Building topologies in packet tracer

Assignment Help Other Subject
Reference no: EM133189380

Lab Title: Introduction to Packet Tracer

Objectives of this Lab:

The goal of this lab is to become familiar with building topologies in Packet Tracer and how to configure switches with the end devices such as PCs or Laptops.

Instructions:

• Read carefully before starting the lab.
• These exercises are to be done individually.
• You are supposed to provide the answers to the questions listed at the end of this document and upload the completed report to the Moodle.

• Avoid plagiarism by copying from the Internet or from your peers. Your submitted work should be written by yourself.

• Total Marks = 15
• Weightage = 3%
• Deadline to submit your report is by midnight Sunday 14 August. You must submit a word document that provides answers to the questions given at the end.

Packet Tracer:

Packet Tracer is a visual simulation tool designed by Cisco Systems that allows users to create network typologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface.

Step 1: Start Packet Tracer

Step 2: Choosing Devices and Connections

We can begin building our network topology by selecting devices and the media in which to connect them. Several types of devices and network connections can be used. For this lab we will keep it simple by using End Devices, Switches, and Connections.

Single click on each group of devices and connections to display the various choices. The devices you see may differ slightly.

Step 3: Building the Topology - Adding Hosts

Single click on the End Devices.

Single click on the Generic host.

Move the cursor into topology area. You will notice it turns into a plus "+" sign.

Single click in the topology area and it copies the device.

Step 4: Building the Topology - Connecting the Hosts to Switches Adding a Switch
Select a switch, by clicking once on Switches and once on a 2950-24 switch.

Add the switch by moving the plus sign "+" below PC2 and PC3 and click once.

Connections contain different wired media. Most common examples are the straight-through cable and the crossover cable.

Straight-Through Cable
A straight through cable is a type of twisted pair cable that is used in local area networks to connect a computer to a network switches/ router.

Crossover Cable
A crossover Ethernet cable is a type of Ethernet cable used to connect computing devices together directly: e.g. two computers (via network interface controller) or two switches to each other.

Connect PC2 to Switch0 by first choosing Connections.

Click once on the Copper Straight-through cable.

Perform the following steps to connect PC2 to Switch0:
1. Click once on PC2
2. Choose FastEthernet
3. Drag the cursor to Switch0
4. Click once on Switch0 and choose FastEthernet0/1
5. Notice the green link lights on PC2 Ethernet NIC and amber light Switch0 FastEthernet0/1 port.
6. After a about 30 seconds the amber light will change to green indicating that the switch is now ready to forward the frames.


1 2 3 4 5 6

Repeat the steps above for PC3 connecting it to Port 3 on Switch0 on port FastEtherent0/2. (The actual switch port you choose does not matter.)

Move the cursor over the link light to view the port number. Fa means FastEthernet, 100 Mbps Ethernet.

Cisco CLI Architecture
A Cisco IOS Switch command line interface can be accessed through a console connection, modem connection, or a telnet session. Regardless of which connection method is used, access to the IOS command line interface is generally referred to as an EXEC session.
As a security feature, Cisco IOS separates EXEC sessions into two different access levels - user EXEC level and privileged EXEC level. User EXEC level allows a person to access only a limited amount of basic monitoring commands. Privileged EXEC level allows a person to access all Switch commands (e.g. configuration and management) and can be password protected to allow only authorized users the ability to configure or maintain the Switch.
For example, when an EXEC session is started, the Switch will display a "Switch>" prompt. The right arrow (>) in the prompt indicates that the Switch is at the user EXEC level. The user EXEC level does not contain any commands that might control (e.g. reload or configure) the operation of the Switch. To list the commands available at the user EXEC level, type a question mark (?) at the Switch> prompt.

Critical commands (e.g. configuration and management) require that the user be at the privileged EXEC level. To change to the privileged EXEC level, type "enable" at the Switch> prompt. If an enable password is configured, the Switch will then prompt for that password. When the correct enable password is entered, the Switch prompt will change to "Switch#" indicating that the user is now at the privileged EXEC level. To switch back to user EXEC level, type "disable" at the Switch# prompt. Typing a question mark (?) at the privileged EXEC level will now reveal many more command options than those available at the user EXEC level. The text below illustrates the process of changing EXEC levels.
Switch> enable Switch# disable Switch>
Once an EXEC session is established, commands within Cisco IOS are hierarchically structured. To assist users in navigation through IOS CLI, the command prompt will change to reflect the position of a user within the command hierarchy. This allows users to easily identify where within the command structure they are at any given moment. The following table gives the summary of command prompts and the corresponding location within the command structure.

Switch> - User EXEC mode
Switch# - Privileged EXEC mode
Switch(config)# - Configuration mode (notice the # sign indicates this is only accessible at privileged EXEC mode.)
Table: IOS command prompt summary

Today's Lab:
Today we are going to make a small network using switches in Cisco Packet Tracer.
We will use 4 End Devices, and 3 Switches in total as shown in the figure below.

Following is the IP Configuration Admin1 : 10.0.0.2
Admin2 : 10.0.0.3
Student1: 10.0.0.12
Student2 : 10.0.0.13

Note: Use the same subnet mask of 255.255.255.0 for all the four end devices.

