56
Yarmouk Uni Faculty of Information Technolog Department of Comput Data Communication and Prepared By: Dr. Ahmed M. Mana Wafa Qarqaz Ahmad Banihan Ikdam Al Ham Fatima Abu Haw iversity gy & Computer Science ter Sciences d Networking Lab : asrah ni mi was

CS 335 Networks Lab Manual

Embed Size (px)

DESCRIPTION

Computer Networks

Citation preview

Page 1: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology

Department of Computer Sciences

Data Communication and Networking Lab

Prepared By:Dr. Ahmed M. Manasrah

Wafa Qarqaz Ahmad BanihaniIkdam Al Hami

Fatima Abu Haw

Yarmouk University

nformation Technology & Computer Science

Department of Computer Sciences

Data Communication and Networking Lab

Prepared By: Manasrah

Banihani

Ikdam Al Hami was

Page 2: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

2 | P a g e

Table of Contents

EXPERIMENT 1 – ACTIVE DIRECTORY INSTALLATION ................................................................................... 4

Active Directory Overview ........................................................................................................................ 4

Creating a new forest ............................................................................................................................ 5

Creating a new domain tree ................................................................................................................. 6

Creating a new child domain ................................................................................................................ 7

Creating additional domain controllers ................................................................................................ 8

EXPERIMENT 2 – DOMAIN NAME SYSTEM (DNS) ....................................................................................... 11

DNS defined ............................................................................................................................................ 11

EXPERIMENT 3 – CREATING AND MANAGING DOMAIN USER ACCOUNTS ................................................ 13

Create / Disable/ Enable Domain user Account ..................................................................................... 13

EXPERIMENT 4: Installing and configuring DHCP server in an Active Directory domain. .......................... 18

EXPERIMENT 5 - Network Infrastructure ............................................................................................... 32

Layer 1, Layer 2 and Layer 3 Devices ...................................................................................................... 32

EXPERIMENT 6- Network commands ..................................................................................................... 33

ping, tracert/tracout, ipconfig ................................................................................................................ 33

EXPERIMENT 7- Networking Concept ......................................................................................................... 34

Network configuration ............................................................................................................................ 34

EXPERIMENT 8- Network Connectivity ................................................................................................... 35

EXPERIMENT 9- IP Addressing: classfull addressing ................................................................................... 36

EXPERIMENT 10- IP Addressing: Classless Addressing ................................................................................ 39

EXPERIMENT 11- Packet tracer ................................................................................................................... 41

EXPERIMENT 12- Configure a Network topology using packet tracer software......................................... 42

EXPERIMENT 13- Configure a Network topology using packet tracer software......................................... 44

EXPERIMENT 14- Configure a Network topology using packet tracer software......................................... 46

EXPERIMENT 15- Subnetting ....................................................................................................................... 48

EXPERIMENT 16- Subnetting ....................................................................................................................... 50

Page 3: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

3 | P a g e

EXPERIMENT 17- Subnetting ....................................................................................................................... 51

EXPERIMENT 18- Protocol Structure ........................................................................................................... 52

Page 4: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

4 | P a g e

EXPERIMENT 1 – ACTIVE DIRECTORY INSTALLATION

Apparatus (Software): Virtual Machine (VMWare) Aim : Building the students ability to :

• Understand Active Directory and its components • Create a new forest • Create a new domain tree in an existing forest • Create a new child domain in an existing tree. • Create an additional domain controller • Remove active directory from the domain if needed.

Procedure: Following should be well established to understand this practical.

Active Directory Overview

A directory is a hierarchical structure that stores information about objects on the network. A directory service, such as Active Directory, provides the methods for storing directory data and making this data available to network users and administrators. For example, Active Directory stores information about user accounts, such as names, passwords, phone numbers, and so on, and enables other authorized users on the same network to access this information.

• Logical Structure In active directory you organize resources in a logical structure that mirror the logical structure of your organization. Grouping resources logically enable you to find a resource by its name rather than by its physical location.

• Domains The core unit of logical structure in Active Directory is the domain, which can store millions of objects. Printers, documents, e-mail address, databases, users, groups, computer objects etc.

• Domain Controller A domain controller is a computer running windows 2000 server that stores a replica of the domain controllers. A domain can contain one or more domain controllers; all domain controllers in a domain have a complete replica of the domain's portion of the database.

Page 5: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

5 | P a g e

Creating a new forest

When you create the first domain controller in your organization, you are creating the first domain (also called the forest root domain) and the first forest. The top-level Active Directory container is called a forest. It usually consists of one or more separately completely independent trees. Forests have the following characteristics:

• A forest consists of one or more trees that share a common schema and global catalog. An organization can have multiple forests.

• Multiple domain trees within a single forest do not form a contiguous namespace; that is, they have noncontiguous DNS domain names. Although trees in a forest do not share a namespace, a forest does have a single root domain, called the forest root domain. The forest root domain is, by definition, the first domain created in the forest. The Enterprise Admins and Schema Admins groups are located in this domain. By default, members of these two groups have forest-wide administrative credentials.

• Domains in a forest operate independently but the forest enables communication across the entire organization.

• Implicit two-way transitive trust exist between domain and domain trees.

Exercise: Creating a New Forest

1.Click Start select Run type dcpromo and click OK. Welcome to the Active Directory

Installation Wizard page appears, click Next. 2. Operating System Compatibility page appears, read the information and click Next. 3. Domain Controller Type page appears, select Domain controller for a new domain and

click Next. 4. Create New Domain page appears, select Domain in a new forest. 5. New Domain Name page appears type the FQDN of your domain and click Next. For e.g.

