Expt 4
Expt 4
Expt 4
AIM:
Task 4a) Use Netsim Interactive Simulation mode and apply the basic networking
commands such as ping, route print, acl
SOFTWARE USED:
Netsim v13.1 Academic version or higher.
This section will demonstrate how to perform Interactive simulation for a simple network scenario. Let
us consider Internetworks. To create a new scenario, go to New à Internetworks. Click & drop Wired
Nodes and Router onto the Simulation Environment and link them as shown below
Procedure
Step 1: A network scenario is designed in NetSim GUI comprising of 2 Wired Nodes and 3
Routers in the “Internetworks” Network Library.
Step 2: In the Network Layer properties of Wired Node 1, “ICMP Status” is set as TRUE.
Similarly, ICMP Status is set as TRUE for all the devices as shown Figure 2
Step 3: In the General properties of Wired Node 1, Wireshark Capture is set as Online.
Step 4: Right click on the Application Flow App1 CBR and select Properties or click on the
Application icon present in the top ribbon/toolbar.
A CBR Application is generated from Wired Node 1 i.e., Source to Wired Node 2 i.e.,
Destination with Packet Size remaining 1460Bytes and Inter Arrival Time 233.6μs. Transport
Protocol is set to UDP.
Additionally, the “Start Time(s)” parameter is set to 30, while configuring the application.
This time is usually set to be greater than the time taken for OSPF Convergence (i.e.,
Exchange of OSPF information between all the routers), and it increases as the size of the
network increases.
Step 5: Packet Trace is enabled in NetSim GUI. At the end of the simulation, a very large .csv
file is containing all the packet information is available for the users to perform packet level
analysis. Plots are enabled in NetSim GUI.
Step 6: Click on Run Simulation. Simulation Time is set to 300 Seconds and in the Runtime
Interaction tab Figure 3, Interactive Simulation is set to True
Figure 2: Run time Interaction tab set Interactive Simulation as True
You can even set the Simulation Time as 500 sec instead (It is recommended to specify a
longer simulation time to ensure that there is sufficient time for the user to execute the
various commands and see the effect of that before Simulation ends) and click OK.
Simulation (NetSimCore.exe) will start running and will display a message "waiting for first
client to connect" as shown below Figure.
After Simulation window opens, goto Network scenario and right clickon Router_3 or any other
node and select NetSim Console option as shown
Figure: Select NetSim Console option
Now client (NetSimCLI.exe) will start running and it will try to establish connection
with NetSimCore.exe. After connection is established, the window will look similar like
this shown below Figure
After this the command line interface can be used to execute the supported
commands
Simulation specific
Pause
PauseAt
Continue
Stop
Exit
Reconnect
Pause: To pause the currently running simulation
PauseAt: To pause the currently running simulation with respect to particular time (Ex: To
Pause simulation at 70.2 sec use command as PauseAt 70.2)
Ping Command#
The ping command is one of the most often used networking utilities for
troubleshooting network problems.
You can use the ping command to test the availability of a networking device (usually
a computer) on a network.
When you ping a device, you send that device a short message, which it then sends
back (the echo)
If you receive a reply then the device is in Network, if you don't then the device is
faulty, disconnected, switched off, incorrectly configured.
You can use the ping cmd with an IP address or Device name.
ICMP_Status should be set as True in all nodes (Wired_Node and Router)
Open Wireshark and apply filter ICMP. We can see the ping request and reply packets
in Wireshark.
Paste the screenshot of the Wireshark layer wise and trace the ICMP control
packets
Route Commands
route print
route delete
route add
In order to view the entire contents of the IP routing table, use following commands route
print.
ACL Configuration
Routers provide basic traffic filtering capabilities, such as blocking Internet traffic, with access control
lists (ACLs). An ACL is a sequential list of permit or deny statements that apply to addresses or upper-
layer protocols. These lists tell the router what types of packets to: permit or deny. When using an
access-list to filter traffic, a permit statement is used to "allow" traffic, while a deny statement is used
to "block" traffic.
ACL Commands
Before using ACL's, we must first verify that acl option enabled.
To disable ACL use command: acl disable (use this command > after exit from acl
configuration)
[PERMIT, DENY] [INBOUND, OUTBOUND, BOTH] PROTO SRC DEST SPORT DPORT
IFID
NetSim>acl enable
ACL is enable
NetSim>aclconfig
ROUTER_3/ACLCONFIG>acl print
OK!
ROUTER_3/ACLCONFIG\>print
ROUTER_3/ACLCONFIG\>exit
NetSim>acl disable
ACL is disable
NetSim>
Results
The impact of ACL rule applied over the simulation traffic can be observed in the
IP_Metrics_Table in the simulation results window, In Router_3 number of packets
blocked by firewall can be seen in the table.
[Note: Results will vary based on time of ACL command are executed]. Paste
the screenshot of the IP_Metrics_Table
The impact of ACL rule applied over the simulation traffic can be observed in the
Application throughput plot. Throughput graph will show a drop after ACL is set. If ACL
is disabled after a while, application packets will start flowing across the router. The
Application throughput plot will show a drop and increase in throughput after setting
ACL and disabling ACL respectively.
When did you see the drop in throughput in the graph, since router blocks UDP
packets in the plot?.
What time you see the increase in throughput when router permitted packets ?
Aim:
Theory:
Linux is the oft-ignored third wheel to Windows and Mac. Yes, over the past decade, the
open source operating system has gained a lot of traction, but it’s still a far cry from being
considered popular. Yet though that may be true, Linux still earns new converts every day. It can be
a traumatic experience having to go from a GUI-based operating system like Windows or Mac to one
that requires command line fiddling. But if you can get over that initial hump of difficulty, you may
find that Linux is surprisingly robust.
Linux has origins in the command line, and there can be many times when you will not be
running a GUI. On some systems, such as a dedicated server, you may not have a GUI installed at all.
Linux provides you with many command line tools to manipulate files.
COMMANDS
1) pwd:
2) ls:
3) man:
4) mkdir:
5) cd:
6) cd ..
7) cd ~:
8) cat :
9) gedit <filename>:
Result:
Thus a few basic linux commands are studied and practiced successfully.