This lab manual provides instructions for a Computer Network lab course. The course aims to provide hands-on networking experience. Students will experiment with networking topics like IP addressing, routing protocols, and network troubleshooting using tools like ping and traceroute. Students will also learn about network modeling and simulation using software like Packet Tracer. The manual outlines 9 experiments that involve studying network devices, IP addressing, connecting computers to a LAN, networking commands, and configuring network topologies using Packet Tracer.
This document provides an overview of computer networking concepts including the OSI model, TCP/IP model, IPv4 addressing, and subnet masking. It describes the seven layers of the OSI model and some common protocols like TCP, IP, UDP, and FTP. It also explains the four layers of the TCP/IP model and compares it to the OSI model. IPv4 addressing supports unicast, broadcast, and multicast modes. IPv4 uses a hierarchical addressing scheme to divide IP addresses into network and host portions. Subnet masks are used to distinguish the network ID from the host portion of an IP address.
This document provides an introduction to a course on computer networks taught by Vinayak M. Umale at Shri sant Gajanan Maharaj college of Engineering. It outlines Vinayak M. Umale's background and experience, provides an overview of the course content which will cover topics like networking devices, protocols, routing, and practical labs, and presents the grading guidelines for the course.
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
An internetwork connects individual networks together so they function as a single large network. It addresses the challenges of connecting different networks that may use varying technologies and speeds. The OSI reference model describes how information passes through seven layers as it moves between software applications on different computer systems. Each layer adds control information in the form of headers and trailers to communicate with its peer layer on other systems. This allows information to be reliably exchanged between networked devices.
This tutorial helps you to learn about Computer Network.
Key Concepts:
What is a computer network?, Types of network, Packets, Switching, LAN, WAN, MAN, Internet Connections, Who owns the internet?
The document discusses the seven layers of the OSI model and their functions. It describes each layer in detail, including the physical, data link, network, transport, session, presentation, and application layers. Each layer has specific responsibilities for networking functions like framing data, addressing devices, routing packets, ensuring reliable data delivery, and providing services to users. The OSI model divides networking tasks into smaller parts handled by individual layers to allow for standardized communication between different computer systems.
This document provides an overview of computer networks and the Internet. It defines a computer network as a collection of connected computing devices that share resources. The main advantages are sharing devices and files, communication capabilities, and centralized data backup. Challenges include high setup costs and risk of viruses or hacking. It describes common network models like client-server, and different types of networks by transmission range. The Internet is defined as a global network of networks using TCP/IP that links billions of devices worldwide. Key components that enable the Internet include backbone networks, ISPs, packet switching, and TCP and IP protocols.
This document provides an overview of computer networking concepts including the OSI model, TCP/IP model, IPv4 addressing, and subnet masking. It describes the seven layers of the OSI model and some common protocols like TCP, IP, UDP, and FTP. It also explains the four layers of the TCP/IP model and compares it to the OSI model. IPv4 addressing supports unicast, broadcast, and multicast modes. IPv4 uses a hierarchical addressing scheme to divide IP addresses into network and host portions. Subnet masks are used to distinguish the network ID from the host portion of an IP address.
This document provides an introduction to a course on computer networks taught by Vinayak M. Umale at Shri sant Gajanan Maharaj college of Engineering. It outlines Vinayak M. Umale's background and experience, provides an overview of the course content which will cover topics like networking devices, protocols, routing, and practical labs, and presents the grading guidelines for the course.
Data Communication
Networks & Internet
Protocols & Standards
Layered Tasks
Internet Model
OSI Model
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
Circuit switching and Telephone Network
Signals
Digital Transmission
Analog Transmission
Multiplexing
Transmission Media
An internetwork connects individual networks together so they function as a single large network. It addresses the challenges of connecting different networks that may use varying technologies and speeds. The OSI reference model describes how information passes through seven layers as it moves between software applications on different computer systems. Each layer adds control information in the form of headers and trailers to communicate with its peer layer on other systems. This allows information to be reliably exchanged between networked devices.
This tutorial helps you to learn about Computer Network.
Key Concepts:
What is a computer network?, Types of network, Packets, Switching, LAN, WAN, MAN, Internet Connections, Who owns the internet?
The document discusses the seven layers of the OSI model and their functions. It describes each layer in detail, including the physical, data link, network, transport, session, presentation, and application layers. Each layer has specific responsibilities for networking functions like framing data, addressing devices, routing packets, ensuring reliable data delivery, and providing services to users. The OSI model divides networking tasks into smaller parts handled by individual layers to allow for standardized communication between different computer systems.
This document provides an overview of computer networks and the Internet. It defines a computer network as a collection of connected computing devices that share resources. The main advantages are sharing devices and files, communication capabilities, and centralized data backup. Challenges include high setup costs and risk of viruses or hacking. It describes common network models like client-server, and different types of networks by transmission range. The Internet is defined as a global network of networks using TCP/IP that links billions of devices worldwide. Key components that enable the Internet include backbone networks, ISPs, packet switching, and TCP and IP protocols.
