0% found this document useful (0 votes)
3 views

computer-networks-lab-1-introduction-to-packet-tracer

The document provides an overview of network tools used in Windows and Linux, highlighting essential tools for monitoring and troubleshooting networks. It also outlines the requirements and steps for setting up a Local Area Network (LAN), including device selection, network architecture planning, and IP addressing. Additionally, it explains the concept of IP addresses, their types, and how they function in data communication across networks.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

computer-networks-lab-1-introduction-to-packet-tracer

The document provides an overview of network tools used in Windows and Linux, highlighting essential tools for monitoring and troubleshooting networks. It also outlines the requirements and steps for setting up a Local Area Network (LAN), including device selection, network architecture planning, and IP addressing. Additionally, it explains the concept of IP addresses, their types, and how they function in data communication across networks.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Understanding various network tools in Windows and Linux

Network tools are essential for monitoring, troubleshooting, and managing networks. Here's an overview of some commonly used
tools in both Windows and Linux:

### **Windows Network Tools**


1. **Wireshark**: A powerful packet analyzer for network troubleshooting and analysis.
2. **Microsoft Message Analyzer**: Useful for capturing and analyzing protocol messaging traffic.
3. **Capsa Free**: Monitors over 300 protocols and provides customizable reports.
4. **Command-Line Tools**:
- **ipconfig**: Displays TCP/IP network configuration.
- **ping**: Tests connectivity to another device.
- **tracert**: Traces the route packets take to a destination.
- **netstat**: Shows active connections and listening ports.
- **nslookup**: Diagnoses DNS-related issues.
- **netsh**: Configures and manages network settings.

### **Linux Network Tools**


1. **ping**: Checks connectivity between devices using ICMP packets.
2. **traceroute**: Maps the path packets take to a destination.
3. **netstat**: Displays network connections and routing tables.
4. **tcpdump**: Captures and analyzes network traffic.
5. **nmap**: Scans networks for open ports and services.
6. **iftop**: Monitors bandwidth usage in real-time.
7. **hping3**: A packet generator and analyzer for testing firewalls and networks.
8. **socat**: Establishes bidirectional data transfers between two points.

Both operating systems offer robust tools for network management, and many of these tools are cross-platform. If you'd like, I can
dive deeper into any specific tool or help you with practical examples!

2.Building a Local Area Network


Requirements for setting up a LAN
Before initiating the configuration steps, it’s important to know exactly what you’re configuring. A LAN is a network of
interconnected digital devices in a limited geographical area such as an office building or campus for communication and exchange of
resources like files and applications.
Understanding the basic requirements for setting up a local area network ensures that your LAN is not only functional but also secure
and efficient. The must-haves are networking devices, nodes, cables, and connectivity:

 Devices: These could be desktops, laptops, or other computing devices that will be part of the network.
 Networking hardware: A router and a switch are fundamental. The router connects your LAN to the internet, while the switch
connects various devices within the LAN.
 Cables: Ethernet cables are needed for wired connections. Make sure to have enough for each device you plan to connect.
 External storage and printers: These are optional, if your enterprise requires shared resources.
 Wired LAN: Ethernet cables connect devices to the switch and router. This option is generally more secure.
 Wireless LAN: Wi-Fi can be used for a more flexible setup but may require additional security measures.

8 steps to LAN setup and configuration


Here’s a quick walkthrough of how to set up and configure your LAN in eight simple steps.

1. Identify network services and resources


Start by listing all the services and resources that will be shared across the network. This could include file servers, printers, and
internet access.
Knowing what needs to be shared helps in selecting the right hardware and software, ensuring that all networking needs are met. You
can use a spreadsheet to organize these resources, noting their locations and access requirements.

Downloaded by Vasudevarao Vysyaraju


2. Select and prepare networking devices
Choosing the right switch and router is crucial. Make sure these devices have enough ports for all your workstations and other
hardware. Update the firmware to the latest versions to ensure you’re getting the best performance and security features.

3. Plan your network architecture


Before you start connecting cables, you can either use network design software such as Cisco Packet Tracer (Figure A) or pen and
paper to sketch out a network diagram. This will serve as your blueprint for device placement, cable lengths, and types. A well-
planned architecture minimizes potential issues and simplifies troubleshooting down the line.

Figure
A: Design of a simple network in Cisco Packet Tracer.

4. Configure IP addressing
IP addressing is a critical aspect of network setup. Decide whether to use static or dynamic IP addresses. Static IPs are often used for
servers and network devices, while dynamic IPs can be assigned to workstations through DHCP.
For static IPs, you’ll need to manually enter IP addresses for each device. This is often done through each device’s settings menu. It’s
also possible to enable DHCP for dynamic IPs on your router via its admin panel to automatically assign IPs to connected devices.

5. Cable and connect devices


Based on your network diagram, start connecting devices using the appropriate cables. Remember to keep the process neat. Make sure
to use quality cables and connectors to minimize signal loss and potential issues. Test each connection as you go along to ensure it’s
secure and functional.

6. Initial testing
Once all devices are connected, perform an initial round of tests. Check if all devices can communicate with each other, access the
internet, and use shared resources. Resolve any issues before moving to the next step.

7. Monitor and manage


While you could stop after Step 6, it will serve you better in the long run to ensure that your LAN is not just up and running, but that it
stays that way. This is done by keeping an eye on your network’s performance after confirming that it’s functional.

Downloaded by Vasudevarao Vysyaraju


Use network monitoring and management tools like Wireshark and SolarWinds Network Performance Monitor to monitor traffic,
bandwidth usage, and any unauthorized access attempts.

8. Document your network


Documentation is often overlooked, but is crucial for effective network management. Keep a record of all configurations, IP
addresses, and device placements. This documentation will be invaluable for troubleshooting and future network expansions.
This recording can be done by creating a digital network documentation file. Use a secure, accessible location to store this file. Include
all device configurations, IP addresses, and a digital copy of your network diagram. And make it a practice to update this file
whenever there are changes to the network configuration.

What is an IP Address?
Last Updated : 17 Dec, 2024



Imagine every device on the internet as a house. For you to send a letter to a
friend living in one of these houses, you need their home address. In the digital
world, this home address is what we call an IP (Internet Protocol) Address.
It’s a unique string of numbers separated by periods (IPv4) or colons (IPv6)
that identifies each device connected to the internet or a local network.
Here’s the definition:
What is an IP Address?
An IP address, or Internet Protocol address, is a unique string of numbers
assigned to each device connected to a computer network that uses the
Internet Protocol for communication. It serves as an identifier that allows
devices to send and receive data over the network, ensuring that this data
reaches the correct destination.
Types of IP Address
IP addresses can be classified in several ways based on their structure,
purpose, and the type of network they are used in. Here’s a breakdown of the
different classifications of IP addresses:
1. Based on Addressing Scheme (IPv4 vs. IPv6)
IPv4:
This is the most common form of IP Address. It consists of four sets of numbers
separated by dots. For example, 192.158.1.38. Each set of numbers can range
from 0 to 255. This format can support over 4 billion unique addresses. Here’s
how the structure is broken down:
 Four Octets: Each octet represents eight bits, or a byte, and can take a
value from 0 to 255. This range is derived from the possible combinations of
eight bits (2^8 = 256 combinations).
 Example of IPv4 Address: 192.168.1.1
o 192 is the first octet
o 168 is the second octet

Downloaded by Vasudevarao Vysyaraju


o 1 is the third octet
o 1 is the fourth octet
Each part of the IP address can indicate various aspects of the network
configuration, from the network itself to the specific device within that
network. In most cases, the network part of the address is represented by the
first one to three octets, while the remaining section identifies the host
(device).

IPv4 Address Format

IPv6:
IPv6 addresses were created to deal with the shortage of IPv4 addresses. They
use 128 bits instead of 32, offering a vastly greater number of possible
addresses. These addresses are expressed as eight groups of four hexadecimal
digits, each group representing 16 bits. The groups are separated by colons.
 Example of IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
o Each group (like 2001, 0db8, 85a3, etc.) represents a 16-bit block
of the address.
For detailed information, refer to this article – IPv4 vs. IPv6
2. Based on Usage (Public vs. Private)
Public IP Addresses
A Public IP address is assigned to every device that directly accesses the
internet. This address is unique across the entire internet. Here are the key
characteristics and uses of public IP addresses:
 Uniqueness: Each public IP address is globally unique. No two devices on
the internet can have the same public IP address at the same time.
 Accessibility: Devices with a public IP address can be accessed directly
from anywhere on the internet, assuming no firewall or security settings
block the access.

Downloaded by Vasudevarao Vysyaraju


 Assigned by ISPs: Public IP addresses are assigned by Internet Service
Providers (ISPs). When you connect to the internet through an ISP, your
device or router receives a public IP address.
 Types: Public IP addresses can be static (permanently assigned to a device)
or dynamic (temporarily assigned and can change over time).
Example Use: Public IP addresses are typically used for servers hosting
websites, email servers, or any device that needs to be accessible from the
internet. For instance, if you host a website on your own server at home, your
ISP must assign a public IP address to your server so users around the world
can access your site.
Private IP Addresses
Private IP addresses are used within private networks (such as home networks,
office networks, etc.) and are not routable on the internet. This means that
devices with private IP addresses cannot directly communicate with devices on
the internet without a translating mechanism like a router performing Network
Address Translation (NAT). Key features include:
 Not globally unique: Private IP addresses are only required to be unique
within their own network. Different private networks can use the same range
of IP addresses without conflict.
 Local communication: These addresses are used for communication
between devices within the same network. They cannot be used to
communicate directly with devices on the internet.
 Defined ranges: The Internet Assigned Numbers Authority (IANA) has
reserved specific IP address ranges for private use:
o IPv4: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255,
192.168.0.0 to 192.168.255.255
o IPv6: Addresses starting with FD or FC
Example Use: In a typical home network, the router assigns private IP
addresses to each device (like smartphones, laptops, smart TVs) from the
reserved ranges. These devices use their private IPs to communicate with each
other and with the router. The router uses NAT to allow these devices to access
the internet using its public IP address.

Downloaded by Vasudevarao Vysyaraju


3. Based on Assignment Method (Static vs. Dynamic)
Static IP Addresses:
 These are permanently assigned to a device, typically important for servers
or devices that need a constant address.
 Reliable for network services that require regular access such as websites,
remote management.
Dynamic IP Addresses:
 Temporarily assigned from a pool of available addresses by the Dynamic
Host Configuration Protocol (DHCP).
 Cost-effective and efficient for providers, perfect for consumer devices that
do not require permanent addresses.
For detailed information, refer to this article – Static vs. Dynamic IP
Address
How Do IP Addresses Work?
Here’s how IP addresses work:
1. Unique Identification
Every device connected to a network, such as computers, smartphones, and
servers, is assigned an IP address. This address is used to identify the device
on the network, similar to how a home address identifies a specific location.
2. Communication Protocol
The Internet Protocol (IP), part of the broader suite of internet protocols, uses
these addresses to facilitate the routing of data packets between devices. Each
piece of data sent over a network is broken into smaller units called packets.
Each packet includes both the sender’s and the recipient’s IP addresses.
3. Data Routing
When a device sends information to another device over the internet:
 The data is divided into packets.
 Each packet contains the IP address of the device it is destined for.
 Routers within the network read the destination IP address on each packet
and determine the best path for the packet to travel. Routers communicate

Downloaded by Vasudevarao Vysyaraju


with each other to update and maintain records of the fastest, most efficient
routes for data.
4. Local Area Networks (LAN) and Wide Area Networks (WAN)
 LAN: On local networks, IP addresses can be assigned manually by an
administrator (static IP) or automatically by a DHCP server. Devices within
the same network communicate directly using their local IP addresses.
 WAN: For devices on different networks, the data must travel through
multiple routers across the internet. Each router makes independent
decisions about the best route for the packets based on the destination IP
address.
5. Network Address Translation (NAT)
Most devices on a home or small business network share a single public IP
address when accessing the internet, even though each device has its own
private IP address within the local network. NAT is a process where multiple
local IP addresses are mapped to a single public IP address. This conserves IP
addresses and adds a layer of security by hiding internal IP addresses from the
external network.
Real World Scenario: Sending an Email from New York to Tokyo
Let’s explore how IP addresses work through a real-world example that
involves sending an email from one person to another across the globe:
Step 1: Assigning IP Addresses
 Alice in New York wants to send an email to Bob in Tokyo.
 Alice’s laptop has a private IP address (e.g., 192.168.1.5) assigned by her
router at home.
 Bob’s computer in Tokyo has a private IP address (e.g., 192.168.2.4)
assigned by his router at his office.
Step 2: Connection to the Internet
 Both Alice and Bob’s routers have public IP addresses assigned by their
Internet Service Providers (ISPs). These public IP addresses are what the
devices use to send and receive data over the internet.
Step 3: Sending the Email
 Alice writes her email and hits send.
 Her email service (e.g., Gmail) packages the message and its attachments
into data packets. Each packet includes the source IP (Alice’s router’s public
IP) and the destination IP (Bob’s email server’s public IP).
Step 4: Routing the Packets
 The data packets leave Alice’s laptop and travel to her home router. The
router notes that the destination IP is outside the local network.
 The router sends the packets to Alice’s ISP. The ISP uses routers that
examine the destination IP address of the packets and determine the best
route to send them toward their destination.
 The packets may pass through several routers around the world — in data
centers in countries like Canada, Germany, and finally Japan. Each router
along the way reads the destination IP and forwards the packets
accordingly.

Downloaded by Vasudevarao Vysyaraju


Step 5: Reaching Bob
 The packets arrive at Bob’s email server’s ISP in Tokyo and are then
forwarded to the server.
 Bob’s email server reassembles the packets into the original email message.
Step 6: Bob Accesses the Email
 Bob’s computer requests the email from his server using his local network
IP.
 The server sends the email to Bob’s computer, allowing him to read the
message Alice sent.
Additional Details
 NAT (Network Address Translation): Both Alice and Bob’s routers
perform NAT, translating the private IP addresses to and from the public IP
addresses when interfacing with the internet. This process is crucial for
keeping the number of public IPs needed lower and adds a layer of security
by masking internal network structures.
 Dynamic IP Addressing: If either Alice or Bob’s public IP is dynamic, it
might change if they restart their routers. This doesn’t affect their ongoing
activities much because the DNS (Domain Name System) helps update the
mapping of domain names (like gmail.com) to the current IP addresses.
This example illustrates the fundamental role of IP addresses and the complex
network of routers involved in even the simplest internet activities like sending
an email. Each part of the process depends on the IP address to ensure that
data finds its way correctly from sender to receiver, no matter where they are
in the world.
—> Other Important Things to Know About IP Address
Classes of IPv4 Address
There are around 4.3 billion IPv4 addresses and managing all those addresses
without any classification is next to impossible.
Let’s understand it with a simple example. If you have to find a word from a
language dictionary, how long will it take just think about it. Usually you will
take less than 5 minutes to find that word. You are able to do this because
words in the dictionary are organized in alphabetical order. If you have to find
out the same word from a dictionary that doesn’t use any sequence or order to
organize the words, it will take an eternity to find the word. If a dictionary with
one billion words without order can be so disastrous, then you can imagine the
pain behind finding an address from 4.3 billion addresses.
For easier management and assignment IP addresses are organized in numeric
order and divided into the following 5 classes:
IP addresses are also classified into different classes based on their
range and intended use:
 Class A (1.0.0.0 to 127.255.255.255):
o Used for very large networks (like multinational companies).
o Supports up to 16 million hosts per network.
o Example: 10.0.0.1 (Private IP in this class).
 Class B (128.0.0.0 to 191.255.255.255):
o Used for medium-sized networks, such as large organizations.

Downloaded by Vasudevarao Vysyaraju


Supports up to 65,000 hosts per network.
o
o Example: 172.16.0.1 (Private IP in this class).
 Class C (192.0.0.0 to 223.255.255.255):
o Used for smaller networks, like small businesses or home networks.
o Supports up to 254 hosts per network.
o Example: 192.168.1.1 (Private IP in this class).
 Class D (224.0.0.0 to 239.255.255.255):
o Reserved for multicast groups (used to send data to multiple
devices at once).
o Not used for traditional devices or networks.
 Class E (240.0.0.0 to 255.255.255.255):
o Reserved for experimental purposes and future use.

IP
Class Address Range Maximum number of networks

Class A 1-126 126 (27-2)

Class B 128-191 16384

Class C 192-223 2097152

Class D 224-239 Reserve for multitasking

Class E 240-254 Reserved for Research and development


Special IP Addresses
There are also some special-purpose IP addresses that don’t follow the usual
structure:
 Loopback Address:
o The loopback address 127.0.0.1 is used to test network connectivity
within the same device (i.e., sending data to yourself).
o Often called “localhost.”
 Broadcast Address:
o The broadcast address allows data to be sent to all devices in a
network. For a typical network with the IP range 192.168.1.0/24, the
broadcast address would be 192.168.1.255.
 Multicast Address:
o Used to send data to a group of devices (multicast). For
example, 233.0.0.1 is a multicast address.
How to Look Up IP Addresses?
In Windows
1. Open the Command Prompt.
2. Type ipconfig and press Enter.
3. Look for your IP under your network connection.

Downloaded by Vasudevarao Vysyaraju


On Mac
1. Open System Preferences > Network.
2. Select your active connection.
3. You’ll see your IP address in the connection details.
On iPhone
1. Go to Settings > Wi-Fi.
2. Tap the (i) icon next to your network.
3. Find your IP under “IP Address.”
IP Address Security Threats
IP addresses are essential for connecting devices on the internet, but they also
come with various security risks. Understanding these threats can help you
protect your network and personal information more effectively. Here are some
common IP address security threats:
 IP Spoofing: Hackers use this technique to bypass security measures,
launch attacks, or gain unauthorized access to systems. By pretending to be
a trusted IP address, attackers can trick networks into granting them access
or allowing malicious activities.
 Distributed Denial of Service (DDoS) Attacks: This happens by
overloading a website or service with too much traffic. Many hacked devices
send lots of requests to a target all at once, making the website or service
crash. This means real users can’t access it which can cause crashing of
site, businesses to lose money and many more.
 Man-in-the-Middle (MitM) Attacks: Eavesdropping or altering messages
between two people without letting them know is MitM attack. Attackers
intercept the communication between two parties and can steal sensitive
information like passwords or credit card details by targeting the IP
addresses involved.
 Port Scanning: It is a technique used to identify open ports and services
running on a device’s IP address. Hackers use port scanners to find
vulnerabilities in network services, which they can then exploit to gain
unauthorized access or deploy malware. Regularly monitoring and securing
open ports is essential to prevent such attacks.
How to Protect and Hide Your IP Address?
 VPN (Virtual Private Network): A VPN hides your IP by masking it with
the VPN server’s IP, giving you privacy. Your internet traffic passes through
the VPN server, masking your real IP address with the server’s IP. This
makes it difficult for others to track your online activities or identify your
location.
 Proxy Server: Routes your data through a different server, hiding your real
IP. When you use a proxy, your requests go through the proxy server, which
hides your real IP address by replacing it with its own.
 Tor Browser: Encrypts and bounces your data around multiple servers for
anonymity. This multi-layered routing makes it extremely difficult to trace
your IP address or monitor your online activities.
 Enable Your Firewall: A firewall is a security system that monitors and
controls incoming and outgoing network traffic. It can block unauthorized

Downloaded by Vasudevarao Vysyaraju


access to your device, making it harder for attackers to target your IP
address.

INTRODUCTION TO PACKET TRACER

1. Objective

This lab exercise is designed to

 To get familiarization with “Packet Tracer 5.0”

 How to make Connections Between more than one Devices?

 How to test the Connectivity between the devices?

2. Resources Required
 Computer

 Packet Tracer (version 5 )

3. Introduction

This lab introduces Packet Tracer 5 which is a network simulator provided by Cisco.

Network Simulator: Network Simulator creates the software portion of the hardware only so you
can’t use them with real networks. The process done by it is called Simulation. Most widely used network
simulators are OPNET, NS (both are general-purpose) and Packet Tracer (for Cisco devices). Using
Simulator allows us to (only) test networks before deploying inthe real world. Also they usually don’t
have all the functionalities available in real-life devices.
The purpose of simulator is to duplicate the software functionality of a device. Packet Tracer is a
standalone, medium-fidelity, simulation-based learning environment for networking novices to design,
configure, and troubleshoot computer networks at a CCNA-level of complexity. Packet Tracer supports
student and instructor creation of simulations, visualizations, and animations of networking phenomena.
Like any simulation, Packet Tracer relies on a simplified model of networking devices and protocols.
Real computer networks remain the benchmark for understanding net- work behavior and developing
networking skills. Packet Tracer was created to help address the "digital divide" in networking education,
where many students and teachers lack access to equipment, bandwidth, and interactive modes of
learning networking. We invite you to use the help files and tutorials to learn about the major features of
the program, which include the items in the following table Packet Tracer 5.0 uses two representation
schemes for your network: The Logical Workspace and the Physical Workspace. The Logical Workspace
allows you to build a logical network topology, without regard to its physical scale and arrangement.

The Physical Workspace allows you to arrange devices physically in cities, buildings, and wiring
closets. Distances and other physical measures will affect network performance and other characteristics
if wireless connections are used. In Packet Tracer 5.0, you first build your logical network, and then
you can arrange it in the Physical Work- space. Most of your time will be spend working in the Logical
Workspace.

Downloaded by Vasudevarao Vysyaraju


Installing Packet Tracer: To download Packet Tracer, go to https://www.netacad.com and log in with
your Cisco Networking Academy credentials; then, click on the Packet Tracer graphic and download the
package appropriate for your operating system.
Windows: Installation in Windows is pretty simple and straightforward; the setup comes in a single
file named Packettracer_Setup6.0.1.exe. Open this file to begin the setup wizard,
accept the license agreement, choose a location, and start the installation.
4. Interface overview

The layout of Packet Tracer is divided into several components similar to a photo editor. Match the
numbering in the following screenshot with the explanations given after it:

The components of the Packet Tracer interface are as follows:

Area 1: Menu bar – This is a common menu found in all software applications; it is used to open, save,
print, change preferences, and so on.
Area 2: Main toolbar – This bar provides shortcut icons to menu options that are commonly accessed,
such as open, save, zoom, undo, and redo, and on the right-hand side is an icon for entering network
information for the current network.
Area 3: Logical/Physical workspace tabs – These tabs allow you to toggle between the Logical and
Physical work areas.
Area 4: Workspace – This is the area where topologies are created and simulations are displayed.

Area 5: Common tools bar – This toolbar provides controls for manipulating topologies, such as select,
move layout, place note, delete, inspect, resize shape, and add simple/complex PDU.
Area 6: Real-time/Simulation tabs – These tabs are used to toggle between the real and simulation modes.
Buttons are also provided to control the time, and to capture the packets.
Area 7: Network component box – This component contains all of the network and end devices available
with Packet Tracer, and is further divided into two areas:
Area 7a: Device-type selection box – This area contains device categories.

Area 7b: Device-specific selection box – When a device category is selected, this selection box
displays the different device models within that category

Downloaded by Vasudevarao Vysyaraju


Area 8: User-created packet box – Users can create highly-customized packets to test their topology from
this area, and the results are displayed as a list.
5. The Logical Workspace

The Logical Workspace is where you will spend the majority of your time building and configuring your
network. In conjunction with Real-time Mode, you can use thisworkspace to complete many of the labs
you encounter in your CCNA coursework. First, you will want to create devices. This is done by
choosing devices from the Network Component box. Then, you can do any of the following:
 Add modules to your devices to install additional interfaces. Note that you must turn off a
device (by clicking its power button) before you can add a module.
 Connect your devices by choosing the appropriate cables (also found in the Net- work Component
box).
 Configure device parameters (such as the device name and IP address) through graphical
dialogue boxes or the Cisco IOS (in the case of routers and switches).
 Make advanced configurations and view network information from the CLI interface on a router
or switch.
6. Creating Devices
To place a device onto the workspace, first choose a device type from the Device-Type Selection box.
Then, click on the desired device model from the Device-Specific Selection box. Finally, click on a
location in the workspace to put your device in that location. If you want to cancel your selection, press
the Cancel icon for that device. Alternatively, you can click and drag a device from the Device-Specific
Selection box onto the workspace. You can also click and drag a device directly from the Device-
Type Selection box and a default device model will be chosen for you.

To quickly create many instances of the same device, press and hold the Ctrl button,click on the device
in the Device-Specific Selection box, and then release the Ctrl button. The device is now locked and
you can click on the workspace multiple times to add multiple copies of the device. Cancel this
operation by pressing the Cancel icon for that device. To duplicate devices, you can press and hold
the Ctrl button and then drag a device on the workspace or select the devices and then use the Copy and
Pastebuttons.
Most Packet Tracer 5.0 devices have modular bays or slots into which you can insert modules. In the
workspace, click on a device to bring up its configuration window. By default, you will be in the Physical
Device View subpanel of the device. An interactive picture of the device is on the right of the panel, and

Downloaded by Vasudevarao Vysyaraju


a list of compatible modules is on the left. You can resize the picture with the Zoom in, Original Size,
and Zoom Out buttons. You can also resize the entire configuration window by dragging its borders
with the mouse. Alternatively, you can undock the window so that you can move it around and freely
resize it

7. Procedure

1. Open Packet Tracer 5 from Desktop or Start Menu. The following window appears.

2. Click on Switch in lower left part, click on 2950T and then again click in the main
window. The switch will appear in the main window.
3. Place four PCs Generic (in End Devices) in the main window.

4. Find suitable connections in Connections to have the following topology. Double-click on PC0
and goto Dektop tab.
5. Click on IP Configuration and enter 192.168.1.2 as the IP address and 255.255.255.0 as subnet
mask. 192.168.1.3 for PC1. Enter any IP address for PC3 and PC4 (in same network).
6. To check communication, go to Desktop tab of any PC, click on the Command Prompt and use
any networking command (ping, tracert etc).

Downloaded by Vasudevarao Vysyaraju


7. You can also use the closed envelope with a plus sign (Add Simple PDU) in theright menu of
the Packet Tracer window. Click on it, then the two nodes to be checked. This a much better
way. To check it benefits, go to Simulation mode using Shift +S or by clicking in the
lower right corner of window.

Downloaded by Vasudevarao Vysyaraju

You might also like