Computer Networking Programming(NEP)
Computer Networking
These are the BCA NEP programs
computer networking technology
computer networking technology
First basically install packet tracer tool based on your system configuration
https://www.netacad.com/courses/packet-tracer use this link and download the software
Program1:Execute the following commands:
a)arp b) ipconfig c) hostname d) netdiag e) netstat f) nslookup g) pathping h) ping route i) tracert
a)ARP:(address resolution protocol) it is used in networking to map an ip address to an mac address
a device wants to communicate with another device on the same network arp it is an fundamental protocol of an Ethernet Networks.
output:
b) ipconfig:(internet protocol) is a command-line tool used in operating systems to display the current network configuration of a device.
when we give the ipconfig command it displays
*IP address assigned to the device
*Subnet mask used by the device
*Default gateway IP address
*DNS server IP addresses
*MAC address of the device's network interface(s)
output:
c) hostname: that is used to display the hostname of a device on a network where it has a unique name that identifies a device on a network and is used to distinguish it from other devices. It is often set to a domain name or a fully qualified domain name (FQDN).
d) netdiag: (Network Diagnostics) is a command-line tool that is used to diagnose network connectivity issues on Windows operating systems. which is a collection of administrative tools for managing and troubleshooting Windows-based networks.
It performs a series of tests to diagnose network connectivity issues.
*Checking network configuration settings, such as IP address, subnet mask, default gateway, and DNS server settings.
*Testing network connectivity by pinging the default gateway, DNS server, and other devices on the network.
*Checking for DHCP and DNS server availability and functionality.
*Checking the status of network adapters and related services.
e) netstat: (network statistics) used in various operating systems to display information about network connections, network interface statistics
which also shows active network connections, in the protocol used, the local and remote IP addresses, and the state of the connection. It can also display the routing table, which also display the detailed information about the network paths that data takes to reach its destination.
f) nslookup:It also know as (name server lookup) it is a command-line used to display the doamin name systems(DNS) to display information of the domain/ip address it allowing computers to communicate with each other using human-readable domain names insted to numerical ip addresses
It also display the various types of DNS records for an given domain or ip
*A(address) records, which map a doamain
*MX (main exchange) he mail servers responsible for handling email
*NS (name server) records, which specify the authoritative name servers
*PTR (pointer) records, which map an IP address to a domain name (reverse DNS lookup)
g) pathping:It is a command-line network tool which is available in Windows Operating Systems used to trace the path of the network of the source and destination the features of the ping commands, providing a more detailed accurate picture of the path
when pathping command sends packets to each router on the path to the destination and it measures the time taken of each packet to travel in router and it also records the loss of teh packet at each host as well as the round-trip time(RTT) for each router.
syntax:-[pathping [-n] [-h maximum_hops] [-w timeout] destination]
h) ping route: ping route it is not a command tool it refers using the ping command to test the connectivity of a specific network when we ping to test a route, you would typically ping each host along the route the destination of the route to check the router working correctly and identify any potential issues
Syntax:-[ping <destination_IP_address_or_hostname>]
i) tracert:It is also called as "traceroute" it is a command-line which available in windows operating systems used to trace the network path btwn the source and destination which sends packets with gradually increasing "time-to-live" to each router's or a network along the path to the destination which is to identify the specific routers being traversed the time takes for packets to reach each one
Syntax:-[tracert [-d] [-h maximum_hops] [-w timeout] destination]
Program2: Study of different types of network cables.
computer network, providing the physical medium for transmitting data between devices. There are several types of network cables available
1:Coaxial Cables:
RG-6: RG-6 cables are commonly used for cable television (CATV) and satellite TV installations. They have low signal loss and provide good shielding against interference.
RG-59: RG-59 cables are older coaxial cables used primarily for analog video transmission. They have higher signal loss compared to RG-6 and are less commonly used today.
2.Fiber Optic Cables:
Single-mode Fiber (SMF): Single-mode fiber cables are designed for long-distance communication and use a single strand of glass or plastic fiber. They can transmit data over several kilometers and support high bandwidths.