The document describes the seven-layer OSI model. It provides details about each layer, including the physical layer which transmits individual bits, the data link layer which provides error-free data transfer, the network layer which routes packets between devices, the transport layer which ensures reliable delivery of data, the session layer which establishes interactions between devices, and the presentation layer which converts data formats.
Network components include nodes, links, clients, servers, and other devices that connect and allow communication between systems. Key components discussed include network interface cards, hubs, bridges, routers, switches, gateways, and wireless devices. Various media are used to physically transmit data between nodes on a network.
A computer network allows devices to connect and exchange data either through cables or wirelessly. Network nodes include devices that originate, route, and terminate data transmission like servers, personal computers, and networking hardware. Different types of computer networks exist like personal area networks for communication among nearby devices, local area networks for connecting devices within a home or office, and wide area networks for linking local and metropolitan networks across broad areas.
This document provides an overview of the OSI model and focuses on the physical and data link layers. It discusses that the OSI model defines a 7-layer framework for network communication and each layer has distinct functions. The physical layer deals with physical transmission and encoding of data, while the data link layer establishes reliable transmission between directly connected nodes through framing, addressing, error control and access control. The document explains the responsibilities and key concepts of both the physical and data link layers in the OSI model.
This document summarizes computer networking concepts including switches, hubs, and the differences between them. It defines a switch as a networking device that connects multiple computers within a local area network and operates at the data link layer. The document describes how switches work by examining destination MAC addresses in packets and updating their MAC address tables to forward packets to the correct port. It also lists characteristics of switches such as using MAC addressing and filtering data. The document then defines a hub as a basic networking device that broadcasts all traffic to all ports without intelligence about destinations. It provides details on how hubs work and compares hubs to switches, noting that switches can selectively forward data while hubs broadcast to all ports.
This document discusses network architecture and design. It covers component architectures, addressing and routing architectures, network management architecture, performance architecture, and security architecture. Some key points include:
- Component architecture describes how network functions are applied using hardware and software mechanisms.
- Addressing involves applying identifiers to network devices, while routing learns connectivity and forwards packets. Common addressing mechanisms include subnetting, super-netting, dynamic addressing, and private/public addressing.
- Network management architecture provides functions for controlling, planning, and monitoring network resources using mechanisms like monitoring, instrumentation, and configuration.
- Performance architecture allocates network resources to users and applications using mechanisms like quality of service, resource control, service level agreements, and policies.
This project involves designing a network system for a 3-floor building with various devices and security features. The network connects 33 computers, 13 switches, motion detectors, CCTV cameras, servers, access points and other devices. The ground floor contains a parking area with security doors and smart lights. The first and second floors contain offices, training rooms, and a server room. All devices connect through switches to servers that provide DNS, DHCP, email, FTP and IOT functions. The total cost of the project is estimated at 2,426,755 Taka using a combination of star and hybrid network topologies with routers, switches and servers to maintain security.
This Presentation consists of the detailed analysis of OSI & TCP/IP Model used for data transmission in Computer Network. It is very beneficial for any BTech, BCA, MCA, MTech students, or who is interested in networking field.
The document provides information about a learning module on computer networks for secondary school students in Malaysia. The module contains 4 activities that aim to teach students about:
1) Definitions of networks and the benefits of computer networks.
2) Different types of computer networks including local area networks (LAN), metropolitan area networks (MAN), and wide area networks (WAN).
3) Network topologies like star networks and ring networks.
4) Current network technologies.
The module is intended to help students understand computer networks, be able to define them, identify the devices used, explain different types of networks and topologies, and discuss modern network technologies.
The document provides an overview of computer networking concepts including:
- The evolution of networking from ARPANET in the 1960s to the modern Internet.
- Common network topologies like bus, star, ring, and mesh configurations.
- Different transmission media and network devices.
- Key networking services and the need for resource sharing between connected devices.
- Important terminology related to data communication standards and switching techniques.
The document discusses basics of computer networks. It defines data communication and its key characteristics like delivery, accuracy and timeliness. The basic components of a communication model are identified as the message, protocol, sender, receiver and transmission medium. Different data types like text, numbers, images, audio and video are represented as bit patterns for transmission. Types of networks like personal area network, local area network, wide area network, campus area network and metropolitan area network are classified based on their geographical span, interconnectivity, administration and architecture.
The document discusses internetworking models and the OSI reference model. It provides details on each of the 7 layers of the OSI model:
1. The Application layer handles communication between applications and users.
2. The Presentation layer translates and formats data for transmission.
3. The Session layer establishes and manages communication sessions between devices.
4. The Transport layer segments data, establishes logical connections, and ensures reliable delivery between hosts.
This document provides an overview of computer networks and data communications. It discusses trends driving changes in network requirements, common network types including LANs and WANs, and technologies like circuit switching, packet switching, and frame relay. It also compares the OSI reference model to the TCP/IP model and summarizes key functions of each layer, including physical, data link, network, and transport layers.
This document provides an overview of basic local area network (LAN) concepts including definitions, hardware, media, and sample implementations. It defines a LAN as a group of computers and devices sharing resources within a small geographic area. Common LAN hardware includes hubs, switches, bridges, and routers which connect devices and segment traffic at different OSI model layers. Wired media include twisted pair, coaxial, and fiber optic cables while common wireless technologies are Wi-Fi and WiMax. Sample configurations show home and business LAN setups connecting devices via these components.
