You are on page 1of 56

Yarmouk University

Faculty of Information Technology


Department of Computer Sciences

Data Communication and Networking Lab
Prepared By:
Dr. Ahmed M. Manasrah
Wafa Qarqaz
Ahmad Banihani
Ikdam Al Hami
Fatima Abu Haw
Yarmouk University
nformation Technology & Computer Science
Department of Computer Sciences
Data Communication and Networking Lab
Prepared By:
Manasrah

Banihani
Ikdam Al Hami
was



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
2 | P a g e

Table of Contents
EXPERIMENT 1 ACTIVE DIRECTORY INSTALLATION ................................................................................... 4
Active Directory Overview ........................................................................................................................ 4
Creating a new forest ............................................................................................................................ 5
Creating a new domain tree ................................................................................................................. 6
Creating a new child domain ................................................................................................................ 7
Creating additional domain controllers ................................................................................................ 8
EXPERIMENT 2 DOMAIN NAME SYSTEM (DNS) ....................................................................................... 11
DNS defined ............................................................................................................................................ 11
EXPERIMENT 3 CREATING AND MANAGING DOMAIN USER ACCOUNTS ................................................ 13
Create / Disable/ Enable Domain user Account ..................................................................................... 13
EXPERIMENT 4: Installing and configuring DHCP server in an Active Directory domain. .......................... 18
EXPERIMENT 5 - Network Infrastructure ............................................................................................... 32
Layer 1, Layer 2 and Layer 3 Devices ...................................................................................................... 32
EXPERIMENT 6- Network commands ..................................................................................................... 33
ping, tracert/tracout, ipconfig ................................................................................................................ 33
EXPERIMENT 7- Networking Concept ......................................................................................................... 34
Network configuration ............................................................................................................................ 34
EXPERIMENT 8- Network Connectivity ................................................................................................... 35
EXPERIMENT 9- IP Addressing: classfull addressing ................................................................................... 36
EXPERIMENT 10- IP Addressing: Classless Addressing ................................................................................ 39
EXPERIMENT 11- Packet tracer ................................................................................................................... 41
EXPERIMENT 12- Configure a Network topology using packet tracer software......................................... 42
EXPERIMENT 13- Configure a Network topology using packet tracer software......................................... 44
EXPERIMENT 14- Configure a Network topology using packet tracer software......................................... 46
EXPERIMENT 15- Subnetting ....................................................................................................................... 48
EXPERIMENT 16- Subnetting ....................................................................................................................... 50


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
3 | P a g e

EXPERIMENT 17- Subnetting ....................................................................................................................... 51
EXPERIMENT 18- Protocol Structure ........................................................................................................... 52




Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
4 | P a g e

EXPERIMENT 1 ACTIVE DIRECTORY INSTALLATION

Apparatus (Software): Virtual Machine (VMWare)

Aim: Building the students ability to :

Understand Active Directory and its components
Create a new forest
Create a new domain tree in an existing forest
Create a new child domain in an existing tree.
Create an additional domain controller
Remove active directory from the domain if needed.

Procedure: Following should be well established to understand this practical.

Active Directory Overview
A directory is a hierarchical structure that stores information about objects on the network. A
directory service, such as Active Directory, provides the methods for storing directory data and
making this data available to network users and administrators. For example, Active Directory
stores information about user accounts, such as names, passwords, phone numbers, and so on,
and enables other authorized users on the same network to access this information.

Logical Structure
In active directory you organize resources in a logical structure that mirror the logical structure
of your organization. Grouping resources logically enable you to find a resource by its name
rather than by its physical location.

Domains
The core unit of logical structure in Active Directory is the domain, which can store millions of
objects. Printers, documents, e-mail address, databases, users, groups, computer objects etc.

Domain Controller
A domain controller is a computer running windows 2000 server that stores a replica of the
domain controllers. A domain can contain one or more domain controllers; all domain controllers
in a domain have a complete replica of the domain's portion of the database.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
5 | P a g e

Creating a new forest
When you create the first domain controller in your organization, you are creating the first
domain (also called the forest root domain) and the first forest. The top-level Active Directory
container is called a forest. It usually consists of one or more separately completely independent
trees. Forests have the following characteristics:
A forest consists of one or more trees that share a common schema and global
catalog. An organization can have multiple forests.
Multiple domain trees within a single forest do not form a contiguous namespace;
that is, they have noncontiguous DNS domain names. Although trees in a forest
do not share a namespace, a forest does have a single root domain, called the
forest root domain. The forest root domain is, by definition, the first domain
created in the forest. The Enterprise Admins and Schema Admins groups are
located in this domain. By default, members of these two groups have forest-wide
administrative credentials.
Domains in a forest operate independently but the forest enables communication
across the entire organization.
Implicit two-way transitive trust exist between domain and domain trees.

Exercise: Creating a New Forest

1.Click Start select Run type dcpromo and click OK. Welcome to the Active Directory
Installation Wizard page appears, click Next.
2. Operating System Compatibility page appears, read the information and click Next.
3. Domain Controller Type page appears, select Domain controller for a new domain and
click Next.
4. Create New Domain page appears, select Domain in a new forest.
5. New Domain Name page appears type the FQDN of your domain and click Next. For e.g.
Yahoo.com.
6. NetBIOS Domain Name page appears leave the default name and click Next.
7. Database and Log Folders page appears specify the location and click Next.
8. Shared System Volume page appears, specify the location and click Next.
9. DNS Registration Diagnostics page appears select Install and configure the DNS
server on this computer, and set this computer to use this DNS server as its preferred
DNS server and click Next.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
6 | P a g e

10. Permissions page appears select the appropriate permission and click Next.
11. Directory Services Restore Mode Administration Password page appears, give the
password and click Next.
12. Summary page appears read the information and click Next. The installation starts, after
few minutes Completing the Active Directory Installation Wizard page appears click
Finish.