Yahoo.com. 6. NetBIOS Domain Name page appears leave the default name and click Next. 7. Database and Log Folders page appears specify the location and click Next. 8. Shared System Volume page appears, specify the location and click Next. 9. DNS Registration Diagnostics page appears select Install and configure the DNS

server on this computer, and set this computer to use this DNS server as its preferred DNS server and click Next.

Page 6: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

6 | P a g e

10. Permissions page appears select the appropriate permission and click Next. 11. Directory Services Restore Mode Administration Password page appears, give the

password and click Next. 12. Summary page appears read the information and click Next. The installation starts, after

few minutes Completing the Active Directory Installation Wizard page appears click Finish.

Creating a new domain tree

A tree is a grouping of hierarchical arrangement of one or more windows 2000 domains that you create by adding one or more child domains to an existing parent domain.

Create a new domain tree only when you need to create a domain whose DNS namespace is not related to the other domains in the forest. This means that the name of the tree root domain (and all of its children) does not have to contain the full name of the parent domain. A forest can contain one or more domain trees. Trees share the following characteristics

• All domains within a single tree share a common schema. • All domains within a single tree share a common global catalog.

Exercise: Creating a New Domain Tree In An Existing Forest

1. Click Start select Run type dcpromo and click OK. Welcome to the Active Directory

Installation Wizard page appears, click Next. 2. Operating System Compatibility page appears, read the information and click Next. 3. Domain Controller Type page appears, select Domain controller for a new domain

and click Next. 4. Create New Domain page appears, select Domain tree in an existing forest. 5. On the Network Credentials page give the name of the Enterprise administrator i.e. the

forest root domain's administrator, his password and name of the forest root domain which you created in the previous exercise and click Next.

6. New Domain Tree page appears type the FQDN of your new domain and click Next. For e.g. Hotmail.com.

7. NetBIOS Domain Name page appears leave the default name and click Next.

Page 7: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

7 | P a g e

8. Database and Log Folders page appears specify the location and click Next. 9. Shared System Volume page appears, specify the location and click Next. 10. DNS Registration Diagnostics page appears select Install and configure the DNS

server on this computer, and set this computer to use this DNS server as its preferred DNS server and click Next.

11. Permissions page appears select the appropriate permission and click Next. 12. Directory Services Restore Mode Administration Password page appears, give the

password and click Next. 13. Summary page appears read the information and click Next. The installation starts, after

few minutes Completing the Active Directory Installation Wizard page appears click Finish.

NOTE: Before performing this exercise define a forwarder on the DNS server where you are creating a new domain tree, for the forest root domain i.e. define a forwarder for yahoo.com.

Creating a new child domain

Create a new child domain when you want to create a domain that shares a contiguous namespace with one or more domains. This means that the name of the new domain contains the full name of the parent domain. For example, sales.microsoft.com would be a child domain of microsoft.com. As a best practice, you create new domains as children of the forest root domain. You can create a new child domain by creating a new domain under a parent domain using the Active Directory Installation Wizard After you create the child domain, you can create additional domain controllers in the child domain for fault tolerance and high availability of Active Directory.

Exercise: Creating a New Child Domain In An Existing Tree

1. Click Start select Run type dcpromo and click OK. Welcome to the Active Directory

Installation Wizard page appears, click Next. 2. Operating System Compatibility page appears, read the information and click Next. 3. Domain Controller Type page appears, select Domain controller for a new domain

and click Next. 4. Create New Domain page appears, select Child domain in an existing domain tree.

Page 8: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

8 | P a g e

5. On the Network Credentials page give the name of the Enterprise administrator i.e. the forest root domain's administrator, his password and name of the forest root domain which you created in the previous exercise and click Next.

6. Child Domain Installation page appears type the name of the parent domain which could either be hotmail.com or yahoo.com and the name of the child domain and click Next.

7. NetBIOS Domain Name page appears leave the default name and click Next. 8. Database and Log Folders page appears specify the location and click Next. 9. Shared System Volume page appears, specify the location and click Next. 10. Permissions page appears select the appropriate permission and click Next. 11. Directory Services Restore Mode Administration Password page appears, give the

password and click Next. 12. Summary page appears read the information and click Next. The installation starts, after

few minutes Completing the Active Directory Installation Wizard page appears click Finish.

NOTE: Before performing this exercise give the IP address of the domain controller which hosts the parent domain, in the preferred DNS server.

Creating additional domain controllers

If you already have one domain controller in a domain, you can add additional domain controllers to the domain to improve the availability and reliability of network services. Adding additional domain controllers can help provide fault tolerance, balance the load of existing domain controllers, and provide additional infrastructure support to sites. More than one domain controller in a domain makes it possible for the domain to continue to function if a domain controller fails or must be disconnected. Multiple domain controllers can also improve performance by making it easier for clients to connect to a domain controller when logging on to the network. You can add additional domain controllers over the network or from backup media.

Page 9: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

9 | P a g e

Exercise 4: Creating an Additional Domain Controller

1. Click Start select Run type dcpromo and click OK. Welcome to the Active Directory

Installation Wizard page appears, click Next. 2. Operating System Compatibility page appears, read the information and click Next. 3. Domain Controller Type page appears, select Additional Domain controller for an

existing domain and click Next. 4. On the Network Credentials page give the name of the Enterprise administrator i.e. the

forest root domain's administrator, his password and name of the forest root domain which you created in the previous exercise and click Next.

5. Additional Domain Controller page appears type the name of the domain for which you want to create the additional domain and click Next.

6. NetBIOS Domain Name page appears leave the default name and click Next. 7. Database and Log Folders page appears specify the location and click Next. 8. Shared System Volume page appears, specify the location and click Next. 9. Permissions page appears select the appropriate permission and click Next. 10. Directory Services Restore Mode Administration Password page appears, give the

password and click Next. 11. Summary page appears read the information and click Next. The installation starts, after

few minutes Completing the Active Directory Installation Wizard page appears click Finish.

