-
7/24/2019 Lab3 Topology Orientation and Building a Small Network
1/10
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1of 1
Lab3 - Topology orientation and building a small network
!! Before you start this lab install wireshark:www.wireshark.org !!
!! Don t share your wireless network !!
!! Set firewall OFF !!
!! Activate telnet client
Topology diagram
In reality we will set up the following toloplogy
Task 1: Create a Peer-to-Peer Network.
Docent
16a 16b 13a 13b 1a 1b 2a 2b 3a
17a 17b 14a 14b 5a 5b 4a 4b 3b
18a 18b 15a 15b 6a 6b 7a 7b 8a
19a 19b 10a 10b 9a 9b 8b
http://www.wireshark.org/http://www.wireshark.org/http://www.wireshark.org/http://www.wireshark.org/ -
7/24/2019 Lab3 Topology Orientation and Building a Small Network
2/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2of 2
20a 20b 11a 11b 12a 12b
Task 2: Connect to the Peer-to-peer Network
Step 1: Connect to the wireless network Eagleserver1/2You will have a limited connection, why?
Our server isnt connected with the internet.
Task 3: check you Ip addressWhich layer of the OSI-model is layer 3? Network layerWhich type of address is used on layer 3? Give two possible names for that specific address.
_Logisch adres of IP adres
Check your ip addres:
Click on the following pictogram:
Open command prompt
Use the command ipconfig
-
7/24/2019 Lab3 Topology Orientation and Building a Small Network
3/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3of 3
You must have an IP address in the range 192.168.1.100199
Check the ip address from your lab partner and ping.Result:
Explain the result of TTL:
TTL stands for Time To Live. The result of the TLL is 128. Its the the value used forWindows (OS of my neighbor).
Explain the result of TTL:
64 is minimum recommended time to live in Linux machines (raspberry Pi)
What protocol is used by the ping-command? (abbreviation + full name):
The protocol that is used by the ping-command is IP or internet protocol
How many packets are sent and received by the ping-command:
There were 4 packets send and 4 received.
-
7/24/2019 Lab3 Topology Orientation and Building a Small Network
4/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4of 4
Task 4: use wireshark to capture the ping-message
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for networktroubleshooting, analysis, software and protocol development, and education.
Before June 2006, Wireshark was known as Ethereal.
Download wireshark
Start wireshark. (Klik rechts en kies: Run as Administrator)
When Wireshark is launched, the screen below is displayed.
To start data capture it is first necessary to go to the Capturemenu and select the interface
choice.
From the Interfacedrop down list, select the network adapter in use.
In this case wireless network adaptor;
-
7/24/2019 Lab3 Topology Orientation and Building a Small Network
5/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5of 5
Setting Wireshark to capture packets in promiscuous mode
If this feature is NOT checked, only PDUs destined for this computer will be captured.
If this feature is checked, all PDUs destined for this computer AND all those detected by thecomputer
Set filter ICMP
-
7/24/2019 Lab3 Topology Orientation and Building a Small Network
6/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6of 6
The PDU (or Packet) List Pane at the top of the diagram displays a summary of each packet
captured. By clicking on packets in this pane, you control what is displayed in the other two panes.
The PDU (or Packet) Details Pane in the middle of the diagram displays the packet selected in thePacket List Pane in more detail.
The PDU (or Packet) Bytes Pane at the bottom of the diagram displays the actual data (inhexadecimal form representing the actual binary) from the packet selected in the Packet List Pane,and highlights the field selected in the Packet Details Pane.
Each line in the Packet List corresponds to one PDU or packet of the captured data. If you select aline in this pane, more details will be displayed in the "Packet Details" and "Packet Bytes" panes.
Packet list Pane
Packet detail Pane
Packet bytes Pane
-
7/24/2019 Lab3 Topology Orientation and Building a Small Network
7/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7of 7
Task 5:
Step 1: ping the other end-device
Step 2: examine the different steps of your ping
Step 3: make a screenshot and highlight the steps of your ping and take a closer look at the PacketDetails Pane.Compare the Packet Details Pane with the OSI-model and compare the Packet Details Pane with
the TCP/IP-model. Work with screenshots and explain in the comparison each layer.
-
7/24/2019 Lab3 Topology Orientation and Building a Small Network
8/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8of 8
The first thing we can see in the Packet Details Plane is the Frame. The OSI model consist of seven layers. In thesecond layer ( data link) we can find protocols that describe methods for exchanging data frames betweendevices over a common media. If we compare this to the TCP/IP model, this will happen in the Network AccessLayer. We can also see that Ethernet the encapsulation type is. If we take a look at the TCP/IP model , we willfind Ethernet in the Network Access Layer. Thereafter we see the frame number , the length of it and the capturelength.
Under Ethernet we will find the source and the destination. For the OSI model , the source and destination aregiven in the third layer ( Network layer). In this layer , a network header will be added . The information for wherethe data comes and to where its supposed to travel will be given in the Network Layer on the basis of an IPaddress. The Internet Protocol shows us the IP address from the source and the destinations IP address.
All of this happens also in the TCP/IP model but under the Internet Layer.
Eventually after the segmenting , the converting into packets and giving it IP addresses, all of this is will betranslated into bits and sent to another PC through a medium. For the OSI model , this last step happens in thePhysical Layer. In the TCP/IP model will it take place in the Network Access Layer.
-
7/24/2019 Lab3 Topology Orientation and Building a Small Network
9/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9of 9
Task 6: Raspberry PI server
Open a browser from your PC
Connect a http server:
http://192.168.1.2
Take a screenshot from this server.
http://192.168.1.2/http://192.168.1.2/http://192.168.1.2/ -
7/24/2019 Lab3 Topology Orientation and Building a Small Network
10/10
Packet Tracer - Implement Basic Connectivity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10of 10
Connect a FTP server:
ftp://192.168.1.2/ftp
If asking a password type:User: pi
Password: raspberryTake a screenshot from this server.
Klik onrasp.txtfile and display the content:
Connect with telnet to the mail server:
Open command window
telnet 192.168.1.2 25What is the purpose of 25? The gateway for the mailserver
Take a screenshot
ftp://192.168.1.2/ftpftp://192.168.1.2/ftpftp://ftp.txt/ftp://ftp.txt/ftp://ftp.txt/ftp://ftp.txt/ftp://192.168.1.2/ftp