3a Configure a network topology using packet tracer software
Aim: To configure a basic network topology in Cisco Packet Tracer, which includes 2 PCs, 2 switches,
and 1 router, using static IP addressing.
Network Topology Overview
PC0 --- SW0 --- R0 --- SW1 --- PC1
Step-by-Step Instructions
Step 1: Open Cisco Packet Tracer
Launch Cisco Packet Tracer from your computer.
Wait for the interface to fully load.
Step 2: Place Devices
From the bottom panel:
Go to End Devices and drag:
o 2 PCs to the workspace (PC0, PC1)
Go to Switches and drag:
o 2 switches (e.g., 2960) (Switch0, Switch1)
Go to Routers and drag:
o 1 router (e.g., Router0)
Step 3: Connect Devices Using Cables
Select the "Connections" (lightning icon) tool:
o PC0 → Switch0 (FastEthernet0)
o PC1 → Switch1 (FastEthernet0)
Switch0 → Router0 (GigabitEthernet0/0)
Router0 → Switch1 (GigabitEthernet0/1)
Make sure all links are green (active). If not, wait a few seconds.
Step 4: Configure IP Addresses
PC0:
Click PC0 → Desktop → IP Configuration:
o IP Address: [Link]
o Subnet Mask: [Link]
o Default Gateway: [Link]
PC1:
Click PC1 → Desktop → IP Configuration:
o IP Address: [Link]
o Subnet Mask: [Link]
o Default Gateway: [Link]
Step 5: Configure the Router Interfaces
Click on Router0 → CLI tab → Configure:
Router> enable
Router# configure terminal
# Configure GigabitEthernet0/0 (to Switch0 / PC0 side)
Router(config)# interface gigabitEthernet 0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
# Configure GigabitEthernet0/1 (to Switch1 / PC1 side)
Router(config)# interface gigabitEthernet 0/1
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# exit
Router# write
Wait until both interfaces turn green (connected).
Step 6: Test the Network
1. Click PC0 → Desktop → Command Prompt
o Type: ping [Link]
2. Expected output: Successful replies (Reply from…)
This shows PC0 can reach PC1 through the router.
3b. To configure simple static routing.
AIM: To configure simple static routing in Cisco Packet Tracer, using two routers, two networks, and
static routes. Configure Static Routing Between Two Networks
Network Diagram
[PC0]---[Switch0]---[Router0]---[Router1]---[Switch1]---[PC1]
Network A Router Link Network B
[Link]/24 [Link]/30 [Link]/24
Step-by-Step Configuration
Step 1: Add Devices in Packet Tracer
2 PCs (PC0, PC1)
2 Switches (Switch0, Switch1)
2 Routers (Router0, Router1)
Step 2: Connect Devices
PC0 → Switch0
PC1 → Switch1
Switch0 → Router0 (e.g., G0/0)
Switch1 → Router1 (e.g., G0/0)
Use copper cross-over cable:
Router0 G0/1 → Router1 G0/1
PC0
IP: [Link]
Subnet Mask: [Link]
Gateway: [Link]
PC1
IP: [Link]
Subnet Mask: [Link]
Gateway: [Link]
Step 4: Configure Router Interfaces
Router> enable
Router# configure terminal
# LAN interface
Router(config)# interface gigabitEthernet 0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
# Link to Router1
Router(config)# interface gigabitEthernet 0/1
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
# Add static route to [Link]/24 via Router1
Router(config)# ip route [Link] [Link] [Link]
Router(config)# exit
Router> enable
Router# configure terminal
# LAN interface
Router(config)# interface gigabitEthernet 0/0
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
# Link to Router0
Router(config)# interface gigabitEthernet 0/1
Router(config-if)# ip address [Link] [Link]
Router(config-if)# no shutdown
Router(config-if)# exit
# Add static route to [Link]/24 via Router0
Router(config)# ip route [Link] [Link] [Link]
Router(config)# exit
Step 5: Verify Routing
From PC0:
Go to Desktop → Command Prompt
Type: ping [Link]
From PC1:
Type: ping [Link]
If routing is correct, you’ll get replies.
Troubleshooting Tips
Check interface status (show ip interface brief)
Use ping between routers to test link
Check static routes (show ip route)
Make sure no shutdown was applied to interfaces
3C. To implement Security on interconnecting devices.
AIM: To implement basic security on interconnecting devices (routers and switches) using Cisco
Packet Tracer.
Network Devices Involved
Router (R1)
Switch (SW1)
These are often the most vulnerable points in a network if not secured.