NOTE: Before performing this exercise give the IP address of the domain controller which hosts the domain, in the preferred DNS server.

Page 10: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

10 | P a g e

Exercise: Removing Active Directory from the Domain Controller

1. Click Start, select Run type dcpromo in the run box and click Next. 2. Welcome to the Active Directory installation Wizard appears. Click Next 3. In the message that appears click OK . 4. On the Remove Active Directory page place a check against this server is the last

domain controller in the domain only if this statement is true otherwise leave it unchecked and click Next.

5. On the Application Directory Partition page click Next. 6. On the Confirm Deletion page place a check against Delete all application directory

partitions on this domain controller and click Next. 7. On the Administrator Password page give the password and click Next. 8. On the Summary page click Next.

Page 11: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

11 | P a g e

EXPERIMENT 2 – DOMAIN NAME SYSTEM (DNS)

Apparatus (Software): Virtual Machine (VMWare), and the command line dnsmgmt.msc Aim : to do the following:

• Install the DNS Server • open the DNS Console

Procedure: Following should be done to understand this practical.

DNS defined

DNS is an abbreviation for Domain Name System, a system for naming computers and network services that is organized into a hierarchy of domains. DNS naming is used in TCP/IP networks, such as the Internet, to locate computers and services through user-friendly names. When a user enters a DNS name in an application, DNS services can resolve the name to other information associated with the name, such as an IP address.

For example, most users prefer a friendly name such as example.microsoft.com to locate a computer such as a mail or Web server on a network. A friendly name can be easier to learn and remember. However, computers communicate over a network by using numeric addresses. To make the use of network resources easier, name systems such as DNS provide a way to map the user-friendly name for a computer or service to its numeric address.

Exercise: Install the DNS Server

• Method 1

1. Log on to the server where you want to install the DNS service. 2. Click Start, point to Control Panel, Add/Remove Programs. 3. In the left pane select Add/Remove Windows Components. 4. In the Windows Components Wizard box that opens select Networking

Services and click Details. 5. In the Networking Services box that opens place a check against Domain Name

System(DNS), click OK, click Next and then click Finish.

Page 12: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

12 | P a g e

• Method 2 1. Log on to the server where you want to install the DNS service. 2. Right click My Network Places and select Properties. 3. In the Network Connections window that opens select Optional Networking

Components from the Advanced menu. 4. In the Windows Optional Networking Components Wizard box that opens

select Networking Services and click Details. In the Networking Services box that opens place a check against Domain Name System(DNS), click OK, click Next and then click Finish.

Exercise: Open the DNS Console

• Method 1

Click Start, select Programs, Administrative Tools, click DNS.

• Method 2 o Click Start, select Run. o In the run box type dnsmgmt.msc.

Page 13: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

13 | P a g e

EXPERIMENT 3 – CREATING AND MANAGING DOMAIN USER

ACCOUNTS

Apparatus (Software): Virtual Machine (VMWare), and the command line dsa.msc. Aim : to do the following:

• Creating a Domain User Account • Disabling and Enabling user Account • Reset password for a user account • Setting expiration date for a user account • Configuring Logon hours for a user account • Configuring workstations from which the users can log on • Creating a Roaming user profile • Creating a home folder.

Procedure: Following should be done to understand this practical.

Create / Disable/ Enable Domain user Account

Exercise: Creating a Domain User Account

1. Log on to a Domain Controller. 2. Click Start, point to Programs, Administrative Tools, select Active Directory Users

and Computers. Active Directory Users and Computers Console opens. Or Click Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users and Computers Console opens.

3. In the left pane expand the node by the name of your domain. 4. Right click the appropriate container node, point to New, select User. New object – User

dialog box opens.

Page 14: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

14 | P a g e

Exercise: Disabling and Enabling user Account

1. Log on to a Domain Controller. 2. Click Start, point to Programs, Administrative Tools, select Active Directory Users

and Computers. Active Directory Users and Computers Console opens. Or Click Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users and Computers Console opens.

3. In the left pane expand the node by the name of your domain. 4. Select the container which contains the user and right click the user, select Properties . 5. On the property sheet select the Account tab. 6. Under Account Options place a check against the Account is disabled check box.

Exercise: Reset password for a user account

1. Log on to a Domain Controller. 2. Click Start, point to Programs, Administrative Tools, select Active Directory Users

and Computers. Active Directory Users and Computers Console opens. Or Click Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users and Computers Console opens.

3. In the left pane expand the node by the name of your domain. 4. Select the container which contains the user and right click the user, select Reset

Password. 5. Reset Password dialog box opens. Enter the password and click OK.

Exercise 4: Setting expiration date for a user account

1. Log on to a Domain Controller. 2. Click Start, point to Programs, Administrative Tools, select Active Directory Users

and Computers. Active Directory Users and Computers Console opens. Or Click Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users and Computers Console opens.

Page 15: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

15 | P a g e

3. In the left pane expand the node by the name of your domain. 4. Select the container which contains the user and right click the user, select Properties. 5. On the property sheet select the Account tab. 6. Under Account Expires select the End of option and then specify the date for account

expiration.

Exercise: Configuring Logon hours for a user account

1. Log on to a Domain Controller. And Click Start, point to Programs, Administrative

Tools, select Active Directory Users and Computers. Active Directory Users and Computers Console opens. Or Click Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users and Computers Console opens.

2. In the left pane expand the node by the name of your domain. 3. Select the container which contains the user and right click the user, select Properties. 4. On the property sheet select the Account tab. 5. Click the Logon Hours button. Logon Hours for user user appears. 6. Select the hours on which you want to deny access and click Logon Denied.

Exercise: Configuring workstations from which the users can log on

1. Log on to a Domain Controller. 2. Click Start, point to Programs, Administrative Tools, select Active Directory Users

and Computers. Active Directory Users and Computers Console opens. Or Click Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users and Computers Console opens.

3. In the left pane expand the node by the name of your domain. 4. Select the container which contains the user and right click the user, select Properties. 5. On the property sheet select the Account tab. 6. Click the Logon On To button. Logon Workstations dialog box appears. 7. Select the The following computers option. 8. Under Computer Name specify the computers and click Add and then click OK .

Page 16: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

16 | P a g e

Exercise: Creating a Roaming user profile

1. Log on to a Domain Controller. 2. Create and share a folder by the name of Profiles on any machine on the domain. 3. Click Start point to, Programs, Administrative tools, Active Directory Users and

Computers Active Directory Users and Computers console opens. 4. Select the container which contains the user, in the right pane right click the user’s name

whose profile you want to create, select Properties. 5. On the user property sheet select the Profile tab. In the profile path give the network path

to the shared folder which you created in Step 2. 6. Network path is given in the following manner

\\computer_name\profiles\%username%

where computer_name is the name of the computer on which you created the Profiles folder, profiles is the share name of the folder you created and %username% is a variable which will automatically resolve to user name.

7. Click Apply and then click OK.

Exercise: Creating a home folder

1. Log on to a Domain Controller. 2. Create and share a folder by the name of Home on any machine on the domain.. 3. Click Start point to, Programs, Administrative tools, Active Directory Users and

Computers Active Directory Users and Computers console opens. 4. Select the container which contains the user, in the right pane right click the user’s name

whose home folder you want to create, select Properties. 5. On the user property sheet select the Profile tab. Under Home Folder select the Connect

option and select the drive letter which you want to assign to the home folder and give the network path to the shared folder you created in step 2.

6. Network path is given in the following manner

\\computername\home\%username%

Page 17: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

17 | P a g e

where computername is the name of the computer on which you created the Home folder, home is the share name of the folder you created and %username% is a variable which will automatically resolve to user name.

7. Click Apply and then click OK.

Page 18: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

18 | P a g e

EXPERIMENT 4: Installing and configuring DHCP server in an Active

Directory domain.

Aim: Installing and configuring windows server 2003 DHCP service.

• Dynamic IP addressing. Apparatus (Software/Hardware): windows server 2003 Procedure1: Setting up a DHCP Server Dynamic Host Configuration Protocol (DHCP) is an IP standard designed to reduce the

complexity of administering IP address configurations. Using DHCP on a network means

administrators don't need to configure these settings individually for each client on the network.

The DHCP would automatically distribute them to the clients itself.

1. Run your windows server 2003.

2. Go to: Start–>All Programs–>Administrative Tools–>Manage Your Server.

3. On manage your server screen: select Add or remove a role.

Page 19: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Co

CS 335: Data Communication & Networks LAB

Faculty of Information Technology and Computer Sciences

4. On preliminary steps screen: verify the required steps for your server then click next.

5. On Server Role screen: choose DHCP Server option and then click next.

6. Read the summery of selections and click next.

7. Installing progress will start.

8. New scope wizard will start. Using this wizard you can create a new scope of IP addresses to the DHCP server to distribute across the network.

o A scope is a collection of IP addresses for computers on a subnet that use DHCP.

9. After Welcome screen; scope name screen

a. Name for the new scopepurpose of the scope on your network.

b. Description, for example, where is the DHCP server located.

Faculty of Information Technology & Computer SciencesDepartment of Computer sciences

CS 335: Data Communication & Networks LAB

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

On preliminary steps screen: verify the required steps for your server then click next.

On Server Role screen: choose DHCP Server option and then click next.

Read the summery of selections and click next.

Installing progress will start.

e wizard will start. Using this wizard you can create a new scope of IP addresses to the DHCP server to distribute across the network.

A scope is a collection of IP addresses for computers on a subnet that use DHCP.

After Welcome screen; scope name screen will ask you to enter:

ame for the new scope: scope name should be descriptive enough to identify the purpose of the scope on your network.

escription, for example, where is the DHCP server located.

mputer Sciences

CS 335: Data Communication & Networks LAB Manual

Computer Sciences Department, Yarmouk University, Jordan, Irbid

19 | P a g e

On preliminary steps screen: verify the required steps for your server then click next.

e wizard will start. Using this wizard you can create a new scope of IP

A scope is a collection of IP addresses for computers on a subnet that use DHCP.

should be descriptive enough to identify the

Page 20: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

20 | P a g e

10. On IP Address Range screen: define the range of addresses that the scope will distribute and the subnet mask for the IP address. Enter the appropriate details and click next.

a. Because these addresses are given to clients, they should all be valid addresses for your network and not currently in use.

b. Specifying the IP address range of a scope requires some knowledge of subnetting.

c. Each scope in a DHCP server holds a pool of IP addresses to give out to clients, and the range of IP addresses must be within the allowed range of the subnet (that you specify on the subnet mask field).

Page 21: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

21 | P a g e

11. On Add Exclusion screen: you can add any exclusion to the range of IP addresses you specified in IP address range screen.

• This includes any addresses that may have already been statically assigned to certain network devices, such as servers and router in your organization.

• The IP addresses may sometimes be within the range of IP addresses defined for a scope. In those cases, you have to exclude the IP addresses from being assigned out by DHCP so the DHCP server should not be able to distribute these addresses.

• You can exclude a range of IP addresses, or a single address.

Page 22: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

22 | P a g e

12. On lease duration screen: determines the length of time that a client can hold a leased

address.

The lease duration is how long clients should keep their IP addresses before having to renew them.

Page 23: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

23 | P a g e

Considerations for lease Duration: • If short lease duration is configured, clients will be renewing their IP addresses more

frequently. The result will be additional network traffic and additional strain on the DHCP server.