(Replace the student1 and student2 end devices and the right-side student switch to your name)

To Configure IP addresses of End Device, we click from drawing window on end host and a menu pops up. If we go to 3rd tab (desktop only for PC and laptop) of it, we will find plenty of options for End host and we can set IP address there by clicking on IP configuration. Following is the Admin1 IP address setup.

Double click on switch and its panel is opened and there we can access CLI as highlighted in the figure below.

Enter once or twice to get the console for the switch configuration. In today's lab, we will be going to perform the following tasks:

1. Change the hostname
2. Enable password
3. Show the running configuration

4. Encrypt the password
5. Setting the message of the day using banner motd #

1. Change the hostname
Following are the commands you have to run on the switch to change the hostname of the switch.
Switch>enable Switch#config terminal
Switch(config)#hostname Admin_Switch Admin_Switch(config)#exit

Admin_Switch#copy running-config startup-config (This command is used to save the configuration, make sure to run this command before closing the CLI window)

2. Enable password
Admin_Switch>enable Admin_Switch#config terminal
Admin_Switch(config)#enable password myPassword1 Admin_Switch(config)#enable secret myPassword Admin_Switch(config)#exit
Admin_Switch#copy running-config startup-config

3. Show the running configuration
We can see the running configuration at any time which shows the overall configuration of your switch.
Admin_Switch#show running-config

4. Encrypt the password
All passwords configured on the switch, with the exception of the passwords configured with enable secret password, are stored in clear-text in the device configuration file. This means that all that attacker needs to do to find out the passwords is to run the show running- config command as shown below in the figure

To encrypt the enable password, we have to run the following command Admin_Switch#config terminal
Admin_Switch(config)# Admin_Switch(config)#service password-encryption Admin_Switch(config)#exit
Admin_Switch#copy running-config startup-config

After running the above command, the password become encrypted as shown below which can be seen by running show running-config:

5. Setting the message of the day using banner motd #
We use the banner command to set the message of the day (motd), which is displayed by the switches when we open their CLI for the switch configuration.
Following are the commands to set the motd:

Admin_Switch#config terminal Admin_Switch(config)# Admin_Switch(config)#banner motd #
This switch can only be used for the admin PCs #

(Note: You can write any message here followed by the #)

Admin_Switch(config)#exit
Admin_Switch#copy running-config startup-config

You can see this message when you go to the User EXEC mode by writing exit command twice as shown in the figure.

How to ensure whether one PC can send the packets to another PC:

We can ensure the packets send from one PC to another by using Ping command. For example if we want to see that the packets of Admin1 PC can send to the Student2 PC, we can open the command prompt of Admin1 PC by double-clicking on the PC icon, the window opens up from there we can open command prompt as shown in the figure below:

Now your task is to configure the other two switches in the same way and then answer the following questions.

Hint:
(? is your best friend in CLI to learn new commands. show ? will show all commands possible with show.)

Answer the following Questions.

Question 1: Ping Admin2 PC from Student2 PC and show the successful communication. (Snapshot required)

Question 2: Show completely running configuration of Student_Switch (snapshot Required)

Question 3: Show the motd of Student_Switch (snapshot Required) [Note: You have to write the following message: My name is (write your full name here) and I have completed the first networking lab myself]

Question 4: Write down exact commands to configure the password (enable password) of Student_Switch.

Question 5: Set the password (enable password) of the main switch as your full name (Put the snapshot of the running configuration showing your name in the password) and write down exact command (s) to encrypt the enable password of Main_Switch. Also paste the snapshot of the Main_Switch running configuration which shows that the enable password has encrypted. (Snapshot required)

Attachment:- Introduction to Packet Tracer.rar

Reference no: EM133189380

Questions Cloud

How much is the gain on bargain purchase : Tala Company purchased 35% interest in Kilometer Company for P5,600,000 on July 15, 2020. How much is the gain on bargain purchase
How much cash should janice contribute : Rachel, Monica and Phoebe are partners with capital balances of P896,000, P3,120,000 and P3,160,000. How much cash should Janice contribute
What is your point of view on st patricks day festival : What is your point of view on St Patricks Day festival, Key Takeaway from the festival
How much is the goodwill recognized by julius : The fair value of the identifiable net assets of Ella Co. was P8,800,000. How much is the goodwill recognized by Julius as a result of business combination
Building topologies in packet tracer : Building topologies in Packet Tracer and how to configure switches with the end devices such as PCs or Laptops
What the charged to business combination expenses : No goodwill was involved in the purchase. The business combination is between two (2) SMEs. What the charged to business combination expenses
What effective annual rate did investors earn : A firm issues 90 day bank accepted bills with a face value of $1,000,000 and receives $985900. What effective annual rate did investors earn
What was the nominal rate of return : Question - MNC Ltd shares generated a return at a real rate of 14.4% when the inflation rate was 1.69%. What was the Nominal Rate of Return
Explain three motivations handling intragroup transactions : Explain three motivations and three challenges in handling intragroup transactions in multinational companies

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd