Survey on Packet Tracer Simulation Challenges

Verified

Added on  2021/04/21

|21
|2613
|32
AI Summary
This assignment is based on a research study that explores the challenges faced by lecturers in using packet tracer simulation in computer networking courses. The study aims to identify the difficulties and issues encountered by educators when teaching network concepts using this simulation tool. The survey results can provide valuable insights for educators, researchers, and policymakers who are interested in improving teaching methods and technologies in computer science education.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: THEORY AND SIMULATION EXERCISES
Assessment Item 2
Theory and Simulation Exercises
Name of the Student
Name of the University
Author’s Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
THEORY AND SIMULATION EXERCISES
Table of Contents
PART A...............................................................................................................................2
Answer to Question 1:.....................................................................................................2
Answer to Question 2:.....................................................................................................2
Answer to Question 3:.....................................................................................................4
Answer to Question 4:.....................................................................................................6
PART B...............................................................................................................................8
Answer to Question 5:.....................................................................................................8
Answer to Question 6:.....................................................................................................9
Answer to Question 7:...................................................................................................13
Answer to Question 8:...................................................................................................15
Bibliography......................................................................................................................18
Document Page
2
THEORY AND SIMULATION EXERCISES
PART A
Answer to Question 1:
A. Broadcast IP address – It is the IP address using which all the hosts are connected in
the network and it helps the network administrator to verify the successful transmission of the
data packets in the network (Shah et al. 2015). The DHCP and the bootstrap protocol are uses the
broadcast address for locating and transmitting the request from different servers.
B. Default Gateway – It is utilized as an access point and that is used by the computers
connected in the network to send data packets to the computer connected in another network.
We need the default gateway because without a default gateway the device in the network
cannot communicate with the device outside the network and it remains isolated.
C. A subnet mask is a number that is used for defining a range of IP address that can be
applied in a network. The subnet mask is used for breaking an address block into smaller subnet
and restricting the connection between the two subnets (Walker et al. 2016). The traffic in a
network can be limited suing the subnet because the network is partitioned.
D. As an example of the broadcasting uses on the TCP/IP is ARP on IP. It is used for
updating the routing tables with the IP address and its corresponding Mac address.
Answer to Question 2:
Defaults gateway
10.10.30.1
Document Page
3
THEORY AND SIMULATION EXERCISES

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
THEORY AND SIMULATION EXERCISES
The arp command is used for the displaying and modification of the ARP cache. The
ARP cache is used for maintaining a mapping of the IP address and the MAC address for
reducing the lookup time in the network. The arp –a command is used for fetching the details of
the arp cache without the IP address.
b. The ARP stands for Address Resolution Protocol.
c. We need the ARP for translating the host address (IP address) to the MAC address and
storing the details of the host and the IP address in a tabular form (Coleman et al. 2015). It maps
the IP address to the physical address of the device.
Answer to Question 3:
IPv4 Routing Table
Document Page
5
THEORY AND SIMULATION EXERCISES
The IPv4 table have the columns network destination, Netmask, gateway, interface and
the metrics. The network destination and the netmask is used for the getting the details of the
network ID. 10.10.30.146. The gateway address defines the next hop address i.e. the address that
is used for the reaching the network address. The interface is used for the demonstration of the
available interface that is used for reaching the local network address 10.10.30.146. Here the
gateway address 10.10.30.1 is used for reaching the interface 10.10.30.146. The metric column is
used for demonstration of the cost of the route and can be analyzed for identification of the best
route from different points in the network.
Document Page
6
THEORY AND SIMULATION EXERCISES
IPv6 Routing Table
The IPv6 routing table is used for maintaining the records of the IPv6 table and the prefix
of the network is matched when a packet is received from the destination. The on-link column is
used for demonstration of the devices that are directly connected in the network and its
corresponding IPv6 address.
Answer to Question 4:
For recovering the password of the cisco 2960 model the switch is required to be
connected with the PC using the console port using the terminal emulation software. The line
speed is set to 9600 baud on the emulation software and the switch should be restarted by
pressing the mode button for interrupting the flash file system. The flash system file should be
initialized using the flash_init and for loading the help file the load_helper command is used. The
contents of the flash directory should be displayed using the dir flash command and it should be
renamed using the config.text.old. the definition of the password remains in this file. The syetem

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
THEORY AND SIMULATION EXERCISES
required to be booted up and when the prompt screen appears N should be selected and the
privilege EXE mode should be entered using the enable command. The configuration file should
be renamed to its original name using the command “rename flash: config.text.old and flash:
config.text”. the configuration file should be copied into the memory and using the command
“Switch# copy flash:config.text system:running-config”
Source filename [config.text]?
Destination filename [running-config]?”
The password now can be changed by entering into the global config mode.
The commands used for cleaning the old configuration of the switch and resetting it to
the factory default settings is as follows:
Step 1:
The switch should be connected with a Pc using a console cable and the boot process
should be interrupted by pressing the mode button
Step 2:
The flash system file should be initialized using the flash_init command
Step 3:
The config.text file should be deleted from the flash directory
Step 4:
If there are VLAN configuration it should be deleted by deleting the vlan.dat file present
in the flash directory.
Document Page
8
THEORY AND SIMULATION EXERCISES
Step 5:
On rebooting the switch the switch is set to its factory default condition and the old
configurations gets deleted.
PART B
Answer to Question 5:
Major Network: 12.97.0.0/16
Available IP addresses in major network: 65534
Number of IP addresses needed: 6126
Available IP addresses in allocated subnets: 6138
About 9% of available major network address space is used
About 100% of subnetted network address space is used
Route
r Interfaces
IP
Address
(Highest)
IP
Address (Lowest)
Subnet
Mask
Default
Gateway
HQ 12.97.8.
1
12.97.15.2
54
255.255.248
.0
12.97.8.
1
Branc
h 1
12.97.0.
1
12.97.7.25
4
255.255.248
.0
12.97.0.
1
Document Page
9
THEORY AND SIMULATION EXERCISES
Branc
h 2
12.97.16
.1
12.97.23.2
54
255.255.248
.0
12.97.16
.1
S
ubnet
Name
N
eeded
Size
A
llocated
Size
A
ddress
M
ask
Dec
Mask
As
signable
Range
Bro
adcast
H
Q
2
042
2
046
12
.97.8.0
/
21
255.
255.248.0
12.
97.8.1 -
12.97.15.2
54
12.
97.15.255
B
ranch 1
2
042
2
046
12
.97.0.0
/
21
255.
255.248.0
12.
97.0.1 -
12.97.7.25
4
12.
97.7.255
B
ranch 2
2
042
2
046
12
.97.16.0
/
21
255.
255.248.0
12.
97.16.1 -
12.97.23.2
54
12.
97.23.255
Answer to Question 6:
Router Configuration

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
THEORY AND SIMULATION EXERCISES
Router 0
Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Branch1
Branch1(config)#
Branch1(config)#enable secret class
Branch1(config)#interface FastEthernet0/0
Branch1(config-if)#ip address 12.97.0.1 255.0.0.0
Branch1(config-if)#ip address 12.97.0.1 255.255.255.252
Branch1(config-if)#no shutdown
Branch1(config)#interface Serial0/3/0
Branch1(config-if)#ip address 12.97.0.10 255.255.255.252
Branch1(config-if)#no shutdown
Branch1(config)#ip route 12.97.8.0 255.255.255.0 12.97.17.2
Branch1(config)#ip route 12.97.16.0 255.255.255.0 12.97.18.2
Branch1(config)#ip route 12.97.18.0 255.255.255.0 12.97.17.2
Document Page
11
THEORY AND SIMULATION EXERCISES
Branch1(config)#
Router 1
Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname HQ
HQ(config)#
HQ(config)#enable secret class
HQ(config)#interface FastEthernet0/0
HQ(config-if)#ip address 12.97.8.1 255.255.255.252
HQ(config-if)#
HQ(config-if)#exit
HQ(config)#interface Serial0/3/0
HQ(config-if)#ip address 12.97.8.10 255.255.255.252
HQ(config-if)#
HQ(config-if)#exit
HQ(config)#interface Serial0/3/1
Document Page
12
THEORY AND SIMULATION EXERCISES
HQ(config-if)#ip address 12.97.8.30 255.255.255.252
HQ(config-if)#
HQ(config)#line vty 0 15
HQ(config-line)#password cisco
HQ(config-line)#login
HQ(config-line)#exit
HQ(config)#banner motd ^
Enter TEXT message. End with the character '^'.
Enter Password for secure login
^
HQ(config)#ip route 12.97.0.0 255.255.255.0 12.97.17.1
Branch2(config)#ip route 12.97.0.0 255.255.255.0 12.97.17.1
Branch2(config)#ip route 12.97.8.0 255.255.255.0 12.97.18.1
Router 2
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Branch2

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
THEORY AND SIMULATION EXERCISES
Branch2(config)#
Branch2(config)#enable secret class
Branch2(config)#interface FastEthernet0/0
Branch2(config-if)#ip address 12.97.16.1 255.0.0.0
Branch2(config-if)#ip address 12.97.16.1 255.255.255.252
Branch2(config-if)#no shutdown
Branch2(config)#interface Serial0/3/0
Branch2(config-if)#ip address 12.97.16.10 255.255.255.252
Branch2(config-if)#no shutdown
Branch2(config)#ip route 12.97.0.0 255.255.255.0 12.97.17.1
Branch2(config)#ip route 12.97.8.0 255.255.255.0 12.97.18.1
Branch2(config)#ip route 12.97.17.0 255.255.255.0 12.97.18.1
For configuring the
Answer to Question 7:
For configuring the router to enable them to communicate with the remote interface of
the Branch router IP route command is used. The IP route enables the PC connected to the
interface off the device to communicate with the PC connected with the interface of the remote
router. The screenshot of the Show IP route command is given below for finding the route of the
network used for communication by the Pc.
Document Page
14
THEORY AND SIMULATION EXERCISES
Document Page
15
THEORY AND SIMULATION EXERCISES
Answer to Question 8:
Pinging PC connected with Branch 2 with the Pc connected in Branch 1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
THEORY AND SIMULATION EXERCISES
Pinging PC connected with Branch 1 with the Pc connected in Branch 2
The ICMP protocol is used for pinging an IP address. It verifies that the IP address exists
and it is able to accept request from the other hosts and network devices connected in the
network. It can also be applied for testing the connectivity of the network devices and finding the
response time for identification of the drop in the network.
Document Page
17
THEORY AND SIMULATION EXERCISES
Document Page
18
THEORY AND SIMULATION EXERCISES
Bibliography
Archana, C., 2015. Analysis of RIPv2, OSPF, EIGRP Configuration on router Using CISCO
Packet tracer. International Journal of Engineering Science and Innovative Technology (IJESIT)
Volume, 4.
Bruschi, D., Di Pasquale, A., Ghilardi, S., Lanzi, A. and Pagani, E., 2017, September. Formal
Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking-A
Case Study. In International Conference on Integrated Formal Methods (pp. 391-406). Springer,
Cham.
Bruschi, D., Di Pasquale, A., Ghilardi, S., Lanzi, A. and Pagani, E., 2017, September. Formal
Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking-A
Case Study. In International Conference on Integrated Formal Methods (pp. 391-406). Springer,
Cham.
Cohen, P.R., Kaiser, E.C., Buchanan, M.C., Lind, S., Corrigan, M.J. and Wesson, R.M., 2015.
Sketch-Thru-Plan: a multimodal interface for command and control. Communications of the
ACM, 58(4), pp.56-65.
Coleman, E.A., Roman, S.P., Hall, K.A. and Min, S.J., 2015. Enhancing the care transitions
intervention protocol to better address the needs of family caregivers. Journal for Healthcare
Quality, 37(1), pp.2-11.
Elias, M.S. and Ali, A.Z.M., 2014. Survey on the challenges faced by the lecturers in using
packet tracer simulation in computer networking course. Procedia-Social and Behavioral
Sciences, 131, pp.11-15.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
THEORY AND SIMULATION EXERCISES
Elias, M.S. and Ali, A.Z.M., 2016. Usability and User Satisfaction of Multimedia Instructional
Message (MIM) for Packet Tracer Simulation. Journal of Educational Multimedia and
Hypermedia, 25(2), pp.143-160.
Ghanwani, A., Dunbar, L., McBride, M., Bannai, V. and Krishnan, R., 2018. A Framework for
Multicast in Network Virtualization over Layer 3 (No. RFC 8293).
Javid, S.R., 2014. Role of Packet Tracer in learning Computer Networks. International Journal
of Advanced Research in Computer and Communication Engineering, 3(5), pp.6508-6511.
Kotzanikolaou, P., Chatzisofroniou, G. and Burmester, M., 2017. Broadcast anonymous routing
(BAR): scalable real-time anonymous communication. International Journal of Information
Security, 16(3), pp.313-326.
Network, C.G.A., 2015. Network. CGA Comprehensive molecular characteriza.
Prasad, N.H., Reddy, B.K., Amarnath, B. and Puthanial, M., 2016. Intervlan Routing and
Various Configurations on Vlan in a Network using Cisco Packet Tracer. International Journal
for Innovative Research in Science and Technology, 2(11), pp.749-758.
Schmitz Weiss, A., 2018. Location-based news in mobile news apps: Broadcast leads in
geolocated news content, newspapers lag behind. Newspaper Research Journal,
p.0739532918765469.
Shah, H., Rosen, E., Le Faucheur, F. and Heron, G., 2015. IP-Only LAN Service (IPLS) (No.
RFC 7436).
Teare, D., Vachon, B. and Graziani, R., 2014. Implementing Cisco IP routing (ROUTE)
foundation learning guide:(CCNP ROUTE 300-101). Cisco Press.
Document Page
20
THEORY AND SIMULATION EXERCISES
Teare, D., Vachon, B., Graziani, R., Froom, R., Frahim, E. and Ranjbar, A., 2015. CCNP
Routing and Switching Foundation Learning Guide Library:(ROUTE 300-101, SWITCH 300-
115, TSHOOT 300-135). Cisco Press.
Totani, Y., Kobayashi, K., Utsu, K. and Ishii, H., 2016. An efficient broadcast-based information
transfer method based on location data over MANET. The Journal of Supercomputing, 72(4),
pp.1422-1430.
Vijayalakshmi, M., Desai, P. and Raikar, M.M., 2016, December. Packet Tracer Simulation Tool
as Pedagogy to Enhance Learning of Computer Network Concepts. In MOOCs, Innovation and
Technology in Education (MITE), 2016 IEEE 4th International Conference on (pp. 71-76).
IEEE.
Walker, G.K., Stockhammer, T., Mandyam, G., Wang, Y.K. and Lo, C., 2016. ROUTE/DASH
IP streaming-based system for delivery of broadcast, broadband, and hybrid services. IEEE
Transactions on Broadcasting, 62(1), pp.328-337.
Yang, J.P., 2015. Web-Based Enterprise Management-Address Resolution Protocol: An Efficient
Scheme for Preventing Address Resolution Protocol Spoofing. Advanced Science, Engineering
and Medicine, 7(11), pp.1003-1006.
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]