• If long lease duration is configured, IP addresses previously obtained by decommissioned clients would remain leased and unavailable to future clients until the leases either expire or are manually deleted.

o If network changes occur, such as the implementation of a new DNS server, those clients would not receive those updates until their leases expire or the computers are restarted.

• According to Microsoft: lease durations should typically be equal to the average time the computer is connected to the same physical network.

o You can leave the default lease duration in an environment where computers are rarely moved or replaced, such as a wired network.

o In an environment where computers are often moved and replaced, such as a wireless network, you would want to specify a short duration since a new wireless client could roam within range at any time.

13. Next screen will be configuring the DHCP server: You are given a choice of whether or not you

wish to configure the DHCP options for the scope now or later.

Page 24: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

24 | P a g e

o DHCP options are additional settings that the DHCP server can provide to clients when it issues them with IP addresses. These are the other settings that help clients communicate on the network. In the New Scope Wizard we can only configure a few options but from the DHCP MMC we have several more options. (See configuring a DHCP server)

14. On router (Default gateway) screen you may enter router, or gateway, IP address. This will help

the client computers will know which router to use.

15. On Domain name and DNS servers: the DNS and domain name settings can be entered. The DNS server IP address will be distributed by the DHCP server and given to the client.

Page 25: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

25 | P a g e

16. On WINS server screen enter the IP Address of the WINS server. You can input the server name into the server name box and press "Resolve" to allow it to find the IP address itself.

• Windows Internet Naming Service; (WINS) is a service resolves Windows network computer names (NetBIOS names) to Internet IP addresses.

• WINS allows Windows computers on a network to easily find and communicate with each other.

Page 26: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

26 | P a g e

17. The last step is to activate the scope. The DHCP server will not work unless you do this.

Procedure 2: Configuring a DHCP server At this point we almost have a functional DHCP server.

1. Run your windows server 2003.

2. Click Start, click Programs, click Administrative Tools, and then click DHCP. Note: You must be logged on to the server with an account that is a member of the Enterprise Administrators group.

o On DHCP configuration screen the address pool displays a list of IP ranges assigned for distribution and IP address exclusions.

Page 27: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

27 | P a g e

o Expand the scope node in the left pane of the DHCP MMC to see the new available nodes:

• Address Pool: Shows the IP address range the scope offers along with any IP address exclusions.

• Address Leases: Shows all the leased IP addresses.

• Reservations: Shows the IP addresses that are reserved. Reservations are made by specifying the MAC address that the server would “listen to” when IP address requests are received by the server. Certain network devices, such as networked printers, are best configured with reserved IP addresses rather than static IP addresses.

• Scope Options: Shows configured scope options. Some of the visible options now are router, DNS, domain name and WINS options.

• Server Options: Shows configured server options. This is similar to scope options except that these options are either inherited by all the scopes or

Page 28: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

28 | P a g e

overridden by them (covered in 'Advanced DHCP Server Configuration on Windows 2003' article).

• Earlier, we only defined exclusions for our servers, router plus a few more spare IP addresses. In case you need to exclude more IP addresses, you can do it at this point by following these instructions:

To authorize a DHCP server:

1. In the console tree of the DHCP snap-in, select the new DHCP server.

• If there is a red arrow in the bottom-right corner of the server object, the server has not yet been authorized.

• Right-click the server, and then click Authorize.

• After a few moments, right-click the server again and then click Refresh. The server should display a green arrow in the bottom-right corner to indicate that the server has been authorized.

2. To create a new scope:

• Click Start, click Programs, point to Administrative Tools, and then click DHCP. Note: In the console tree, select the DHCP server on which you want to create the new DHCP scope.

• Right-click the server and then click New Scope.

• In the New Scope Wizard, click Next, and then type a name and description for the scope.

• Type the range of addresses that can be leased as part of this scope.

• If you want to use a different subnet mask, type the new subnet mask. Click Next.

• Type any IP addresses that you want to exclude from the range. Click Next.

Page 29: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

29 | P a g e

• Type the number of days, hours, and minutes before an IP address lease from this scope expires.

• Click Next to select Yes, I want to configure these options now, and then extend the wizard to include settings for the most common DHCP options. Click Next.

• Type the IP address for the default gateway that should be used by clients that obtain an IP address from this scope. Click Add to place the default gateway address into the list, and then click Next. Note: When DNS servers already exist on your network, type your organization's domain name in Parent domain. Type the name of your DNS server, and then click Resolve to ensure that your DHCP server can contact the DNS server and determine its address. Then click Add to include that server in the list of DNS servers that are assigned to the DHCP clients. Click Next.

• Click Yes, I want to activate this scope now, to activate the scope and allow clients to obtain leases from it, and then click Next. Click Finish.

3. To add exclusion:

• Right clicking the address pool text on the left hand side of the window.

• Selecting new exclusion range.

• A window will allow you to enter an address range to be added.

• Entering only the start IP will add a single IP address.

Page 30: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

30 | P a g e

4. Reserving an IP address for a client. • Reserving an IP means that the specific

network client will have the same IP for as

long as you wanted it to.

• To do this you will have to know the physical

address (MAC) of each network card.

• Enter the reservation name, desired IP

address, MAC address.

• On description choose whether you want to

support DHCP or BOOTP and press add.

• The new reservation will be added to the list.

5. Right click scope options and press configure options; you can configure more servers and their

parameters. These settings will be distributed by the DHCP server along with the IP address.

• Server options act as a default for all the scopes in the DHCP server. However, scope

options take preference over server options.

BOOTP:

o BOOTP is a network protocol used

by a network client to obtain an IP

address from a configuration

server.

o The bootstrap protocol (BOOTP)

developed before DHCP. DHCP

improves on BOOTP and resolves

specific limitations BOOTP had as

a host configuration service.