The document discusses different network topologies including mesh, star, bus, ring, tree, and hybrid topologies. For each topology, it describes the logical layout, advantages, disadvantages, and examples of applications. Mesh topology has every device connected to every other device but requires a large amount of cabling. Star topology has each device connected to a central hub, requiring less cabling than mesh. Bus topology uses a single backbone that devices connect to via taps. Ring topology passes signals in one direction between devices connected in a closed loop. Tree topology connects multiple star networks. A hybrid uses elements of different topologies under a single backbone. Factors like cost, cable needs, growth and cable type should be considered when choosing a topology
The document discusses various topics related to computer networking including:
1. Networking involves connecting computing devices like PCs and printers to share information and resources using physical or logical connections.
2. Common network models include client-server, peer-to-peer, and domain models.
3. Network topologies describe how network elements are physically connected and include bus, star, ring, tree, mesh, and hybrid topologies.
The document discusses various network architectures including Token Ring, Ethernet, FDDI, AppleTalk, ARCNET, and MAN systems. Token Ring uses a logical ring topology and token passing for data transfer. It has advantages like no data collisions but disadvantages if links are malfunctioning. Ethernet uses CSMA/CD and can use any physical topology. FDDI provides high performance over fiber optic cables in a token ring architecture. AppleTalk was an early client-server system for Macintosh. ARCNET uses token passing over coaxial cable and supports up to 255 nodes. MAN connects different LANs over large distances.
manual on networking cabling with pratical guideNuhuSamaila
1. Configure the IP addresses of the client computers to be in the same subnet as the host computer sharing the internet connection. 2. Use ping and tracert commands on the client computers to test connectivity to the host and internet gateway. 3. Use ipconfig to view and confirm TCP/IP settings like IP addresses, subnet masks, and default gateways on all computers match the LAN configuration.
Students will first study basic networking commands like ping and tracert using Command Prompt to test network connectivity. They will then configure the network settings of both a host computer and client computers to share an internet connection on the LAN. The host will be configured to act as a DHCP server to automatically assign IP addresses to connected clients. Students will use networking configuration commands to set the host IP as 192.168.0.1 and enable internet connection sharing.
The document describes the seven-layer OSI model. It provides details about each layer, including the physical layer which transmits individual bits, the data link layer which provides error-free data transfer, the network layer which routes packets between devices, the transport layer which ensures reliable delivery of data, the session layer which establishes interactions between devices, and the presentation layer which converts data formats.
Network components include nodes, links, clients, servers, and other devices that connect and allow communication between systems. Key components discussed include network interface cards, hubs, bridges, routers, switches, gateways, and wireless devices. Various media are used to physically transmit data between nodes on a network.
A computer network allows devices to connect and exchange data either through cables or wirelessly. Network nodes include devices that originate, route, and terminate data transmission like servers, personal computers, and networking hardware. Different types of computer networks exist like personal area networks for communication among nearby devices, local area networks for connecting devices within a home or office, and wide area networks for linking local and metropolitan networks across broad areas.
This document provides an overview of the OSI model and focuses on the physical and data link layers. It discusses that the OSI model defines a 7-layer framework for network communication and each layer has distinct functions. The physical layer deals with physical transmission and encoding of data, while the data link layer establishes reliable transmission between directly connected nodes through framing, addressing, error control and access control. The document explains the responsibilities and key concepts of both the physical and data link layers in the OSI model.
This document summarizes computer networking concepts including switches, hubs, and the differences between them. It defines a switch as a networking device that connects multiple computers within a local area network and operates at the data link layer. The document describes how switches work by examining destination MAC addresses in packets and updating their MAC address tables to forward packets to the correct port. It also lists characteristics of switches such as using MAC addressing and filtering data. The document then defines a hub as a basic networking device that broadcasts all traffic to all ports without intelligence about destinations. It provides details on how hubs work and compares hubs to switches, noting that switches can selectively forward data while hubs broadcast to all ports.
This document discusses network architecture and design. It covers component architectures, addressing and routing architectures, network management architecture, performance architecture, and security architecture. Some key points include:
- Component architecture describes how network functions are applied using hardware and software mechanisms.
- Addressing involves applying identifiers to network devices, while routing learns connectivity and forwards packets. Common addressing mechanisms include subnetting, super-netting, dynamic addressing, and private/public addressing.
- Network management architecture provides functions for controlling, planning, and monitoring network resources using mechanisms like monitoring, instrumentation, and configuration.
- Performance architecture allocates network resources to users and applications using mechanisms like quality of service, resource control, service level agreements, and policies.
This project involves designing a network system for a 3-floor building with various devices and security features. The network connects 33 computers, 13 switches, motion detectors, CCTV cameras, servers, access points and other devices. The ground floor contains a parking area with security doors and smart lights. The first and second floors contain offices, training rooms, and a server room. All devices connect through switches to servers that provide DNS, DHCP, email, FTP and IOT functions. The total cost of the project is estimated at 2,426,755 Taka using a combination of star and hybrid network topologies with routers, switches and servers to maintain security.
