DCCN Lab Manual
DCCN Lab Manual
SSUET/QR/112
Laboratory Manual
Data Communication & Computer Networks(EE-300)
Spring Semester 2021
SSUET/QR/112
4. 16-17 CLO-4
IP ADDRESSING
5. 18-19 CLO-4
STATIC ROUTE
LAB # 01
To understand the basic concepts of Computer Network and its types, Also describe brief
overview of OSI layers.
Theory
Computer Networking
Networks may be classified according to a wide variety of characteristics such as the medium
used to transport the data, communications protocol used, scale, topology, and organizational
scope.
Network Types
A local area network (LAN) supplies networking capability to a group of computers in close
proximity to each other such as in an office building, a school, or a home. A LAN is useful for
sharing resources like files, printers, games or other applications.
Examples:
The most common type of local area network is an Ethernet LAN. The smallest home LAN can
have exactly two computers; a large LAN can accommodate many thousands of computers.
Examples:
The world's most popular WAN is the Internet. Some segments of the Internet, like VPN-based
extranets, are also WANs in themselves. Finally, many WANs are corporate or research
networks that utilize leased lines.
WANs generally utilize different and much more expensive networking equipment than do
LANs.
Key Technologies
Key technologies often found in WANs include SONET, Frame Relay, and ATM.
A metropolitan area network (MAN) is a network that interconnects users with computer
resources in a geographic area or region larger than that covered by even a large local area
network (LAN) but smaller than the area covered by a wide area network (WAN).
Examples:
Examples of metropolitan area networks of various sizes can be found in the metropolitan areas
of London, England; Lodz, Poland; and Geneva, Switzerland. Large universities also sometimes
use the term to describe their networks. A recent trend is the installation of wireless MANs.
The OSI, or Open System Interconnection, model defines a networking framework for
implementing protocols in seven layers. Control is passed from one layer to the next, starting at
the application layer in one station, and proceeding to the bottom layer, over the channel to the
next station and back up the hierarchy.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified,
quality of service is identified, user authentication and privacy are considered, and any
constraints on data syntax are identified. Everything at this layer is application-specific. This
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This layer formats and
encrypts data to be sent across a network, providing freedom from compatibility problems. It is
sometimes called the syntax layer.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session
layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
applications at each end. It deals with session and connection coordination.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible
for end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node. Routing and forwarding are functions of this
layer, as well as addressing, internetworking, error handling, congestion control and packet
sequencing.
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access Control
(MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a
computer on the network gains access to the data and permission to transmit it. The LLC layer
controls frame synchronization, flow control and error checking.
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network
at the electrical and mechanical level. It provides the hardware means of sending and receiving
data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232,
and ATM are protocols with physical layer components.
Network Cabling
The vast majority of networks today are connected by some sort of wiring or cabling that acts as
a network transmission medium that carries signals between computers. Many cable types are
available to meet the varying needs and sizes of networks, from small to large.
Types Of Cables
Coaxial cable
Twisted-pair (unshielded and shielded) cable
Fiber-optic cable
Coaxial Cable
At one time, coaxial cable was the most widely used network cabling. There were a couple of
reasons for coaxial cable's wide usage: it was relatively inexpensive, and it was light, flexible,
and easy to work with.
In its simplest form, coaxial cable consists of a core of copper wire surrounded by insulation, a
braided metal shielding, and an outer cover. Figure shows the various components that make up
a coaxial cable.
In its simplest form, twisted-pair cable consists of two insulated strands of copper wire twisted
around each other. Figure shows the two types of twisted-pair cable: unshielded twisted-
pair(UTP) and shielded twisted-pair(STP) cable.
UTP is the most popular type of twisted-pair cable and is fast becoming the most popular LAN
cabling. The maximum cable length segment is 100 meters, about 328 feet.
Traditional UTP cable, as shown in Figure, consists of two insulated copper wires. UTP
specifications govern how many twists are permitted per foot of cable; the number of twists
allowed depends on the purpose to which the cable will be put. In North America, UTP cable is
the most commonly used cable for existing telephone systems and is already installed in many
office buildings.
FigureUTP cable
Categories Of UTP
Category 1 This refers to traditional UTP telephone cable that can carry voice but not
data transmissions. Most telephone cable prior to 1983 was Category 1 cable.
Category 2 This category certifies UTP cable for data transmissions up to 4 megabits per
second (Mbps). It consists of four twisted pairs of copper wire.
Category 3 This category certifies UTP cable for data transmissions up to 16 Mbps. It
consists of four twisted pairs of copper wire with three twists per foot.
Category 4 This category certifies UTP cable for data transmissions up to 20 Mbps. It
consists of four twisted pairs of copper wire.
STP cable uses a woven copper-braid jacket that is more protective and of a higher quality than
the jacket used by UTP. Figure shows a two-twisted-pair STP cable. STP also uses a foil wrap
around each of the wire pairs. This gives STP excellent shielding to protect the transmitted data
from outside interference, which in turn allows it to support higher transmission rates over longer
distances than UTP.
Fiber-Optic Cable
In fiber-optic cable, optical fibers carry digital data signals in the form of modulated pulses of
light. This is a relatively safe way to send data because, unlike copper-based cables that carry
data in the form of electronic signals, no electrical impulses are carried over the fiber-optic cable.
This means that fiberoptic cable cannot be tapped, and its data cannot be stolen.
Fiber-optic cable is good for very high-speed, high-capacity data transmission because of the
purity of the signal and lack of signal attenuation.
An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a
concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic.
Plastic is easier to install, but cannot carry the light pulses for as long a distance as glass.
FigureFiber-optic cable
Need to transmit data at very high speeds over long distances in very secure media.
LAB ASSIGNMENT
▪ Briefly describe the purpose of RJ-45 and BNC connectors. Also give some examples where
each of the connector is used.
DIAGNOSTIC UTILITIES
Object
To Study the Basic Diagnostic Utilities on command prompt and viewing their outputs.
Diagnostic Commands
1. Ipconfig
▪ It gives you the ip address,default gateway server and subnet mask respectively.
2. Hostname
3. Tracert
▪ It let you know about the different routing information to reach any destination. It has different
parameters like maximum hops,host list etc
4. Arp
▪ Displays and modifies IP to physical address translation tables used by address resolution
protocol. It have different parameters.
5. Netstat
▪ Displays the active connections,protocols link status local and foreign address.
6. Ns lookup
▪ It let you know about the default server and its ip address.
LAB ASSIGNMENT
▪ Apply the following commands and attach the result in the form of screen shot in lab file, and
also give necessary explanation.
To learned the basics about the Packet Tracer software. Also run basic SHOW commands which
are defined below and give required explanation of the results.
Introduction
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols
used in networking, in either Real Time or Simulation mode. This includes layer 2 protocols
such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols
such as TCP and UDP. Routing protocols can also be traced.
User mode
Router>
▪ Where user can access different commands and login to the main device.
Router> en
Router#
▪ Where the user can make changes and configure the device manually.
Router(config)#
▪ Where the user can make changes and to access the interfaces and assigning ip addresses
respectively.
Router#show running-config
Show the active configuration in memory. The currently active configuration script running on
the router is referred to as the running-config on the routers command-line interface. Note that
privileged mode is required. The running configuration script is not automatically saved on a
Cisco router, and will be lost in the event of power failure. The running configuration must be
manually saved with the 'copy' command
Router#show flash
Flash memory is a special kind of memory on the router that contains the operating system image
file(s). Unlike regular router memory, Flash memory continues to maintain the file image even
after power is lost.
Router#show history
The routers Command Line Interface (CLI) maintains by default the last 10 commands you have
entered in memory. It shows the history of last 10 used commands.
To retrieve the previous command you typed:
Press the up arrow
To retrieve the next command you typed:
Press the down arrow
Router#show protocols
Use this command to view the status of the current layer 3 routed protocols running on your
router
Router#show version
Show detailed information about Cisco IOS Software and its specifications. This command will
give you critical information, such as: router platform type, operating system revision, operating
system last boot time and file location, amount of memory, number of interfaces, and
configuration register
Router#show clock
Router#show hosts
Will display a cached list of hosts and all of their interfaces IP addresses.
Router#show users
Will show a list of all users who are connected to the router.
Router#show interfaces
Will give you detailed information about each and all kinds of interfaces used by the router. And
also tell which interface UP, Down and Administratively down.
This command will show brief descriptions about interface. This command mostly used in
troubleshooting. There may be three possible conditions of status
UP :- interface is up and operational
This command will give a detail about known route. Router will not forward packet if route is
not shown here for that packet. Router’s routing decision is made by this routing table. And also
tell which IP is directly connected to the interface and which IP is indirectly connected to the
interface in the route.