Step 3: Assign IP Addresses
Security Configuration Goals
Security Task Devices Affected
Set passwords for console and VTY Router, Switch
Encrypt passwords Router, Switch
Set enable secret Router, Switch
Disable unused switch ports Switch only
Set a login banner Router, Switch
Step-by-Step: Router Security (e.g., Router R1)
Step 1: Access CLI
Click on the router → CLI Tab → Press Enter
Step 2: Set Enable Password
Router> enable
Router# configure terminal
Router(config)# enable secret cisco123
This encrypts the enable password automatically.
Step 3: Set Console Line Password
Router(config)# line console 0
Router(config-line)# password conpass
Router(config-line)# login
Router(config-line)# exit
Step 4: Set VTY Line Password (for Telnet/SSH)
Router(config)# line vty 0 4
Router(config-line)# password vtypass
Router(config-line)# login
Router(config-line)# exit
Step 5: Encrypt Plain Text Passwords
Router(config)# service password-encryption
Step 6: Set a Security Banner
Router(config)# banner motd #Unauthorized Access is Prohibited!#
Step-by-Step: Switch Security (e.g., Switch SW1)
Follow similar steps for the switch:
Access CLI
Click on Switch → CLI Tab → Press Enter
Configure Enable Secret
Switch> enable
Switch# configure terminal
Switch(config)# enable secret cisco123
Console & VTY Passwords
Switch(config)# line console 0
Switch(config-line)# password conpass
Switch(config-line)# login
Switch(config-line)# exit
Switch(config)# line vty 0 4
Switch(config-line)# password vtypass
Switch(config-line)# login
Switch(config-line)# exit
Encrypt All Passwords
Switch(config)# service password-encryption
Set a Banner
Switch(config)# banner motd #Access restricted to authorized personnel only#
Step 7: Disable Unused Switch Ports (Best Practice)
Assuming FastEthernet 0/10 to 0/24 are unused:
Switch(config)# interface range fastEthernet 0/10 - 24
Switch(config-if-range)# shutdown
Switch(config-if-range)# exit
Verify Security Settings
After configuration, use the following commands:
show running-config
show line
show interfaces status
3d. To configure network state routing protocol.
Aim: To configure a Link-State Routing Protocol (specifically OSPF) in Cisco Packet Tracer, follow
this step-by-step guide. OSPF (Open Shortest Path First) is the most common link-state protocol used
in enterprise networks. create a simple network with 2 routers, 2 end devices, and configure OSPF
to allow them to communicate.
Network Topology
PC0 --- R1 --- R2 --- PC1
Network A: [Link]/24
Network B: [Link]/30 (between routers)
Network C: [Link]/24
Devices Used
2 PCs
2 Routers (e.g., Router0 and Router1)
2 Switches (optional for realism)
Step-by-Step Instructions
Step 1: Setup the Topology
1. Place the devices (PC0, R1, R2, PC1)
2. Connect them as follows using straight-through cables:
o PC0 → Router1 (G0/0)
o PC1 → Router2 (G0/0)
o Router1 (G0/1) ↔ Router2 (G0/1) (this is the OSPF link)
Step 2: Assign IP Addresses
PC0:
IP: [Link]
Subnet Mask: [Link]
Default Gateway: [Link]
PC1:
IP: [Link]
Subnet Mask: [Link]
Default Gateway: [Link]
Router1:
enable
configure terminal
interface g0/0
ip address [Link] [Link]
no shutdown
exit
interface g0/1
ip address [Link] [Link]
no shutdown
exit
Router2:
enable
configure terminal
interface g0/0
ip address [Link] [Link]
no shutdown
exit
interface g0/1
ip address [Link] [Link]
no shutdown
exit
Step 3: Configure OSPF (Link-State Routing Protocol)
On Router1:
router ospf 1
network [Link] [Link] area 0
network [Link] [Link] area 0
exit
On Router2:
router ospf 1
network [Link] [Link] area 0
network [Link] [Link] area 0
exit
Step 4: Verify OSPF Neighbor Relationship
From either router:
>show ip ospf neighbor
Step 5: Test Connectivity
1. Go to PC0 → Desktop → Command Prompt
2. Type: ping [Link]
If OSPF is working correctly, you'll get replies
Summary Table
Device Interface IP Address Role
PC0 NIC [Link] End host
Router1 G0/0 [Link] LAN side
Router1 G0/1 [Link] OSPF link
Device Interface IP Address Role
Router2 G0/1 [Link] OSPF link
Router2 G0/0 [Link] LAN side
PC1 NIC [Link] End host
3. CASE STUDY
3e. Study of Network simulator (NS).and Simulation of Congestion Control Algorithms using
NS
Aim:
To Study of Network simulator (NS).and Simulation of Congestion Control Algorithms using NS
NET WORK SIMULATOR (NS2)
Ns overview
Ns programming: A Quick start
Case study I: A simple Wireless network
Case study II: Create a new agent in Ns
Ns overview
Ns Status
Periodical release (ns-2.26, Feb 2003)
Platform support
FreeBSD, Linux, Solaris, Windows and Mac
Ns Functionalities
Routing, Transportation, Traffic sources, Queuing disciplines, QoS
Wireless
Ad hoc routing, mobile IP, sensor-MAC
Tracing, visualization and various utilitie
NS(Network Simulators)
Most of the commercial simulators are GUI driven, while some network simulators are CLI
driven. The network model / configuration describes the state of the network (nodes,routers, switches,
links) and the events (data transmissions, packet error etc.). An important output of simulations are the
trace files. Trace files log every packet, every event that occurred in the simulation and are used for
analysis. Network simulators can also provide other tools to facilitate visual analysis of trends and
potential trouble spots.
Most network simulators use discrete event simulation, in which a list of pending "events" is
stored, and those events are processed in order, with some events triggering future events—such as the
event of the arrival of a packet at one node triggering the event of the arrival of that packet at a
downstream node.
Simulation of networks is a very complex task. For example, if congestion is high, then
estimation of the average occupancy is challenging because of high variance. To estimate the likelihood
of a buffer overflow in a network, the time required for an accurate answer can be extremely large.
Specialized techniques such as "control variates" and "importance sampling" have been developed to
speed simulation.
Examples of network simulators
There are many both free/open-source and proprietary network simulators. Examples of notable
network simulation software are, ordered after how often they are mentioned in research papers:
1. ns (open source)
2. OPNET (proprietary software)
3. NetSim (proprietary software)
Uses of network simulators
Network simulators serve a variety of needs. Compared to the cost and time involved in setting up an
entire test bed containing multiple networked computers, routers and data links, network simulators are
relatively fast and inexpensive. They allow engineers, researchers to test scenarios that might be
particularly difficult or expensive to emulate using real hardware - for instance, simulating a scenario
with several nodes or experimenting with a new protocol in the network. Network simulators are
particularly useful in allowing researchers to test new networking protocols or changes to existing
protocols in a controlled and reproducible environment. A typical network simulator encompasses a
wide range of networking technologies and can help the users to build complex networks from basic
building blocks such as a variety of nodes and links. With the help of simulators, one can design
hierarchical networks using various types of nodes like computers, hubs, bridges, routers, switches,
links, mobile units etc.
Various types of Wide Area Network (WAN) technologies like TCP, ATM, IP etc. and Local Area
Network (LAN) technologies like Ethernet, token rings etc., can all be simulated with a typical
simulator and the user can test, analyze various standard results apart from devising some novel protocol
or strategy for routing etc. Network simulators are also widely used to simulate battlefield networks in
Network-centric warfare
There are a wide variety of network simulators, ranging from the very simple to the very complex.
Minimally, a network simulator must enable a user to represent a network topology, specifying the
nodes on the network, the links between those nodes and the traffic between the nodes. More
complicated systems may allow the user to specify everything about the protocols used to handle traffic
in a network. Graphical applications allow users to easily visualize the workings of their simulated
environment. Text-based applications may provide a less intuitive interface, but may permit more
advanced forms of customization.
Packet loss
occurs when one or morepacketsof data travelling across a computer networkfail to reachtheir
destination. Packet loss is distinguished as one of the three main error types encountered in digital
communications; the other two being bit errorand spurious packets caused due to noise.
Packets can be lost in a network because they may be dropped when a queue in the network node
overflows. The amount of packet loss during the steady state is another important property of a
congestion control scheme. The larger the value of packet loss, the more difficult it is for transportlayer
protocols to maintain high bandwidths, the sensitivity to loss of individual packets, as well as to
frequency and patterns of loss among longer packet sequences is strongly dependent on the application
itself.
Throughput
This is the main performance measure characteristic, and most widely used.
Incommunicationnetworks, such asEthernetorpacket radio, throughputor network throughputis the
average rate of successfulmessage delivery over a communication channel. The throughput is usually
measured inbitsper second (bit/s orbps), andsometimes indata packetsper second or data packets pertime
slotThis measure how soon the receiver is able to get a certain amount of data send by the sender. It is
determined as the ratio of the total data received to the end to end delay. Throughput is an important
factor which directly impacts the network performance
Delay
Delay is the time elapsed while a packet travels from one point e.g., source premise or network ingress
to destination premise or network degrees. The larger the valueof delay, the more difficult it is for
transport layer protocols to maintain highbandwidths. We will calculate end to end delay