CN - Lab - Manual
CN - Lab - Manual
Computer Networks
(3150710)
Laboratory Manual
Year: 2025-2026
Prepared By:
Page No.
Sr.
No. Experiment From To Date Marks Signature
7. IP Addressing Basics
8. Implementation of Dynamic
Routing (Using RIP)
9. Introduction to Networking and
Internetworking Devices
10. Implementation of DHCP in
network
Page 2 of 40
Experiment No: 1 Date: / /
OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Basics concepts of OSI model.
➢ Data transmission in Network.
➢ Concept of computer code conversion.
➢ Convert the given binary digits into character and given character into binary.
THEORY:
What is Network?
• In the simplest terms, a network consists of two or more computers that are connected
together to share information.
• Networking may be defined as two computers being linked together, either physically
through a cable or through a wireless device. This link allows the computers to share
files, printers and even internet connections
Data Communication:-
Components of networks:
1) Message
2) Source
3) Destination
4) Medium
5) Protocol
Page 3 of 40
OSI Model
Page 4 of 40
3) Perform modulo by 2 of ASCII Value and store Reminder until ASCII
Value equal to1.
4) Print stored Reminder Values in the Reverse order
The above algorithm will convert the given character into its binary equivalent and
store in the array. Observe the sequence stored in the array.
EXCERCISE:
1) Write a program to convert character into binary and binary digits into
character.
QUIZ:
Answer the Followings:
1) Write ASCII range for A-Z, a-z,0-9.
2) In the second program why the “for loop” appears in reverse order?
3) Give difference between ISO and OSI.
4) What is Protocol?
5) Differentiate “Node to Node Communication” and “End to End
Communication”
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 5 of 40
Experiment No: 2 Date: / /
TITLE: Implementation of star topology using switch and Hub in Packet Tracer.
OBJECTIVES:
After completing study of this practical student will be familiarized with…
➢ Concept of Packet Tracer Simulator.
➢ Concept of Basic N/W.
THEORY:
Packet Tracer:
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols
used in networking, in either Real Time or Simulation mode. This includes layer 2 protocols
such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols
such as TCP and UDP. Routing protocols can also be traced.
Step 1: Start Packet Tracer and Entering Simulation Mode
Single click on each group of devices and connections to display the various choices.
Page 6 of 40
Step 3: Building the Topology – Adding Hosts Single click on the End Devices.
Move the cursor into topology area. You will notice it turns into a plus “+” sign.
Single click in the topology area and it copies the device.
Step 4: Building the Topology – Connecting the Hosts to Hubs and Switches
Adding a Hub
Select a hub, by clicking once on Hubs and once on a Generic hub.
Page 7 of 40
Perform the following steps to connect PC0 to Hub0:
1. Click once onPC0
2. Choose Fast Ethernet
3. Drag the cursor toHub0
4. Click once on Hub0 and choose Port0
5. Notice the green link lights on both the PC0 Ethernet NIC and the Hub0 Port 0 showing -
that the link is active.
Adding a Switch
Select a switch, by clicking once on Switches and once on a 2950-24 switch.
Add the switch by moving the plus sign “+” below PC2 and PC3 and click once.
Connect PC2 to Switch0 by first choosing Connections. Click once on the Copper Straight-
through cable.
Page 8 of 40
Perform the following steps to connect PC2 to Switch0:
1. Click once onPC2
2. Choose Fast Ethernet
3. Drag the cursor toSwitch0
4. Click once on Switch0 and choose FastEthernet0/1
5. Notice the green link lights on PC2 Ethernet NIC and amber light Switch0FastEthernet0/1
port. The switch port is temporarily not forwarding frames, while it goes through the stages
for the Spanning Tree Protocol (STP)process.
6. After a about 30 seconds the amber light will change to green indicating that the port has
entered the forwarding stage. Frames can now forwarded out the switch port.
Choose the Config tab. It is here that you can change the name of PC0. It is also here where
you would enter a Gateway IP Address, also known as the default gateway. We will discuss
this later, but this would be the IP address of the local router. If you want, you can enter the
IP Address 172.16.1.1, although it will not be used in this lab.
Click on Fast Ethernet. Although we have not yet discussed IP Addresses, add the
IP Address to 172.16.1.10. Click once in the Subnet Mask field to
enter the default Subnet Mask. You can leave this at 255.255.0.0. We will discuss this later.
Page 9 of 40
Repeat these steps for the other hosts. Use the information below for IP Addresses and
Subnet Masks.
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 10 of 40
Experiment No: 3 Date: / /
OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Concept of Wired Media.
THEORY:
Introduction:
There are two types of transmission media
• To transmit a single bit down a copper wire, we must send some electrical signal
having two discrete states to represent 0 and1
• Examples:
Voltage +5v= 1 0V = 0
• Guided transmission is where the signal (information or data) is sent through some
sort of cable, usually copper or optical fiber.
• There are many different types of cabling:
▪ Twisted Pair:
▪ Coaxial Cable (Coax)
▪ Fiber Optic Cable
Twisted Pair:
• This consists of two or more insulated wires twisted together in a shape similar to a
helix.
• Use metallic conductor
Page 11 of 40
• The cables are twisted around each other to reduce the amount of external
interference
• It consists of two conductors (copper), each with its colored plastic insulation.
• This cable can be used at speeds of several Mb/s for a few kilometers.
• Used for telephone line and lab network.
UTP connector
Advantages of UTP
Page 12 of 40
Categories of coaxial cables
• Easy to Install.
• In expensive installation.
• It is better for Higher Distance at Higher speed than twisted pair.
• Excellent noise immunity.
Disadvantage:-
• High Cost
• Harder to work
o Light Source
o Transmission Medium
o Light Detector
Page 13 of 40
• This consists of a central glass core, surrounded by a glass cladding of lower
refractive index, so that the light stays in the core (using Total Internal Reflection)
• outside is covered with plastic jacket
• Many fibers may be bundled together surrounded by another plastic cover
Refraction:-
When Light travels from one medium to another medium changes occurs in its speed
and direction, this changes is called refraction.
I - Angle of Incidence.
R- Angle of Refraction.
• Critical Angle:-
At some points, the changes in the incident angle results in the refracted angle of 90
degrees, with the refracted beam lying along the Horizontal. The incident angle at this
point is known as Critical Angle.
• Reflection:-
When the angle of incidence becomes greater than the critical angle, a new phenomenon
is Occurs is called reflection.
Page 14 of 40
• Propagations Mode:-
o Fiber optic cables and network interface cards to connect a computer to the
fiber are an order of magnitude more expensive than their corresponding
copper cable equivalents
o Cost is high
o Installation and maintenance is difficult.
o Higher Bandwidth.
• Fiber cable Connector
EXERCISE:
1. Compare different types of light source which we can use in optical fiber.
2. List out different type of wired media used in computer Lab with their specification.
3. Give difference between following:
a. Twisted pair Cable and Coaxial Cable.
b. Twisted Pair Cable and Fiber Optics Cable.
c. Fiber Optic Cable and Coaxial Cable.
d. Wire Communication and Wireless Communication.
QUIZ:
Answer the Followings:
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 15 of 40
Experiment No: 4 Date: / /
OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Understand the concept of CRC.
➢ Understand the concept of Error checking Techniques.
THEORY:
Program: Generate a CRC code from given String and Fixed code.
Example:-
Page 16 of 40
Exercise
1) Write a C Program for the CRC Generator.
QUIZ:
Answer the Followings:
1. What is CRC?
2. CRC is used at which Layer?
3. Find CRC for String/Frame 1101011011 and Fixed code/Generator10011?
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 17 of 40
Experiment No: 5 Date: //
THEORY:
Note: Windows NT/2000/XP users complete Steps 1 to4
Step 1 Gather TCP/IP configuration information
Use the Start menu to open the Command Prompt, an MS-DOS-like window.
Press Start >Programs >Accessories >Command Prompt or Start >Programs >Command
Prompt.
The following figure shows the Command screen. Type ipconfig and press the Enter key.
The spelling of ipconfig is critical while case is not. It is short for IP Configuration.
This first screen shows the IP address, subnet mask, and default gateway. The IP address
and the default gateway should be in the same network or subnet, otherwise this host would
not be able to communicate outside the network. In the figure the subnet mask tells us that
the first three octets must be the same to be in the samenetwork.
Note: If this computer is on a LAN, the default gateway might not be seen if it is running
behind a Proxy Server.
Step 3 Compare the TCP/IP configuration of this computer to others on the LAN
Page 18 of 40
If this computer is on a LAN, compare the information of several machines.
Are there any similarities?
The IP addresses should share the same network portion. All machines in the LAN should
share the same default gateway.
Step 4 Check additional TCP/IP configuration information
To see detailed information, type ipconfig /all and press Enter. The figure shows the
detailed IP configuration screen.
The host name, including the computer name and NetBIOS name should be displayed. Also,
the DHCP server address, if used, and the date the IP lease starts and ends should be
displayed.
Look over the information. Entries for the DNS, used in name resolution servers, may also
be present.
The previous figure reveals that the router is performing DHCP services for this network.
This would likely be a small office or home office (SOHO) or small branch office
implementation.
Page 19 of 40
Notice the Physical Address (MAC) and the NIC model (Description).
In the LAN, what similarities about the Physical (MAC) Addresses are seen?
While not a requirement, most LAN administrators try to standardize components like
NICs.
Therefore, it would not be surprising to find all machines share the first three Hex pairs in
the adapter address. These three pairs identify the manufacturer of the adapter.
Exercise:-
Based on observations, what can be deduced about the following results taken from four
computers connected to one switch?
Computer 1
IP Address: 192.168.12.113 , Subnet Mask: 255.255.255.0, Default Gateway: 192.168.12.1
Computer 2
IP Address: 192.168.12.205, Subnet Mask: 255.255.255.0, Default Gateway: 192.168.12.1
Computer 3
IP Address: 192.168.112.97 , Subnet Mask: 255.255.255.0, Default Gateway: 192.168.12.2
Computer 4
IP Address: 168.19.112.97, Subnet Mask: 255.255.0.0, Default Gateway: 192.168.12.1
Should they be able to talk to each other? Are they all on the same network? Why or why
not? If something is wrong, what is most likely the problem?
QUIZ:
Answer the Followings:
1. Where IP Address is Stored?
2. Where MAC Address is Stored?
3. IP Address and MAC Address is used at which Layer?
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 20 of 40
Experiment No: 6 Date: / /
OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Concept of VLAN
THEORY:
VLAN:
● VLAN refers to Virtual Local Area Network
● VLAN that extends its functionalities beyond a single LAN through VLAN a network is
divided into different logical segments which known as broadcast domains.
● In technical terms, a VLAN is a broadcast domain created by switches.
● All devices, by default, are in VLAN 1.
● For devices in different VLAN’s to communicate, you must use a router or Layer 3
switch.
● The standard range consists of VLANs 1 to1024.
● The extended range consists of VLANs 1025 to4096.
Page 21 of 40
VLAN9 added: Name:jashvant
Vlan_Switch(config)#interface fastethernet0/1
Vlan_Switch(config-if)#switchport mode access
Vlan_Switch(config-if)#switchport access vlan 8
Vlan_Switch(config-if)#exit
Vlan_Switch(config)#interface fastethernet0/2
Vlan_Switch(config-if)#switchport mode access
Vlan_Switch(config-if)#switchport access vlan 8
Vlan_Switch(config-if)#exit
Vlan_Switch(config)#interface fastethernet0/3
Vlan_Switch(config-if)#switchport mode access
Vlan_Switch(config-if)#switchport access vlan 9
Vlan_Switch(config-if)#exit
Vlan_Switch(config)#interface fastethernet0/4
Vlan_Switch(config-if)#switchport mode access
Vlan_Switch(config-if)#switchport access vlan 9
Vlan_Switch(config-if)#exit
PC1:>ping 10.1.1.2
Pinging 10.1.1.2 with 32 bytes of data:
Replyfrom10.1.1.2:bytes=32 time=60msTTL=241
Replyfrom10.1.1.2:bytes=32 time=60msTTL=241
Page 22 of 40
Reply from 10.1.1.2: bytes=32 time=60ms TTL=241
Reply from 10.1.1.2: bytes=32 time=60ms TTL=241
Reply from 10.1.1.2: bytes=32 time=60ms TTL=241
Ping statistics for 10.1.1.2: Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),
Approximate round trip times inmilli-seconds:
Minimum = 50ms, Maximum = 60ms, Average =55ms
PC1:>ping 10.1.1.3
Pinging 10.1.1.3 with 32 bytes of data:
PC1:>ping 10.1.1.4
Pinging 10.1.1.4 with 32 bytes of data:
Page 23 of 40
VLANName Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11,Fa0/12
8 ajay active Gi0/-11,Gi0/-10
9 jashvant active Gi0/-9, Gi0/-8
1002fddi-default active
1003token-ring-default active
1004fddinet-default active
1005trnet-default active
EXCERCISE:
1) Create the Two VLAN from one LAN and write the configuration steps.
QUIZ:
Answer the Followings:
1) Give different types of VLAN.
2) List out advantages of VLAN.
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 24 of 40
Experiment No: 7 Date: / /
OBJECTIVES:
addressing
➢ Define the range of addresses and default subnet mask for each class
THEORY:
IP addresses are used to uniquely identify individual TCP/IP networks and hosts, such
Workstations and servers on a TCP/IP network are called hosts and each has a unique
IP address.
In order for a host to access the Internet, it must have an IP address.
▪ A network address
▪ A host address
IP addresses are 32 bits long according to the current version IPv4 and are divided
They operate at the network layer (Layer 3) of the Open System Interconnection
(DHCP)server
Page 25 of 40
The IP address of a workstation or host is a logical address, meaning it can be
changed.
The Media Access Control (MAC) address of the workstation is a 48-bit physical
address.
This address is burned into the network interface card (NIC) and cannot change
The combination of the logical IP address and the physical MAC address helps route
There are five different classes of IP addresses, and depending on the class, the
network and host part of the address will use a different number of bits.
Address classes
• The first column is the class of IP address. The second column is the first octet, which
must fall within the range shown for a given class of addresses.
• The first bit of a Class A address is always a zero, meaning the High Order Bit (HOB)
or the 128 bit cannot be used. 127 is reserved for loopback testing.
• The default subnet mask uses all binary ones, decimal 255, to mask the first 8 bits of
• The default subnet mask helps routers and hosts determine if the destination host is
• Because there are only 126 Class A networks, the remaining 24 bits, or 3 octets, can be
• Each Class A network can have 224, or over 16 million hosts. It is common to
Page 26 of 40
Network and host address
• The network or host portion of the address cannot be all ones or all zeros.
• As an example, the Class A address of 118.0.0.5 is a valid IP address.
• The network portion, or first 8 bits, which are equal to 118, is not all zeros and the host
portion, or last 24 bits, is not all zeros or all ones. If the host portion were all zeros, it
• If the host portion were all ones, it would be a broadcast for the network address. The
value of any octet can never be greater than decimal 255 or binary11111111.
Use the IP address chart and your knowledge of IP address classes to answer the following
questions:
1. What is the decimal and binary range of the first octet of all possible Class B IP addresses?
4. What is the maximum number of useable hosts with a Class C network address?
Page 27 of 40
Step 3: Given an IP address of 142.226.0.15 and a subnet mask of 255.255.255.0, answer the
following questions:
Step 4: Determine which IP host addresses are valid for commercial networks
For the following IP host addresses, determine which are valid for commercial networks
Sub netting
Page 28 of 40
• A Network with Three Levels of Hierarchy
• Masking: Masking is a process that extracts the address of the physical network from
an IP address.
172.16.0.0 /18
172.16.0.0 /19
172.16.0.0 /20
172.16.0.0 /21
172.16.0.0 /22
Page 29 of 40
172.16.0.0 /23
172.16.0.0 /24
172.16.0.0 /25
172.16.0.0 /26
172.16.0.0 /27
172.16.0.0 /28
172.16.0.0 /29
172.16.0.0 /30
EXERCISE:
1. Prepare the Network diagram of SAL Engineering & Technical Institute College.
QUIZ:
Answer the Followings:
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 30 of 40
Experiment No: 8 Date: / /
RIPv1 RIPv2
Interior/ Exterior Interior Interior
Type Distance vector Distance vector
Speed of Convergence Slow Slow
Scalability – Size of Network Small Small
Use of VLSM No Yes
Resource Usage Low Low
Implementation and Maintenance Simple Simple
Classful/
Classful Classless
Classless
Metric Hop Hop
Time Period 30 sec 30 sec
Administrative Distance(AD) 120 120
Algorithm Bellman-Ford Bellman-Ford
Updates Full Table Full Table
● RIP is a standardized vector distance routing protocol and uses a form of distance as hop
count metric. It is a distance vector. Through limiting the number of hop counts allowed
in paths between sources and destinations, RIP prevents routing loops. Typically, the
maximum number of hops allowed for RIP is 15. However, by achieving this routing loop
prevention, the size of supporting networks is sacrificed. Since the maximum number of
hop counts allowed for RIP is 15, as long as the number goes beyond 15, the route will be
considered as unreachable.
● When first developed, RIP only transmitted full updates every 30 seconds. In the early
distributions, traffic was not important because the routing tables were small enough. As
networks become larger, massive traffic burst becomes more likely during the 30 seconds
period, even if the routers had been initialized at different times. Because of this random
initialization, it is commonly understood that the routing updates would spread out in
time, but that is not the case in real practice.
Page 31 of 40
RIP Configuration
Router configuration:
Router-1 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router1
Router1(config)#interface fastethernet 0/0
Router1(config-if)#ip address 10.1.1.100 255.0.0.0
Router1(config-if)#noshutdown
Router1(config-if)#exit
Router1(config)#interface fastethernet 1/0
Router1(config-if)#ip address 20.1.1.100 255.0.0.0
Router1(config-if)#noshutdown
Router1(config-if)#exit
Router1(config)#router rip
Router1(config-router)#network10.0.0.0
Router1(config-router)#network20.0.0.0
Router-2 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router2
Router2(config)#interface fastethernet 0/0
Router2(config-if)#ip address 20.1.1.200 255.0.0.0
Router2(config-if)#noshutdown
Router2(config-if)#exit
Router2(config)#interface fastethernet 1/0
Router2(config-if)#ip address 30.1.1.100 255.0.0.0
Router2(config-if)#noshutdown
Router2(config-if)#exit
Router2(config)#router rip
Router2(config-router)#network 20.0.0.0
Page 32 of 40
Router2(config-router)#network 30.0.0.0
Router-3 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router3
Router3(config)#interface fastethernet 0/0
Router3(config-if)#ip address 30.1.1.200 255.0.0.0
Router3(config-if)#noshutdown
Router3(config-if)#exit
Router3(config)#interface fastethernet 1/0
Router3(config-if)#ip address 40.1.1.100 255.0.0.0
Router3(config-if)#noshutdown
Router3(config-if)#exit
Router3(config)#router rip
Router3(config-router)#network30.0.0.0
Router3(config-router)#network40.0.0.0
EXCERCISE:
1) Connect two different networks using three routers and configure using RIP
protocols. (Write the steps for each Routing Configuration.)
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 33 of 40
Experiment No: 9 Date: / /
TITLE: Introduction to Networking and Internetworking Devices
OBJECTIVES:
After completing this experiment students will be able to…
➢ Understand Networking and Internetworking Devices
THEORY:
Introduction
Repeater
Bridge
• Bridge operates at both the physical layer and data link layer.
• Bridge divides a larger network onto smaller segments.
• Maintain traffic for each segment.
• Maintain physical address of each node of each segment.
• Store address into look-up table.
Page 34 of 40
• Types of bridge
1. Simple Bridge
o Used to connect two segments
o Least expensive
o Address of each node entered manually
o Installation and maintenance is high & time consuming
2. Multiport Bridge
o Used to connect more than two LAN
o Maintain physical address of each station
o If three segment is connected then it maintain three tables
o Address of each node entered manually
o Installation and maintenance is high & time consuming
3. Transparent Bridge
o It’s also known as a learning Bridge
o Maintain physical address of each station
o Manually entry of each node is not required
o Maintain address by its own
o At initial level table is empty
o After each process its storing details of each node
o Its self updating
Router
Page 35 of 40
• It’s an intelligent device
• It has its own software
• Determines the best path among available different path
• Used to connect two different networks
• Manually handling is not required
• We can configure the router according to our requirement
• Maintain address by its own
• At initial level table is empty
• After each process its storing details of each node
• Its self updating
• Routing is classified as a Non adaptive and Adaptive routing
1. Non-adaptive Routing
o Path to the destination is selected first
o Router sends each packet through the same path
o All the packets follow the same path
o Routing decision is not taken based on the condition or topology of the
network
2. Adaptive Routing
o Router may select a different path for each packet
o Routing decision is taken based on the condition or topology of the network
o Find the best path among available path
Gateway
Switch
Page 36 of 40
• Layer two switch is operates at second layer and layer three switch is operates at
third layer
• We can configure layer three switch
• Switch(l2) maintain physical address of each node
• L3 switch handle logical address
• Not manually handling is required for tables
• For the first time broadcast the message if destination address is not available inthe
table.
• Two different strategies of switch
o Store and forward Switch: store the frame in the input buffer until the whole
packet has arrived.
o Cut through Switch: Not wait for other frames; just transmit it towards the
destination
Hub
• Used at physical layer
• Dump device
• Not maintaining any type of node details
• Each time broadcast the packets
• Cheaper
• Used to connect two or more number of computers
EXERCISE:
QUIZ:
Answer the Followings:
1) What is Brouter?
2) What is Multiprotocol Router?
3) Give difference between Store and forward Switch and Cut through Switch
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 37 of 40
Experiment No: 10 Date: / /
The Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to
configure network devices. DHCP allows a computer to join an IP-based network without
having a pre-configured IP address. DHCP is a protocol that assigns unique IP addresses to
devices, then releases and renews these addresses as devices leave and re-join the network.
Internet Service Providers (ISPs) usually use DHCP to allow customers to join the Internet
with minimum effort. The DHCP server maintains a database of available IP addresses and
configuration information. When it receives a request from a client, the DHCP server
determines the network to which the DHCP client is connected, and then allocates an IP
address. DHCP servers typically grant IP addresses to clients only for a limited interval.
Lets apply DHCP on packet tracer.
First, let us make a topology with one router on which we will apply DHCP and several client
PCs. More like this one,
In the following command “ipdhcp pool cisco”, we are creating a pool for DHCP called
cisco. cisco is the name here and we can name it whatever we want.
Similarly, in the command “default-router “ we are telling the DHCP about the default route
to follow.
Page 38 of 40
Notice, after we exit from DHCP mode, we are excluding some IP addresses by applying this
command “ipdhcp excluded-addresses x-x”, where x is the starting and ending IP address
respectively. We are basically reserving some IPs for our use. It can be used to attach printers,
or assign it to some specific users for security purposes. You can also give dns address in
dhcp by using the following command. dns-server192.168.1.15.
Now, open the PC.
Click on IP Configuration
And after DHCP request is completed you will see the following screen.
Now, after applying some IPs in sequence, DHCP will skip the IPs that we have excluded
from our DHCP pool.
Page 39 of 40
That is all, we have applied DHCP on packet tracer.
EXCERCISE:
1) Create wireless home network which only allow 6 wireless nodes in network.
(Write Steps)
2) Explain DHCP IP allocation.
EVALUATION:
Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)
Page 40 of 40