Router#show ip protocols
It shows the detailed of the routing protocol which is used by the router.
LAB ASSIGNMENT
▪ Apply the following commands and attach the results in the form of screen shot in lab file and
also define the functions of the following commands and give required explanation of the results.
LAB 04
IP ADDRESSING
Objective
PART A
Network Topology:
Methodology:
PART B
Network Topology:
Lab Assignment
Configure the defined network by assigning the IP addresses at the interfaces of routers
and check the connectivity between all the routers.
Also check the interfaces summary of the routers.
Display the interface information of the interfaces of the routers.
Also implement the following show commands at each router.
1. Show protocols
2. Show ip route
3. Show flash
LAB 05
STATIC ROUTING
Object
Network Topology:
Methodology:
Lab Assignment
ROUTING PROTOCOL
Object
To understand the operation of Dynamic routing protocolby using the Routing Information
Protocol (RIP)
Network Topology:
Methodology:
Lab Assignment
(a) To understand the operation of Dynamic routing protocol by using the Enhanced Interior
Gateway Routing Protocol (EIGRP).
Network Topology:
Methodology:
(b) By using the defined network and apply RIP and EIGRP protocols perform the following
tasks.
Methodology:
To Study some basic show commands of switch and apply them in given network topology.
Network Topology:
User mode
Switch>
▪ Where user can access different commands and login to the main device.
Switch> en
Switch#
▪ Where the user can make changes and configure the device manually.
Switch(config)#
▪ Where the user can make changes and to access the interfaces and assigning ip addresses
respectively.
Switch(config-if)#
Where the user can assign ip addresses and protocols to the interfaces respectively.
Switch#show running-config
Show the active configuration in memory. The currently active configuration script running on
the Switch is referred to as the running-config on the Switchs command-line interface. Note that
privileged mode is required. The running configuration script is not automatically saved on a
Cisco Switch, and will be lost in the event of power failure. The running configuration must be
manually saved with the 'copy' command
Switch#show flash
Flash memory is a special kind of memory on the Switch that contains the operating system
image file(s). Unlike regular Switch memory, Flash memory continues to maintain the file image
even after power is lost.
Switch#show history
The Switchs Command Line Interface (CLI) maintains by default the last 10 commands you
have entered in memory. It shows the history of last 10 used commands.
To retrieve the previous command you typed:
Press the up arrow
To retrieve the next command you typed:
Press the down arrow
Switch#show version
Show detailed information about Cisco IOS Software and its specifications. This command will
give you critical information, such as: Switch platform type, operating system revision, operating
system last boot time and file location, amount of memory, number of interfaces, and
configuration register
Switch#show clock
Switch#show hosts
Will display a cached list of hosts and all of their interfaces IP addresses.
Switch#show users
Will show a list of all users who are connected to the Switch.
Switch#show interfaces
Will give you detailed information about each and all kinds of interfaces used by the Switch.
And also tell which interface UP, Down and Administratively down.
This command will show brief descriptions about interface. This command mostly used in
troubleshooting. There may be three possible conditions of status
UP :- interface is up and operational
DOWN :- physical link is detected but there are some problem in configurations.
Administratively down :- port is disable by shutdown command ( Default mode of any port on
Switch.)
Switch#show mac-address-table
This command will show the information about the MAC addresses
LAB ASSIGNMENT
▪ Apply the following commands and attach the results in the form of screen shot in lab file and
also define the functions of the following commands and give required explanation of the results.
OSPF
Object
To understand the operation of Dynamic routing protocol by using the Open Shortest Path First
(OSPF).
Network Topology:
Methodology:
Lab Assignment
(a)To understand the operation of Dynamic routing protocol by using the Open Shortest Path
First (OSPF).
Network Topology:
Methodology:
Network Topology:
Methodology:
To understand the operation of Access Control List with the help of given topology, by applying
RIP routing protocol.
Network Topology:
Methodology:
7. Make the Standard ACL on router 1 such that Host ‘A’ cannot be accessing the Web and
FTP servers respectively.
8. Apply the Standard ACL on router R1’s Serial interface.
9. Check by using Ping command Host A should not be accessing the Web and FTP servers,
but Host B should be accessing both the servers respectively.
Lab Assignment
To understand the operation of Access Control List with the help of given topology, by applying
RIP routing protocol.