Multimode Fiber (MMF): Multimode fiber cables have larger core diameters, allowing multiple light modes to propagate. They are suitable for shorter distances and offer lower cost options compared to single-mode fiber.
3.Twisted Pair Cables:
A cable consists of two thin insulated copper wires twisted to from a spiral .A pair of wires forms a circuit that can transmit data the pairs are twisted to proctect against crosstalk, the noise generated by adjacent pairs
>Unshielded Twisted Pair (UTP): UTP cables are the most common type of network cables used in Ethernet networks. They consist of multiple twisted pairs of insulated copper wires and are available in different categories (Cat5e, Cat6, etc.).
>Shielded Twisted Pair (STP): STP cables are similar to UTP cables but with additional shielding to protect against electromagnetic interference. They are commonly used in environments with high interference or noise.
Types of unguided Transmission media
>Radio Transmission: it's frequency is between 10Khz to 1Ghz. It is simple to install and has high attenuation. These waves are used for multicat communicaiton
Types of propagation:
1.Microwaves: It is a line a sight transmission to send and receving antennas need to be properly aligned with each other. The distance covered by the signal is directly proportional to the height of the anntenna frequency:-1Ghz-300Ghz
2.Infrared:Infrared :waves are used for very short distance communicaiton and they cannot be penetrate through obstacles & it prevents interference between systems. frequency:-300Ghz-400Thz
Program3: Practically implement the cross-wired cable and straight wired cable using crimping tool
> Materials
Ethernet cable (CAT5e, CAT6, or CAT6a)
RJ-45 connectors (8P8C connectors) - 2 for each cable
Crimping tool
Wire stripper or utility knife
Cable tester (optional but recommended)
Step-by-step guide to creating a Cross-Wired Cable (Crossover Cable):
1.Strip the Cable: Use a wire stripper or utility knife to strip approximately 1.5 inches (3-4 cm) of the outer jacket from both ends of the Ethernet cable. Be careful not to cut into the individual wires inside.
2.Untwist and Arrange Wires: Untwist the wires and separate them into four pairs, using the color-coding standards (T568A or T568B) for both ends of the cable. Make sure both ends follow the same standard.
3.Cross the Wires: To create a crossover cable, you'll need to cross the following wires on one end of the cable:
Pin 1 (white/orange) to Pin 3 (white/green)
Pin 2 (orange) to Pin 6 (green)
Pin 3 (white/green) to Pin 1 (white/orange)
Pin 6 (green) to Pin 2 (orange)
Trim Excess Wires: Trim any excess wires to ensure they are all of the same length, leaving about 0.5 inches (1-1.5 cm) extending from the outer jacket
4.Insert Wires into RJ-45 Connector: Carefully insert the wires into the RJ-45 connector in the proper order, following the color-coding standard (T568A or T568B) you have chosen. Make sure the wires reach the end of the connector, and double-check the order before crimping.
5.Crimp the Connector: Place the RJ-45 connector into the crimping tool and apply firm pressure to crimp the connector onto the cable. Ensure the connector's contacts penetrate the wires fully.
6.Repeat the Process: Follow the same steps to create the other end of the cross-wired cable.
Step-by-step guide to creating a Straight Cable (Straight-Through Cable):
7.Strip the Cable: Use a wire stripper or utility knife to strip approximately 1.5 inches (3-4 cm) of the outer jacket from both ends of the Ethernet cable. Be careful not to cut into the individual wires inside.
8.Untwist and Arrange Wires: Untwist the wires and separate them into four pairs, using the color-coding standards (T568A or T568B) for both ends of the cable. Make sure both ends follow the same standard.
9.Arrange Wires Straight-Through: For a straight cable, arrange the wires in the same order on both ends of the cable. Do not cross any wires.
10.Trim Excess Wires: Trim any excess wires to ensure they are all of the same length, leaving about 0.5 inches (1-1.5 cm) extending from the outer jacket.