Page 31: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

31 | P a g e

Troubleshooting:

1. Clients are unable to obtain an IP address

If a DHCP client does not have a configured IP address, it generally means that the client has not

been able to contact a DHCP server. This is either because of a network problem or because the

DHCP server is unavailable. If the DHCP server has started and other clients have been able to

obtain a valid address, verify that the client has a valid network connection and that all related

client hardware devices (including cables and network adapters) are working properly.

2. The DHCP server is unavailable

When a DHCP server does not provide leased addresses to clients, it is often because the DHCP

service has failed to start. If this is the case, the server may not have been authorized to operate

on the network. If you were previously able to start the DHCP service, but it has since stopped,

use Event Viewer to check the system log for any entries that may explain the cause.

Note To restart the DHCP service, click Start, click Run, type cmd, and then press ENTER.

Type net start dhcpserver, and then press ENTER.

Exercise:

Ex. You are the network administrator of a large company. You have to configure your Windows

Server 2003 to distribute IP Addresses to group of users on a network dynamically. The IP Address

block is 192.168.20.0/24, the server will take the first IP Address and it will not be changed. The

router will take the IP Address 192.168.20.5 and there is a set of IP Addresses will not be leased

dynamically starting from 192.168.20.7 to 192.168.20.19. How can we make it? Describe the

Solution in clear Steps.

Page 32: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

32 | P a g e

EXPERIMENT 5 - Network Infrastructure

Aim : Study of following Network Devices in Detail

• Hub • Switch • Bridge • Router

Apparatus (Software/Hardware): No software or hardware needed. Procedure: Following should be done to understand this practical.

Layer 1, Layer 2 and Layer 3 Devices

1. Hub: is a device for connecting multiple twisted pair or fiber optic Ethernet devices together

and making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The device is a form of broadcast sender.

2. Switch: A network switch or switching hub is a device that connects network segments.

The term commonly refers to a network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.

3. Bridge: A network bridge connects multiple network segments at the data link layer (Layer

2) of the OSI model. A bridge and switch are very much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge.

4. Router: A router is an electronic device that interconnects two or more computer networks,

and selectively interchanges packets of data between them. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network to another. Where multiple routers are used in a large collection of interconnected networks, the routers exchange information about target system addresses, so that each router can build up a table showing the preferred paths between any two systems on the interconnected networks.

Page 33: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

33 | P a g e

EXPERIMENT 6- Network commands

Aim : Study of basic network command and Network configuration commands. Apparatus (Software/Hardware): Command Prompt.

ping, tracert/tracout, ipconfig Procedure: To do this EXPERIMENT- issue each command individually and examine the results (if you require any help, type the command followed by the word –help or issue the command without any parameter to learn the usage format.) 1. Display Connection Configuration: Configures or displays network interface parameters for a

network, using TCP/IP. >ipconfig /all 2. Test Connectivity: a computer network tool used to test whether a particular host is reachable

across an IP network >ping IP_address / Domain name 3. Trace Route: is a command which can show you the path a packet of information takes from your

computer to one you specify. It will list all the routers it passes through until it reaches its

destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop' from

router to router takes. >tracert IP_address / Domain name 4. Display Resolved MAC Addresses: Displays or changes the Internet address to hardware

address translation tables used by the Address Resolution Protocol (ARP). >arp

Page 34: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

34 | P a g e

EXPERIMENT 7- Networking Concept

Aim : Connect the computers in Local Area Network. Apparatus (Software/Hardware): Virtual Machines, this exercise should be carried out between 2 hosts (your host machine and the guest OS machine) or two students who are sitting on adjacent computers. PC1 will be connected to PC2.

Network configuration

Procedure: On the host computer (PC1) .

1. Find out the IP address, subnet MASK of your PC (Host). And use these information in step 2 (use ipconfig command)

2. Go to Control Panel, Network Connections (on your guest machine), right click

on Local Area Connections, click on Properties, Internet Protocol (TCP/IP) and select Use the following IP address. Enter the IP address, subnet mask and default gateway (the IP address for the router) and click ok. Here use the following values:

IP address (of your computer): same range (not the same IP address) Subnet mask: class A, B, C network Default gateway: from the same range (in LAN connection, this is optional)

Page 35: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

35 | P a g e

EXPERIMENT 8- Network Connectivity

Aim : Verify the connectivity of your workstation LAN using network Commands Apparatus (Software/Hardware): Two connected computers in Local Area Network Procedure: this exercise should be carried out between 2 hosts (your host machine and the guest OS machine). Issue each command individually and examine the results. Experiment 1. On your host machine, open the Command Prompt of the operating system using either

of the following methods: a. Click on Start > All Programs > Accessories > Command Prompt or b. Click on Start > Run, enter cmd (short for command) and click on ok. c. A Command Prompt screen should open.

2. Gather TCP/IP configuration information using the ipconfig command:

a. Type ipconfig (short for IP configuration) on the command prompt window, and press Enter.

The screen will show the IP address, subnet mask, and default gateway for your computer’s connection. Notice the values in the Command Prompt. The IP address and the default Gateway should be in the same network or subnet, otherwise this host would not be able to communicate

. 3. Check more detailed TCP/IP configuration information:

Type ipconfig /all and press Enter. • What are the DNS and DHCP server addresses? • What are their functions? • What is the MAC of the network interface card?

4. Ping the IP address of another computer (guest machine).

Note that for the ping and tracert commands to work the PC firewalls have to be disabled. Why do you think this is so?

5. Is your PING Successful?

Page 36: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

36 | P a g e

EXPERIMENT 9- IP Addressing: classfull addressing

Aim : understand the structure of the IP address

• Classification of IP address • Sub netting

Apparatus (Software/Hardware): N/A Procedure: the structure and the classification of the IP address are required for this practical. Experiment 1. An IPv4 (Internet Protocol version 4) address is a 32-bit address that uniquely and

universally defines the connection of a device to the Internet. 2. IP Address Functions:

a. Network Interface Identification: the IP address provides unique identification of the interface between a device and the network.

b. Routing: When the source and destination of an IP datagram are not on the same network.

3. Each IP address has the following format x.y.w.z (four numbers/zones) a. Each number / zone should not have a leading zero (128.011.3.31) b. The IP address is exactly 4 numbers / zones ONLY (3 dots) c. Each number needs to be less than or equal to 255, WHY? d.

Page 37: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

37 | P a g e

4. To organize the IP distribution and the IP address space, the IP addresses classified into 5

classes as follows:

5. Addressing is based on class. However, this causes a big waste of IP addresses, because, a. each class is divided into a fixed number of blocks b. each block having a fixed size c. Thus, large part of the available addresses were wasted, consider YU with Class A IP

address, too much. 6. A Subnet mask is a 32-bit number that masks an IP address. Subnet Mask is made by setting

network bits to all "1"s and setting host bits to all "0"s. The leftmost bits must be set to '1‘, and the rightmost bits in a valid subnet mask must be set to '0'.

7. Fill in the table below: Class Subnet Mask in Binary Subnet Mask in Decimal CIDR Notation

A B C

8. How the IP addresses are given??

Page 38: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

38 | P a g e

9. Configure the following network using class A, then class B, and then class C Network?

10. Fill in the table below?

Class MASK in Decimal Number of Networks Number of Hosts Per Network A B C

Page 39: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

39 | P a g e

EXPERIMENT 10- IP Addressing: Classless Addressing

Aim : understand the structure of the IP address

• Sub netting Apparatus (Software/Hardware): n/a Procedure: the structure and the classification of the IP address is an entry to this practical.

18. Since classfull addressing distribute the IP addresses as blocks, there was a huge IP addresses

waste and such, a subnet aims to organizing hosts into logical groups because There are no classes, but addresses are giving in blocks of a known and pre-determined size ( assign IP as much as they require to minimize the IP addresses waste).

19. However, the internet authorities impose 3 restrictions: a. The addresses in a block must be contagious (one after another) b. The number of addresses in a block must be a power of 2 (1,2,4,8,…) c. The first address must be evenly divisible by the number of needed addresses

20. Initially the IP address has two components: a. Netid: Network address b. Hostid: Host address.

21. The IP address now should have three components: a. Netid: Network address b. Subnetid: subnet address c. Hostid: Host address.

22. In classless addressing, a block of addresses can be defined as ( x.y.z.t /n ) in which (x.y.z.t) defines one of the addresses and the( /n) defines the subnet mask .

Page 40: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

40 | P a g e

23. How the IP addresses are given??

24. Configure the following network using /24, 25, /26?

Hint: Find the first IP address and the last IP address within the block.

25. Fill in the table below?

CIDR MASK in Decimal Number of Subnets Number of Hosts Per subnet /24 /25 /26 /27 /17 /9 /8 /16

Page 41: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

41 | P a g e

EXPERIMENT 11- Packet tracer

Aim : Installing and understand Cisco Packet Tracer Apparatus (Software/Hardware): Cisco Packet tracer 5.3.2 Procedure: 1. Install Cisco Packet tracer (Cisco_Packet_Tracer_5.3.2).

2. Refer to the usage manual

Page 42: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

42 | P a g e

EXPERIMENT 12- Configure a Network topology using packet tracer

software

Aim : Understand Network Topology and network hardware (L1) devices. Apparatus (Software/Hardware): Cisco packet tracer Procedure: Start the packet tracer and configure the following network.

• At which layer the HUB operates?

• What is the physical topology of this network?

• Is the network functioning? Why?

Page 43: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

43 | P a g e

• Make the network functioning by providing class A, Class B, class C Addressing?

Class A Class B Class C

Subnet MASK Subnet MASK Subnet MASK

• Explain (simulate) the function of the HUB?

Explain Content of the Corresponding OSI Layer

Page 44: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

44 | P a g e

EXPERIMENT 13- Configure a Network topology using packet tracer

software

Aim : Understand Network Topology and network hardware (L2) devices. Apparatus (Software/Hardware): Cisco packet tracer Procedure: Start the packet tracer and configure the following network.

• At which layer the SWITCH operates?

• What is the physical topology of this network?

• Is the network functioning? Why?

Page 45: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

45 | P a g e

• Make the network functioning by providing class A, Class B, class C Addressing?

Class A Class B Class C

Subnet MASK Subnet MASK Subnet MASK

• Explain (simulate) the function of the SWITCH?

Explain Content of the Corresponding OSI Layer

Page 46: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

46 | P a g e

EXPERIMENT 14- Configure a Network topology using packet tracer

software

Aim : Understand Network Topology and network hardware (L3) devices. Apparatus (Software/Hardware): Cisco packet tracer Procedure: Start the packet tracer and configure the following network.

• At which layer the ROUTER operates?

• What is the physical topology of this network?

• Is the network functioning? Why?

Page 47: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

47 | P a g e

• Make the network functioning by providing class A, Class B, class C Addressing?

Class A Class B Class C

Subnet MASK Subnet MASK Subnet MASK

• Explain (simulate) the function of the ROUTER?

Explain Content of the Corresponding OSI Layer

Page 48: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

48 | P a g e

EXPERIMENT 15- Subnetting

Aim : Why we Develop sub netting and How to calculate subnet mask and how to identify subnet addresses. Apparatus (Software/hardware): n/a Procedure: subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting. Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you do not subnet, you are only able to use one network from your Class A, B, or C network, which is unrealistic.