Network Topology:
Methodology:
7. Make the Standard ACL on router 0 &2 such that Host ‘PC0’ &’PC2’ cannot be
accessing the Web and FTP servers respectively.
8. Apply the Standard ACL on router R0’s Serial interface, R2’s Serial interface.
9. Check by using Ping command Host PC0 &PC2 should not be accessing the Web and
FTP servers, but Host PC1 & PC3 should be accessing both the servers respectively.
To understand the operation of Static NAT with the help of given topology. For routing apply
RIP protocol.
Network Topology:
Methodology:
5. Make the Standard ACL on router 0 &2 such that Host ‘PC2’ &’PC5’ cannot be
accessing the Web and FTP servers respectively.
6. Apply the Standard ACL on router R0’s Serial interface, R2’s Serial interface.
Verifying Command
Lab Assignment
Apply static NAT on PC0, PC1, PC3 and PC4 in a given topology. Create ACL at R0 and R2
and deny PC2 and PC 5 to access the network.
Network Topology:
Methodology:
5. Establishes Static NAT Translation between an inside local address and an outside global
address. (create NAT translation table at R1)
6. Mark the interface as connected to the inside network (internal network) and translate
inside network.
7. Mark the interface as connected to the outside network (external network) and translate
outside network.
Verifying Command
LAB 11
Network Topology:
Methodology:
4. Verify that port 1 assigned from vlan1 to vlan2 by place the cursor on the switch.
Switch#show vlan
1. Deleting a vlan
Lab Assignment
(a) Create two vlans for two users on the same switch and assign two ports on the two
different vlans to two users.
Network Topology:
Methodology:
1. Creating two vlans, vlan 2 and vlan3 (vlan1 is a default vlan so start with vlan2)
4. Verify that port 1 and 2 assigned from vlan1 to vlan2 and vlan3 by place the cursor on the
switch.
Switch#show vlan
(b) Create one vlans for two users on the switch and assign two ports on the same vlan to two
users.
Network Topology:
Methodology:
3. Assigning Port 1 and 2 of slot 0 of fast Ethernet interface to Vlan 2 by using the range of
ports.
4. Verify that port 1 and 2 assigned from vlan1 to vlan2 by place the cursor on the switch.
Switch#show vlan
WIRESHARK TCP
Object:
Theory:
Do the following:
• Start up your web browser. Go the http://gaia.cs.umass.edu/wiresharklabs/alice.txt and retrieve
an ASCII copy of Alice in Wonderland. Store this file somewhere on your computer.
• Next go to http://gaia.cs.umass.edu/wireshark-labs/TCP-wireshark-file1.html.
• You should see a screen that looks like:
• Use the Browse button in this form to enter the name of the file (full path name)on your
computer containing Alice in Wonderland (or do so manually). Don’t yetpress the “Upload
alice.txt file” button.
• Now start up Wireshark and begin packet capture (Capture->Options) and thenpress OK on the
Wireshark Packet Capture Options screen (we’ll not need toselect any options here).
• Returning to your browser, press the “Upload alice.txt file” button to upload thefile to the
gaia.cs.umass.edu server. Once the file has been uploaded, a shortcongratulations message will
be displayed in your browser window.
• Stop Wireshark packet capture. Your Wireshark window should look similar tothe window
shown below.
If you are unable to run Wireshark on a live network connection, you can download a packet
trace file that was captured while following the steps above on one of the author’s computers.
You may well find it valuable to download this trace even if you’ve captured your own trace and
use it, as well as your own trace, when you explore the questions below.
Before analyzing the behavior of the TCP connection in detail, let’s take a high level view of the
trace.
Answer the following questions, by opening the Wireshark captured packet file tcpethereal-
trace-1 in http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip (that is download the
trace and open that trace in Wireshark; see footnote 2). Whenever possible, when answering a
question you should hand in a printout of the packet(s) within the trace that you used to answer
the question asked. Annotate the printout to explain your answer. To print a packet, use File-
>Print, choose Selected packet only, choose Packet summary line, and select the minimum
amount of packet detail that you need to answer the question.
1. What is the IP address and TCP port number used by the client computer (source) that is
ransferring the file to gaia.cs.umass.edu? To answer this question, it’s probably easiest to
select an HTTP message and explore the details of the TCP packet used to carry this
HTTP message, using the “details of the selected packet header window” (refer to Figure
2 in the “Getting Started with Wireshark” Lab if you’re uncertain about the Wireshark
windows).
