0% found this document useful (0 votes)
13 views13 pages

Configure Basic Network Topology in Packet Tracer

The document provides a comprehensive guide on configuring network topologies using Cisco Packet Tracer, including static IP addressing, static routing, security implementation, and link-state routing protocols like OSPF. It outlines step-by-step instructions for setting up devices, connecting them, configuring IP addresses, and verifying network functionality. Additionally, it discusses the use of network simulators for studying congestion control algorithms and their applications in various networking scenarios.

Uploaded by

sn3906128
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views13 pages

Configure Basic Network Topology in Packet Tracer

The document provides a comprehensive guide on configuring network topologies using Cisco Packet Tracer, including static IP addressing, static routing, security implementation, and link-state routing protocols like OSPF. It outlines step-by-step instructions for setting up devices, connecting them, configuring IP addresses, and verifying network functionality. Additionally, it discusses the use of network simulators for studying congestion control algorithms and their applications in various networking scenarios.

Uploaded by

sn3906128
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

3a Configure a network topology using packet tracer software

Aim: To configure a basic network topology in Cisco Packet Tracer, which includes 2 PCs, 2 switches,
and 1 router, using static IP addressing.
Network Topology Overview
PC0 --- SW0 --- R0 --- SW1 --- PC1

Step-by-Step Instructions

Step 1: Open Cisco Packet Tracer

 Launch Cisco Packet Tracer from your computer.


 Wait for the interface to fully load.

Step 2: Place Devices

From the bottom panel:

 Go to End Devices and drag:


o 2 PCs to the workspace (PC0, PC1)
 Go to Switches and drag:
o 2 switches (e.g., 2960) (Switch0, Switch1)
 Go to Routers and drag:
o 1 router (e.g., Router0)

Step 3: Connect Devices Using Cables

Select the "Connections" (lightning icon) tool:

o PC0 → Switch0 (FastEthernet0)


o PC1 → Switch1 (FastEthernet0)
 Switch0 → Router0 (GigabitEthernet0/0)
 Router0 → Switch1 (GigabitEthernet0/1)

Make sure all links are green (active). If not, wait a few seconds.

Step 4: Configure IP Addresses

PC0:

 Click PC0 → Desktop → IP Configuration:


o IP Address: [Link]
o Subnet Mask: [Link]
o Default Gateway: [Link]

PC1:

 Click PC1 → Desktop → IP Configuration:


o IP Address: [Link]
o Subnet Mask: [Link]
o Default Gateway: [Link]

Step 5: Configure the Router Interfaces

Click on Router0 → CLI tab → Configure:

Router> enable
Router# configure terminal

# Configure GigabitEthernet0/0 (to Switch0 / PC0 side)


Router(config)# interface gigabitEthernet 0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit

# Configure GigabitEthernet0/1 (to Switch1 / PC1 side)


Router(config)# interface gigabitEthernet 0/1
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit

Router(config)# exit
Router# write

Wait until both interfaces turn green (connected).

Step 6: Test the Network

1. Click PC0 → Desktop → Command Prompt


o Type: ping [Link]
2. Expected output: Successful replies (Reply from…)

This shows PC0 can reach PC1 through the router.


3b. To configure simple static routing.

AIM: To configure simple static routing in Cisco Packet Tracer, using two routers, two networks, and
static routes. Configure Static Routing Between Two Networks

Network Diagram

[PC0]---[Switch0]---[Router0]---[Router1]---[Switch1]---[PC1]

Network A Router Link Network B


[Link]/24 [Link]/30 [Link]/24

Step-by-Step Configuration
Step 1: Add Devices in Packet Tracer

 2 PCs (PC0, PC1)


 2 Switches (Switch0, Switch1)
 2 Routers (Router0, Router1)

Step 2: Connect Devices

 PC0 → Switch0
 PC1 → Switch1
 Switch0 → Router0 (e.g., G0/0)
 Switch1 → Router1 (e.g., G0/0)

Use copper cross-over cable:

 Router0 G0/1 → Router1 G0/1

PC0

 IP: [Link]
 Subnet Mask: [Link]
 Gateway: [Link]

PC1

 IP: [Link]
 Subnet Mask: [Link]
 Gateway: [Link]

Step 4: Configure Router Interfaces

Router> enable
Router# configure terminal

# LAN interface
Router(config)# interface gigabitEthernet 0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
# Link to Router1
Router(config)# interface gigabitEthernet 0/1
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit

# Add static route to [Link]/24 via Router1


Router(config)# ip route [Link] [Link] [Link]

Router(config)# exit
Router> enable
Router# configure terminal

# LAN interface
Router(config)# interface gigabitEthernet 0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit

# Link to Router0
Router(config)# interface gigabitEthernet 0/1
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit

# Add static route to [Link]/24 via Router0


Router(config)# ip route [Link] [Link] [Link]

Router(config)# exit

Step 5: Verify Routing

From PC0:

 Go to Desktop → Command Prompt


 Type: ping [Link]

From PC1:

 Type: ping [Link]

If routing is correct, you’ll get replies.