Creating a new domain tree
A tree is a grouping of hierarchical arrangement of one or more windows 2000 domains that you
create by adding one or more child domains to an existing parent domain.
Create a new domain tree only when you need to create a domain whose DNS namespace is not
related to the other domains in the forest. This means that the name of the tree root domain (and
all of its children) does not have to contain the full name of the parent domain. A forest can
contain one or more domain trees. Trees share the following characteristics
All domains within a single tree share a common schema.
All domains within a single tree share a common global catalog.

Exercise: Creating a New Domain Tree In An Existing Forest

1. Click Start select Run type dcpromo and click OK. Welcome to the Active Directory
Installation Wizard page appears, click Next.
2. Operating System Compatibility page appears, read the information and click Next.
3. Domain Controller Type page appears, select Domain controller for a new domain
and click Next.
4. Create New Domain page appears, select Domain tree in an existing forest.
5. On the Network Credentials page give the name of the Enterprise administrator i.e. the
forest root domain's administrator, his password and name of the forest root domain
which you created in the previous exercise and click Next.
6. New Domain Tree page appears type the FQDN of your new domain and click Next.
For e.g. Hotmail.com.
7. NetBIOS Domain Name page appears leave the default name and click Next.



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
7 | P a g e


8. Database and Log Folders page appears specify the location and click Next.
9. Shared System Volume page appears, specify the location and click Next.
10. DNS Registration Diagnostics page appears select Install and configure the DNS
server on this computer, and set this computer to use this DNS server as its
preferred DNS server and click Next.
11. Permissions page appears select the appropriate permission and click Next.
12. Directory Services Restore Mode Administration Password page appears, give the
password and click Next.
13. Summary page appears read the information and click Next. The installation starts, after
few minutes Completing the Active Directory Installation Wizard page appears click
Finish.
NOTE: Before performing this exercise define a forwarder on the DNS server where you are creating a
new domain tree, for the forest root domain i.e. define a forwarder for yahoo.com.

Creating a new child domain
Create a new child domain when you want to create a domain that shares a contiguous
namespace with one or more domains. This means that the name of the new domain contains the
full name of the parent domain. For example, sales.microsoft.com would be a child domain of
microsoft.com. As a best practice, you create new domains as children of the forest root domain.
You can create a new child domain by creating a new domain under a parent domain using the
Active Directory Installation Wizard After you create the child domain, you can create additional
domain controllers in the child domain for fault tolerance and high availability of Active
Directory.

Exercise: Creating a New Child Domain In An Existing Tree

1. Click Start select Run type dcpromo and click OK. Welcome to the Active Directory
Installation Wizard page appears, click Next.
2. Operating System Compatibility page appears, read the information and click Next.
3. Domain Controller Type page appears, select Domain controller for a new domain
and click Next.
4. Create New Domain page appears, select Child domain in an existing domain tree.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
8 | P a g e

5. On the Network Credentials page give the name of the Enterprise administrator i.e. the
forest root domain's administrator, his password and name of the forest root domain
which you created in the previous exercise and click Next.
6. Child Domain Installation page appears type the name of the parent domain which
could either be hotmail.com or yahoo.com and the name of the child domain and click
Next.
7. NetBIOS Domain Name page appears leave the default name and click Next.
8. Database and Log Folders page appears specify the location and click Next.
9. Shared System Volume page appears, specify the location and click Next.
10. Permissions page appears select the appropriate permission and click Next.
11. Directory Services Restore Mode Administration Password page appears, give the
password and click Next.
12. Summary page appears read the information and click Next. The installation starts, after
few minutes Completing the Active Directory Installation Wizard page appears click
Finish.
NOTE: Before performing this exercise give the IP address of the domain controller which hosts the
parent domain, in the preferred DNS server.

Creating additional domain controllers
If you already have one domain controller in a domain, you can add additional domain
controllers to the domain to improve the availability and reliability of network services. Adding
additional domain controllers can help provide fault tolerance, balance the load of existing
domain controllers, and provide additional infrastructure support to sites.
More than one domain controller in a domain makes it possible for the domain to continue to
function if a domain controller fails or must be disconnected. Multiple domain controllers can
also improve performance by making it easier for clients to connect to a domain controller when
logging on to the network. You can add additional domain controllers over the network or from
backup media.







Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
9 | P a g e

Exercise 4: Creating an Additional Domain Controller

1. Click Start select Run type dcpromo and click OK. Welcome to the Active Directory
Installation Wizard page appears, click Next.
2. Operating System Compatibility page appears, read the information and click Next.
3. Domain Controller Type page appears, select Additional Domain controller for an
existing domain and click Next.
4. On the Network Credentials page give the name of the Enterprise administrator i.e. the
forest root domain's administrator, his password and name of the forest root domain
which you created in the previous exercise and click Next.
5. Additional Domain Controller page appears type the name of the domain for which you
want to create the additional domain and click Next.
6. NetBIOS Domain Name page appears leave the default name and click Next.
7. Database and Log Folders page appears specify the location and click Next.
8. Shared System Volume page appears, specify the location and click Next.
9. Permissions page appears select the appropriate permission and click Next.
10. Directory Services Restore Mode Administration Password page appears, give the
password and click Next.
11. Summary page appears read the information and click Next. The installation starts, after
few minutes Completing the Active Directory Installation Wizard page appears click
Finish.
NOTE: Before performing this exercise give the IP address of the domain controller which hosts the
domain, in the preferred DNS server.