11.Insert Wires into RJ-45 Connector: Carefully insert the wires into the RJ-45 connector in the proper order, following the color-coding standard (T568A or T568B) you have chosen. Make sure the wires reach the end of the connector, and double-check the order before crimping.
12.Crimp the Connector: Place the RJ-45 connector into the crimping tool and apply firm pressure to crimp the connector onto the cable. Ensure the connector's contacts penetrate the wires fully.
13.Repeat the Process: Follow the same steps to create the other end of the straight cable
Once you have created both the crossover and straight cables, you can use a cable tester (if available) to verify that the connections are correct and the cables are working as intended. The cable tester will indicate whether the cables are properly wired and if there are any issues with the connections.
Program4: Study of network IP address configuration: (Classification of address, static and dynamic address)
>
The study of network IP address configuration involves understanding the different types of IP addresses and how they are used in computer networks. IP addresses are unique numerical identifiers assigned to devices on a network, allowing them to communicate with each other using the Internet Protocol (IP).
1.Classification of IP Addresses:
IP addresses can be classified into two main categories based on their format: IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6).
a. IPv4 Addresses: IPv4 addresses are 32-bit addresses represented in decimal format with four octets separated by periods. Each octet can have a value between 0 and 255. For example, 192.168.1.10 is an IPv4 address. The widespread adoption of the internet has led to the exhaustion of available IPv4 addresses.
b. IPv6 Addresses: IPv6 addresses are 128-bit addresses represented in hexadecimal format with eight groups of four hexadecimal digits separated by colons. IPv6 was introduced to provide a much larger address space to accommodate the growing number of devices connected to the internet. An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
2.Static IP Addresses:
A static IP address is an IP address that remains constant and does not change over time. It is manually configured on a device, and once set, it stays the same until explicitly changed by the network administrator. Static IP addresses are commonly used for devices that require a fixed and predictable address, such as servers, printers, routers, and network switches. The main advantages of using static IP addresses are:
Predictability: Since the address doesn't change, other devices can reliably connect to the device using the same IP.
Port Forwarding: Static IP addresses are essential for enabling port forwarding, which allows external devices to access specific services hosted on the network.
However, managing static IP addresses can be cumbersome in large networks, and it may lead to IP address conflicts if not carefully planned.
3.Dynamic IP Addresses:
A dynamic IP address is an IP address that is automatically assigned to a device by a Dynamic Host Configuration Protocol (DHCP) server when the device joins the network. DHCP is a network protocol that dynamically allocates IP addresses to devices, ensuring efficient utilization of available IP addresses. Dynamic IP addresses have several advantages, including:
Efficient Use of IP Space: IP addresses are assigned only when needed, and they can be reused when a device disconnects from the network.
Simplified Management: DHCP reduces the manual configuration effort required to set up IP addresses on each device.
Dynamic IP addresses are commonly used for most end-user devices like computers, laptops, smartphones, and tablets, as they do not typically require a fixed address.
In conclusion, the study of network IP address configuration involves understanding the classification of IP addresses into IPv4 and IPv6, and the difference between static and dynamic IP addresses. Each type of IP address has its use cases and benefits, and a well-designed network will often employ a combination of both static and dynamic IP addressing to suit the needs of various devices and services.
Program5: Study of network IP address configuration: (IPv4 and IPv6 , Subnet, Supernet)
>
Understanding network IP address configuration is essential for designing and managing computer networks. IP addresses are numerical labels assigned to devices on a network, allowing them to communicate with each other using the Internet Protocol (IP). There are two versions of IP addresses commonly used: IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6).
1. IPv4 (Internet Protocol version 4):
IPv4 addresses are 32-bit binary numbers, typically represented in decimal form with four sets of numbers separated by periods (e.g., 192.168.0.1). Each number in the address can range from 0 to 255. The total number of unique IPv4 addresses is limited to approximately 4.3 billion, which has led to address exhaustion.
Subnetting and Supernetting:
To efficiently allocate and manage IPv4 addresses, network administrators use subnetting and supernetting techniques. Subnetting involves dividing a large network into smaller subnetworks, each identified by its unique subnet mask. This allows for better organization and improved address space utilization.
