Networking Lab Manual
Networking Lab Manual
Students must present a valid ID card before entering the computer lab.
Playing of games on computer in the lab is strictly prohibited.
Users are strictly prohibited from downloading, viewing or distributing any offensive
Before leaving the lab, users must close all programs positively and keep the desktop
blank.
Users are strictly prohibited from modifying or deleting any important files and install
any software or settings in the computer
Based on the prime priority, users may be requested by the lab in-charge, to leave the
workstation any time and the compliance is a must.
Eating and/or drinking inside the computer labs is strictly prohibited.
Internet facility is only for educational/ study purpose.
Silence must be maintained in the lab at all times.
The lab must be kept clean and tidy at all times.
If any problem arises, please bring the same to the notice of lab in-charge.
No bags/ hand bags/ rain coats/ casual wears will be allowed inside the computer lab,
however note book may be allowed.
Lab timing will be as per the academic time table of different classes
Every user must make an entry while entering in the DCCN Lab and also at the time of
exit from the lab.
Each student or visitor must take mobile phones in “Switched Off” mode while entering
and or working in Computer Lab.
Conversation, discussion, loud talking & sleeping are strictly prohibited.
Students are not allowed to use personal Pen Drives, CDs, DVDs etc., in a Computer Lab.
Only prescribed official Pen Drives, CDs, DVDs etc. will be used in the Computer Lab to
avoid VIRUS in Computers.
Users must turn-off the computer before leaving the computer lab.
In case of theft / destruction of the computers or peripherals, double the cost of the lost
will be charged from the student/user.
Keep your passwords to yourself. Change your password right away if you think
someone else may know it.
The DCCN lab is for academic purposes. Therefore, a quiet atmosphere is required.
Noisy students will be asked to leave.
Food and drink are not permitted in the computer lab.
The use of cell phones is prohibited in the computer lab. Cell phone usage in the
computer lab is distracting to other students and instructors trying to work.
General Instructions:
An observation note and a fair record are needed to record the experiments conducted
in the laboratory. Observation notes are needed to be certified immediately on completion of
the experiment. Fair records are due at the beginning of the next lab period. Fair records
must be submitted as neat, legible, and complete.
Instructions To Students For Writing The Fair Record: In the fair record, the index page
should be filled properly by writing the corresponding experiment number, experiment name ,
date on which it was done and the page number.
Title: The title of the experiment should be written in the page in capital letters
In the left top margin, experiment number and date should be written.
Aim: The purpose of the experiment should be written clearly.
Apparatus/Tools/Equipments/Components used: A list of the Apparatus/Tools
/Equipments /Components used for doing the experiment should be entered.
Theory: Simple working of the circuit/experimental set up/algorithm should be written.
Procedure: steps for doing the experiment and recording the readings should be briefly
described(flow chart/programs in the case of computer/processor related
experiments)
Results: The results of the experiment must be summarized in writing and should be
fulfilling the aim.
Inference: Inference from the results is to be mentioned.
Graphs: Graphs can used to present data in a form that show the results obtained, as
one or more of the parameters are varied. A graph has the advantage of presenting
large amounts of data in a concise visual form. Graph should be in a square format.
INDEX
S.No Experiment
1. Recognize the physical topology and cabling (coaxial, OFC, UTP,
STP) of a network.
2. Recognition and use of various types of connectors RJ-45, RJ-
11,BNC and SCST
3. Making of cross cable and straight cable.
4. Install and configure a network interface card in a workstation.
5. Identify the IP address of a workstation and the class of the
address.
6. Managing user accounts in windows.
7. Sharing of Hardware resources (Eg:Printer) in the network
8. Managing use of NETSTAT and its options
9. Connectivity troubleshooting using PING, IPCONFIG
10. Introduction To Cisco Packet Tracer7.2.2
11. Introduction to Cisco IOS
12. Basic Device Configuration in Cisco Packet Tracer
13. Configure IP Addressing of a basic network device in Cisco IOS
14. Basic Router Configuration
Theory:
2. RING Topology:
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.
3. STAR Topology:
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
4. MESH Topology:
5. TREE Topology:
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
6. HYBRID Topology:
It is two different types of topologies which is a mixture of two or more topologies. For example
if in an office in one department ring topology is used and in another star topology is used,
connecting these topologies will result in Hybrid Topology (ring topology and star topology).
