Assignment 1 Cst234csm335
Assignment 1 Cst234csm335
Objective:
To design a small network infrastructure using Packet Tracer, configure devices with
specific IP addresses, create network diagrams using any drawing tool, capture and
analyze network traffic in Wireshark, and submit a comprehensive report. Each group
member will be responsible for one section of the submission.
________________________________________________________________________________
Assignment Overview:
Switch: 192.168.1.1
Router: 192.168.1.254
Drag and drop desktop computers, switches, and routers onto the workspace.
Arrange the devices according to the assigned topologies (star, ring, bus).
Configure IP addresses for desktop computers, switch, and router according to the
provided scheme.
Connect the devices with appropriate cables and ensure proper connectivity.
--------------------------------------------------------------------------------------------------------------
1
CST235/CST235W/CSM335
Configure each desktop computer with its assigned IP address, subnet mask, default
gateway, and DNS server settings.
Configure the IP address, subnet mask, default gateway, and DNS server settings in the
network settings menu.
--------------------------------------------------------------------------------------------------------------
Create network diagrams for each topology (star, ring, bus) using any drawing tool (e.g.,
Microsoft Visio, Lucidchart).
Include all devices (desktop computers, switches, router) and connections for each
topology.
Drag and drop symbols for desktop computers, switches, and routers onto the canvas.
Connect the devices according to the assigned topologies, using appropriate symbols for
connections.
--------------------------------------------------------------------------------------------------------------
2
CST235/CST235W/CSM335
Capture network traffic using Wireshark during a simulated data transfer between
desktop computers in each topology.
Analyze the captured packets to identify source and destination IP addresses, protocols
used, and any anomalies or errors specific to each topology.
Open Wireshark and select the appropriate network interface for capturing packets.
Simulate a data transfer between desktop computers in each topology in Packet Tracer.
Stop capturing packets after a sufficient amount of traffic has been captured.
Analyze the captured packets to identify source and destination IP addresses, protocols
used, and any anomalies or errors.
--------------------------------------------------------------------------------------------------------------
Organize the report into sections for each task (Network Design, Device Configuration,
Network Diagram, Wireshark Analysis).
Clearly label each section and ensure all contributions are clearly attributed to individual
group members.
--------------------------------------------------------------------------------------------------------------
3
CST235/CST235W/CSM335
Assessment Criteria:
Note to Students:
4
CST235/CST235W/CSM335
Report Guideline:
Cover Page:
Instructor's name.
Submission date.
Table of Contents:
Include a table of contents listing all sections of the report with corresponding page
numbers.
Introduction:
Provide a summary of the devices included (desktop computers, switches, router) and
their connections.
Include screenshots of the Packet Tracer workspace to illustrate the network design.
5
CST235/CST235W/CSM335
Detail the configuration settings for each type of device (desktop computers, switch,
router) in Packet Tracer.
Specify the IP addresses, subnet masks, default gateways, and DNS server settings
configured for desktop computers.
Describe the configuration of the switch and router interfaces with their respective IP
addresses.
Present the network diagram created using a drawing tool (e.g., Microsoft Visio,
Lucidchart).
Include all devices (desktop computers, switches, router) and their connections.
Wireshark Analysis:
Summarize the Wireshark analysis conducted during the capture of network traffic.
Describe the data transfer scenario simulated and the corresponding Wireshark
captures.
Identify and analyze source and destination IP addresses, protocols used, and any
anomalies or errors observed.
Individual Contributions:
Provide a section for each group member to outline their individual contributions to the
assignment.
Describe the tasks assigned and completed by each member, including any challenges
faced and solutions implemented.
Conclusion:
Reflect on the overall experience of working on the assignment and lessons learned.
6
CST235/CST235W/CSM335
References:
Include a list of any references or resources consulted during the completion of the
assignment.
Appendices:
Page Limit:
Note:
Ensure adherence to academic integrity policies and citation standards when referencing
external sources.
7
CST235/CST235W/CSM335
To complete the Packet Tracer task for configuring devices in the network, follow these
step-by-step instructions:
Open your Packet Tracer project where you've designed the network.
Select a desktop computer by clicking on it to access its properties. You can identify
desktop computers by their icon resembling a PC.
Locate the network settings menu. This may be labeled as "IP Configuration" or similar.
Enter the assigned IP address, subnet mask, default gateway, and DNS server settings in
their respective fields. Ensure you use the IP address range specified for the desktop
computers.
Repeat the process for all desktop computers in the network. Click on each desktop
computer and access its properties to configure the network settings as per the
assignment requirements.
Click on the switch device in your Packet Tracer workspace to access its properties.
Enter the assigned IP address for the switch in the appropriate field. Ensure it matches
the IP address specified in the assignment instructions.
Click on the router device in your Packet Tracer workspace to access its properties.
Configure each router interface with the provided IP addresses. You may need to specify
IP addresses for multiple interfaces if the router has more than one.
8
CST235/CST235W/CSM335
Once you have configured all desktop computers, switch, and router interfaces, save the
project to ensure your progress is preserved.
Click on the "Save" or "Save As" option in the File menu and choose a location to save
your Packet Tracer project file.
9
CST235/CST235W/CSM335
Wireshark Guidelines:
To capture network traffic using Wireshark during a simulated data transfer between
desktop computers in each topology and analyze the captured packets to identify source
and destination IP addresses, protocols used, and any anomalies or errors specific to
each topology, follow these steps:
Ensure that you have already designed and configured the network in Packet Tracer
according to the specified topologies (star, ring, bus) with desktop computers, switches,
and routers.
Ensure that all devices are properly configured with the assigned IP addresses.
2. Start Wireshark:
Select the appropriate network interface to capture packets. This is usually your Ethernet
or Wi-Fi interface.
3. Capture Packets:
Simulate a data transfer between desktop computers in each topology in Packet Tracer.
For example, initiate a file transfer or ping command between two desktop computers.
--------------------------------------------------------------------------------------------------------------
Identify the desktop computers between which you want to simulate the data transfer.
On the source desktop computer, navigate to the file or folder you want to transfer.
Right-click on the file or folder and select "Share" or "Share with" option.
Once the file or folder is shared, it will be available on the destination desktop computer.
Verify the successful transfer by checking if the file or folder appears on the destination
desktop.
10
CST235/CST235W/CSM335
Type the ping command followed by the IP address of the destination desktop
computer.
Monitor the command output to see the response from the destination desktop
computer.
Check for successful ping replies to confirm the data transfer between the two desktop
computers.
Repeat the process for each topology in your network (star, ring, bus) to simulate data
transfers between different sets of desktop computers.
Ensure that the simulated data transfers occur within the topology boundaries to
accurately assess network performance and behavior.
Document the results of each simulated data transfer, including any observed delays,
packet losses, or other anomalies, for analysis in Wireshark.
By following these steps, you can effectively simulate data transfers between desktop
computers in each topology in Packet Tracer using either file sharing or the ping
command. This will help you analyze network behavior and performance as part of your
assignment.
--------------------------------------------------------------------------------------------------------------
After a sufficient amount of network traffic has been captured, stop the packet capture
in Wireshark by clicking on the "Stop" or "Capture" button.
Now, you can analyze the captured packets to identify the following:
11
CST235/CST235W/CSM335
Source and destination IP addresses: Look for the IP addresses in the packet headers.
These addresses will indicate the origin and destination of the data.
Protocols used: Examine the packet headers to determine which protocols are being
used for the data transfer (e.g., TCP, UDP).
Anomalies or errors: Look for any unusual patterns, errors, or abnormalities in the packet
capture that may indicate network issues.
For each topology (star, ring, bus), analyze the captured packets separately to identify
any specific characteristics or issues related to that topology.
Pay attention to the flow of traffic, packet delays, retransmissions, or any other anomalies
that may be specific to each topology.
7. Document Findings:
Document your findings, including source and destination IP addresses, protocols used,
and any anomalies or errors specific to each topology.
Repeat the packet capture and analysis process for each topology (star, ring, bus) in your
network.
By following these steps, you can effectively capture network traffic using Wireshark
during a simulated data transfer between desktop computers in each topology and
analyze the captured packets to identify source and destination IP addresses, protocols
used, and any anomalies or errors specific to each topology.
12
CST235/CST235W/CSM335
Marking guidelines:
13
CST235/CST235W/CSM335
14