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
10 | P a g e

Exercise: Removing Active Directory from the Domain Controller

1. Click Start, select Run type dcpromo in the run box and click Next.
2. Welcome to the Active Directory installation Wizard appears. Click Next
3. In the message that appears click OK.
4. On the Remove Active Directory page place a check against this server is the last
domain controller in the domain only if this statement is true otherwise leave it
unchecked and click Next.
5. On the Application Directory Partition page click Next.
6. On the Confirm Deletion page place a check against Delete all application directory
partitions on this domain controller and click Next.
7. On the Administrator Password page give the password and click Next.
8. On the Summary page click Next.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
11 | P a g e

EXPERIMENT 2 DOMAIN NAME SYSTEM (DNS)

Apparatus (Software): Virtual Machine (VMWare), and the command line dnsmgmt.msc

Aim: to do the following:
Install the DNS Server
open the DNS Console

Procedure: Following should be done to understand this practical.
DNS defined
DNS is an abbreviation for Domain Name System, a system for naming computers and network
services that is organized into a hierarchy of domains. DNS naming is used in TCP/IP networks,
such as the Internet, to locate computers and services through user-friendly names. When a user
enters a DNS name in an application, DNS services can resolve the name to other information
associated with the name, such as an IP address.
For example, most users prefer a friendly name such as example.microsoft.com to locate a
computer such as a mail or Web server on a network. A friendly name can be easier to learn and
remember. However, computers communicate over a network by using numeric addresses. To
make the use of network resources easier, name systems such as DNS provide a way to map the
user-friendly name for a computer or service to its numeric address.

Exercise: Install the DNS Server

Method 1
1. Log on to the server where you want to install the DNS service.
2. Click Start, point to Control Panel, Add/Remove Programs.
3. In the left pane select Add/Remove Windows Components.
4. In the Windows Components Wizard box that opens select Networking
Services and click Details.
5. In the Networking Services box that opens place a check against Domain Name
System(DNS), click OK, click Next and then click Finish.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
12 | P a g e


Method 2
1. Log on to the server where you want to install the DNS service.
2. Right click My Network Places and select Properties.
3. In the Network Connections window that opens select Optional Networking
Components from the Advanced menu.
4. In the Windows Optional Networking Components Wizard box that opens
select Networking Services and click Details. In the Networking Services box
that opens place a check against Domain Name System(DNS), click OK, click
Next and then click Finish.

Exercise: Open the DNS Console

Method 1
Click Start, select Programs, Administrative Tools, click DNS.

Method 2
o Click Start, select Run.
o In the run box type dnsmgmt.msc.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
13 | P a g e

EXPERIMENT 3 CREATING AND MANAGING DOMAIN USER
ACCOUNTS

Apparatus (Software): Virtual Machine (VMWare), and the command line dsa.msc.

Aim: to do the following:
Creating a Domain User Account
Disabling and Enabling user Account
Reset password for a user account
Setting expiration date for a user account
Configuring Logon hours for a user account
Configuring workstations from which the users can log on
Creating a Roaming user profile
Creating a home folder.

Procedure: Following should be done to understand this practical.

Create / Disable/ Enable Domain user Account

Exercise: Creating a Domain User Account

1. Log on to a Domain Controller.
2. Click Start, point to Programs, Administrative Tools, select Active Directory Users
and Computers. Active Directory Users and Computers Console opens. Or Click
Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users
and Computers Console opens.
3. In the left pane expand the node by the name of your domain.
4. Right click the appropriate container node, point to New, select User. New object User
dialog box opens.





Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
14 | P a g e


Exercise: Disabling and Enabling user Account

1. Log on to a Domain Controller.
2. Click Start, point to Programs, Administrative Tools, select Active Directory Users
and Computers. Active Directory Users and Computers Console opens. Or Click
Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users
and Computers Console opens.
3. In the left pane expand the node by the name of your domain.
4. Select the container which contains the user and right click the user, select Properties .
5. On the property sheet select the Account tab.
6. Under Account Options place a check against the Account is disabled check box.

Exercise: Reset password for a user account

1. Log on to a Domain Controller.
2. Click Start, point to Programs, Administrative Tools, select Active Directory Users
and Computers. Active Directory Users and Computers Console opens. Or Click
Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users
and Computers Console opens.
3. In the left pane expand the node by the name of your domain.
4. Select the container which contains the user and right click the user, select Reset
Password.
5. Reset Password dialog box opens. Enter the password and click OK.

Exercise 4: Setting expiration date for a user account

1. Log on to a Domain Controller.
2. Click Start, point to Programs, Administrative Tools, select Active Directory Users
and Computers. Active Directory Users and Computers Console opens. Or Click
Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users
and Computers Console opens.



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
15 | P a g e

3. In the left pane expand the node by the name of your domain.
4. Select the container which contains the user and right click the user, select Properties.
5. On the property sheet select the Account tab.
6. Under Account Expires select the End of option and then specify the date for account
expiration.

Exercise: Configuring Logon hours for a user account

1. Log on to a Domain Controller. And Click Start, point to Programs, Administrative
Tools, select Active Directory Users and Computers. Active Directory Users and
Computers Console opens. Or Click Start, select Run. In the run box type dsa.msc and
click OK. Active Directory Users and Computers Console opens.
2. In the left pane expand the node by the name of your domain.
3. Select the container which contains the user and right click the user, select Properties.
4. On the property sheet select the Account tab.
5. Click the Logon Hours button. Logon Hours for user user appears.
6. Select the hours on which you want to deny access and click Logon Denied.