Subnet Mask:
A subnet mask is a 32-bit number used to determine the network portion and the host portion of an IP address. It is represented in the same decimal-dotted format as an IP address. The subnet mask contains consecutive ones in the network portion and consecutive zeros in the host portion. For example, the subnet mask 255.255.255.0 means the first 24 bits represent the network, and the last 8 bits represent the host within that network.
Supernetting (CIDR - Classless Inter-Domain Routing):
Supernetting is the opposite of subnetting and is used to aggregate multiple contiguous subnets into a larger block, reducing the size of routing tables and simplifying network management. It is commonly used with CIDR notation, which represents the number of bits used for the network prefix. For instance, 192.168.0.0/24 represents a supernet containing all addresses from 192.168.0.1 to 192.168.0.254.
2. IPv6 (Internet Protocol version 6):
IPv6 addresses are 128-bit binary numbers, represented in hexadecimal format with eight sets of four characters separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334). IPv6 was developed to address the growing need for more unique IP addresses compared to the limited availability in IPv4. With 2^128 unique addresses, IPv6 provides an enormous address space.
Subnetting in IPv6:
Subnetting in IPv6 is similar to IPv4, but due to the large address space, it is more common to use a longer prefix length when subnetting. For example, a typical IPv6 subnet might be represented as 2001:0db8:85a3::/64, where the first 64 bits represent the network, and the remaining 64 bits are available for host addresses within that network.
In conclusion, understanding IPv4 and IPv6 addressing, subnetting, and supernetting is crucial for network administrators to efficiently manage IP address space and ensure smooth communication within a network. Subnetting and supernetting are essential techniques used to optimize address utilization and reduce routing table sizes. IPv6 is gradually replacing IPv4 to accommodate the ever-growing number of devices and services connected to the internet.
Program 6: Study of network devices (Routers,Hub,Switch,Bridge,Repeater,Gateway)
>
Understanding network devices is essential for designing and managing computer networks. Each device plays a specific role in facilitating communication and data transfer within a network. Here's a brief overview of some common network devices:
1. Router:
A router is a networking device that connects multiple networks together and forwards data packets between them. It operates at the network layer of the OSI model and uses IP addresses to make routing decisions. Routers are crucial for connecting different local area networks (LANs) or wide area networks (WANs) and directing traffic efficiently.
2. Hub:
A hub is a simple networking device that operates at the physical layer of the OSI model. It receives incoming data packets and broadcasts them to all devices connected to its ports. Hubs are considered "dumb" devices because they do not examine the destination of the data and do not have any intelligence to make decisions about where to send the data. As a result, they are inefficient and not commonly used in modern networks.
3. Switch:
A switch is a more advanced networking device that operates at the data link layer (Layer 2) of the OSI model. It uses MAC addresses to make forwarding decisions. When a data packet arrives at a switch, it examines the destination MAC address and forwards the packet only to the port where the destination device is connected, rather than broadcasting it to all ports like a hub does. This makes switches more efficient and reduces unnecessary network traffic.
4. Bridge:
A bridge is a networking device that connects two or more network segments (LANs or network segments) and operates at the data link layer (Layer 2) of the OSI model. Like switches, bridges use MAC addresses to make forwarding decisions. They help in dividing a large network into smaller segments to reduce broadcast domains and improve overall network performance.
5. Repeater:
A repeater is a simple device used to extend the range of a network by amplifying and regenerating signals. It operates at the physical layer of the OSI model. When network signals weaken over long distances, repeaters can be deployed to strengthen the signal and allow data to travel further without degradation.
6. Gateway:
A gateway is a device or software that acts as an interface between two different networks using different protocols. It translates data between the networks, allowing them to communicate effectively. Gateways are commonly used to connect local networks (e.g., LANs) to the internet or to connect networks using different communication protocols.