Twisted Pair: A twisted pair cable is a type of cable made by putting two separate insulated
wires together in a twisted pattern and running them parallel to each other. This type of cable
is widely used in different kinds of data and voice infrastructures.
It is further classified into two types. a) UTP, b) STP
UTP has four pairs of color-coded copper wires twisted together and encased in a flexible
plastic sheath. No shielding is used. UTP relies on the following properties to limit crosstalk:
Cancellation - Each wire in a pair of wires uses opposite polarity. One wire is negative,
the other wire is positive. They are twisted together and the magnetic fields effectively
cancel each other and outside EMI/RFI.
Coaxial Cable:
Fiber-Optic Cabling:
Single-Mode Fiber:
Multimode Fiber:
• Larger core
• Uses less expensive LEDs
• LEDs transmit at different angles
• Up to 10 Gbps over 550 meters
Conclusion: In the above experiment we have recognized, observed and studied about different
types of topologies and cables in detail.
The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking interface. The
"45" simply refers to the number of the interface standard. Each RJ45 connector has eight pins,
which means an RJ45 cable contains eight separate wires. If you look closely at the end of an
Ethernet cable, you can actually see the eight wires, which are each a different color. Four of
them are solid colors, while the other four are striped.
RJ45 cables can be wired in two different ways. One version is called T-568A and the other is T-
568B. These wiring standards are listed below:
T-568A T-568B
1. White/Green (Receive +) 1. White/Orange (Transmit +)
2. Green (Receive -) 2. Orange (Transmit -)
3. White/Orange (Transmit +) 3. White/Green (Receive +)
4. Blue 4. Blue
5. White/Blue 5. White/Blue
6. Orange (Transmit -) 6. Green (Receive -)
7. White/Brown 7. White/Brown
8. Brown 8. Brown
The T-568B wiring scheme is by far the most common, though many devices support the T-
568A wiring scheme as well. Some networking applications require a crossover Ethernet cable,
which has a T-568A connector on one end and a T-568B connector on the other. This type of
cable is typically used for direct computer-to-computer connections when there is
no router, hub, or switch available.
Types of cables based on the termination:
1. Straight-over cable
2. Crossover cable
iii)BNC(Bayonet Neill Concelman connector): It’s a type of connector used with coaxial
cables such as the RG-58 A/U cable used with the 10Base-2 Ethernet system. The basic BNC
connector is a male type mounted at each end of a cable. This connector has a center pin
connected to the center cable conductor and a metal tube connected to the outer cable shield.
A rotating ring outside the tube locks the cable to any female connector.
BNC T-connectors (used with the 10Base-2 system) are female devices for connecting two
cables to a network interface card (NIC). A BNC barrel connector allows connecting two cables
together.
BNC connectors can also be used to connect some monitors, which increases the accuracy of
the signals sent from the video adapter.
iv) SC-ST: These connectors are used to connect the optical fibers.
Theory: Ethernet cables can be wired as straight through or crossover. The straight through is
the most common type and is used to connect computers to hubs or switches. They are most
likely what you will find when you go to your local computer store and buy a patch cable.
Crossover Ethernet cable is more commonly used to connect a computer to a computer and
may be a little harder to find since they aren’t used nearly as much as straight through Ethernet
cable. Then, what’s the difference between straight through vs crossover cable? Read through
this post to find the answer.
A straight through cable is a type of twisted pair cable that is used in local area networks to
connect a computer to a network hub such as a router. This type of cable is also sometimes
Crossover Cable:
A crossover Ethernet cable is a type of Ethernet cable used to connect computing devices
together directly. Unlike straight through cable, the RJ45 crossover cable uses two different
wiring standards: one end uses the T568A wiring standard, and the other end uses the T568B
wiring standard. The internal wiring of Ethernet crossover cables reverses the transmit and
receive signals. It is most often used to connect two devices of the same type: e.g. two
computers (via network interface controller) or two switches to each other.
Uses of Straight Through and Crossover Cables: Usually, straight through cables are primarily
used for connecting unlike devices. And crossover cables are use for connecting alike devices.
