EXPERIEMENT–1
Aim: Installation of Cisco Packet Tracer.
Theory:
Cisco Packet Tracer is a powerful network simulation tool developed by Cisco Systems. It allows
students, educators, and network professionals to design, configure, and test computer networks in
a virtual environment without requiring physical networking devices. Packet Tracer provides an
interactive platform to practice routing, switching, wireless, IoT, and security concepts, making it
a vital tool for learning and preparing for Cisco certifications such as CCNA.
Some key features include:
• Drag-and-drop network devices and easy configuration.
• Supports routing protocols (RIP, OSPF, EIGRP, BGP).
• IoT device simulation for smart city/home projects.
• Multi-user collaboration and real-time simulation.
• Runs on Windows, Linux, and macOS.
Other Network Simulators:
1) GNS3 (Graphical Network Simulator 3):
• Open-source, supports real Cisco IOS images. Used by professionals for advanced
labs.
• More realistic than Packet Tracer but requires higher system resources.
2) EVE-NG (Emulated Virtual Environment – Next Generation):
• Browser-based emulator supporting multiple vendors (Cisco, Juniper, Palo Alto).
• Professional-grade, often used in enterprises.
3) Boson NetSim:
• Commercial tool with high-fidelity Cisco labs. Offers guided labs for
certification preparation.
• Paid software, more realistic than Packet Tracer.
➢ Installation of Cisco Packet Tracer
Step 1: Download Packet Tracer
• Visit the official Cisco NetAcad website: https://www.netacad.com.
• Log in (or create an account) and navigate to the Resources → Download Packet
Tracer section.
• Select the correct installer based on your operating system
Step 2: Run the Installer
• Double-click the downloaded .exe (Windows) or .deb (Linux) file.
• The installation wizard will appear.
• Read and accept the Cisco license agreement, then click Next.
Step 3: Finish Installation
• Choose installation directory → Click Install → Wait for setup to complete.
• Once done, click Finish and launch Cisco Packet Tracer.
➢ NetAcad.com Login Page
EXPERIMENT-2
Aim: To simulate the Lab 131-132 environment.
SOFTWARE USED: Cisco Packet Tracer
COMMON NETWORKING DEVICES IN CISCO PACKET TRACER:
1. Router:
● Connects different networks (e.g., LAN to WAN, LAN to Internet).
● Uses IP addresses and routing protocols (RIP, OSPF, EIGRP, BGP) to decide the best
path for data.
2. Switch:
● Works at Layer 2 (Data Link layer).
● Connects multiple devices in the same LAN and forwards data using MAC addresses.
● Supports VLANs, trunking, and STP in Packet Tracer.
● More efficient than hubs because it sends data only to the intended device.
3. Hub:
● A very basic device at Layer 1 (Physical layer).
● Forwards all incoming traffic to all connected devices (broadcast).
4. PC/Laptop:
● End devices used by users to connect to networks.
● Can be assigned IP addresses, gateways, and DNS settings.
● Useful in Packet Tracer for testing connectivity (ping, traceroute, browser, email
client, etc.).
SIMULATION STEPS:
1. Add 10 PCs and 1 Switch to the workspace for the first network.
2. Add 10 PCs and 1 Switch to the workspace for the second network.
3. Add 1 Router to the workspace.
4. Connect each PC to its respective Switch using a Copper Straight-Through cable or
Dynamic Cable.
5. Connect each Switch to the Router using a Copper Straight-Through cable or Dynamic
Cable.
6. Configure IP addresses for all devices in Network 1 and Network 2. Don’t assign PCs'
default gateways yet.
8. Turn on the Router interfaces.
9. Test connectivity between devices within the same network.
FINAL LAB SIMULATION SETUP:
Viva Voce
1. What is a router, and what is its primary function in a network?
Ans. A router is a device that connects multiple networks, like a home network to the
internet. It decides the best route for data packets so they reach the correct
destination.
2. How does a switch differ from a hub in terms of forwarding data?
Ans. A switch identifies the MAC address of the destination device and forwards data
only to that port, making it efficient. A hub just copies the data to all ports, causing
unnecessary traffic.
3. What is the purpose of an end device (like a PC or laptop) in a Cisco Packet Tracer
simulation?
Ans. End devices represent real users. They are used to create, send, and receive data
in the simulation, helping us check whether the network works properly.
4. When would you use a straight-through cable versus a crossover cable in Cisco
Packet Tracer?
Ans. Straight-through cables are used to connect different devices (PC to Switch,
Router to Switch).
Crossover cables are used to directly connect similar devices (PC to PC, Switch to
Switch) without another device in between.
5. What is a wireless access point (WAP), and how does it function in a network?
Ans. A WAP allows wireless devices like phones or laptops to connect to a wired
network. It converts wired signals into wireless signals, making Wi-Fi access
possible.
EXPERIMENT-3
AIM: To implement an IP Addressing Scheme and Subnetting in small networks using
Cisco Packet Tracer.
SOFTWARE USED: Cisco Packet Tracer
SIMULATION STEPS:
1. Add 2 PCs and 1 Switch to the workspace for the first network.
2. Add 2 PCs and 1 Switch to the workspace for the second network.
3. Add 1 Router to the workspace.
4. Assign IP address (192.168.0.5) to PC0 and IP address (192.168.0.8) to PC1.
5. Assign IP address (192.168.128.6) to PC2 and IP address (192.168.128.9) to PC3.
6. Assign IP address (192.168.0.4) to Router Interface FastEthernet 0/0 and IP address
(192.168.128.1) to Router Interface FastEthernet 0/1.
7. Assign default gateways as IP address of Router FastEthernet 0/0 (192.168.0.4), to the
network 1 PCs, i.e, PC0 and PC1.
8. Assign default gateways as IP address of Router FastEthernet 0/1 (192.168.128.1)), to
the network 2 PCs, i.e, PC2 and PC3.
9. Turn on both the ports of Router, i.e., FastEthernet 0/0 and FastEthernet 0/1.
10.Now that the networks are set up and connections are well established between 2
networks, try to check connectivity between the networks by pinging from PC of
network 1 to a PC of network 2, using ping command.
11.As the packets are being sent and received successfully with 0% loss as seen from the
screenshot, both the networks are successfully well connected.
SIMULATION SCREENSHOTS:
1. Assigning IP address and Default Gateway to PC0 :
2. Assigning IP address and Default Gateway to PC1 :
3. Assigning IP address to Router Interface FastEthernet 0/0:
4. Assigning IP address to Router Interface FastEthernet 0/1:
5. Assigning IP address and Default Gateway to PC2:
6. Assigning IP address and Default Gateway to PC3:
7. Ping from PC0 to PC4 :
8. Final Network Setup :
Viva Voce
1. Define subnetting and explain why it is necessary in network design.
Ans. Subnetting is the process of dividing a big network into smaller subnetworks. It is
necessary because it makes networks easier to manage, reduces congestion, improves
security, and saves IP addresses.
2. What is a subnet mask, and how does it determine the size of a subnet?
Ans. A subnet mask is a 32-bit value that separates the network part and the host part of
an IP address. The number of network bits (1’s) in the mask decides how many hosts can
exist in that subnet.
3. What is CIDR notation, and how does it represent subnets?
Ans. CIDR stands for Classless Inter-Domain Routing. It shows the subnet by writing a
slash “/” followed by the number of network bits (for example, 192.168.1.0/24 means 24
bits are for the network).
4. Explain the concept of subnetting and its importance in IP address management.
Ans. Subnetting splits one IP network into many smaller ones. It helps in better use of IP
addresses, reduces unnecessary traffic, and adds more control and security to the
network.
5. What is the default subnet mask for Class A, Class B, and Class C IP addresses?
Ans. Class A → 255.0.0.0 (/8)
Class B → 255.255.0.0 (/16)
Class C → 255.255.255.0 (/24)
6. How can Variable Length Subnet Masking (VLSM) improve IP address utilization in a
network?
Ans. VLSM lets us assign different subnet masks within the same network. This way,
large subnets get more addresses and small subnets get fewer, so IPs are not wasted.