I
In modern networks, hubs are mostly obsolete, replaced by switches, which provide better performance and efficiency. Routers, switches, bridges, repeaters, and gateways play critical roles in ensuring data flows smoothly and efficiently throughout a network, enabling devices to communicate with each other and access resources.
Program 7: Configure and Connect the computer in LAN
>
To configure and connect a computer in a Local Area Network (LAN), follow these steps:
1. Gather Information:
- Obtain the network parameters, such as the IP address range, subnet mask, default gateway, and DNS servers, from the network administrator or router configuration.
2. Physical Connection:
- Connect the computer to the LAN using an Ethernet cable. Plug one end of the cable into the computer's Ethernet port and the other end into an available LAN port on the network switch or router.
3. Configure IP Address (IPv4):
- If the network uses DHCP (Dynamic Host Configuration Protocol), the computer should automatically obtain an IP address, subnet mask, default gateway, and DNS server addresses. In most cases, DHCP is enabled by default on routers.
- If DHCP is not available or not used on the network, you'll need to set a static IP address manually.
- On Windows:
- Go to Control Panel > Network and Sharing Center.
- Click on the network connection (Ethernet) and select "Properties."
- Choose "Internet Protocol Version 4 (TCP/IPv4)" and click on "Properties."
- Select "Use the following IP address" and enter the IP address, subnet mask, default gateway, and DNS server addresses provided by the network administrator.
- Click "OK" to apply the settings.
- On macOS:
- Go to System Preferences > Network.
- Select the Ethernet connection from the left panel and click on "Advanced."
- Go to the TCP/IP tab and select "Manually" from the Configure IPv4 dropdown menu.
- Enter the IP address, subnet mask, router (default gateway), and DNS server addresses provided by the network administrator.
- Click "OK" to save the settings.
4. Configure IP Address (IPv6) [Optional]:
- If the network uses IPv6 and provides IPv6 addresses via DHCPv6, the computer should automatically obtain an IPv6 address.
- If IPv6 is manually configured, follow similar steps as above, but select "Configure IPv6" and enter the appropriate IPv6 address and other parameters.
5. Verify Connectivity:
- Once the IP configuration is done, open a web browser and try accessing a website to test internet connectivity.
- You can also use the "ping" command in the command prompt (Windows) or terminal (macOS) to check connectivity to other devices in the LAN.
By following these steps, you should be able to configure and connect the computer in the LAN successfully. If you encounter any issues, ensure that you have the correct network parameters and that the physical connections are secure. If needed, contact your network administrator for assistance.
Program 8: Block th e website using “Windows Defender Firewall” in windows 10
>
Step1:Launch Control Panel on your computer
Step2:Select "Windows Defender Firewall" followed by "Advanced Settings" on the left side panel
Step3:Right click on "Outbound Rules" from the menu on the left and select "New Rule"
Step4:When a new window pop-up, Select the "Custom" option followed by "Next"
Step5:On the next window, select "All Program" & again select "Next"
Step6:Select the "These IP Addresses" option under "which remote ip addresses does this rule apply
to?" and click next
Step7:Open the command prompt as Administrator by entering "CMD" into the search box
Step8:Enter "nslookup www.facebook.com" and press enter button
Step9:Click on "Add" & enter the IP Addresses you want to block then select "Next"
Step10:Make sure to choose the "Block the connection" option and click on " Next"
Step11:Choose Whether the rule applies to Domain, private or public you can also, select all three
Step12:Select "Next" add a name or description for this rule, and select "finish" to complete the action
Step13:Finish
Check for Blocked Website
Program 9:Share the folder in a system, and access the files of that folder from other system using IP address
>
To share a folder on a system and access the files from another system using the IP address, follow these steps:
Step 1: Share the Folder on the Source System (Windows):
Right-click on the folder you want to share and select "Properties."
In the folder properties, go to the "Sharing" tab.
Click on the "Advanced Sharing" button.
Check the box "Share this folder."
You can provide a share name for the folder (this will be the name used to access the folder from other systems).
Click on "Permissions" to set the access permissions for the shared folder. Choose the appropriate permissions for the users you want to allow access.
Click "OK" to close the folder permissions window.
Click "Apply" and "OK" to close the folder properties.
Step 2: Note Down the IP Address of the Source System:
On the source system, open the Command Prompt.
Type "ipconfig" and press Enter.
Note down the IPv4 address of the source system. It will typically be listed under "Ethernet adapter" or "Wireless LAN adapter" as "IPv4 Address."
Step 3: Access the Shared Folder from the Destination System (Windows):
On the destination system (the computer from which you want to access the shared folder), open File Explorer.
In the address bar, type the following:
\[IP Address of the Source System][Share Name]
Replace "[IP Address of the Source System]" with the IPv4 address you noted down in Step 2.
Replace "[Share Name]" with the name you provided for the shared folder in Step 1.
Press Enter. You should now see the contents of the shared folder.
If prompted, enter the credentials (username and password) of a user account that has permission to access the shared folder on the source system.
You should now be able to access the files in the shared folder on the source system from the destination system using the IP address. Note that the steps may vary slightly on different versions of Windows, but the general process remains the same. Additionally, ensure that both systems are connected to the same network and that there are no firewall or security settings blocking access to the shared folder.
Program 10:Share the printer in Network, and take print from other PC
>
To share a printer in a network and print from other PCs, follow these steps:
Step 1: Connect the Printer to the Network:
1. Ensure that your printer is connected to the same network as the PCs from which you want to print.
2. If your printer supports wired Ethernet, connect it to the network using an Ethernet cable.
3. If your printer supports wireless connectivity, configure it to connect to your Wi-Fi network.
Step 2: Share the Printer on the Host PC (Windows):
1. On the PC that is physically connected to the printer (the host PC), open Control Panel.
2. Go to "Devices and Printers" or "Printers & Scanners," depending on your Windows version.
3. Right-click on the printer you want to share and select "Printer properties."
4. Go to the "Sharing" tab and check "Share this printer."
5. You can provide a share name for the printer to make it easier to find on other PCs.
6. Click "Apply" and then "OK" to save the changes.
Step 3: Add the Shared Printer on Other PCs (Windows):
1. On the PCs from which you want to print, open Control Panel.
2. Go to "Devices and Printers" or "Printers & Scanners."
3. Click on "Add a printer" or "Add a printer or scanner."
4. Windows will search for available printers on the network. If the shared printer is found, it will be listed.
5. Select the shared printer from the list and click "Next."
6. Windows will install the necessary drivers for the printer. Follow any on-screen prompts to complete the installation.
7. Once the installation is complete, the shared printer will be available for use on the PC.
Step 4: Print from Other PCs:
1. To print a document or file from one of the other PCs, open the document you want to print.
2. Choose "Print" from the application's File menu.
3. Select the shared printer from the list of available printers.
4. Adjust any print settings as needed (e.g., number of copies, paper size, etc.).
5. Click "Print" to send the print job to the shared printer on the host PC.
The print job will be sent to the shared printer on the host PC, and the printer will produce the output accordingly.
Please note that the steps provided are specific to Windows-based PCs. If you are using a different operating system or printer model, the steps may vary slightly, but the general process of sharing the printer on the host PC and adding it on other PCs should be similar.
