 1 R1(config-router)#network 10.0.0.0 255.0.0.0 area 0 R1(config-router)#network 20.0.0.0 255.0.0.0 area 0 R1(config-router)#network 30.0.0.0 255.0.0.0 area 0 To configure and enable OSPF routing on R2 follow these commands exactly. Router>enable Router#configure terminal Router(config)#hostname R2 R2(config)#interface fastethernet 0/0 R2(config-if)#ip address 30.0.0.1 255.0.0.0 R2(config-if)#no shutdown R2(config-if)#exit R2(config)#interface serial 2/0 R2(config-if)#ip address 20.0.0.2 255.0.0.0 R2(config-if)#no shutdown R2(config-if)#exit R2(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1 R2(config)#router ospf 1 R2(config-router)#network 30.0.0.0 255.0.0.0 area 0 R2(config-router)#network 20.0.0.0 255.0.0.0 area 0 R2(config-router)#network 10.0.0.0 255.0.0.0 area 0

Experiment No. 9 Aim: Study of ipconfig, ping and tracert commands Theory: Packet Internet Groper (ping) command is used to provide a basic test of whether a particular host is operating properly and is reachable on the network from the testing host. It provides estimates of round trip time and packet loss rate between hosts. The traceroute (tracert) traces all the routers that a network layer packet has to pass through to get to a destination. 1. Verify the connectivity of your workstation to the internet. 2. Open the Command Prompt of the operating system using either of the following methods: Click on Start > All Programs > Accessories > Command Prompt or Click on Start > Run, enter cmd (short for command) and click on ok. A Command Prompt screen should open. 3. Gather TCP/IP configuration information: Type ipconfig (short for IP configuration) and press Enter. The screen will show the IP address, subnet mask, and default gateway for your computers connection.

Ping the IP address of another computer. Note that for the ping and tracert commands to work the PC firewalls have to be disabled. Ask the IP address of the workstation that is being used by another group of students. Then type ping, space, and the IP address that you received, then press Enter. Notice the outputs.

Ping the Loopback IP address of your computer. Type the following command: ping 127.0.0.1. The IP address 127.0.0.1 is reserved for loopback testing. If the ping is successful, then TCP/IP is properly installed and functioning on this computer.

Trace the route to the Cisco website. Type tracert www.cisco.com and press enter. In a successful output, you will see listings of all routers the tracert requests had to pass through to get to the destination.

Experiment No. 8 Aim: Installation of DNS Server with WEB server and DHCP server Theory: The Domain Name system is a hierarchical distributed naming system for computers, services or any resource connected to internet or private network. It translates easy to memorise domain names to the numerical IP addresses needed to locate any computer service or device. Essential component of the functionality of the Internet. It serves as phone book for the Internet by translating human-friendly computer hostnames into IP addresses. Unlike phone book, DNS can be quickly updated without affecting the end users. Users can use meaningful Uniform Resource Locators (URLs) and email addresses without having to know IP address of service required. A DNS name server is a server that stores the DNS records for domain name, such as address record and mail exchanger records. A DNA name server responds with answers to queries against its database. Implementation:

1. 2. 3. 4. 5.

Create the network shown in figure. DHCP server will distribute IP addresses to network 10.0.0.0 and 30.0.0.0 Web server will host a website having name www.acn.com RIP routing protocol is used for configuring the network. Configure DNS server: a. Goto config tab > DNS b. Make DNS service ON c. Add resource record as follows d. Name = www.acn.com e. Type = A Record f. Address = 30.0.0.2 (IP address of web server on which your website is hosted) g. Click Add. 6. Goto PC1 > Desktop > web browser 7. Enter URL as www.acn.com 8. See the working of DNS server in simulation mode.

Conclusion: Thus we have implemented DNS server, web server and DHCP server to work together as whole networking system.

Experiment No. 10 Aim: Packet grab and analysis tool: WIRESHARK Theory: Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. Wireshark is perhaps one of the best open source packet analyzers available today. Here are some examples people use Wireshark for: o network administrators use it to troubleshoot network problems o network security engineers use it to examine security problems o developers use it to debug protocol implementations o people use it to learn network protocol internals The following are some of the many features Wireshark provides: o Available for UNIX and Windows. o Capture live packet data from a network interface. o Open files containing packet data captured with tcpdump/WinDump, Wireshark, and a number of other packet capture programs. o Import packets from text files containing hex dumps of packet data. o Display packets with very detailed protocol information. o Save packet data captured. o Export some or all packets in a number of capture file formats. o Filter packets on many criteria. o Search for packets on many criteria. o Colorize packet display based on filters. o Create various statistics. Wireshark captures packets and allows you to examine their content. (fig 1) Here are some things Wireshark does not provide: o Wireshark isn't an intrusion detection system. It will not warn you when someone does strange things on your network that he/she isn't allowed to do. o Wireshark will not manipulate things on the network, it will only "measure" things from it. Wireshark doesn't send packets on the network or do other active things The Wireshark capture engine provides the following features: o Capture from different kinds of network hardware (Ethernet, Token Ring, ATM, ...). o Stop the capture on different triggers like: amount of captured data, captured time, captured number of packets. o Simultaneously show decoded packets while Wireshark keeps on capturing o Filter packets, reducing the amount of data to be captured o Simultaneous capturing from multiple network interfaces. Once you have captured some packets, or you have opened a previously saved capture file, you can view the packets that are displayed in the packet list pane by simply clicking on a packet in the packet list pane, which will bring up the selected packet in the tree view and byte view panes. Eg. Wireshark with a TCP packet selected for viewing (fig 2)

Fig 1

Fig 2 Conclusion: Thus we have done packet grab and analysis using WIRESHARK.

Вам также может понравиться