Exercise: Configuring workstations from which the users can log on

1. Log on to a Domain Controller.
2. Click Start, point to Programs, Administrative Tools, select Active Directory Users
and Computers. Active Directory Users and Computers Console opens. Or Click
Start, select Run. In the run box type dsa.msc and click OK. Active Directory Users
and Computers Console opens.
3. In the left pane expand the node by the name of your domain.
4. Select the container which contains the user and right click the user, select Properties.
5. On the property sheet select the Account tab.
6. Click the Logon On To button. Logon Workstations dialog box appears.
7. Select the The following computers option.
8. Under Computer Name specify the computers and click Add and then click OK.





Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
16 | P a g e

Exercise: Creating a Roaming user profile

1. Log on to a Domain Controller.
2. Create and share a folder by the name of Profiles on any machine on the domain.
3. Click Start point to, Programs, Administrative tools, Active Directory Users and
Computers Active Directory Users and Computers console opens.
4. Select the container which contains the user, in the right pane right click the users name
whose profile you want to create, select Properties.
5. On the user property sheet select the Profile tab. In the profile path give the network path
to the shared folder which you created in Step 2.
6. Network path is given in the following manner
\\computer_name\profiles\%username%
where computer_name is the name of the computer on which you created the Profiles
folder, profiles is the share name of the folder you created and %username% is a variable
which will automatically resolve to user name.
7. Click Apply and then click OK.

Exercise: Creating a home folder

1. Log on to a Domain Controller.
2. Create and share a folder by the name of Home on any machine on the domain..
3. Click Start point to, Programs, Administrative tools, Active Directory Users and
Computers Active Directory Users and Computers console opens.
4. Select the container which contains the user, in the right pane right click the users name
whose home folder you want to create, select Properties.
5. On the user property sheet select the Profile tab. Under Home Folder select the Connect
option and select the drive letter which you want to assign to the home folder and give
the network path to the shared folder you created in step 2.
6. Network path is given in the following manner
\\computername\home\%username%


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
17 | P a g e

where computername is the name of the computer on which you created the Home folder,
home is the share name of the folder you created and %username% is a variable which
will automatically resolve to user name.
7. Click Apply and then click OK.









Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
18 | P a g e

EXPERIMENT 4: Installing and configuring DHCP server in an Active
Directory domain.


Aim: Installing and configuring windows server 2003 DHCP service.
Dynamic IP addressing.

Apparatus (Software/Hardware): windows server 2003

Procedure1: Setting up a DHCP Server

Dynamic Host Configuration Protocol (DHCP) is an IP standard designed to reduce the
complexity of administering IP address configurations. Using DHCP on a network means
administrators don't need to configure these settings individually for each client on the network.
The DHCP would automatically distribute them to the clients itself.



1. Run your windows server 2003.
2. Go to: Start>All Programs>Administrative Tools>Manage Your Server.
3. On manage your server screen: select Add or remove a role.


Yarmouk University

Faculty of Information Technology & Co
CS 335: Data Communication & Networks LAB


Faculty of Information Technology and Computer Sciences

4. On preliminary steps screen: verify the required steps for your server then click next.
5. On Server Role screen: choose DHCP Server option and then click next.
6. Read the summery of selections and click next.
7. Installing progress will start.
8. New scope wizard will start. Using this wizard you can create a new scope of IP
addresses to the DHCP server to distribute across the network.
o A scope is a collection of IP addresses for computers on a subnet that use DHCP.
9. After Welcome screen; scope name screen
a. Name for the new scope
purpose of the scope on your network.
b. Description, for example, where is the DHCP server located.
Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB


Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
On preliminary steps screen: verify the required steps for your server then click next.
On Server Role screen: choose DHCP Server option and then click next.
Read the summery of selections and click next.
Installing progress will start.
e wizard will start. Using this wizard you can create a new scope of IP
addresses to the DHCP server to distribute across the network.
A scope is a collection of IP addresses for computers on a subnet that use DHCP.
After Welcome screen; scope name screen will ask you to enter:
ame for the new scope: scope name should be descriptive enough to identify the
purpose of the scope on your network.
escription, for example, where is the DHCP server located.
mputer Sciences
CS 335: Data Communication & Networks LAB Manual
Computer Sciences Department, Yarmouk University, Jordan, Irbid
19 | P a g e
On preliminary steps screen: verify the required steps for your server then click next.

e wizard will start. Using this wizard you can create a new scope of IP
A scope is a collection of IP addresses for computers on a subnet that use DHCP.
should be descriptive enough to identify the


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
20 | P a g e



10. On IP Address Range screen: define the range of addresses that the scope will distribute
and the subnet mask for the IP address. Enter the appropriate details and click next.
a. Because these addresses are given to clients, they should all be valid addresses for
your network and not currently in use.
b. Specifying the IP address range of a scope requires some knowledge of
subnetting.
c. Each scope in a DHCP server holds a pool of IP addresses to give out to clients,
and the range of IP addresses must be within the allowed range of the subnet (that
you specify on the subnet mask field).



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
21 | P a g e



11. On Add Exclusion screen: you can add any exclusion to the range of IP addresses you
specified in IP address range screen.
This includes any addresses that may have already been statically assigned to certain
network devices, such as servers and router in your organization.
The IP addresses may sometimes be within the range of IP addresses defined for a
scope. In those cases, you have to exclude the IP addresses from being assigned out
by DHCP so the DHCP server should not be able to distribute these addresses.
You can exclude a range of IP addresses, or a single address.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
22 | P a g e


12. On lease duration screen: determines the length of time that a client can hold a leased
address.
The lease duration is how long clients should keep their IP addresses before having to renew them.





Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
23 | P a g e

Considerations for lease Duration:
If short lease duration is configured, clients will be renewing their IP addresses more
frequently. The result will be additional network traffic and additional strain on the DHCP
server.
If long lease duration is configured, IP addresses previously obtained by decommissioned
clients would remain leased and unavailable to future clients until the leases either expire or
are manually deleted.
o If network changes occur, such as the implementation of a new DNS server, those
clients would not receive those updates until their leases expire or the computers are
restarted.
According to Microsoft: lease durations should typically be equal to the average time the
computer is connected to the same physical network.
o You can leave the default lease duration in an environment where computers are
rarely moved or replaced, such as a wired network.
o In an environment where computers are often moved and replaced, such as a wireless
network, you would want to specify a short duration since a new wireless client could
roam within range at any time.

13. Next screen will be configuring the DHCP server: You are given a choice of whether or not you
wish to configure the DHCP options for the scope now or later.



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
24 | P a g e

o DHCP options are additional settings that the DHCP server can provide to clients when it
issues them with IP addresses. These are the other settings that help clients communicate on
the network. In the New Scope Wizard we can only configure a few options but from the
DHCP MMC we have several more options. (See configuring a DHCP server)

14. On router (Default gateway) screen you may enter router, or gateway, IP address. This will help
the client computers will know which router to use.


15. On Domain name and DNS servers: the DNS and domain name settings can be entered. The DNS
server IP address will be distributed by the DHCP server and given to the client.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
25 | P a g e



16. On WINS server screen enter the IP Address of the WINS server. You can input the server name
into the server name box and press "Resolve" to allow it to find the IP address itself.
Windows Internet Naming Service; (WINS) is a service resolves Windows network
computer names (NetBIOS names) to Internet IP addresses.
WINS allows Windows computers on a network to easily find and communicate with
each other.




Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
26 | P a g e

17. The last step is to activate the scope. The DHCP server will not work unless you do this.


Procedure 2: Configuring a DHCP server

At this point we almost have a functional DHCP server.

1. Run your windows server 2003.
2. Click Start, click Programs, click Administrative Tools, and then click DHCP.

Note: You must be logged on to the server with an account that is a member of the
Enterprise Administrators group.
o On DHCP configuration screen the address pool displays a list of IP ranges assigned
for distribution and IP address exclusions.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
27 | P a g e



o Expand the scope node in the left pane of the DHCP MMC to see the new available
nodes:
Address Pool: Shows the IP address range the scope offers along with any IP
address exclusions.
Address Leases: Shows all the leased IP addresses.
Reservations: Shows the IP addresses that are reserved. Reservations are
made by specifying the MAC address that the server would listen to when
IP address requests are received by the server. Certain network devices, such
as networked printers, are best configured with reserved IP addresses rather
than static IP addresses.
Scope Options: Shows configured scope options. Some of the visible options
now are router, DNS, domain name and WINS options.
Server Options: Shows configured server options. This is similar to scope
options except that these options are either inherited by all the scopes or


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
28 | P a g e

overridden by them (covered in 'Advanced DHCP Server Configuration on
Windows 2003' article).
Earlier, we only defined exclusions for our servers, router plus a few more
spare IP addresses. In case you need to exclude more IP addresses, you can do
it at this point by following these instructions:

To authorize a DHCP server:

1. In the console tree of the DHCP snap-in, select the new DHCP server.
If there is a red arrow in the bottom-right corner of the server object, the server
has not yet been authorized.
Right-click the server, and then click Authorize.
After a few moments, right-click the server again and then click Refresh. The
server should display a green arrow in the bottom-right corner to indicate that the
server has been authorized.
2. To create a new scope:
Click Start, click Programs, point to Administrative Tools, and then click DHCP.
Note: In the console tree, select the DHCP server on which you want to create the
new DHCP scope.
Right-click the server and then click New Scope.
In the New Scope Wizard, click Next, and then type a name and description for
the scope.
Type the range of addresses that can be leased as part of this scope.
If you want to use a different subnet mask, type the new subnet mask.
Click Next.
Type any IP addresses that you want to exclude from the range. Click Next.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
29 | P a g e

Type the number of days, hours, and minutes before an IP address lease from this
scope expires.
Click Next to select Yes, I want to configure these options now, and then extend
the wizard to include settings for the most common DHCP options. Click Next.
Type the IP address for the default gateway that should be used by clients that
obtain an IP address from this scope. Click Add to place the default gateway
address into the list, and then click Next.

Note: When DNS servers already exist on your network, type your organization's
domain name in Parent domain. Type the name of your DNS server, and then
click Resolve to ensure that your DHCP server can contact the DNS server and
determine its address. Then click Add to include that server in the list of DNS
servers that are assigned to the DHCP clients. Click Next.
Click Yes, I want to activate this scope now, to activate the scope and allow
clients to obtain leases from it, and then click Next. Click Finish.
3. To add exclusion:
Right clicking the address pool text on the left hand side of the window.
Selecting new exclusion range.
A window will allow you to enter an address range to be added.
Entering only the start IP will add a single IP address.


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
30 | P a g e


4. Reserving an IP address for a client.
Reserving an IP means that the specific
network client will have the same IP for as
long as you wanted it to.
To do this you will have to know the physical
address (MAC) of each network card.
Enter the reservation name, desired IP
address, MAC address.
On description choose whether you want to
support DHCP or BOOTP and press add.
The new reservation will be added to the list.
5. Right click scope options and press configure options; you can configure more servers and their
parameters. These settings will be distributed by the DHCP server along with the IP address.
Server options act as a default for all the scopes in the DHCP server. However, scope
options take preference over server options.
BOOTP:
o BOOTP is a network protocol used
by a network client to obtain an IP
address from a configuration
server.
o The bootstrap protocol (BOOTP)
developed before DHCP. DHCP
improves on BOOTP and resolves
specific limitations BOOTP had as
a host configuration service.