This Presentation consists of the detailed analysis of OSI & TCP/IP Model used for data transmission in Computer Network. It is very beneficial for any BTech, BCA, MCA, MTech students, or who is interested in networking field.
The document provides information about a learning module on computer networks for secondary school students in Malaysia. The module contains 4 activities that aim to teach students about:
1) Definitions of networks and the benefits of computer networks.
2) Different types of computer networks including local area networks (LAN), metropolitan area networks (MAN), and wide area networks (WAN).
3) Network topologies like star networks and ring networks.
4) Current network technologies.
The module is intended to help students understand computer networks, be able to define them, identify the devices used, explain different types of networks and topologies, and discuss modern network technologies.
The document provides an overview of computer networking concepts including:
- The evolution of networking from ARPANET in the 1960s to the modern Internet.
- Common network topologies like bus, star, ring, and mesh configurations.
- Different transmission media and network devices.
- Key networking services and the need for resource sharing between connected devices.
- Important terminology related to data communication standards and switching techniques.
The document discusses basics of computer networks. It defines data communication and its key characteristics like delivery, accuracy and timeliness. The basic components of a communication model are identified as the message, protocol, sender, receiver and transmission medium. Different data types like text, numbers, images, audio and video are represented as bit patterns for transmission. Types of networks like personal area network, local area network, wide area network, campus area network and metropolitan area network are classified based on their geographical span, interconnectivity, administration and architecture.
The document discusses internetworking models and the OSI reference model. It provides details on each of the 7 layers of the OSI model:
1. The Application layer handles communication between applications and users.
2. The Presentation layer translates and formats data for transmission.
3. The Session layer establishes and manages communication sessions between devices.
4. The Transport layer segments data, establishes logical connections, and ensures reliable delivery between hosts.
This document provides an overview of computer networks and data communications. It discusses trends driving changes in network requirements, common network types including LANs and WANs, and technologies like circuit switching, packet switching, and frame relay. It also compares the OSI reference model to the TCP/IP model and summarizes key functions of each layer, including physical, data link, network, and transport layers.
This document provides an overview of basic local area network (LAN) concepts including definitions, hardware, media, and sample implementations. It defines a LAN as a group of computers and devices sharing resources within a small geographic area. Common LAN hardware includes hubs, switches, bridges, and routers which connect devices and segment traffic at different OSI model layers. Wired media include twisted pair, coaxial, and fiber optic cables while common wireless technologies are Wi-Fi and WiMax. Sample configurations show home and business LAN setups connecting devices via these components.
The document discusses different network topologies including mesh, star, bus, ring, tree, and hybrid topologies. For each topology, it describes the logical layout, advantages, disadvantages, and examples of applications. Mesh topology has every device connected to every other device but requires a large amount of cabling. Star topology has each device connected to a central hub, requiring less cabling than mesh. Bus topology uses a single backbone that devices connect to via taps. Ring topology passes signals in one direction between devices connected in a closed loop. Tree topology connects multiple star networks. A hybrid uses elements of different topologies under a single backbone. Factors like cost, cable needs, growth and cable type should be considered when choosing a topology
The document discusses various topics related to computer networking including:
1. Networking involves connecting computing devices like PCs and printers to share information and resources using physical or logical connections.
2. Common network models include client-server, peer-to-peer, and domain models.
3. Network topologies describe how network elements are physically connected and include bus, star, ring, tree, mesh, and hybrid topologies.
The document discusses various network architectures including Token Ring, Ethernet, FDDI, AppleTalk, ARCNET, and MAN systems. Token Ring uses a logical ring topology and token passing for data transfer. It has advantages like no data collisions but disadvantages if links are malfunctioning. Ethernet uses CSMA/CD and can use any physical topology. FDDI provides high performance over fiber optic cables in a token ring architecture. AppleTalk was an early client-server system for Macintosh. ARCNET uses token passing over coaxial cable and supports up to 255 nodes. MAN connects different LANs over large distances.
manual on networking cabling with pratical guideNuhuSamaila
1. Configure the IP addresses of the client computers to be in the same subnet as the host computer sharing the internet connection. 2. Use ping and tracert commands on the client computers to test connectivity to the host and internet gateway. 3. Use ipconfig to view and confirm TCP/IP settings like IP addresses, subnet masks, and default gateways on all computers match the LAN configuration.
Students will first study basic networking commands like ping and tracert using Command Prompt to test network connectivity. They will then configure the network settings of both a host computer and client computers to share an internet connection on the LAN. The host will be configured to act as a DHCP server to automatically assign IP addresses to connected clients. Students will use networking configuration commands to set the host IP as 192.168.0.1 and enable internet connection sharing.
Basic networking in power point by suprabhaSuprabha Sahoo
Computer networking allows for the sharing of data and resources between connected computers. The main purpose is sharing information, hardware, software, and administration. Connected devices include network interface cards, cables, hubs/switches, routers, and network software. Common network topologies are peer-to-peer and client-server. Common network types include local area networks within an office and metropolitan area networks within a city.