Program 11: Configuration of wifi hotspot, and connect other devices (mobile / laptop)
>
Step1: Move the switch on the top of Dir505 to the router(AP Position then plug it into an available
wall outlet verify the power LED has on
Step2:Connect it to your equipment:- Ethernet Cable which has internet connection into Ethernet port
on the underside of DIR-505
Step3:From laptop/Mobile device go to wireless utility to display available wireless network and select
wifi-name the printed on wifi configuration then enter password printed on configuration Note
Step4:Once done with the establishing a connection between DIR-505 and your computer/any device
open (https://dlinkrouter) in browser
Step5:At the login page Enter Password if you have not changed leave it blank
Step6:From main page of the configuration interface choose setup tap at the top of the page then click
LAN setup from menu
Step7:Select Acess point/Router mode from drop-menu according to required function. If you wish to
use DIR-505 to provide wireless access to an existing network, or select router wirelss private in
order to share it wireless connection
Step8:For access point mode:-
->You can enter personalized name for your device in device name from my LAN connection is drop
down menu, select the conneciton type
*Network Connection type:-
DHCP:-Dynamic IP select this connection type if network automatically assign you IP address you
should change if for future connection
STATIC:-If you network requires have to specific IP address enter the desired IP address, Subnet
GateWay address ,DNS Server save settings click next to wireless setup from menu on the left
on the left-hand side of page
Step9:Ensure that wireless box is checked you can specify a name to identify you wireless network
name and wireless mode select WPA personal
Step10:PPPOE(Username/Password)select this connection type if your internet service provider has
supplied you "Username/Password". Enter the credential and save the configuration
Step11: Click next on wireless settings from menu at left hand side of page. Ensure that enable wireless
box is checked you can enter your own identify name and security password. WPA personal
from the security mode and secure the network and save the change
Step12: Take the mobile/laptop search for the wifi device (vulnerability) click on it enter the password
connect the internet
Program 12: Configuration of Switches
>
The switch is a network device that is used to segment the network into different sub networks called
subnets or LAN segments
Step1:Open packet tracer desktop and take a switch(PT-Switch) from the devices
Step2:Configure the host name of the Switch0
->Click on Switch0 and go to command line interface
->Then change it
Commands:
Swithch>
Swithch>en
Switch#conf
Switch(config)#hostname sh
sh(config)exit
Step3:Set a message of the day[MOTD](message of the day) banner for users
Commands:
sh(config)#banner motd$
->then enter MOTD and end it with '$' to exit
Step4:Set up line control password and enable secrect password
To configure the Line Control Password and enable secert follow below commands
Commands:
sh#conf t
sh(config)#
sh(config)# line con 0
sh(config-line)#password Blackeye
sh(config-line)#login
sh(config-line)#exit
Step5:Verify the Password
->When you try to login just, it will ask for line control password
->Then to configure the termianl it will as to enable to a secret password
TO SAVE THE CONFIGURATION USE THE BELOW COMMAND
sh# copy run start-up config
output:
Program13: Configuration of I/O Boxing
Step1: 1inch of jacket with jacket stripper using cutting tool cut 1inch of the jacket from top of the cable if using scissors or any other cutter devices make sure not to cut through wires in the cables
Step2:Cut it by pulling String
-->pull string inside cut off the position that is showing
Step3:Cut the spline
if cable also has a spline/cross separator in cables, them cut off the position that is showing
Step4:Unwrap twisted pait
-->It's easier to insert on the 90` keystone jack the important part to this step to decide which wiring scheme you want to go 1568B or 1568B
1568B goes in order!!
orange strip
orange
green strip
blue
blue strip
green
brown strip
brown
-->Don't insert cable too far in to the keystore jacket touching end of the jacket other important thing to mention here is to not have any wiring exposed from jacket to the jack
Step5:Put the wire in groove
-->using wiring scheme have choosen lay down the wires in grooves of keystone jacket
Step6:Put keystone jack in 90' punch down tool
--> Insert the jack into the punch down area of the tool. Make sure the degree of punch down tool matches the degree of keystone jack insert open side facing grooves of punch down tool
Step7:Squeeze punch down tool
-->PUnch down tool wire now firmly inside the contact area of jacket the wires hanging of side should also have been cut off. If some were not cut off that . Simply cuy off the remanin gportion using cutting device
Step8:close the cap
Program 14: Making your own patch cord
Step1:Take 1/2 mtr or 1mtr cable[cat5 or cat6]
Step2:To make straight through patch chord
Step3:Do follwing steps
->check both cable end should be either T568 or both ends should be T568B
Step4:Take RJ45 connector
Step5:Insert cable inside RJ45 connector according to the color code
Step6:Crimp cable using crimping tool for both the ends
Step7:Check both ends with cable tester
Step8:Repeat same process for cross over cable (But both ends of cable should be T568B and T568A / T568B)
This is same as how to make networking cable just creating with rj457
output:
Program 15: Configuration of VLAN using packet Tracer
Cisco packet Tracer Home Screen(Installation will be in my youtube channel) vistit by clicking below linkyoutube
Step1:Insert 6pcs, 2switches,1router,as shown in diagram
Select end devies to get the pc icon on screen
Step2:Take 2 switches (by clicking on switch icon) and take 1 router
Step3:connect all the devies by selecting straight cable
switch1
Fast ethernet0 --> fast ethernet 0/1
Fast ethernet0 --> fast ethernet 0/2
Fast ethernet0 --> fast ethernet 0/3
Switch2
Fast ethernet0 --> fast ethernet 0/1
Fast ethernet0 --> fast ethernet 0/2
Fast ethernet0 --> fast ethernet 0/3
repeat the steps for both the switches
Step4:Connect switch to router
->connect switch to router gigabit ethernet 0/1 to gigabit ethernet 0/0
->gigabit ethernet 0/1 from switch side
->ethernet 0/1 to gigabit ethernet 0/1
towards routerside
topology is ready
Step6:Start Configure the devices
->Right click on the pc and select configure
CLASS A RANGE 1 WILL BE GIVEN
GATE WAY AS ;-192.168.1.254
then select fast ethernet
ip address is 192.168.1.1
subnet mask by default appear
Step6:Repeat step5 for all the pc's 1-6
Step7:CLASS B RANGE WILL BE GIVEN FOR OTHER NETWORK
GATEWAY AS;172.16.1.254
ipaddress is:172.16.1.1
172.16.1.2
172.16.1.3
Step8:Configure the router
->Config-[] top right croner select on
note:if the topology is correct all small icons turned into green color
Step9:Connect router to swtich interface as ip address 192.168.1.254
->connect router to one more switch as select ethernet gigabit 0/1 and type ipaddress as 172.16.1.254
click on the top of pc1
Step10:Select desktop->command prompt->run
Step11:c:\> ping192.168.1.2
Program 16:Configuration of VPN using packet tracer
Step1:take 2pc's and 3 routers
Step2:connect 01 pc to router1 and other to router 3
Step3:confite ip for all pcs
PC1:192.168.1.2 gateway ip:-192.168.1.1
PC2:192.168.2.2 gateway ip:-192.168.2.1
Step4:Router 0 Configuration
fast ethernet0/0 -192.168.1.1
fast ethernet0/1-1.0.0.2
Step5:Router 1 Configuration
fast ethernet0/0 -1.0.0.1
fast ethernet0/1-2.0.0.1
Step6:Router 2 Configuration
fast ethernet0/0 -192.168.2.1
fast ethernet0/1-2.0.0.2
Step7:Router 0
click on confg->click on static->add
Network->0.0.0.0
Mask->0.0.0.0
Next hop->1.0.0.1
Step8:Router 2
click on confg->click on static->add
Network->0.0.0.0
Mask->0.0.0.0
Next hop->2.0.0.1
Step9:Click on router0
exit
Router# ping 2.0.0.2
Router# config t
Router(config)#interface tunnel 1
Router(config-if)# ipaddress 172.16.1.1 255.255.0.0
Router(config-if)#tunnel source fa0/1
Router(config-if)#tunnel destination 2.0.0.2
Router(config-if)no shut
Step10:Router2
Router(config)#interface tunnel 2
ipaddress 172.16.1.2 255.255.0.0
Router(config-if)#tunnel source fa0/1
Router(config-if)#tunnel destination 1.0.0.2
Router(config-if)# exit
Step11: Router0
click on config->click on static-> add
Network-192.168.2.0
Mask->255.255.255.0
Next hop->172.16.1.2
Step12:Router2
click on config->click on static->add
Network-192.168.1.0
Mask-255.255.255.0
Next hop-172.16.1.1
Step13:
pring from pc1:- ping 192.168.2.2
tracert 192.168.2.2
1st program output please
ReplyDeletesure! i will be uploading
Delete