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
31 | P a g e

Troubleshooting:
1. Clients are unable to obtain an IP address
If a DHCP client does not have a configured IP address, it generally means that the client has not
been able to contact a DHCP server. This is either because of a network problem or because the
DHCP server is unavailable. If the DHCP server has started and other clients have been able to
obtain a valid address, verify that the client has a valid network connection and that all related
client hardware devices (including cables and network adapters) are working properly.
2. The DHCP server is unavailable
When a DHCP server does not provide leased addresses to clients, it is often because the DHCP
service has failed to start. If this is the case, the server may not have been authorized to operate
on the network. If you were previously able to start the DHCP service, but it has since stopped,
use Event Viewer to check the system log for any entries that may explain the cause.

Note To restart the DHCP service, click Start, click Run, type cmd, and then press ENTER.
Type net start dhcpserver, and then press ENTER.

Exercise:

Ex. You are the network administrator of a large company. You have to configure your Windows
Server 2003 to distribute IP Addresses to group of users on a network dynamically. The IP Address
block is 192.168.20.0/24, the server will take the first IP Address and it will not be changed. The
router will take the IP Address 192.168.20.5 and there is a set of IP Addresses will not be leased
dynamically starting from 192.168.20.7 to 192.168.20.19. How can we make it? Describe the
Solution in clear Steps.



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
32 | P a g e

EXPERIMENT 5 - Network Infrastructure

Aim: Study of following Network Devices in Detail
Hub
Switch
Bridge
Router

Apparatus (Software/Hardware): No software or hardware needed.

Procedure: Following should be done to understand this practical.

Layer 1, Layer 2 and Layer 3 Devices

1. Hub: is a device for connecting multiple twisted pair or fiber optic Ethernet devices together
and making them act as a single network segment. Hubs work at the physical layer (layer 1)
of the OSI model. The device is a form of broadcast sender.

2. Switch: A network switch or switching hub is a device that connects network segments.
The term commonly refers to a network bridge that processes and routes data at the data link
layer (layer 2) of the OSI model. Switches that additionally process data at the network layer
(layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.

3. Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2) of the OSI model. A bridge and switch are very much alike; a switch being a bridge with
numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge.

4. Router: A router is an electronic device that interconnects two or more computer networks,
and selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. Where
multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a table
showing the preferred paths between any two systems on the interconnected networks.








Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
33 | P a g e

EXPERIMENT 6- Network commands

Aim: Study of basic network command and Network configuration commands.

Apparatus (Software/Hardware): Command Prompt.

ping, tracert/tracout, ipconfig

Procedure: To do this EXPERIMENT- issue each command individually and examine the
results (if you require any help, type the command followed by the word help or issue the
command without any parameter to learn the usage format.)

1. Display Connection Configuration: Configures or displays network interface parameters for a
network, using TCP/IP.
>ipconfig /all


2. Test Connectivity: a computer network tool used to test whether a particular host is reachable
across an IP network
>ping IP_address / Domain name


3. Trace Route: is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop' from
router to router takes.
>tracert IP_address / Domain name


4. Display Resolved MAC Addresses: Displays or changes the Internet address to hardware
address translation tables used by the Address Resolution Protocol (ARP).
>arp











Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
34 | P a g e

EXPERIMENT 7- Networking Concept

Aim: Connect the computers in Local Area Network.

Apparatus (Software/Hardware): Virtual Machines, this exercise should be carried out
between 2 hosts (your host machine and the guest OS machine) or two students who are
sitting on adjacent computers. PC1 will be connected to PC2.

Network configuration

Procedure: On the host computer (PC1)
.
1. Find out the IP address, subnet MASK of your PC (Host). And use these information
in step 2 (use ipconfig command)

2. Go to Control Panel, Network Connections (on your guest machine), right click
on Local Area Connections, click on Properties, Internet Protocol (TCP/IP) and
select Use the following IP address. Enter the IP address, subnet mask and
default gateway (the IP address for the router) and click ok. Here use the following
values:

IP address (of your computer): same range (not the same IP address)
Subnet mask: class A, B, C network
Default gateway: from the same range (in LAN connection, this is optional)






Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
35 | P a g e

EXPERIMENT 8- Network Connectivity

Aim: Verify the connectivity of your workstation LAN using network Commands

Apparatus (Software/Hardware): Two connected computers in Local Area Network

Procedure: this exercise should be carried out between 2 hosts (your host machine and the
guest OS machine). Issue each command individually and examine the results.

Experiment

1. On your host machine, open the Command Prompt of the operating system using either
of the following methods:

a. Click on Start > All Programs > Accessories > Command Prompt or
b. Click on Start > Run, enter cmd (short for command) and click on ok.
c. A Command Prompt screen should open.

2. Gather TCP/IP configuration information using the ipconfig command:
a. Type ipconfig (short for IP configuration) on the command prompt window, and press
Enter.

The screen will show the IP address, subnet mask, and default gateway for
your computers connection.

Notice the values in the Command Prompt. The IP address and the default
Gateway should be in the same network or subnet, otherwise this host
would not be able to communicate

.
3. Check more detailed TCP/IP configuration information:
Type ipconfig /all and press Enter.
What are the DNS and DHCP server addresses?
What are their functions?
What is the MAC of the network interface card?

4. Ping the IP address of another computer (guest machine).

Note that for the ping and tracert commands to work the PC firewalls have to be
disabled. Why do you think this is so?

5. Is your PING Successful?


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
36 | P a g e

EXPERIMENT 9- IP Addressing: classfull addressing

Aim: understand the structure of the IP address
Classification of IP address
Sub netting

Apparatus (Software/Hardware): N/A

Procedure: the structure and the classification of the IP address are required for this practical.