The document discusses the key differences between packet switching and circuit switching networks. Packet switching breaks messages into packets that are sent independently over multiple routes, while circuit switching establishes a dedicated connection for the duration of a call. Some advantages of packet switching are more efficient use of bandwidth and easier scalability, while circuit switching guarantees quality of service and full bandwidth for calls.
The document provides information about experimenting with RJ45 and Cat6 cabling using a crimping tool. It discusses the specifications of CAT6 cable and how it is an improved standard over previous categories. It also describes how to properly crimp RJ45 connectors onto cable and defines the straight-through and crossover wiring configurations. The document further explains how to install and use Cisco Packet Tracer for network simulations.
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxpicklesvalery
Supportive Security Policies in SOHO
Topic: SUPPORTIVE SECURITY POLICIES IN SOHO
NETWORKING
It is a supportive system of sharing information and services among individuals and groups having a common interest.
A local-area network (LAN) is basically defined as two or more computers connected by a structured wire system for the purpose of sharing resources and files. In this chapter we will explain the various ‘structured wire systems’ that the Network Engineer will deal with during the course of their job. Wireless LANs are becoming more and more popular, but even these devices rely on some amount of physical wires in most cases.
REQUIREMENTS
Network Adapter
A computer needs a network adapter to connect to a network. It converts computer data into electronic signals. It listens for silence on the network cable and applies the data to it when it has an opportunity. The network access element of its job is called Media Access Control, or MAC. The physical address of every computer on a network is called its MAC address. The MAC address is the network adapter's serial number. Most computers are shipped with the network adapter integrated into the motherboard. However, early PCs didn't include this function and computer owners had to buy it separately and fit it into an expansion slot on the motherboard. These were called "network cards" because they were sold on a separate card. Although network adapters are now integrated, the name network card is still used. The wireless equivalent is called a Wireless Network Interface Controller.
Network Medium
Wired networks need cable. The most common form of cable used in networks is called the "Unshielded Twisted Pair." In PC shops, it is generally just referred to as "network cable" or "Ethernet cable." Ethernet is the most widely implemented set of standards for the physical properties of networks. UTP is so closely identified with Ethernet that it is often given that name. Other cable types used for networks are twin-axial, Shielded Twisted Pair and single-mode and multi-mode fiber optic cable. Wireless networks don't need cable; they send data on radio waves generated by the WNIC.
Cable Connectors
In wired networks, the most common form of connector is the RJ45. Every computer with networking capabilities has an RJ45 port. This is sometimes called a "network port" or an "Ethernet port." The RJ45 plug looks like a slightly larger telephone plug and connects the Unshielded Twisted Pair or the Shielded Twisted Pair cable.
Power Supply
Both wired and wireless networks need a power supply. A wireless network uses the current to generate radio waves. A cabled network sends data interpreted as an electronic pulse.
Hub/Switch/Router
In wired networks, one computer cannot connect to many others without some form of splitter. A hub is little more than a splitter. It repeats any signals coming into one of its ports out onto all its other ports. A cable leads from each port to one computer. A switch ...
The document discusses key concepts of networking including the three basic elements required: network hardware, software, and protocols. It describes common network types like LAN, WAN, and MAN and compares peer-to-peer and server-based networks. The OSI reference model and TCP/IP model are explained along with common network devices, cabling, and IP addressing schemes.
The document discusses network infrastructure management and provides details on networking devices and concepts. It covers networking scenarios and infrastructure, commonly used devices like switches, hubs, routers, and wireless devices, and cable types. Specific sections are devoted to explaining switches, routers, VPNs, modems and their classifications. Wireless technologies like WiFi, Bluetooth, and WiMax are also summarized.
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptJayaprasanna4
This document provides an overview of the network layer and IP addressing. It discusses:
1) The functions and position of the network layer based on the OSI and TCP/IP models. The key duty is interconnecting different networks and making them appear as a single network.
2) Duties of the network layer including uniquely addressing devices, packetizing data, routing packets between networks, and fragmentation. IP is the primary network layer protocol.
3) IP addressing including the concepts of unicast, multicast, and classful addressing schemes. It also covers converting between binary and dotted-decimal notation for IP addresses.
For beginners in Computer Networking field, know about basics about what is Computer Networks, what are ways through which we can communicate, what is meant by protocols, he famous OSI its layers and TCP/IP and its layers, What makes a Networking Device, basic topologies of Computer Networks, special purpose network devices like Switch, routers, repeter, bridges and hub, and basics of networking methods, basics of ethernet, TCP its characteristics, UDP, TCP vs UDP, One would wonder what happens when information particular to each layer is read by the corresponding protocols at target machine or why is it required?
1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdfsadoyah492
The document discusses various networking devices and network layer attacks. It begins by defining networking devices that operate at different layers, such as network interface cards, routers, switches, hubs, bridges, and gateways. It then covers different types of network layer attacks like IP spoofing, hijacking, Smurf attacks, wormhole attacks, and others. The document provides details on each attack method, how they are carried out, and their impact on network communication.