Prepared by Deepika Panda(Lecturer in Electronics) & Shivanee Prusty (Lecturer in Electronics)
Use straight through Ethernet cable for the following cabling:
Switch to router
Switch to PC or server
Hub to PC or server
Switch to switch
Switch to hub
Hub to hub
Router to router
Router Ethernet port to PC NIC
PC to PC
Procedure:
Step 1: Strip the cable jacket about 1.5 inch down from the end. Ed Rhee
Step 2: Spread the four pairs of twisted wire apart. For Cat 5e, you can use the pull string to
strip the jacket farther down if you need to, then cut the pull string. Cat 6 cables have a spine
that will also need to be cut. Ed Rhee
Step 4: Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.
Step 5: Carefully insert the wires all the way into the modular connector, making sure that each
wire passes through the appropriate guides inside the connector.
Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way down.
Ed Rhee
Step 7: Repeat steps 1-6 for the other end of the cable.
Step 8: To make sure you've successfully terminated each end of the cable, use a cable tester to
test each pin.
For crossover cables, simply make one end of the cable a T568A and the other end a T568B.
Now you can make Ethernet cables of any length, fix broken connectors, or make yourself a
crossover cable.
Conclusion: In the above experiment we have studied about and Straight Through and
Crossover cable. Also, we learnt how to make them.
The first step in planning for IP addressing on your network is to determine which network class
is appropriate for your network. After you have done this, you can take the crucial second step:
obtain the network number from the Inter NIC addressing authority.
Currently there are three classes of TCP/IP networks. Each class uses the 32-bit IP address space
differently, providing more or fewer bits for the network part of the address. These classes are
class A, class B, and class C.
A class A network number uses the first eight bits of the IP address as its "network part." The
remaining 24 bits comprise the host part of the IP address, as illustrated in Figure 1 below.
The values assigned to the first byte of class A network numbers fall within the range 0-127.
Consider the IP address 75.4.10.4. The value 75 in the first byte indicates that the host is on a
class A network. The remaining bytes, 4.10.4, establish the host address. The InterNIC assigns
only the first byte of a class A number. Use of the remaining three bytes is left to the discretion
of the owner of the network number. Only 127 class A networks can exist. Each one of these
numbers can accommodate up to 16,777,214 hosts.
A class B network number uses 16 bits for the network number and 16 bits for host numbers.
The first byte of a class B network number is in the range 128-191. In the number
129.144.50.56, the first two bytes, 129.144, are assigned by the Inter NIC, and comprise the
network address. The last two bytes, 50.56, make up the host address, and are assigned at the
Class C network numbers use 24 bits for the network number and 8 bits for host numbers. Class
C network numbers are appropriate for networks with few hosts--the maximum being 254. A
class C network number occupies the first three bytes of an IP address. Only the fourth byte is
assigned at the discretion of the network owners. Figure 3 graphically represents the bytes in a
class C address.
The first byte of a class C network number covers the range 192-223. The second and third each
cover the range 1- 255. A typical class C address might be 192.5.2.5. The first three bytes,
192.5.2, form the network number. The final byte in this example, 5, is the host number.
If your organization has been assigned more than one network number, or uses subnets,
appoint a centralized authority within your organization to assign network numbers. That
authority should maintain control of a pool of assigned network numbers, assigning network,
subnet, and host numbers as required. To prevent problems, make sure that duplicate or
random network numbers do not exist in your organization.
After you have received your network number, you can then plan how you will assign the host
parts of the IP address.
The numbers in the first byte of the IP address define whether the network is class A, B, or C
and are always assigned by the Inter NIC. The remaining three bytes have a range from 0-255.
The numbers 0 and 255 are reserved; you can assign the numbers 1-254 to each
byte depending on the network number assigned to you.
Table 2 shows which bytes of the IP address are assigned to you and the range of numbers
within each byte that are available for you to assign to your hosts.
Procedure:
I. Steps to find workstation's IP address:
Observations:
IP address: 192.168.43.140
Subnet Mask:255.255.255.0 – Class C IP address
Apparatus Required-
Theory- We can manage user accounts in any OS( Windows and Linux). This implies adding a
new user account, editing the user details, removing the user account etc.