Experiment

1. An IPv4 (Internet Protocol version 4) address is a 32-bit address that uniquely and
universally defines the connection of a device to the Internet.
2. IP Address Functions:
a. Network Interface Identification: the IP address provides unique identification of the
interface between a device and the network.
b. Routing: When the source and destination of an IP datagram are not on the same network.
3. Each IP address has the following format x.y.w.z (four numbers/zones)
a. Each number / zone should not have a leading zero (128.011.3.31)
b. The IP address is exactly 4 numbers / zones ONLY (3 dots)
c. Each number needs to be less than or equal to 255, WHY?
d.





Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
37 | P a g e


4. To organize the IP distribution and the IP address space, the IP addresses classified into 5
classes as follows:




5. Addressing is based on class. However, this causes a big waste of IP addresses, because,
a. each class is divided into a fixed number of blocks
b. each block having a fixed size
c. Thus, large part of the available addresses were wasted, consider YU with Class A IP
address, too much.
6. A Subnet mask is a 32-bit number that masks an IP address. Subnet Mask is made by setting
network bits to all "1"s and setting host bits to all "0"s. The leftmost bits must be set to '1, and
the rightmost bits in a valid subnet mask must be set to '0'.

7. Fill in the table below:

Class Subnet Mask in Binary Subnet Mask in Decimal CIDR Notation
A
B
C


8. How the IP addresses are given??




Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
38 | P a g e

9. Configure the following network using class A, then class B, and then class C Network?


10. Fill in the table below?
Class MASK in Decimal Number of Networks Number of Hosts Per Network
A
B
C





Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
39 | P a g e

EXPERIMENT 10- IP Addressing: Classless Addressing

Aim: understand the structure of the IP address
Sub netting

Apparatus (Software/Hardware): n/a

Procedure: the structure and the classification of the IP address is an entry to this practical.

18. Since classfull addressing distribute the IP addresses as blocks, there was a huge IP addresses
waste and such, a subnet aims to organizing hosts into logical groups because There are no
classes, but addresses are giving in blocks of a known and pre-determined size ( assign IP as
much as they require to minimize the IP addresses waste).
19. However, the internet authorities impose 3 restrictions:
a. The addresses in a block must be contagious (one after another)
b. The number of addresses in a block must be a power of 2 (1,2,4,8,)
c. The first address must be evenly divisible by the number of needed addresses
20. Initially the IP address has two components:
a. Netid: Network address
b. Hostid: Host address.
21. The IP address now should have three components:
a. Netid: Network address
b. Subnetid: subnet address
c. Hostid: Host address.
22. In classless addressing, a block of addresses can be defined as ( x.y.z.t /n ) in which (x.y.z.t)
defines one of the addresses and the( /n) defines the subnet mask .



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
40 | P a g e

23. How the IP addresses are given??

24. Configure the following network using /24, 25, /26?

Hint: Find the first IP address and the last IP address within the block.

25. Fill in the table below?
CIDR MASK in Decimal Number of Subnets Number of Hosts Per subnet
/24
/25
/26
/27
/17
/9
/8
/16


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
41 | P a g e

EXPERIMENT 11- Packet tracer

Aim: Installing and understand Cisco Packet Tracer

Apparatus (Software/Hardware): Cisco Packet tracer 5.3.2

Procedure:
1. Install Cisco Packet tracer (Cisco_Packet_Tracer_5.3.2).

2. Refer to the usage manual





Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
42 | P a g e

EXPERIMENT 12- Configure a Network topology using packet tracer
software

Aim: Understand Network Topology and network hardware (L1) devices.

Apparatus (Software/Hardware): Cisco packet tracer

Procedure:

Start the packet tracer and configure the following network.



At which layer the HUB operates?




What is the physical topology of this network?




Is the network functioning? Why?







Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
43 | P a g e


Make the network functioning by providing class A, Class B, class C Addressing?

Class A Class B Class C





















Subnet MASK Subnet MASK Subnet MASK



Explain (simulate) the function of the HUB?

Explain Content of the Corresponding OSI Layer












Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
44 | P a g e

EXPERIMENT 13- Configure a Network topology using packet tracer
software

Aim: Understand Network Topology and network hardware (L2) devices.

Apparatus (Software/Hardware): Cisco packet tracer

Procedure:

Start the packet tracer and configure the following network.




At which layer the SWITCH operates?




What is the physical topology of this network?




Is the network functioning? Why?







Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
45 | P a g e


Make the network functioning by providing class A, Class B, class C Addressing?

Class A Class B Class C





















Subnet MASK Subnet MASK Subnet MASK



Explain (simulate) the function of the SWITCH?

Explain Content of the Corresponding OSI Layer












Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
46 | P a g e

EXPERIMENT 14- Configure a Network topology using packet tracer
software

Aim: Understand Network Topology and network hardware (L3) devices.

Apparatus (Software/Hardware): Cisco packet tracer

Procedure:

Start the packet tracer and configure the following network.




At which layer the ROUTER operates?




What is the physical topology of this network?




Is the network functioning? Why?









Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
47 | P a g e

Make the network functioning by providing class A, Class B, class C Addressing?

Class A Class B Class C





















Subnet MASK Subnet MASK Subnet MASK



Explain (simulate) the function of the ROUTER?

Explain Content of the Corresponding OSI Layer












Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
48 | P a g e

EXPERIMENT 15- Subnetting

Aim: Why we Develop sub netting and How to calculate subnet mask and how to identify subnet
addresses.

Apparatus (Software/hardware): n/a

Procedure:

subnet, is a logically visible subdivision of an IP network. The practice of dividing a network
into two or more networks is called subnetting. Subnetting allows you to create multiple logical
networks that exist within a single Class A, B, or C network. If you do not subnet, you are only
able to use one network from your Class A, B, or C network, which is unrealistic.
Each data link on a network must have a unique network ID, with every node on that link being a
member of the same network. If you break a major network (Class A, B, or C) into smaller
subnetworks, it allows you to create a network of interconnecting subnetworks. Each data link on
this network would then have a unique network/subnetwork ID. Any device, or gateway,
connecting n networks/subnetworks has n distinct IP addresses, one for each network /
subnetwork that it interconnects.
In order to subnet a network, extend the natural mask using some of the bits from the host ID
portion of the address to create a subnetwork ID. For example, given a Class C network of
204.17.5.0 which has a natural mask of 255.255.255.0, you can create subnets in this manner:
204.17.5.0 - 11001100.00010001.00000101.00000000
255.255.255.224 - 11111111.11111111.11111111.11100000
--------------------------|sub|----
By extending the mask to be 255.255.255.224 (/27), you have taken three bits (indicated by
"sub") from the original host portion of the address and used them to make subnets. With these
three bits, it is possible to create eight subnets (2^n=2^3). With the remaining five host ID bits,
each subnet can have up to 32 host addresses (2^32-n = 2^5), 30 of which can actually be
assigned to a device since host ids of all zeros or all ones are not allowed (it is very important to
remember this). So, with this in mind, these subnets have been created.
204.17.5.0 255.255.255.224 host range 204.17.5.1 to 204.17.5.30
204.17.5.32 255.255.255.224 host range 204.17.5.33 to 204.17.5.62
204.17.5.64 255.255.255.224 host range 204.17.5.65 to 204.17.5. 94
204.17.5.96 255.255.255.224 host range 204.17.5.97 to 204.17.5.126
204.17.5.128 255.255.255.224 host range 204.17.5.129 to 204.17.5.158


Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
49 | P a g e

204.17.5.160 255.255.255.224 host range 204.17.5.161 to 204.17.5.190
204.17.5.192 255.255.255.224 host range 204.17.5.193 to 204.17.5.222
204.17.5.224 255.255.255.224 host range 204.17.5.225 to 204.17.5.254

Say you are assigned a Class C network number of 200.133.175.0. You want to utilize this
network across multiple small groups within an organization. You can do this by subnetting that
network with a subnet address. We will break this network into 14 subnets of 14 nodes each.
This will limit us to 196 nodes on the network instead of the 254 we would have without
subnetting, but gives us the advantages of traffic isolation and security. To accomplish this, we
need to use a subnet mask 4 bits long.

Recall that the default Class C subnet mask is
255.255.255.0 (11111111.11111111.11111111.00000000 binary)
Extending this by 4 bits yields a mask of
255.255.255.240 (11111111.11111111.11111111.11110000 binary)
This gives us 16 possible network numbers, 2 of which cannot be used:

Subnet bits Network Number Node Addresses Broadcast Address
0000 200.133.175.0 Reserved None
0001 200.133.175.16 .17 thru .30 200.133.175.31
0010 200.133.175.32 .33 thru .46 200.133.175.47
0011 200.133.175.48 .49 thru .62 200.133.175.63
0100 200.133.175.64 .65 thru .78 200.133.175.79
0101 200.133.175.80 .81 thru .94 200.133.175.95
0110 200.133.175.96 .97 thru .110 200.133.175.111
0111 200.133.175.112 .113 thru .126 200.133.175.127
1000 200.133.175.128 .129 thru .142 200.133.175.143
1001 200.133.175.144 .145 thru .158 200.133.175.159
1010 200.133.175.160 .161 thru .174 200.133.175.175
1011 200.133.175.176 .177 thru .190 200.133.175.191
1100 200.133.175.192 .193 thru .206 200.133.175.207
1101 200.133.175.208 .209 thru .222 200.133.175.223
1110 200.133.175.224 .225 thru .238 200.133.175.239
1111 200.133.175.240 Reserved None



Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
50 | P a g e

EXPERIMENT 16- Subnetting

Aim: subnetting a network

Apparatus (Software/hardware): Cisco Packet Tracer

Procedure:
Construct and build the following topology from class C network 192.168.1.0

How many network you can build out of the given block?



How many host you can have per network?



How many subnet you can build out of the given block? And how many host you can have
per subnet?



How many subnet you need to configure the above network from the given block? Configure
it/




Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
51 | P a g e

EXPERIMENT 17- Subnetting

Aim: subnetting a network

Apparatus (Software/hardware): Cisco Packet Tracer

Procedure:
Construct and build the following topology from class A,B and C network 192.0.0.0,
192.168.0.0, 192.168.1.0




Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
52 | P a g e

EXPERIMENT 18- Protocol Structure

Aim: understanding protocol structure (IP, TCP, UDP, ICMP header format)

Apparatus (Software/hardware): Cisco Packet Tracer

Procedure:
1. Construct and build the following topology using class A, B, C network

2. Simulate the PING command from PC0 to PC1.
3. Double click on the envelop sign at PC0, Router0 and PC1

4. The popped up window (below) will enable you to trace the content of the message
through the OSI layer and what changes will occur at each layer (use next and previous
buttons to trace each layer content).





Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
53 | P a g e

5. Navigate to the outbound/inbound tab at the top of the popped up window to view the
content of the message header format.





Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
54 | P a g e

6. Repeat the above with Router0 to trace the content of the OSI model ( note here there is
two path, UP and Down, Up for the receiving process and down for the sending)










Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
55 | P a g e

The inbound tab shows the content of the message (header format) during the receiving
process






Yarmouk University

Faculty of Information Technology & Computer Sciences
Department of Computer sciences


CS 335: Data Communication & Networks LAB Manual




Faculty of Information Technology and Computer Sciences, Computer Sciences Department, Yarmouk University, Jordan, Irbid
56 | P a g e

Where the outbound tab shows the content of the message (header format) during the
Sending process

You might also like