Each data link on a network must have a unique network ID, with every node on that link being a member of the same network. If you break a major network (Class A, B, or C) into smaller subnetworks, it allows you to create a network of interconnecting subnetworks. Each data link on this network would then have a unique network/subnetwork ID. Any device, or gateway, connecting n networks/subnetworks has n distinct IP addresses, one for each network / subnetwork that it interconnects.

In order to subnet a network, extend the natural mask using some of the bits from the host ID portion of the address to create a subnetwork ID. For example, given a Class C network of 204.17.5.0 which has a natural mask of 255.255.255.0, you can create subnets in this manner:

204.17.5.0 - 11001100.00010001.00000101.00000000 255.255.255.224 - 11111111.11111111.11111111.11100000 --------------------------|sub|----

By extending the mask to be 255.255.255.224 (/27), you have taken three bits (indicated by "sub") from the original host portion of the address and used them to make subnets. With these three bits, it is possible to create eight subnets (2^n=2^3). With the remaining five host ID bits, each subnet can have up to 32 host addresses (2^32-n = 2^5), 30 of which can actually be assigned to a device since host ids of all zeros or all ones are not allowed (it is very important to remember this). So, with this in mind, these subnets have been created.

204.17.5.0 255.255.255.224 host range 204.17.5.1 to 204.17.5.30 204.17.5.32 255.255.255.224 host range 204.17.5.33 to 204.17.5.62 204.17.5.64 255.255.255.224 host range 204.17.5.65 to 204.17.5. 94 204.17.5.96 255.255.255.224 host range 204.17.5.97 to 204.17.5.126 204.17.5.128 255.255.255.224 host range 204.17.5.129 to 204.17.5.158

Page 49: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

49 | P a g e

204.17.5.160 255.255.255.224 host range 204.17.5.161 to 204.17.5.190 204.17.5.192 255.255.255.224 host range 204.17.5.193 to 204.17.5.222 204.17.5.224 255.255.255.224 host range 204.17.5.225 to 204.17.5.254

Say you are assigned a Class C network number of 200.133.175.0. You want to utilize this network across multiple small groups within an organization. You can do this by subnetting that network with a subnet address. We will break this network into 14 subnets of 14 nodes each. This will limit us to 196 nodes on the network instead of the 254 we would have without subnetting, but gives us the advantages of traffic isolation and security. To accomplish this, we need to use a subnet mask 4 bits long. Recall that the default Class C subnet mask is 255.255.255.0 (11111111.11111111.11111111.00000000 binary)

Extending this by 4 bits yields a mask of 255.255.255.240 (11111111.11111111.11111111.11110000 binary)

This gives us 16 possible network numbers, 2 of which cannot be used:

Subnet bits Network Number Node Addresses Broadcast Address 0000 200.133.175.0 Reserved None 0001 200.133.175.16 .17 thru .30 200.133.175.31 0010 200.133.175.32 .33 thru .46 200.133.175.47 0011 200.133.175.48 .49 thru .62 200.133.175.63 0100 200.133.175.64 .65 thru .78 200.133.175.79 0101 200.133.175.80 .81 thru .94 200.133.175.95 0110 200.133.175.96 .97 thru .110 200.133.175.111 0111 200.133.175.112 .113 thru .126 200.133.175.127 1000 200.133.175.128 .129 thru .142 200.133.175.143 1001 200.133.175.144 .145 thru .158 200.133.175.159 1010 200.133.175.160 .161 thru .174 200.133.175.175 1011 200.133.175.176 .177 thru .190 200.133.175.191 1100 200.133.175.192 .193 thru .206 200.133.175.207 1101 200.133.175.208 .209 thru .222 200.133.175.223 1110 200.133.175.224 .225 thru .238 200.133.175.239 1111 200.133.175.240 Reserved None

Page 50: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

50 | P a g e

EXPERIMENT 16- Subnetting

Aim : subnetting a network Apparatus (Software/hardware): Cisco Packet Tracer Procedure: Construct and build the following topology from class C network 192.168.1.0

• How many network you can build out of the given block? • How many host you can have per network? • How many subnet you can build out of the given block? And how many host you can have

per subnet? • How many subnet you need to configure the above network from the given block? Configure

it/

Page 51: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

51 | P a g e

EXPERIMENT 17- Subnetting

Aim : subnetting a network Apparatus (Software/hardware): Cisco Packet Tracer Procedure: Construct and build the following topology from class A,B and C network 192.0.0.0, 192.168.0.0, 192.168.1.0

Page 52: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

52 | P a g e

EXPERIMENT 18- Protocol Structure

Aim : understanding protocol structure (IP, TCP, UDP, ICMP header format) Apparatus (Software/hardware): Cisco Packet Tracer Procedure:

1. Construct and build the following topology using class A, B, C network

2. Simulate the PING command from PC0 to PC1. 3. Double click on the envelop sign at PC0, Router0 and PC1

4. The popped up window (below) will enable you to trace the content of the message

through the OSI layer and what changes will occur at each layer (use next and previous buttons to trace each layer content).

Page 53: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

53 | P a g e

5. Navigate to the outbound/inbound tab at the top of the popped up window to view the content of the message header format.

Page 54: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

54 | P a g e

6. Repeat the above with Router0 to trace the content of the OSI model ( note here there is two path, UP and Down, Up for the receiving process and down for the sending)

Page 55: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

55 | P a g e

The inbound tab shows the content of the message (header format) during the receiving process

Page 56: CS 335 Networks Lab Manual

Yarmouk University

Faculty of Information Technology & Computer Sciences Department of Computer sciences

CS 335: Data Communication & Networks LAB Manual

Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid

56 | P a g e

Where the outbound tab shows the content of the message (header format) during the Sending process