Packet Tracer Peer-to-Peer Simulation (PTP2PS)


PTP2PS:   SOLD       




Objective:

  • So that students can get to know more about the parts and functions of the menu in Packet Tracer,
  • So that students can use Packet Tracer to simulate Peer-to-Peer networks.

Substance:

  1. Understanding Computer Networks
  2. Various types of computer network access such as: Host Terminal, Client Server, Peer to Peer.
  3. IP Addressing Concept
  4. IP Address Class Division Table
  5. Private IP grouping
  6. IP Class Network Mask Table
  7. Getting to Know Packet Tracer
  8. Analysis & Experimental Results
  9. Review and Conclusion

1. Understanding Computer Networks

A computer network is an interconnection (interconnection) between one group of computers and another group of computers using a communication network, so that they can access data and exchange data without having to carry external storage media.

2. Types of Computer Network Access

Terminal Host

There are one or more servers connected in one dumb terminal. Dumb terminal is a monitor connected with RS232 cable or also called display terminal, therefore a server must have high data processing capability and large data storage.

Client Server

There are one or more servers connected to several clients. The server is tasked with providing services such as files, peripherals, databases, etc., while the Client is the terminal that uses the service. The Client Terminal performs data processing on its own terminal, which is why the server in this process does not have to have high performance or large capacity.

Peer to Peer

There are several computer terminals connected by cable media. The principle is that each computer can function as a server or client and both can be used at the same time.

3. IP Addressing Concept

Fastnetgama (2013) explains in the computer network module that IP (Internet Protocol) is a protocol that is responsible for sending packets to the correct address. Delivery characteristics:

  • Unreliable, that is, there is no packet error checking,
  • Connectionless, that is, it does not require a handshake process, and
  • Datagram Delivery Service, which means there is no packet sorting process.

Internet protocol uses IP-address as an identity. Data delivery will be wrapped in a data packet with a label in the form of the sender's IP-address and the recipient's IP-address, when the recipient checks the delivery package is correct, then the datagram will be taken and channeled to TCP or UDP via the port, where the application has been waiting for it.

IP address consists of 2 parts:

  • Network address or network identity, and
  • Host address or computer identity

Writing an IP address is divided into 4 numbers, each of which has a maximum value of 255 (or 8bits or 28 which is the definition of the maximum value of an IP address).

IP Address Class Division Table

| Kelas | Nomor        | Jumlah Jaringan | Jumlah Host per-Jaringan |
|-------|--------------|-----------------|--------------------------|
| A     | 1 s.d. 126   | 126             | 16.777.214               |
| B     | 128 s.d. 191 | 16.384          | 65.534                   |
| C     | 192 s.d. 223 | 2.097.152       | 254                      |

The legal assignment of IP addresses will be given by the NIC (Network Interface Card), generally through the ISP (Internet Service Provider). In addition to the numbering, it has been agreed to assign numbers to a local network (LAN). IANA (Internet Assigned Numbers Authority) groups several IP address blocks that are stated as "private", meaning they are used only for their own circles and are not valid on the internet.

The grouping of private IPs is as follows,

  • Class A : 10.0.0.0 to 10.255.255.255
  • Class B: 172.16.0.0 to 172.31.255.255
  • Class C: 192.168.0.0 to 192.168.255.255

Note: The network address 172.0.0.1 cannot be used because it is used as a "loopback" address, which is an IP address for yourself.

IP-address also has a broadcast address, which is an address defined in TCP/IP that can be sent to all networks on the internet as an introduction effort (broadcasting). The goal is to provide information to the network, that there is a certain service and also to search for information into the network. The broadcast address is marked by writing 255 on the host-id, so the broadcast is.

  • Class A : xxx.255.255.255
  • Class B : xxx.xxx.255.255
  • Class C : xxx.xxx.xxx.255

IP-address recognizes a netmask address, because every TCP/IP network requires a subnet value known as a netmask or address-netmask. Netmask is needed by TCP/IP to determine whether the network in question is a local or non-local network. For packets sent to a non-local network, it means that the packet must be forwarded to the destination network through the network layer, namely the router, so it can be concluded that netmask is needed to filter IP-addresses and data packets that enter and exit the network.

IP Class Network Mask Table

| Kelas | Network Mask (Netmask) |
|-------|------------------------|
| A     | 255.0.0.0              |
| B     | 255.255.0.0            |
| C     | 255.255.255.0          |

7. Getting to know Packet Tracer

Packet Tracer is a Cisco network equipment simulator that is often used as a learning medium, training and research in the field of computer networks. This program is made by Cisco Systems and is provided free of charge to faculty, students and alumni who have participated in the Cisco Networking Academy.

8. Analysis & Experimental Results


Simulation of the installation of 2 different computer networks using Packet Tracer and testing the interconnection of both.

DOWNLOAD TOPOLOGY SIMULATION.pkt

Experimental Procedure

  • Download and install the Packet Tracer application;
  • Windows :  http://www.packettracernetwork.com/
  • Linux : <ftp://rpmfind.net/linux/opensuse/update/12.2/i586/libopenssl1_0_0-1.0.1e-2.8.1.i586.rpm>

Demo and Analysis

https://youtu.be/jg6XQ6Xs3k4

Experimental Results

  1. When sending data packets from PC0 to PC1, PC2, or PC3, and vice versa, the result is Successful.
  2. When sending data packets from PC1 to PC2 or PC3, and vice versa, the result is Successful.
  3. When sending a data packet from PC2 to PC3, and vice versa, the result is Successful,
  4. When sending data packets from PC4 to PC5, PC6, or PC7, and vice versa, the result is Successful.
  5. When sending data packets from PC5 to PC6 or PC7, and vice versa, the result is Successful.
  6. When sending a data packet from PC6 to PC7, and vice versa, the result is Successful, and
  7. When sending data packets from each PC on the FastEthernet 0 network to each PC on the FastEthernet 1 network, the result is Successful.

9. Review and Conclusion

Review

In the experimental results above, points 1, 2, and 3 prove that the interconnection on network A (FastEthernet 0) works well. Meanwhile, points 4, 5, and 6 also prove that the interconnection on a different network, let's say network B (FastEthernet 1) works well. This can happen as long as the gateway address is still in the same IP class as the NetID.

Not only that, point 7 proves that the interconnection of PCs between different networks also works well, this can be done by using a Router as a connecting media then configuring the IP address on the router with the default gateway address on each PC on each network. In cases like this (connecting two different networks) then, the gateway address on each network must not only be the same as its NetID IP class, but also the same numbering.

Conclusion:

  • By default, devices such as Switches and Hubs can share networks between PCs on condition that the gateway address must be in the same IP class as the NetID.
  • Devices such as routers can be used to divide several different networks, although they are basically protocol splitters.

Bibliography

DOWNLOAD REPORT

Q1:

  1. DANNY RIFALDY Apr 30, 2015, 02:16:00 = switch to repeater is not connected yet, boss.. how do you do it? more complete tutorial, boss
  2. SISKA RIANTINI Jul 27, 2017, 14:28:00 = Good afternoon Mr. Wawan, I'm Siska, if I want to do a VoLTE interconnection simulation. What should I use? Can I use Packet tracer? Because there are codec settings. Thanks. Can I have your Whatsapp number for further discussion? I'm working on a thesis about IP interconnection using VoLTE. Please help.. T_T

A1:

For the case study above there are no settings for repeaters, switches, hubs and bridges, so indirectly these devices are in the Default settings. I think the tutorial above is very complete, because everything is available, both material, practice (video) and results (download) .. please combine all the features above to help the learning process, bro, download the simulation.pkt (that is the finished topology that I made in packet tracer, according to the video above, so you can run it directly ... then if you want to learn by yourself, you can use the simulation as a comparison or reference .. That's it, bro Danny Rifaldy, thank you for the discussion


Post a Comment

Previous Next

نموذج الاتصال