2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending and
receiving TCP segments for this connection?
If you have been able to create your own trace, answer the following question:
3. What is the IP address and TCP port number used by your client computer
(source) to transfer the file to gaia.cs.umass.edu?
Since this lab is about TCP rather than HTTP, let’s change Wireshark’s “listing of captured
packets” window so that it shows information about the TCP segments containing the HTTP
messages, rather than about the HTTP messages. To have Wireshark do this, select Analyze-
>Enabled Protocols. Then uncheck the HTTP box and select OK. You should now see an
Wireshark window that looks like:
This is what we’re looking for - a series of TCP segments sent between your computer and
gaia.cs.umass.edu. We will use the packet trace that you have captured (and/or the packet trace
tcp-ethereal-trace-1 in http://gaia.cs.umass.edu/wireshark-labs/wiresharktraces.zip; see footnote
to study TCP behavior in the rest of this lab.
TCP Basics
4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP
connection between the client computer and gaia.cs.umass.edu? What is it in the segment that
identifies the segment as a SYN segment?
6. What is the sequence number of the TCP segment containing the HTTP POST command?
Note that in order to find the POST command, you’ll need to dig into the packet content field at
the bottom of the Wireshark window, looking for a segment with a “POST” within its DATA
field.
7. Consider the TCP segment containing the HTTP POST as the first segment in the TCP
connection. What are the sequence numbers of the first six segments in the TCP connection
(including the segment containing the HTTP POST)? At what time was each segment sent?
When was the ACK for each segment received?
Given the difference between when each TCP segment was sent, and when its acknowledgement
was received, what is the RTT value for each of the six segments? What is the EstimatedRTT
value (see page 249 in text) after the receipt of each ACK? Assume that the value of the
EstimatedRTT is equal to the measured RTT for the first segment, and then is computed
using the EstimatedRTT equation on page 249 for all subsequent segments.
Note: Wireshark has a nice feature that allows you to plot the RTT for each of the TCP segments
sent. Select a TCP segment in the “listing of captured packets” window that is being sent from
the client to the gaia.cs.umass.edu server. Then select: Statistics->TCP Stream Graph-
>Round Trip Time Graph.
10. Are there any retransmitted segments in the trace file? What did you check for (in the trace)
in order to answer this question?
11. How much data does the receiver typically acknowledge in an ACK? Can you identify cases
where the receiver is ACKing every other received segment.
12. What is the throughput (bytes transferred per unit time) for the TCP connection? Explain
how you calculated this value.
WIRESHARK UDP
Object:
Theory:
In this lab, we’ll take a quick look at the UDP transport protocol. UDP is a streamlined, non-
thrills protocol. Because UDP is simple and sweet, we’ll be able to cover it pretty quickly in this
lab. So if you’ve another appointment to run off to in 30 minutes, no need to worry, as you
should be able to finish this lab with ample time to spare.
At this stage, you should be a Wireshark expert. Thus, we are not going to spell out the
steps as explicitly as in earlier labs. In particular, we are not going to provide example
screenshots for all the steps.
The Assignment
Start capturing packets in Wireshark and then do something that will cause your host to send and
receive several UDP packets. After stopping packet capture, set your packet filter so that
Wireshark only displays the UDP packets sent and received at your host. Pick one of these UDP
packets and expand the UDP fields in the details window.
Whenever possible, when answering a question you should hand in a printout of the packet(s)
within the trace that you used to answer the question asked. Annotate the printout to explain your
answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary
line, and select the minimum amount of packet detail that you need to answer the question.
1. Select one packet. From this packet, determine how many fields there are in the UDP
header. (Do not look in the textbook! Answer these questions directly from what you
observe in the packet trace.) Name these fields.
2. From the packet content field, determine the length (in bytes) of each of the UDP header
fields.
3. The value in the Length field is the length of what? Verify your claim with your captured
UDP packet.
4. What is the maximum number of bytes that can be included in a UDP payload.
5. What is the largest possible source port number?
6. What is the protocol number for UDP? Give your answer in both hexadecimal and
decimal notation. (To answer this question, you’ll need to look into the IPheader.)
7. Search “UDP” in Google and determine the fields over which the UDP checksumis
calculated.
Open-Ended LAB
Title:
Objective:
Hardware/Software required:
Diagram:
Methodology:
Observation:
Conclusion: