CN file
CN file
1. Introduction
Cisco Packet Tracer is a powerful network simulation tool that allows users to design, configure,
and troubleshoot networks in a virtual environment. This guide explores the graphical user interface
(GUI) and its key features to help beginners understand its functionality.
1
3. Logical and Physical Workspaces
• Logical Workspace: This is where the actual network topology is created and
configured. Users can drag and drop devices to simulate a network. Physical
• Workspace: This mode simulates the physical locations and layouts of network
devices, giving a more realistic representation.
4. Device Types
At the bottom of the screen, you can see the device type selection panel:
• Routers: Icons representing various models like the 1941 and 2911 series.
• Switches: Different switch types available for use in networks.
• End Devices: Includes PCs, laptops, and other networked devices.
• Connections: Cabling options to connect devices in the workspace.
5. Simulation Mode
• Real-time Mode: The default mode where network operations are executed
instantly.
• Simulation Mode: Allows users to step through the network operations for
troubleshooting and debugging. It is useful for examining how data packets move
through the network.
• New PDU: Allows you to create a new packet to track its journey through the
network.
• PDU Details: Displays information such as the packet’s source, destination, and
protocol used.
2
8. Device Configuration
When a device is dragged into the workspace and selected, a configuration window pops up. Here,
users can:
• Set IP Addresses
• Configure Routing Protocols
• Set Security Features
Conclusion
Cisco Packet Tracer’s user interface is rich in functionality, designed to support network design,
configuration, and troubleshooting. By understanding its features, you can efficiently design and
simulate complex network architectur
3
Q2: lnterpret suitable Network Simulator.
1.Wireshark Introduction
Wireshark is a widely used network protocol analyser that allows users to capture and inspect
data traveling through a network in real time. It supports the deep analysis of hundreds of
protocols and is commonly used for network troubleshooting, performance analysis, and
security auditing. The latest version of Wireshark includes enhancements such as updated
protocol support, performance improvements, and bug fixes. These updates make it even
more efficient and reliable for users looking to monitor and diagnose network issues,
providing valuable insights into the flow and structure of network traffic.
History
In the late 1990's Gerald Combs, a computer science graduate of the University of Missouri-
Kansas City was working for the small ISP (Internet Service Provider). The protocol at that
time did not complete the primary requirements. So, he started writing ethereal and released
the first version around 1998. The Network integration services owned the Ethernet
trademark.
Combos still held the copyright on most of the ethereal source code, and the rest of the
source code was re-distributed under the GNU GPL. He did not own the Ethereal trademark,
so he changed the name to Wireshark. He used the contents of the ethereal as the basis.
Wireshark has won several industry rewards over the years including eWeek, InfoWorld, PC
Magazine and also as a top-rated packet sniffer. Combos continued the work and released
the new version of the software. There are around 600 contributed authors for the Wireshark
product website.
2. Features
The following are some of the many features Wireshark provides:
• Available for UNIX and Windows.
• Capture live packet data from a network interface.
• Open files containing packet data captured with tcpdump/WinDump, Wireshark, and
many other packet capture programs.
• Import packets from text files containing hex dumps of packet data.
• Display packets with very detailed protocol information.
• Save packet data captured.
• Export some or all packets in a number of capture file formats.
• Filter packets on many criteria.
• Search for packets on many criteria.
• Colorize packet display based on filters.
• Create various statistics.
4
3. Functionality of Wireshark:
Wireshark users can see all the traffic passing through the network.
Wireshark can also monitor the unicast traffic which is not sent to the network's MAC address
interface. But, the switch does not pass all the traffic to the port. Hence, the promiscuous mode
is not sufficient to see all the traffic. The various network taps or port mirroring is used to
extend capture at any point.
The packets in the Wireshark are highlighted with blue, black, and green color. These colors
help users to identify the types of traffic. It is also called as packet colorization. The kinds of
coloring rules in the Wireshark are temporary rules and permanent rules.
o The temporary rules are there until the program is in active mode or until we quit the
program.
o The permanent color rules are available until the Wireshark is in use or the next time
you run the Wireshark. The steps to apply color filters will be discussed later in this
topic.
5.User Interfaces
File
This menu contains items to open and merge capture files, save, print, or export capture files in
whole or in part, and to quit the Wireshark application.
5
Edit
This menu contains items to find a packet, time reference or mark one or more packets, handle
configuration profiles, and set your preferences; (cut, copy, and paste are not presently
implemented)
View
This menu controls the display of the captured data, including colorization of packets, zooming
the font, showing a packet in a separate window, expanding and collapsing trees in packet details.
6
Go
This menu contains items to go to a specific packet.
Capture
This menu allows you to start and stop captures and to edit capture filters.
Analyze
This menu contains items to manipulate display filters, enable or disable the dissection of
protocols, configure user specified decodes and follow a TCP stream.
7
Statistics
This menu contains items to display various statistic windows, including a summary of the
packets that have been captured, display protocol hierarchy statistics and much more.
Telephony
This menu contains items to display various telephony related statistic windows, including a
media analysis, flow diagrams, display protocol hierarchy statistics and much more.
8
Wireless
This menu contains items to display Bluetooth and IEEE 802.11 wireless statistics.
Tools
This menu contains various tools available in Wireshark, such as creating Firewall ACL Rules.
9
Help
This menu contains items to help the user, e.g., access to some basic help, manual pages of the
various command line tools, online access to some of the webpages, and the usual about dialog.
Home Screen
10
Capturing Packet:
11
Changing Layout
12
Adding New Column:
13
Applying Filters:
14
Checking details of a captured packet:
15
Q3. Implement network configure using commands
Ping
Ping -a
16
Ping -w timeout
Ipconfig
17
Ipconfig/all
18
Ipconfig/flushdns
Ipconfig/registerdns
Arp -a
Netstat
19
Netstat -a
20
21
Netstat -r
22
Netstat -e
Tracert
Tracert -d
23
Tracert -h
Tracert -w timeout
NSLookup
24
Hostname
system info
25
Q4: Design and implement different network specific scenario.
1. Bus Topology
Output:
26
2. Star Topology
Output:
27
28
2. Ring Topology
Output:
29
30
Q5 :Connect the network in a local area network using a network simulator .
Output:
31
32
33
Q6. Study and implement of various network devices using a network simulator.
Hub
and
switches
34
Add Simple PDU to the starting and ending PCs.
35
Q7.Configuring protocol using network simulator.
36
37
Q8.Configure a network using link state routing protocol using a network
simulator.
38
39
40
41
Q9.Configure a network using distance vector routing protocol using a network
simulator.
42
43
44
45
46
47
48
49
50
Q10.Work in a teams to design to design networks for real life scenarios by
applying the concepts of all the layered architecture.
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
.
71
72
73
74
75