network lab

352 views
Skip to first unread message

Soumalya Ghosh

unread,
Oct 7, 2015, 2:46:01 AM10/7/15
to upes_...@googlegroups.com, mohini...@gmail.com

EXPERIMENT-5

Familiarization of Basic network command and Network configuration commands

Aim: Study of basic network command and Network configuration commands.

Apparatus (Software): Command Prompt And Packet Tracer or GNS3.

Theory: Cisco Packet Tracer is a network simulation program that allows students to experiment with network behavior and ask “what if” questions. As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts.

Procedure: To do this EXPERIMENT- follows these steps:

In this EXPERIMENT- students have to understand basic networking commands e.g ping, traceroute etc.

All commands related to Network configuration which includes how to switch to privilege mode and normal mode and how to configure router interface and how to save this configuration to flash memory or permanent memory. There are other modes than these. Not all commands work in all modes. Be careful, If you type in a command that you know is correct—show running-config, for example—and you get an error, make sure that you are in the correct mode.

This commands includes

• Configuring the Router commands

 

• General Commands to configure network

 

• Privileged Mode commands of a router

 

• Router Processes & Statistics

 

• IP Commands

 

• Other IP Commands e.g. show ip route etc.

UNIVERSITY OF PETROLEUM & ENERGY STUDIES Centre for Information Technology, CES, Dehradun

 

Note: When you are entering a command, you can use the tab key to complete the command. Enter the first few characters of a command and press the tab key. If the characters are unique to the command, the rest of the command is entered in for you. This is helpful if you are unsure about the spelling of a command. For example, if we write in enable mode, “sh” and press tab button, “show” command will be written on the CLI mode.

Conclusion: Gain the knowledge about the network commands and network configure commands. UNIVERSITY OF PETROLEUM & ENERGY STUDIES Centre for Information Technology, CES, Dehradun

 

EXPERIMENT-6

Set –up the network topology using two Routers

Aim: Configure a Network topology using two router on packet tracer software.

Apparatus (Software): Packet tracer Software

Theory: Network Topology refers to layout of a network and how different nodes in a network are connected to each other and how they communicate. A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node.

Procedure: To implement this practical following network topology is required to be configured using the commands learned in previous practical.

After configuring the given network a packet should be ping from any one machine to another

Conclusion: Successfully network topology is configured using two routers on Packet tracer.


This email and any attached files are confidential and intended solely for the intended recipient(s). If you are not the named recipient you should not read, distribute copy or alter this email. Any views or opinions expressed in this email are those of the author and do not represent those of the organization. Warning: Although precautions have been taken to make sure no viruses are present in this email, the organization cannot accept responsibility for any loss or damage that arise from the use of this email or attachments.

Victoria Adam

unread,
Nov 3, 2025, 2:00:01 PM11/3/25
to UPES_CS_BAO

ReadTech offers easy-to-follow tutorials in networking, cloud computing, and cybersecurity, empowering professionals to build their skills and advance confidently. Much like Gluco 20 nurtures overall wellness, the right learning tools from ReadTech foster lasting growth and career success in the ever-evolving tech world.

Reply all
Reply to author
Forward
0 new messages