ACN - 22520
Practical 10: Run Different SCTP commands
Theory:
Stream Control Transmission Protocol (SCTP) is a transport-layer protocol for transmitting signaling messages over IP
networks. Unlike TCP or UDP, SCTP supports multi-homing, multi-streaming, and provides reliable, in-sequence
message delivery with congestion control.
Key features include the ability to handle multiple data streams between endpoints, enhancing resilience to network
failures. This makes SCTP ideal for telecom signaling and real-time applications where TCP or UDP may be insufficient.
SCTP uses various timers and retransmission mechanisms:
• T1 Timer: Controls initiation and retransmissions during connection setup.
• T3 Timer: Manages retransmissions for established connections.
• Retransmission Counters: Limit retries for association, path, and startup.
The IUA protocol adapts ISDN signals for IP transmission using SCTP, commonly in VoIP and telecom networks.
Conclusion……..
Practical 11: Configure Dynamic host Configuration Protocol (DHCP) using relevant software.
Theory:
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on IP networks for the
automatic assignment of IP addresses and other network parameters (such as default gateway and DNS server) to
devices connected to the network. DHCP follows a client-server model, where the server dynamically assigns IP
addresses to devices (clients) in a network, ensuring efficient IP management and eliminating the need for manual
configuration.
Steps to Configure DHCP:
Step 1: Build the Network Topology
• First, create the required network setup with routers, switches, and PCs.
Step 2: Configure the Router’s Interface (fa0/0) as the Default Gateway
• Log in to the router and configure its interface to act as the default gateway for the LAN.
Commands:
Router> enable
Router# configure terminal
Router(config)# interface fastethernet0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
Step 3: Configure the DHCP Server on the Router
• Create a DHCP pool and define the network, default gateway, and IP address range.
Commands:
Router(config)# ip dhcp pool IP10
Router(dhcp-config)# network [Link] [Link]
Router(dhcp-config)# default-router [Link]
Router(dhcp-config)# exit
Step 5: Enable DHCP on Client PCs
• On each PC in the network, go to the IP configuration tab and enable DHCP to allow the automatic
assignment of IP addresses from the DHCP server.
• Result/Output:
• Each PC should successfully obtain an IP address, subnet mask, and default gateway automatically
from the DHCP server configured on the router.
Conclusion.
Practical 12: Configure Domain name Server (DNS) with relevant software.
theory:
Theory:
The Domain Name System (DNS) is a decentralized and hierarchical naming system used to translate human-
readable domain names into numerical IP addresses. DNS is a critical component of the internet, enabling
users to access websites and services by typing familiar names (e.g., [Link]) rather than needing
to remember complex IP addresses. DNS consists of resource records that associate domain names with
other forms of information, most commonly IP addresses, but it also supports additional functions such as
mail server mapping and service discovery.
Steps to Configure a DNS Server:
Step 1: Build the Network Topology
• Set up the network with the required devices, including PCs and a server.
Step 2: Configure Static IP Addresses on the PCs and Server
• Manually assign static IP addresses to each PC and the server to ensure proper communication within the
network.
Example (PC1):
IP Address: [Link]
Subnet Mask: [Link]
Default Gateway: [Link]
Example (Server):
IP Address: [Link]
Subnet Mask: [Link]
Default Gateway: [Link]
Step 3: Configure DNS Service on the Server
• Access the server and navigate to the DNS settings to set up the DNS service.
1. Click on the server.
2. Select the Services tab.
3. Choose DNS Server from the menu.
4. Turn ON the DNS service.
5. Define the domain names (hosts) and their corresponding IP addresses.
Example:
Hostname: [Link]
IP Address: [Link]
Step 4: Verify DNS Configuration by Pinging Using Domain Names
• From any PC, ping other devices using their domain names instead of IP addresses. If the DNS service is
correctly configured, the devices should be able to resolve domain names to IP addresses and communicate
successfully.
Command:
ping [Link]
Result/Output:
Successful configuration of the DNS server should allow devices to ping each other using domain names,
confirming the DNS service is working as expected.
Conclusion.
Practical 13: a. Configure File Transfer Protocol (FTP) using relevant software.
b. Configure Hypertext Transfer Protocol (HTTP) using relevant software.
Theory:
File Transfer Protocol (FTP) is a widely used network protocol that enables the transfer of files between a
client and a server over a TCP-based network. FTP follows a client-server architecture, where the client
initiates the connection and the server responds. Communication occurs over two separate channels:
• Control Channel: Handles the commands and responses.
• Data Channel: Transfers the actual data (files).
FTP uses cleartext for transmitting login credentials (username and password), making it less secure. To
improve security, FTP can be secured using SSL/TLS (known as FTPS) or replaced with SFTP, which uses SSH to
encrypt the connection.
Steps to Configure FTP on a Cisco Router:
Step 1: Build the Network Topology
• Set up the network with necessary devices, including PCs, a server, and a router.
Step 2: Configure Static IP Addresses
• Assign static IP addresses to the router, server, and clients to ensure communication within the network.