Procedure –
b. The Manage Accounts window opens. Click Add a new user in PC settings.
f. The second Add a user window opens. Type the name provided by your Answers in
the User name field.
b. The Delete account and data? window opens. Click Delete account and data.
b. The Manage Accounts window opens. Click Add a new user in PC settings.
d. The Add a user window opens. Click Sign in without a Microsoft account.
a. Click Control Panel > User accounts > Manage another account.
b. The Manage Accounts window opens. Click the new account.
c. The Change an Account window opens. Click Change the account type.
.
Step 4: Delete the Account
Aim: Install Print server in a LAN and share the between two system in a LAN.
Procedure:
To Install and configure printer:
1. Connect the printer to parallel port of the motherboard and
power cable to AC. Switch on the system and printer.
2. Insert the driver disk in the CD drive.
3. Click start >control panel>printers and fax respectively.
4. Then >double click> add a printer>add printer wizard
respectively.
Printer sharing:
a) Open Printers and Faxes. Click Start, click Control Panel, click Printers and Other
Hardware, and then click Printers and Faxes.
b) Right-click the printer you want to share, and then click Sharing.On the Sharing
tab, click Share this printer and then type a share name for the shared printer.
c) If you share the printer with others using different hardware or different
operating systems, click Additional Drivers. Click the Environment and
operating system for the other computers, and then click OK to install the
additional drivers.
d) Click OK, or, if you have installed additional drivers, click Close.
Apparatus Required:
Theory:
Netstat is a common command line TCP/IP networking utility available in most versions of
Windows, Linux, UNIX and other operating systems. Netstat provides information and statistics
about protocols in use and current TCP/IP network connections. (The name derives from the
words network and statistics.)
Netstat is a useful tool for checking network and Internet connections. Some useful applications
for the average PC user are considered, including checking for malware connections.
When dealing with excessive traffic and malicious software it’s advantageous to be informed
about the inbound and outbound connections to your computer. These are created via their
respective network addresses that indicate which ports were preemptively opened for
exchanging data. Once a port is opened, it receives the status “LISTEN” and waits for
connection attempts. One problem of having these ports remain open is that your system is
then left vulnerable to malware. What’s more, there’s also a chance that Trojan viruses already
found in your system may install a backdoor, opening up a corresponding port in the process.
For this reason, you should always regularly check the ports opened by your system, a task for
which netstat is particularly well suited. Possible infections can be caught based on unknown
opened ports or unknown IP addresses. In order to obtain an informative result, all other
programs, such as your internet browser, should be turned off. This is due to the fact that these
are often connected with computers that possess unknown IP addresses. Thanks to the detailed
statistics, users also receive information on the packets that have been transferred since the
last system start as well as notices of any errors that have occurred. The routing table, which
delivers information on the paths data packets takes through the net, can be displayed with the
help of the system-specific netstat command.
netstat [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-t] [-x] [-y] [Interval]
The combination of the individual options works by stringing the individual parameters
together, each separated by a space:
netstat [-OPTION1][OPTION2][OPTION3] …
In this case, it is important that you do not leave any spaces between the individual netstat
options.
-e netstat –e Shows statistics about your network connection (received and sent data
packets, etc.) Displays Ethernet statistics
-o netstat –o Displays the owning process identifier (PID) associated with each
displayed connection
-p proto netstat -p TCP Displays the connections for the protocol specified by proto, proto may
be any of TCP, UDP, TCPv6, or UDPv6
-q netstat –q Lists all connections, all listening TCP ports, and all open TCP ports that
are not listening
-s netstat –s Retrieves statistics about the important network protocols such as TCP,
IP, or UDP
-t netstat –t Shows the download status (TCP download to relieve the main
processor) of active connections
-x netstat –x Informs about all connections, listeners, and shared endpoints for
NetworkDirect
-y netstat –y Displays which connection templates were used for the active TCP
connections
Interval netstat -p 10 Displays the respective statistics again after a selected number of
seconds (here 10); can be combined as required (here with –p), [CTRL] +
[C] ends the interval display. Default setting is to display once.
/? netstat /? Use the help switch to show details about the netstat command's several
options.
Procedure :
In Windows operating systems, you can use the netstat services via the command line
(cmd.exe). You can find them in the start menu under "All Programs" -> "Accessories" ->
"Command Prompt". Alternatively, you can search directly for "Command Prompt" in
the start menu’s search field or start the command line via "Run" (Windows key + press
"R" and enter "cmd").
