CN Lab File Rizwan
CN Lab File Rizwan
Introduction
Network simulation is one kind of method in the research of a computer network where a software
program forms the performance of a network by analyzing the relations between the various network
entities such as links, switches, routers, nodes, access points.
Cisco Packet Tracer is a network simulation tool developed by Cisco Systems, designed to help
individuals and organizations understand, configure, and troubleshoot network topologies in a virtual
environment. Ideal for students, educators, and networking professionals, Packet Tracer offers a hands-on
approach to learning networking concepts and practicing network configurations without the need for
physical equipment. This tool is integral to Cisco's Networking Academy curriculum and supports both
basic and advanced networking scenarios.
Packet Tracer allows users to build and test network designs using a variety of network devices such as
routers, switches, and end-user devices. It provides an interactive and visual approach to network
simulation, which enhances the learning experience and facilitates the development of practical
networking skills.
While Cisco Packet Tracer is widely used, there are several other network simulation tools available that
offer different features and capabilities. Here is a brief overview of some popular alternatives:
Ns3
This type of simulator is mainly designed for the purpose of education as well as research. When compared
with the Ns2 type, it uses Python to work in a better way because of the low level of abstraction. The
modules of Ns3 include protocols and network devices, written in the languages of C++, Python.
Netki
Netki is open-source software that uses User-mode Linux. This simulator is used whenever there is a need
to form a networking environment with small endeavors. It is a simulation tool based on the command
line. It is also used to create a total network over a single PC through exploiting VN (virtual network)
devices. It is designed to help network engineers and administrators test and validate DNS records,
troubleshoot connectivity issues, and ensure that network configurations are correctly applied.
Marionnet
Marionnet/Virtual Network Laboratory is utilized as an educational tool because of its smart Graphical
user interface. By using this, a complex network can be defined by the user on a host computer.
It is used in research & development to provide whole flexibility to study regarding communication
networks, protocols, and applications. When it includes both programming environment and GUI, then it
provides a platform for the user to form the network when they require it.
OR
Step 5: Scroll down, now click on Resources and choose MacOS option and
Downloading will start automatically.
Step 6: Check for the executable file in your system and run it.
Step 10: Click on the continue and finally installed on your system.
Step 11: An icon is created in the launchpad or Application Folder in finder and
Click icon to initialize.
Step 12: After initialization it ask to sign in then choose Cisco Network Academy option.
----------END----------
6 Rizwan (16) IT-2
069150031222
Practical-2
AIM: Using Cisco Packet Tracer connect two PC’s using appropriate network wire using static IP
configuration.
THEORY:
IP Address:
An IP (Internet Protocol) address is a unique numerical identifier assigned to each device connected to a
network that uses the Internet Protocol for communication. The IP addresses serves two primary purposes:
identification of the host or network interface, and location addressing.
Static IP configuration:
A static IP address is a 32- bit number assigned to a computer as an address on the internet. This number
is in the form of a dotted quad and is typically provided by an internet service provider (ISP).
The RJ-45 connector (Registered Jack 45) is a widely used standard connector for networking, primarily
with Ethernet cables. It is used in both residential and commercial networks to connect computers, network
switches, routers, and other network devices. It is a rectangular plug with eight pins or contacts that align
with the eight wires in an Ethernet cable. Straight through and crossover are two types of terminating
cable conductors in the RJ45 connector Crossover cables are twisted-pair cables that are used to connect
the same devices in LANs. A PC to a PC for instance will be connected using a crossover cable whereas
a PC will be connected to a router using a straight-through cable.
Crossover cable is defined by the fact that its ends are configured into jacks and connectors as
per different wiring standards. If one end of the cable is configured according to the T568A standard, the
other end will be configured according to the T568B standard.
TOPOLOGY:
Step 2: From the bottom toolbar, click on ‘End Devices’ and select ‘PC’ and then click on the
screen (for two PC’s do this step twice).
Step 4: After selecting the wire click on the computer on the screen (here PC0) and select
FastEthernet0.
Then, drag the wire to the other pc (here PC1) and do the same.
Step 5: Now, we will assign the IP address to both the PCs (PC0 & PC1). Click on PC0. A dialog box
will appear on the screen, select Desktop and then select IP configuration.
From the Secondary Toolbar at the top, select ‘Add sample PDU’ that is the second last icon. Now click
on PC0 and then PC1.
Now if in Realtime box- PDU list window it shows successful, that means all the connections
are correct and the data transfer is successful
----------END----------
12 Rizwan (16) IT-2
069150031222
Practical-3
AIM: Create a basic network of one server and two computers using appropriate network wire using
Dynamic IP address allocation. Verify the connectivity.
THEORY:
A local area network (LAN) allows multiple devices to communicate and share resources. In a basic
network setup with one server and two computers, the server often acts as a central point to manage and
allocate IP addresses dynamically using the Dynamic Host Configuration Protocol (DHCP). The network
requires proper configuration, including the use of appropriate network cables (e.g., Ethernet cables) and
devices (e.g., switches or routers).
Network Components
The following components will be used in Cisco Packet Tracer:
1. Server: A device that provides network services, such as DHCP, to other network devices (clients).
2. Computers (PCs): End devices that connect to the network and receive an IP address dynamically from
the DHCP server.
3. Switch: A device used to connect multiple devices on the same network. It forwards data to the correct
device using MAC addresses.
4. Copper Straight-Through Cables: In Packet Tracer, these cables are used to connect devices such as
PCs and servers to the switch.
1. Discovery: When a computer (client) connects to the network, it sends a DHCP Discover message to
find a DHCP server.
2. Offer: The DHCP server responds with a DHCP Offer, proposing an IP address for the client.
3. Request: The client sends a DHCP Request, accepting the offered IP address.
4. Acknowledge: The DHCP server sends a DHCP Acknowledge message, confirming the IP address
assignment. The IP address allocation is temporary and referred to as a lease. When the lease expires, the
client must request a new IP address or renew the existing one.
Benefits of DHCP
2. Reduced network administration: DHCP includes the following features to reduce network
administration DHCP runs at the application layer of the Transmission Control Protocol/IP (TCP/IP) stack
to dynamically assign IP addresses to DHCP clients and to allocate TCP/IP configuration information to
DHCP clients. This includes subnet mask information, default gateway IP addresses and domain name
system (DNS)addresses.
TOPOLOGY:
Drag and drop one ‘Server’ and two ‘PCs’ onto the workspace.
Similarly use the Copper Straight-Through Cable to connect ‘PC2’ to the ‘Switch’.
Open IP Configuration
Set the static IP address as 10.0.0.1, Default Gateway as 10.0.0.2 and DNS Server as 10.0.0.1
Set the Default Gateway as 10.0.0.2, DNS Server as 10.0.0.1 and the Start IP Address as 10.0.0.3
Click Save to apply the configuration.
2. PING
On PC0 open command prompt and test the connectivity with PC1 and Server0
----------END----------
20 Rizwan (16) IT-2
069150031222
Practical-4
AIM: Create a basic network of one server, two computers and two mobile/movable devices using
appropriate network wire and verify connectivity.
THEORY:
A wireless network is a computer network that uses wireless data connections between network nodes.
Wireless networking allows homes, telecommunications networks and business installations to avoid the
costly process of introducing cables into a building, or as a connection between various equipment
locations.
A wireless network is a system that uses radio waves to transmit and receive data between devices without
the need for physical cables. It allows devices like smartphones, laptops, and tablets to connect to the
internet or communicate with each other wirelessly, using components such as wireless routers and access
points. By leveraging standards like Wi-Fi, a wireless network provides flexibility and mobility, enabling
users to move freely within the network's range while maintaining connectivity.
A wireless access point (WAP) is a device that allows wireless devices to connect to a wired network using
Wi-Fi or other wireless communication standards. It acts as a bridge between the wired network (like
Ethernet) and the wireless devices (like laptops, smartphones, or tablets).
DHCP, or Dynamic Host Configuration Protocol, is a network protocol used to automatically assign IP
addresses and other network configuration parameters to devices on a network. In a wireless network,
DHCP simplifies the process of connecting devices by managing the IP address allocation
TOPOLOGY:
STEP 1: From the bottom toolbar, select two PC’s, one mobile, one laptop and one home wireless
router.
STEP 2: After clicking on the PC0, we click on physical and drag and drop the WMP300N MODULE
after switching the PC off. After the module has been dropped, we switch it on.
STEP 4: Now on PC0 and PC1, firstly switched off the light and then WMP300N and again switch on
the CPU, both the pc will connect to home router wireless.
STEP 6: Now, switch off the server and connect WPM300N in server to it wireless connectivity,
carefully switch on the server.
----------END----------
26 Rizwan (16) IT-2
069150031222
Practical-5
Aim: To Understand the operation of TELNET by accessing the router in a server room from a
PC in IT Office.
Theory:
Telnet is a network protocol that allows for remote communication with another computer over the internet
or a local area network (LAN). It was developed in the late 1960s and is used primarily for managing
remote devices, servers, or network equipment.
When you connect to a remote machine using Telnet, it enables a command-line interface (CLI) that gives
you control of that machine as if you were physically present at its terminal. Telnet uses Transmission
Control Protocol (TCP) and typically communicates over port 23.
However, Telnet does not encrypt data, including passwords, making it insecure for modern usage. As a
result, it has largely been replaced by more secure protocols like SSH (Secure Shell). Despite its security
shortcomings, Telnet is still used in certain network troubleshooting scenarios or for accessing older
systems that don't support more secure protocols.
TOPOLOGY:
STEPS TO DO SIMULATION:
Step 1: Bring one PC and one ISR4321 Router from the bottom to your screen and connect it
through copper straight through wire.
Step 4: Now type these commands to active telnet service on the router.
1. PING
On PC0 open command prompt and test the connectivity with PC0 and Router0.
2. TELNET
On PC0 open command prompt and type telnet with IP of router (192.168.1.1).
3. MESSAGE
Now Drag the message icon form top tool bar for PC0 to Router0 similarly Router0 to PC0.
------------END----------
29 Rizwan (16) IT-2
069150031222
Practical-6
Theory: In networking, routing refers to the process of selecting paths in a network along which
to send data packets. Static routing is a type of network routing where the network administrator
manually configures routes in the routing table. Unlike dynamic routing, static routes don't adjust
automatically in response to network topology changes. Static routing is generally used in small
networks or in scenarios where the network environment is stable, and the administrator has full
control over the paths.
In CISCO Packet Tracer, a network simulation tool, static routing can be implemented to direct
data packets between different routers based on manually set routes. This method ensures
predictability and minimal router overhead, but it requires more manual intervention when network
changes occur.
Two units
Step 3: Select four PCs and establish connection using copper cross over cable with Fast
Ethernet ports.
After the connections with all devices, we would have something like below
Step 5: Go to PC0 IP Configuration tab & input the Static IP and Default Gateway (192.168.1.2)
Step 6: Go to the PC1 and do the same process with same Default Gateway.
Step 8: Go to Router0 Config tab then click on GigabitEthernet0/0 and assign IP Address and
subnet mask, mark the Port Status ON
Step 9: Repeat the steps with GigabitEthernet0/1 and mark the Port Status ON
Step 11: Now we have to set Static Routing in the routers and network address.
Step 13: Go to the Router1 assign network address, subnet mask, Next Hop.
1. PING
On PC1 open command prompt and test the connectivity with PC1 and PC2.
On PC2 open command prompt and test the connectivity with PC2 and PC1.
2. MESSAGE
Now Drag the message icon form top tool bar. (Note: Sometime Network take time to fully active)
----------END----------
Aim: To implement the DNS, Email services, FTP and Web server in the network using CISCO
Packet Tracer.
Theory: In Cisco Packet Tracer, implementing network services like DNS, Email, FTP, and Web
servers allows for simulating real-world networking scenarios.
1. DNS (Domain Name System) resolves domain names to IP addresses, enabling easier
navigation on the network. In Packet Tracer, a DNS server is configured to map domain names to
the IPs of other servers in the network.
2. Web Server serves webpages over HTTP/HTTPS. Configuring a Web server lets client
devices access the server's content via a browser.
3. FTP (File Transfer Protocol) allows file sharing between clients and the server. An FTP
server configuration includes user authentication for secure file access.
4. Email Server enables sending and receiving emails using SMTP (sending) and POP3
(receiving) protocols. Setting up user accounts on the Email server allows for communication
within the network.
Topology:
Step 1: Setup the Network by Adding required devices (2Nos PCs, 1Nos Router, 2Nos Switches, 4Nos
Servers).
Step 4: Connect Via respective wire or just auto connect (Red-Orange Lighting Icon)
Step 8: Go to the DNS Server then IP Configuration Tab and staticaly assign IPv4 192.168.10.1, same to
DNS server and Default gatway will be the IP address of router which set earliar.
Step 14: Select the Web Server and click Services > HTTP.
Enable HTTP Service and configure the home page content if required,enable HTTPS as well.
1. DNS: Open the command prompt on a PC, and ping the domain name of each server (e.g., ping
www.rizwan.com) to check if DNS is resolving correctly.
4. Email: Use an email client or configure Packet Tracer’s built-in email client to test sending and
receiving emails.
Now to go every PC0( for Rizwan) and Configure the email ( such as name, email address, server and
logon information which set earliar in the email server)
Now to go every PC2( for Sumit) and Configure the email ( such as name, email address, server and logon information
which set earliar in the email server)
On the bottom will see success message with other important details( in this sending mail From PC0 to
PC1)
Go to the PC1 and Choose receive there will see mail from [email protected](PC0)
-----------END----------
Theory: Subnetting is a technique used in networking to divide a large IP network into smaller, more
manageable subnetworks (subnets). Each subnet can function as an independent network, but they all
share the original network’s IP address range.
Subnetting allows organizations to:
• Efficiently use IP addresses.
• Enhance network security by segmenting networks.
• Reduce network congestion.
• Make management easier by isolating different departments or groups.
A subnet mask determines which part of the IP address is designated for the network and which part for
the hosts. For example, in a /24 subnet mask (255.255.255.0), the first 24 bits are used for the network,
leaving the last 8 bits for host addresses.
Topology:
Step 1: After establishing the connections with all devices, go to Router0 config tab >Interface
GigabitEthernet0/0 assign 192.168.10.1 & subnet mask 255.255.255.128, turn Port Status>ON.
Step 2: Go to Router0 config tab >Interface GigabitEthernet0/1 assign 192.168.10.129 & subnet mask
255.255.255.128, turn Port Status>ON.
Step 4: Go to PC1 IP Configuration assign the IP 192.168.10.3 & Default Gateway 192.168.10.1 (g0/0)
Step 6: Go to PC3 IP Configuration assign the IP 192.168.10.131 & Default Gateway 192.168.10.129
(g0/1)
PING:
-------------END------------
52 Rizwan (16) IT-2
069150031222
Practical-9
Aim: To implement the Static Network Address Translation (NAT) using CISCO Packet Tracer.
Theory: Network Address Translation (NAT) is a method used in networking to map private IP
addresses within a local network to a public IP address before data is sent to external networks.
NAT is essential because IPv4 addresses are limited, and NAT allows multiple devices on a private
network to share a single public IP address.
Types of NAT
There are three main types of NAT, each serving different needs:
1. Static NAT
• Maps a single private IP address to a single public IP address on a one-to-one basis.
• Useful when a specific device (like a web server) needs to be accessed from the outside
network using a consistent public IP address.
2. Dynamic NAT
• Maps a private IP address to an available public IP address from a pool of addresses.
• Unlike static NAT, it doesn’t provide a fixed public IP for each device. Instead, it assigns
an IP address from the available pool dynamically when needed.
• Typically used when there are more internal devices than available public IP addresses, but
still require unique addresses for each connection.
3. Port Address Translation (PAT), also known as Overloading
• A variant of dynamic NAT that maps multiple private IP addresses to a single public IP
address by differentiating each connection with a unique port number.
• This is the most commonly used type of NAT, as it enables many devices to share a single
public IP, conserving IP address resources while still allowing individual connections.
NAT in Action
When a device in a private network sends data to the internet, NAT changes the private IP address
of the device to a public IP address. This allows the data to pass through the router and reach the
external network. When the external network sends data back, NAT translates the public IP address
back to the device's private IP address, ensuring that the data reaches the intended device within
the network.
Steps to Simulate:
Step 1: Drag the devices (2 router-PT, 2 switch-PT, 2 PCs, 1 Server-PT) according to the
topology and connect them via respective wires.
Ping:
NAT Translations:
----------END----------
Aim: Conducting a Network capture and Monitoring with Wireshark Simulation Tool.
Theory: Wireshark is an open-source network protocol analyzer used for monitoring and
analyzing network traffic. It captures data packets traveling over a network, displaying them in
real time and allowing users to analyze traffic at a very detailed level. Wireshark is commonly used
by network administrators, cybersecurity professionals, and IT support for tasks such as network
troubleshooting, security analysis, performance monitoring, and protocol development.
Key Concepts of Network Capture and Monitoring
1. Packet Capture: Capturing involves intercepting packets as they travel across the
network. This data capture provides insights into communication between devices, such as
the type of traffic, sources, and destinations.
2. Packet Analysis: Wireshark allows users to analyze the captured data, displaying detailed
packet information. This analysis helps diagnose network problems, monitor network
activity, or even detect security threats.
3. Protocol Analysis: Wireshark supports over a thousand network protocols, such as IP, TCP,
UDP, HTTP, DNS, and SSL. This protocol support makes it versatile for analyzing various
types of network traffic.
Key Features of Wireshark
• Real-Time Monitoring: Wireshark captures and displays network packets in real time,
allowing immediate insight into network activity.
• Filtering Capabilities: Wireshark provides powerful filtering options to focus on specific
traffic. Users can set capture filters to limit the initial capture or apply display filters post-
capture for analysis.
• Detailed Packet View: Each captured packet can be expanded to show details about its
layers, including the Ethernet, IP, TCP/UDP, and application layers.
• Decryption Support: Wireshark supports decryption for protocols like SSL/TLS if proper
keys are provided, enabling more in-depth analysis of encrypted traffic.
Components of Wireshark's Interface
1. Packet List Pane: Displays captured packets in sequence, showing columns such as packet
number, time, source and destination IPs, protocol, length, and additional info.
2. Packet Details Pane: Provides an in-depth view of the selected packet, breaking down the
packet by protocol layers and fields.
3. Packet Bytes Pane: Shows the raw data (in hexadecimal) of the selected packet.
How Wireshark Captures and Analyzes Packets
1. Interface Selection: When Wireshark starts, it lists all available network interfaces. The
user selects an interface to begin capturing packets.
2. Packet Filtering: Capture filters are applied to limit what Wireshark captures. After
capture, display filters help narrow down the data displayed for analysis.
3. Protocol Dissection: Wireshark analyzes each packet based on its protocols, dividing
packets into layers, which include the Data Link, Network, Transport, and Application
layers.
4. Packet Decoding: Wireshark decodes each packet, interpreting the data and displaying
meaningful information for each field, allowing in-depth analysis of protocols and traffic.
Step 2: Open Wireshark: Once installed, open the tool, and you’ll see a list of network interfaces
available for capturing.
Step 4: Live Traffic Monitoring: As soon as you start, Wireshark will display packets being
transmitted and received on the selected interface in real time.
Step 5: Now go some http site such as home router configuration page (192.168.1.1)
Step 6: After this go Wireshark>Capture and Click on the Stop Capture button (red square icon)
to end capturing packets.
Step 9: On the left bottom window, we find HTML form (For capture sensitive info password,
cards numbers etc.) in this tab whatever we have provided info on router site that was not
encrypted that is why it show as plain text otherwise it will show as some encrypted values.
-----------END-----------