Example (Router):
Router(config)# interface fastethernet0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
Step 3: Enable FTP Service on the Router
• Enable FTP service on the Cisco router and configure basic settings such as username and password
authentication.
Commands:
Router(config)# ip ftp username admin
Router(config)# ip ftp password cisco123
Step 4: Create User Accounts for FTP Access
• Configure local user accounts for FTP access to the router.
Commands:
Router(config)# username admin privilege 15 password cisco123
Step 5: Verify FTP Configuration
• Use a PC or server to connect to the router via FTP and test file transfer. This can be done by accessing the
router's IP address through an FTP client.
Example:
ftp [Link]
• Enter the username and password when prompted (admin/cisco123). You should now be able to upload or
download files from the router.
Result/Output:
The FTP service should be successfully configured, allowing file transfers between the client and the server
using the configured router.
Conclusion.
b. Configure Hypertext Transfer Protocol (HTTP) using relevant software.
Theory:
The Hypertext Transfer Protocol (HTTP) is an application-layer protocol used for transmitting hypermedia
documents, such as HTML, over the internet. HTTP forms the foundation of data communication on the
World Wide Web, enabling users to access resources like web pages, images, and videos via browsers. It
works on a client-server model, where a client (typically a web browser) sends requests to a server, which
responds with the requested resource.
the protocol was designed to support basic client-server communication (HTTP 0.9), but over time it evolved
into more sophisticated versions to support additional features and security.
Steps to Configure HTTP on a Cisco Router:
Step 1: Build the Network Topology
• Create a network setup involving a router, PCs, and a server that will act as the web server.
Step 2: Configure IP Addresses
• Assign static IP addresses to the router interfaces for communication between devices on the network.
Example (Router):
Router(config)# interface fastethernet0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
Step 3: Enable HTTP Service on the Router
• Enable HTTP services on the router to allow web-based access.
Commands:
Router(config)# ip http server
Step 4: Configure Authentication (Optional)
• You can set up authentication for HTTP access by creating a local user account.
Commands:
Router(config)# username admin privilege 15 password cisco123
Router(config)# ip http authentication local
Step 5: Verify HTTP Configuration
• Verify the HTTP configuration by accessing the router’s web interface through a web browser. Open a
browser on a PC connected to the network and enter the router’s IP address (e.g., [Link]
Step 6: Test HTTP Access
• Once accessed, the browser should prompt for the login credentials (if authentication is set up), and you
should be able to see the web-based GUI for managing the router.
Result/Output:
HTTP service will be successfully enabled on the Cisco router, allowing access to the web-based management
interface.
Conclusion:
Thus, we have successfully configured HTTP on a Cisco router, enabling web-based access and management
through a browser within the network.
Practical 14: a. Use Telnet to login a remote machine.
Theory:
Telnet is a network protocol that allows users to communicate with a remote device over a TCP/IP network. It
provides a command-line interface that network administrators use to manage network devices such as
routers and switches. Telnet works on a client-server model, where the user (client) initiates a connection to
the remote device (server) using the device's IP address or hostname.
By default, Telnet uses TCP port 23 and does not provide encryption for data, including sensitive information
like usernames and passwords, which are transmitted in plain text. Due to this security vulnerability, Telnet
has largely been replaced by SSH (Secure Shell), which provides encrypted communication. Despite this,
Telnet remains useful in secure internal networks.
Steps to Configure Telnet on a Switch:
Step 1: Access the Switch
• Begin by accessing the switch through the console and entering privileged EXEC mode.
Switch> enable
Switch# configure terminal
Step 2: Configure VLAN 1
• Assign an IP address to VLAN 1, which will serve as the management interface for remote access.
Commands:
Switch(config)# interface vlan 1
Switch(config-if)# ip address [Link] [Link]
Switch(config-if)# no shutdown
The IP address [Link] is assigned to VLAN 1, and the interface is brought up.
Step 3: Enable Telnet Access
• Now configure the vty lines (virtual terminal lines) for Telnet access.
Commands:
Switch(config)# line vty 0 15
Switch(config-line)# password telnet1234
Switch(config-line)# login
This sets the Telnet password to telnet1234 and enables login authentication on the virtual terminals.
Step 4: Set Enable Password
• Set the enable password that will be used after logging in through Telnet.
Switch(config)# enable password admin1234
• The enable password is configured as admin1234.
Step 5: Save Configuration
• Exit the configuration mode and save the configuration.
Switch(config)# exit
Switch# write memory
Step 6: Telnet to the Switch
• Now, from a remote machine, open the terminal or Telnet client and initiate a Telnet session using the IP
address assigned to VLAN 1.
telnet [Link]
You will be prompted for the Telnet password, after which you can log in and manage the switch remotely.
Result/Output:
You should be able to log in to the switch remotely using Telnet, providing you with access to configure the
device from a different machine.
Conclusion.
b. Connect Remote machine using secure shell (SSH)
theory:
Secure Shell (SSH) is a cryptographic protocol for securely accessing and managing network devices over an
unsecured network. It encrypts data, ensuring confidentiality and integrity. SSH operates over port 22 and
replaces insecure protocols like Telnet. It supports remote command execution and is widely used on Unix-
like systems, but also works on Windows via OpenSSH.
Steps to Configure SSH:
1. Build Network Topology:
o Connect 1 PC, 2 routers, and 1 switch using straight-through cables.
2. Assign IP Addresses:
o Configure IPs on the routers and PC.
3. Enable SSH on Router:
o Set a hostname and domain:
R1(config)# hostname R1
R1(config)# ip domain-name [Link]
Create a user and enable SSH:
R1(config)# username cisco password ssh1234
R1(config)# crypto key generate rsa
4. Configure VTY Lines:
• Enable SSH login:
R1(config)# line vty 0 4
R1(config-line)# transport input ssh
5. Connect via SSH from PC:
• Use terminal on PC to connect:
PC1> ssh -l cisco [Link]
6. Verify SSH:
R1# show ssh
R1# show ip ssh
Conclusion:
SSH was successfully configured and used for secure remote login.
Practical 15: Configure SMTP, POP3, and IMAP Using Relevant Software
Theory:
• SMTP (Simple Mail Transfer Protocol): Used for sending emails from a client to an email server and between
servers. It handles the delivery of messages.
• POP3 (Post Office Protocol version 3): Enables users to retrieve emails from a mail server, allowing them to
download messages to their local device.
• IMAP (Internet Message Access Protocol): An alternative to POP3, IMAP allows users to access and manage
emails directly on the server without downloading them, making it suitable for users who need to access
their email from multiple devices.
Steps to Configure SMTP, POP3, and IMAP:
1. Build Network Topology:
o Select 2 computers, 1 server, 1 router, and 2 switches.
o Connect using straight-through and crossover cables.
2. Assign IP Addresses:
o Configure static IP addresses and default gateways for the computers.
3. Configure the Router:
o Set up routing to ensure proper communication between devices.
4. Install and Configure Email Software:
o On the server, install software that supports SMTP, POP3, and IMAP (e.g., Postfix for SMTP, Dovecot
for POP3/IMAP).
o Configure the email server with the necessary settings, including domain names, authentication
details, and ports.
5. Test Email Configuration:
o Use email clients (e.g., Thunderbird) on the computers to configure SMTP, POP3, and IMAP settings.
o Send test emails and check connections to ensure proper configuration.
6. Conclusion:
7. SMTP, POP3, and IMAP protocols were successfully configured using relevant software, enabling
efficient email communication.
Practical 16: MIME (Multipurpose Internet Mail Extensions)
Theory: MIME is an Internet standard that extends the format of email to support text in character sets other
than ASCII, as well as attachments like audio, video, images, and application programs. MIME allows emails
to include multimedia content and is widely used in email transmission across the web.
• MIME headers are added to the email to indicate the type of content and the encoding method used.
• It supports a wide variety of content types, including plain text, HTML, video, and audio.
Steps to Configure MIME in Email Systems:
1. Install and configure an email server (such as Postfix or Sendmail).
2. Enable MIME settings on the server to allow attachment and multimedia content in emails.
3. Compose an email with MIME types such as text/plain, text/html, image/jpeg, or application/pdf and send it
to test MIME encoding.
SNMP (Simple Network Management Protocol)
Theory: SNMP is a protocol used for managing devices on IP networks, including routers, switches, servers,
and other networked equipment. It operates by exchanging management information between network
devices and enables administrators to monitor the health and status of network infrastructure.
• SNMP uses two community strings: read-only (ro) and read-write (rw) to allow monitoring and configuration
changes.
• It works with Management Information Bases (MIBs), which are structured sets of network objects.
Steps to Configure SNMP on Router (R1):
1. Enable SNMP on Router (R1)
Before configuring SNMP, ensure basic network configurations, such as IP address settings, are complete.
Router Configuration Steps:
1. Access the R1 console:
R1> enable
R1# configure terminal
2. Configure SNMP:
R1(config)# snmp-server community R1 ro
R1(config)# snmp-server community R1rw rw
R1(config)# exit
• R1 is the read-only community string.
• R1rw is the read-write community string
Testing SNMP Using MIB Browser
To test SNMP configuration from a PC using a MIB Browser:
1. On PC1, open the MIB Browser.
2. In the Advanced tab, enter the following:
o Address: [Link] (R1’s IP address)
o Read Community: R1 (read-only)
o Write Community: R1rw (read-write)
o SNMP Version: Select V3.
3. Click OK.
4. Expand the MIB tree and select system, then click GO to retrieve data from Router 1.
Conclusion:
Both MIME and SNMP are critical in modern networking. MIME enhances email communication by allowing
multimedia content, while SNMP facilitates network management and device monitoring. These protocols,
when configured properly, significantly improve the functionality and oversight of networked systems.