Troubleshooting Tips

 Check interface status (show ip interface brief)


 Use ping between routers to test link
 Check static routes (show ip route)
 Make sure no shutdown was applied to interfaces
3C. To implement Security on interconnecting devices.

AIM: To implement basic security on interconnecting devices (routers and switches) using Cisco
Packet Tracer.

Network Devices Involved

 Router (R1)
 Switch (SW1)

These are often the most vulnerable points in a network if not secured.

Step 3: Assign IP Addresses

Security Configuration Goals


Security Task Devices Affected

Set passwords for console and VTY Router, Switch

Encrypt passwords Router, Switch

Set enable secret Router, Switch

Disable unused switch ports Switch only

Set a login banner Router, Switch

Step-by-Step: Router Security (e.g., Router R1)

Step 1: Access CLI

Click on the router → CLI Tab → Press Enter

Step 2: Set Enable Password

Router> enable
Router# configure terminal
Router(config)# enable secret cisco123

This encrypts the enable password automatically.

Step 3: Set Console Line Password

Router(config)# line console 0


Router(config-line)# password conpass
Router(config-line)# login
Router(config-line)# exit

Step 4: Set VTY Line Password (for Telnet/SSH)

Router(config)# line vty 0 4


Router(config-line)# password vtypass
Router(config-line)# login
Router(config-line)# exit

Step 5: Encrypt Plain Text Passwords

Router(config)# service password-encryption

Step 6: Set a Security Banner

Router(config)# banner motd #Unauthorized Access is Prohibited!#

Step-by-Step: Switch Security (e.g., Switch SW1)

Follow similar steps for the switch:

Access CLI

Click on Switch → CLI Tab → Press Enter

Configure Enable Secret

Switch> enable
Switch# configure terminal
Switch(config)# enable secret cisco123

Console & VTY Passwords

Switch(config)# line console 0


Switch(config-line)# password conpass
Switch(config-line)# login
Switch(config-line)# exit

Switch(config)# line vty 0 4


Switch(config-line)# password vtypass
Switch(config-line)# login
Switch(config-line)# exit

Encrypt All Passwords

Switch(config)# service password-encryption

Set a Banner

Switch(config)# banner motd #Access restricted to authorized personnel only#

Step 7: Disable Unused Switch Ports (Best Practice)

Assuming FastEthernet 0/10 to 0/24 are unused:

Switch(config)# interface range fastEthernet 0/10 - 24


Switch(config-if-range)# shutdown
Switch(config-if-range)# exit

Verify Security Settings

After configuration, use the following commands:

 show running-config
 show line
 show interfaces status
3d. To configure network state routing protocol.

Aim: To configure a Link-State Routing Protocol (specifically OSPF) in Cisco Packet Tracer, follow
this step-by-step guide. OSPF (Open Shortest Path First) is the most common link-state protocol used
in enterprise networks. create a simple network with 2 routers, 2 end devices, and configure OSPF
to allow them to communicate.

Network Topology
PC0 --- R1 --- R2 --- PC1

Network A: [Link]/24
Network B: [Link]/30 (between routers)
Network C: [Link]/24
Devices Used

 2 PCs
 2 Routers (e.g., Router0 and Router1)
 2 Switches (optional for realism)

Step-by-Step Instructions

Step 1: Setup the Topology

1. Place the devices (PC0, R1, R2, PC1)


2. Connect them as follows using straight-through cables:
o PC0 → Router1 (G0/0)
o PC1 → Router2 (G0/0)
o Router1 (G0/1) ↔ Router2 (G0/1) (this is the OSPF link)

Step 2: Assign IP Addresses

PC0:

 IP: [Link]
 Subnet Mask: [Link]
 Default Gateway: [Link]

PC1:

 IP: [Link]
 Subnet Mask: [Link]
 Default Gateway: [Link]

Router1:
enable
configure terminal
interface g0/0
ip address [Link] [Link]
no shutdown
exit

interface g0/1
ip address [Link] [Link]
no shutdown
exit

Router2:
enable
configure terminal

interface g0/0
ip address [Link] [Link]
no shutdown
exit

interface g0/1
ip address [Link] [Link]
no shutdown
exit

Step 3: Configure OSPF (Link-State Routing Protocol)

On Router1:
router ospf 1
network [Link] [Link] area 0
network [Link] [Link] area 0
exit
On Router2:
router ospf 1
network [Link] [Link] area 0
network [Link] [Link] area 0
exit

Step 4: Verify OSPF Neighbor Relationship

From either router:

>show ip ospf neighbor

Step 5: Test Connectivity

1. Go to PC0 → Desktop → Command Prompt


2. Type: ping [Link]

If OSPF is working correctly, you'll get replies

Summary Table
Device Interface IP Address Role

PC0 NIC [Link] End host

Router1 G0/0 [Link] LAN side

Router1 G0/1 [Link] OSPF link


Device Interface IP Address Role

Router2 G0/1 [Link] OSPF link

Router2 G0/0 [Link] LAN side

PC1 NIC [Link] End host


3. CASE STUDY
3e. Study of Network simulator (NS).and Simulation of Congestion Control Algorithms using
NS

Aim:
To Study of Network simulator (NS).and Simulation of Congestion Control Algorithms using NS