1. Displaying connections
(a) If you run netstat without specifying any parameters, you get a list of active connections,
all the Established and Waiting for TCP connections. something like this:
C:\>netstat
Active Connections
Proto Local Address Foreign Address State
TCP Doug:1463 192.168.168.10:1053 ESTABLISHED
TCP Doug:1582 192.168.168.9:netbios-ssn ESTABLISHED
TCP Doug:3630 192.168.168.30:9100 SYN_SENT
TCP Doug:3716 192.168.168.10:4678 ESTABLISHED
TCP Doug:3940 192.168.168.10:netbios-ssn ESTABLISHED
This list shows all the active connections on the computer and indicates the local port used by
the connection, as well as the IP address and port number for the remote computer.
(b) Running netstat with a number after the command continues to run the command until
stopped. In this case, netstat would be refreshed every five seconds. To cancel, press Ctrl+C.
C:\>netstat 5
(c) You can use below syntax to view all established connection from/to your Windows server.
Similarly, to view LISTEN, CLOSE_WAIT, TIME_WAIT you can just use as follows.
C:\>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 192.168.168.21:1463 192.168.168.10:1053 ESTABLISHED
TCP 192.168.168.21:1582 192.168.168.9:139 ESTABLISHED
TCP 192.168.168.21:3658 192.168.168.30:9100 SYN_SENT
TCP 192.168.168.21:3716 192.168.168.10:4678 ESTABLISHED
TCP 192.168.168.21:3904 207.46.106.78:1863 ESTABLISHED
TCP 192.168.168.21:3940 192.168.168.10:139 ESTABLISHED
(b)
C:\>netstat -an
Displays all connections on the computers in numerical format, only displaying the local and
foreign IP and port addresses. The information that is displayed includes the protocol, the local
address, the remote (foreign) address, and the connection state.
3. Display of all open ports and active connections (numeric and process ID included)
One of the most popular netstat commands is undoubtedly to query all open ports and active
connections (including process ID) in numeric form:
The command netstat -ano lists all open ports and active connections numerically, including
process ID.
A very handy when you have to find out which PID is using the particular port number..
Let’s suppose you want to monitor if a port is listening at a constant interval. Windows netstat
command can accept sleep interval.
here the interval is 5 seconds,The netstat -abo command would run every 5 seconds until
interrupted or stopped with CTRL+C
C:\>netstat -e
Interface Statistics
Received Sent
The items to pay attention to in this output are the Discards and Errors. These numbers should
be zero, or at least close to it. If they're not, the network may be carrying too much traffic or
the connection may have a physical problem. If no physical problem exists with the connection,
try segmenting the network to see whether the error and discard rates drop.
C:\>netstat -es
Use the following netstat command for a repeated query of the interface statistics, which
returns new values every 20 seconds on received and sent data packets:
C:\>netstat -e 20
Useful when you have to find out for any received header error, received address error,
discarded packet, etc. It will list out statistics from IPv4, IPv6, ICMPv4, ICMPv6, TCP, UDP, etc.
C:\>netstat -s
Note: to find out any errors quickly you can use syntax.
If you don't want to retrieve all active connections, but only all active IPv4 connections, you can
do this using the netstat command:
C:\>netstat -p IP
If you only want to obtain statistics on the ICMPv6 protocol, enter the following command in
the command line:
C:\>netstat -s -p icmpv6
To access the statistics for the previous ICMPv6 version 4, replace "icmpv6" with "icmp" in the
command shown here.
To display Route Table, you can use below syntax. The following syntax will also list all
interfaces.
C:\>netstat -r
Conclusion: In this experiment we have learnt about NETSTAT and its options.
2. At the command prompt, ping the loopback address by typing ping 127.0.0.1.
4. Ping the IP address of the default gateway. If the ping command fails, verify that the
default gateway IP address is correct and that the gateway (router) is operational.
Conclusion: In the above experiment we have learnt the usage of ipconfig and ping.
Theory:
Introduction: Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems
that allows users to create network typologies and imitate modern computer networks. The
software allows users to simulate the configuration of Cisco routers and switches using a
simulated command line interface.
Navigating in Cisco Packet Tracer 7.2.2 : Open Packet Tracer. On the lower left corner, there are
all the components required for creating our network as shown in fig2. There are routers,
switches, End devices, Hubs, Wireless Devices, and Connections etc.
End Devices: Click on “End Devices” symbol to select an end device among the available devices
such as PC, Laptop, Server etc. Drag it to place the selected end device in the home screen.
Connections: The connection icon is used to select different connection media which are used
to connect the network devices. The types of connection media available are: Console, Copper
straight-through, copper cross-over, fiber, phone, coaxial, Serial DCE, serial DTE, USB etc.
When two devices are connected, If the connection end points are red, then there is some
problem with your wiring. If end points show green, then your wiring is alright.
Packet Tracer Modes: Cisco Packet Tracer provides two operating modes to visualize the
behavior of a network—real-time mode and simulation mode. In real-time mode the network
behaves as real devices do, with immediate real-time response for all network activities. In
simulation mode the user can see and control time intervals, the inner workings of data
transfer, and the propagation of data across a network.
A Basic network:
Fig6:Basic Network
Steps to connect the above network:
Select and place the network devices in the home screen.(Select Switch from “Network
Devices” and PCs from “End Devices”).
Choose appropriate connection media to connect the network devices.(Copper Straigh-
through cable is used)
Theory:
Cisco Operating System:
• Shell - The user interface that allows users to request specific tasks from the computer.
These requests can be made either through the CLI or GUI interfaces.
• Kernel - Communicates between the hardware and software of a computer and
manages how hardware resources are used to meet software requirements.
• Hardware - The physical part of a computer including underlying electronics.
Access Methods:
• Console – A physical management port used to access a device in order to provide
maintenance, such as performing the initial configurations.
• Secure Shell (SSH) – Establishes a secure remote CLI connection to a device, through a
virtual interface, over a network. (Note: This is the recommended method for remotely
connecting to a device.)
• Telnet – Establishes an insecure remote CLI connection to a device over the network.
(Note: User authentication, passwords and commands are sent over the network in
plaintext.)
IOS Navigation:
Primary Command Modes:
User EXEC Mode:
Allows access to only a limited number of basic monitoring commands
Identified by the CLI prompt that ends with the > symbol
•
Line Configuration Mode:
• To move in and out of line configuration mode, use the line command followed
by the management line type. To return to global configuration mode, use the
exit command.
• Keyword – This is a specific parameter defined in the operating system (in the figure, ip
protocols).
• Argument - This is not predefined; it is a value or variable defined by the user (in the
figure, 192.168.10.5).
Hot Keys and Shortcuts:
Keystroke Description
Left Arrow or Ctrl+B Moves the cursor one character to the left.
Right Arrow or Ctrl+F Moves the cursor one character to the right.
Keystroke Description
Conclusion: From the above experiment we have got familiarized with the Cisco IOS and learnt
how to make a basic network connection.
Aim: To configure a basic device (Switch) in Cisco IOS using Cisco Packet Tracer
Procedure:
(Note: To return the switch to the default prompt, use the no hostname global config
command.)
Configure Passwords:
Securing user EXEC mode access:
• First enter line console configuration mode using the line console 0 command in
global configuration mode.
• Next, specify the user EXEC mode password using the password password command.
• Finally, enable user EXEC access using the login command.
Save Configurations:
There are two system files that store the device configuration:
startup-config - This is the saved configuration file that is stored in NVRAM. It contains
all the commands that will be used by the device upon startup or reboot. Flash does not
lose its contents when the device is powered off.
Conclusion: From the above experiment we have learnt how to configure name, password of a
basic network device and also how to save the configurations.
Procedure:
Conclusion: In this experiment we have learnt how to configure IP address Manually and
Dynamically of a End Device using LAN properties and a of switch using SVI.
Procedure:
1. Configure Initial Router Settings:
2. Configure Interfaces:
Configuring a router interface includes issuing the following commands:
• It is a good practice to use the description command to add information about the
network connected to the interface.
• The no shutdown command activates the interface.
The default gateway address is typically configured on all devices that will communicate beyond
their local network.
To configure an IPv4 default gateway on a switch, use the ip default-gateway ip-address global
configuration command. The ip-address that is configured is the IPv4 address of the local router
interface connected to the switch.
Conclusion: In the above experiment we have performed the basic configurations of the router.