Network system on Ahsanullah University of Science & TechnologyManas Saha
This document provides an overview of the network system at Ahsanullah University of Science & Technology (AUST) in Bangladesh. It describes the types of networks, topologies, hardware, and media used. The university uses both wired and wireless networks to connect computers. The wired network uses UTP and fiber optic cables in a star topology. Routers, switches, and servers connect the departments and buildings. The wireless network provides internet access across campus. In total, the network system at AUST effectively connects computers to share resources while managing bandwidth usage.
Introduction to networking by vikas jagtapVikas Jagtap
Network :- “A group of computers & other devices (such as workstations, printers, or servers) that are linked together is called as Network.”
Networking :- “The concept of connected computers sharing information, resources, or both is called as Networking.”
This document provides information about the network structure of Ashok Leyland's Alwar unit. It discusses how the network is connected through the Ennore Data Center which acts as the central hub. It also has a disaster management unit in Hosur as a backup. The data center is connected to customers, dealers and suppliers through various portals. The network uses both Reliance and BSNL connections with the ability to shift the entire workload to one if the other fails. Diagrams show how the connections are implemented through both the radio link and optical fiber link using various networking devices.
The document discusses computer networks and networking concepts. It defines what a computer network is and provides examples of common network devices like routers, switches, hubs, bridges and modems. It explains how these devices work and their purposes. The document also discusses network connection methods like WiFi and Bluetooth. It outlines the advantages and disadvantages of networks as well as factors to consider when using different connection types.
This document provides instruction on setting up and configuring a wireless network. It begins by reviewing concepts covered in previous lessons, such as connecting computers via Ethernet cables and switches, and connecting a network to the internet via a router. It then discusses more advanced scenarios that require additional devices, such as connecting to nearby networks using switches or repeaters, and extending the wireless network range using wireless access points. The document provides detailed steps for configuring routers, switches, repeaters and wireless access points, including assigning IP addresses via DHCP. It also defines key terms like DHCP, firewall and wireless network configuration.
1. A computer network is an interconnected collection of autonomous computers and devices that communicate and share resources using physical wires, cables, or wireless connections.
2. The main goals of networks are resource sharing, reliability through file copies, lower costs by sharing one file server, and improved communication.
3. Common network applications include sharing data, peripherals, control/access, accessing remote databases, and communication facilities.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
The document contains a practice exam for CCNA 1 with multiple choice questions about networking concepts. It covers topics like the OSI model, TCP/IP, IPv4 and IPv6 addressing, routing, switching, and troubleshooting. An example question asks which layer of the OSI model would format data as shown in an exhibit. The correct answer is the data link layer.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
2. CSE-310 F Computer Network Lab
L T P
- - 3 Class Work : 25 Marks
Exam : 25 MARKS
Total : 50 Marks
This course provides students with hands on training regarding the design, troubleshooting,
modeling and evaluation of computer networks. In this course, students are going to
experiment in a real test-bed networking environment, and learn about network design and
troubleshooting topics and tools such as: network addressing, Address Resolution Protocol
(ARP), basic troubleshooting tools (e.g. ping, ICMP), IP routing (e,g, RIP), route discovery
(e.g. traceroute), TCP and UDP, IP fragmentation and many others. Student will also be
introduced to the network modeling and simulation, and they will have the opportunity to
build some simple networking models using the tool and perform simulations that will help
them evaluate their design approaches and expected network performance.
3. S.No Experiment
1 Study of different types of Network cables and Practically implement the
cross-wired cable and straight through cable using clamping tool.
2 Study of Network Devices in Detail.
3 Study of network IP.
4 Connect the computers in Local Area Network.
5 Study of basic network command and Network configuration commands.
6 Configure a Network topology using packet tracer software.
7 Configure a Network topology using packet tracer software.
8 Configure a Network using Distance Vector Routing protocol.
9 Configure Network using Link State Vector Routing protocol.
5. EXPERIMENT-1
Aim: Study of different types of Network cables and Practically implement the cross-wired
cable and straight through cable using clamping tool.
Apparatus (Components): RJ-45 connector, Climping Tool, Twisted pair Cable
Procedure: To do these practical following steps should be done:
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter
the characteristics of your cable, or even worse render is useless. Check the wires, one more
time for nicks or cuts. If there are any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable
must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'.
At this point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made
cable, with one of the ends whacked off, you only have one end to install - the crossed over
end. Below are two diagrams, which show how you need to arrange the cables for each type
of cable end. Decide at this point which end you are making and examine the associated
picture below.
Diagram shows you how to prepare Cross wired connection
7. EXPERIMENT-2
Aim: Study of following Network Devices in Detail
• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way
Apparatus (Software): No software or hardware needed.
Procedure: Following should be done to understand this practical.
1. Repeater:Functioning at Physical Layer.A repeater is an electronic device that receives a
signal and retransmits it at a higher level and/or higher power, or onto the other side of an
obstruction, so that the signal can cover longer distances. Repeater have two ports ,so cannot
be use to connect for more than two devices
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of the
OSI model. The device is a form of multiport repeater. Repeater hubs also participate in
collision detection, forwarding a jam signal to all ports if it detects a collision.
3. Switch:A network switch or switching hub is a computer networking device that
connects network segments.The term commonly refers to a network bridge that processes and
routes data at the data link layer (layer 2) of the OSI model. Switches that additionally
process data at the network layer (layer 3 and above) are often referred to as Layer 3 switches
or multilayer switches.
4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device
that behaves according to the IEEE 802.1D standard. A bridge and switch are very much
alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used
interchangeably with bridge.Bridges can analyze incoming data packets to determine if the
bridge is able to send the given packet to another segment of the network.
5. Router: A router is an electronic device that interconnects two or more computer
networks, and selectively interchanges packets of data between them. Each data packet
contains address information that a router can use to determine if the source and destination
are on the same network, or if the data packet must be transferred from one network to
another. Where multiple routers are used in a large collection of interconnected networks, the
routers exchange information about target system addresses, so that each router can build up
a table showing the preferred paths between any two systems on the interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing with
8. another network that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching
devices, rate converters, fault isolators, or signal translators as necessary to provide
system interoperability. It also requires the establishment of mutually acceptable
administrative procedures between both networks.
• A protocol translation/mapping gateway interconnects networks with different
network protocol technologies by performing the required protocol conversions.
9. EXPERIMENT- 3
Aim: Study of network IP
• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA
Procedure: Following is required to be study under this practical.
• Classification of IP address
As show in figure we teach how the ip addresses are classified and when they are used.
Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.
• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet
address.
• Super netting
Why we develop super netting and How to calculate supernet mask and how to identify
supernet address.
10. EXPERIMENT-4
Aim: Connect the computers in Local Area Network.
Procedure: On the host computer
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under
Dial-up / other network available.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to connect
through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection
whenever a computer on my network attempts to access the Internet check box if you
want to permit your computer to automatically connect to the Internet.
10. Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address
192.168.0.1. Your computer may lose connectivity with other computers on your network. If
these other computers have static IP addresses, it is a good idea to set them to obtain their IP
addresses automatically. Are you sure you want to enable Internet Connection Sharing?
11. Click Yes.
The connection to the Internet is shared to other computers on the local area network (LAN).
The network adapter that is connected to the LAN is configured with a static IP address of
192.168.0.1 and a subnet mask of 255.255.255.0
On the client computer
To connect to the Internet by using the shared connection, you must confirm the LAN adapter
IP configuration, and then configure the client computer. To confirm the LAN adapter IP
configuration, follow these steps:
1. Log on to the client computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
11. 3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet mask, and
default gateway:
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
12. Quit Control Panel.
12. EXPERIMENT- 5
Aim: Study of basic network command and Network configuration commands.
Apparatus (Software): Command Prompt And Packet Tracer.
Procedure: To do this EXPERIMENT- follows these steps:
In this EXPERIMENT- students have to understand basic networking commands e.g ping,
tracert etc.
All commands related to Network configuration which includes how to switch to privilege
mode and normal mode and how to configure router interface and how to save this
configuration to flash memory or permanent memory.
This commands includes
• Configuring the Router commands
• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands e.g. show ip route etc.
ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds,
you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a
machine is alive. If there is no response, you know something is wrong.
13. Traceroute:
Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop'
from router to router takes.
14. nslookup:
Displays information from Domain Name System (DNS) name servers.
NOTE :If you write the command as above it shows as default your pc's server name firstly.
pathping:
A better version of tracert that gives you statics about packet lost and latency.
15. Getting Help
In any command mode, you can get a list of available commands by entering a question mark (?).
Router>?
To obtain a list of commands that begin with a particular character sequence, type in those
haracters followed immediately by the question mark (?).
Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument. Include
a space before the question mark.
Router#configure ?
memory Configure from NV memory
network Configure from a TFTP network host
terminal Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters to make the
command unique from other commands. For example, you can abbreviate the show command to
sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes to memory
because if you do not they will be lost if there is a system reload or power outage. There are two
types of configuration files: the running (current operating) configuration and the startup
configuration.
Use the following privileged mode commands to work with configuration files.
16. • configure terminal – modify the running configuration manually from the terminal.
• show running-config – display the running configuration.
• show startup-config – display the startup configuration.
• copy running-config startup-config – copy the running configuration to the startup
configuration.
• copy startup-config running-config – copy the startup configuration to the running
configuration.
• erase startup-config – erase the startup-configuration in NVRAM.
• copy tftp running-config – load a configuration file stored on a Trivial File
Transfer Protocol (TFTP) server into the running configuration.
• copy running-config tftp – store the running configuration on a TFTP server.
IP Address Configuration
Take the following steps to configure the IP address of an interface.
Step 1: Enter privileged EXEC mode:
Router>enable password
Step 2: Enter the configure terminal command to enter global configuration mode.
Router#config terminal
Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for Cisco
2500 series) to enter the interface configuration mode.
Example:
Router (config)#interface ethernet 0/1
Step 4: Enter the IP address and subnet mask of the interface using the ip address ipaddress
subnetmask command.
Example,
Router (config-if)#ip address 192.168.10.1 255.255.255.0
Step 5: Exit the configuration mode by pressing Ctrl-Z
Router(config-if)#[Ctrl-Z]
17. EXPERIMENT-6
Aim: Configure a Network topology using packet tracer software.
Apparatus (Software): Packet tracer Software
Procedure: To implement this practical following network topology is required to be
configured using the commands learned in previous practical.
After configuring the given network a packet should be ping from any one machine to
another.
Router0 Configuration Command :.........
Continue with configuration dialog? [yes/no]: no
18. Press RETURN to get started!
Router>
Router>Enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname router0
router0(config)#interface fastethernet 0/0
router0(config-if)#ip address 192.168.1.1 255.255.255.0
router0(config-if)#description router0 fastethernet 0/0
router0(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
router0(config-if)#exit
router0(config)#interface fastethernet 0/1
router0(config-if)#description router0 fastethernet 0/1
router0(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
router0(config-if)#exit
router0(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
router0#show running-config
Building configuration...
Current configuration : 437 bytes
19. !
version 12.4
no service password-encryption
!
hostname router0
!
!
!
!
!
ip ssh version 1
!
!
interface FastEthernet0/0
description router0 fastethernet 0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
description router0 fastethernet 0/1
no ip address
duplex auto
speed auto
!
interface Vlan1
no ip address
20. shutdown
!
ip classless
!
!
!
!
!
line con 0
line vty 0 4
login
!
!
end
router0#
router0#
router0#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
router0#
21. EXPERIMENT-7
Aim: Configure a Network topology using packet tracer software.
Apparatus (Software): Packet tracer Software
Procedure: To implement this practical following network topology is required to be
configured using the commands learned in previous practical.
After configuring the given network a packet should be ping from any one machine to
another.
Router0 Configuration Command.........
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 192.168.0.254 255.255.255.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to
up
Router(config-if)#exit
22. Router(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface FastEthernet0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial2/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial2/0, changed state to down
Router(config-if)#exit
Router(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
Router#wr
Building configuration...
[OK]
Router#show running-config
Building configuration...
Current configuration : 542 bytes
!
version 12.2
no service password-encryption
!
hostname Router
!
!
!
!
!
ip ssh version 1
!
!
interface FastEthernet0/0
ip address 192.168.0.254 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet1/0
no ip address
duplex auto
speed auto
shutdown
!
interface Serial2/0
ip address 192.168.1.1 255.255.255.0
!
23. interface Serial3/0
no ip address
shutdown
!
interface FastEthernet4/0
no ip address
shutdown
!
interface FastEthernet5/0
no ip address
shutdown
!
ip classless
!
!
!
!
!
line con 0
line vty 0 4
login
!
!
end
Router#
Router1 Configuration Command.......
Continue with configuration dialog? [yes/no]: no
Press RETURN to get started!
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface Serial2/0
Router(config-if)#ip address 192.168.1.2 255.255.255.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial2/0, changed state to up
Router(config-if)#exit
Router(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
Router#config t
24. Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
Router(config)#interface Serial2/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 192.168.2.254 255.255.255.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to
up
Router(config-if)#exit
Router(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
Router#wr
Building configuration...
[OK]
Router#
Router#show running-config
Building configuration...
Current configuration : 542 bytes
!
version 12.2
no service password-encryption
!
hostname Router
!
!
!
!
!
ip ssh version 1
!
!
interface FastEthernet0/0
ip address 192.168.2.254 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet1/0
no ip address
duplex auto
speed auto
shutdown
!
interface Serial2/0
ip address 192.168.1.2 255.255.255.0
!
25. interface Serial3/0
no ip address
shutdown
!
interface FastEthernet4/0
no ip address
shutdown
!
interface FastEthernet5/0
no ip address
shutdown
!
ip classless
!
!
!
!
!
line con 0
line vty 0 4
login
!
!
end
Router#
IP ROUTE Command.....
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 192.168.2.0 255.255.255.0 192.168.2.2
Router(config)#exit
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 192.168.2.0/24 is directly connected, FastEthernet0/0
C 192.168.1.2/24 is directly connected, Serial2/0
S 192.168.2.0/24 [1/0] via 192.168.1.2
Router#
26. IP ROUTE Command.....
Router>enable
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
S 192.168.0.0/24 [1/0] via 192.168.1.1
C 192.168.0.0/24 is directly connected, FastEthernet0/0
C 192.168.1.1/24 is directly connected, Serial2/0
Router#
27. EXPERIMENT- 8
Aim: Configure a Network using Distance Vector Routing protocol.
• RIP
Apparatus (Software): packet tracer software
Procedure:
1. Develop a Topology shown in figure given below.
3. Configure all Routers
4. Implement RIP protocols in Router to configure Network.
Router0 configuration.....
Continue with configuration dialog? [yes/no]: no
Press RETURN to get started!
Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
34. EXPERIMENT- 9
Aim: Configure Network using Link State Vector Routing protocol.
• OSPF
Apparatus (Software): Packet Tracer Software
Procedure:
1. Develop a Topology shown in figure given below.
2. Configure all the workstations
3. Configure all switches
4. Configure all Routers
5. Implement OSPF protocols in Router to configure Network.