NET WORK SIMULATOR (NS2)

Ns overview

 Ns programming: A Quick start


 Case study I: A simple Wireless network
 Case study II: Create a new agent in Ns

Ns overview
 Ns Status
 Periodical release (ns-2.26, Feb 2003)
 Platform support
 FreeBSD, Linux, Solaris, Windows and Mac

Ns Functionalities

Routing, Transportation, Traffic sources, Queuing disciplines, QoS

Wireless

Ad hoc routing, mobile IP, sensor-MAC


Tracing, visualization and various utilitie

NS(Network Simulators)

Most of the commercial simulators are GUI driven, while some network simulators are CLI
driven. The network model / configuration describes the state of the network (nodes,routers, switches,
links) and the events (data transmissions, packet error etc.). An important output of simulations are the
trace files. Trace files log every packet, every event that occurred in the simulation and are used for
analysis. Network simulators can also provide other tools to facilitate visual analysis of trends and
potential trouble spots.

Most network simulators use discrete event simulation, in which a list of pending "events" is
stored, and those events are processed in order, with some events triggering future events—such as the
event of the arrival of a packet at one node triggering the event of the arrival of that packet at a
downstream node.

Simulation of networks is a very complex task. For example, if congestion is high, then
estimation of the average occupancy is challenging because of high variance. To estimate the likelihood
of a buffer overflow in a network, the time required for an accurate answer can be extremely large.
Specialized techniques such as "control variates" and "importance sampling" have been developed to
speed simulation.
Examples of network simulators

There are many both free/open-source and proprietary network simulators. Examples of notable
network simulation software are, ordered after how often they are mentioned in research papers:

1. ns (open source)
2. OPNET (proprietary software)
3. NetSim (proprietary software)

Uses of network simulators

Network simulators serve a variety of needs. Compared to the cost and time involved in setting up an
entire test bed containing multiple networked computers, routers and data links, network simulators are
relatively fast and inexpensive. They allow engineers, researchers to test scenarios that might be
particularly difficult or expensive to emulate using real hardware - for instance, simulating a scenario
with several nodes or experimenting with a new protocol in the network. Network simulators are
particularly useful in allowing researchers to test new networking protocols or changes to existing
protocols in a controlled and reproducible environment. A typical network simulator encompasses a
wide range of networking technologies and can help the users to build complex networks from basic
building blocks such as a variety of nodes and links. With the help of simulators, one can design
hierarchical networks using various types of nodes like computers, hubs, bridges, routers, switches,
links, mobile units etc.

Various types of Wide Area Network (WAN) technologies like TCP, ATM, IP etc. and Local Area
Network (LAN) technologies like Ethernet, token rings etc., can all be simulated with a typical
simulator and the user can test, analyze various standard results apart from devising some novel protocol
or strategy for routing etc. Network simulators are also widely used to simulate battlefield networks in
Network-centric warfare

There are a wide variety of network simulators, ranging from the very simple to the very complex.
Minimally, a network simulator must enable a user to represent a network topology, specifying the
nodes on the network, the links between those nodes and the traffic between the nodes. More
complicated systems may allow the user to specify everything about the protocols used to handle traffic
in a network. Graphical applications allow users to easily visualize the workings of their simulated
environment. Text-based applications may provide a less intuitive interface, but may permit more
advanced forms of customization.

Packet loss

occurs when one or morepacketsof data travelling across a computer networkfail to reachtheir
destination. Packet loss is distinguished as one of the three main error types encountered in digital
communications; the other two being bit errorand spurious packets caused due to noise.

Packets can be lost in a network because they may be dropped when a queue in the network node
overflows. The amount of packet loss during the steady state is another important property of a
congestion control scheme. The larger the value of packet loss, the more difficult it is for transportlayer
protocols to maintain high bandwidths, the sensitivity to loss of individual packets, as well as to
frequency and patterns of loss among longer packet sequences is strongly dependent on the application
itself.
Throughput

This is the main performance measure characteristic, and most widely used.
Incommunicationnetworks, such asEthernetorpacket radio, throughputor network throughputis the
average rate of successfulmessage delivery over a communication channel. The throughput is usually
measured inbitsper second (bit/s orbps), andsometimes indata packetsper second or data packets pertime
slotThis measure how soon the receiver is able to get a certain amount of data send by the sender. It is
determined as the ratio of the total data received to the end to end delay. Throughput is an important
factor which directly impacts the network performance

Delay

Delay is the time elapsed while a packet travels from one point e.g., source premise or network ingress
to destination premise or network degrees. The larger the valueof delay, the more difficult it is for
transport layer protocols to maintain highbandwidths. We will calculate end to end delay

You might also like