12.1 9 Packet Tracer – Identify Packet Flow
When you open Cisco Packet Tracer and load the “12.Now, 1 9” activity, you are presented with a small‑to‑medium sized network that contains routers, switches, PCs, and a server. The goal of the exercise is to trace the path a packet takes from a source host to a destination host and to understand how each device processes the frame or packet Most people skip this — try not to..
Below is a step‑by‑step guide that will help you identify the packet flow in this scenario, explain the underlying protocols, and give you a solid foundation for more advanced troubleshooting tasks.
1. Overview of the Topology
| Device | Interface | IP Address | Subnet Mask | Default Gateway |
|---|---|---|---|---|
| PC0 | NIC | 192.0 | – | |
| Switch0 | – | – | – | – |
| Server0 | NIC | 10.Also, 2. 16.255.168.That said, 255. That's why 0 | – | |
| Router0 | Fa0/1 | 192. 1 | ||
| PC1 | NIC | 192.168.That said, 255. Plus, 1. 255.1 | 255.0.2.168.0 | – |
| Router1 | Fa0/1 | 172.20 | 255.1 | 255.255.0.255.0.Worth adding: 0 |
| Router1 | Fa0/0 | 10. 5 | 255.10 | 255.In practice, 255. 0 |
| Router0 | Fa0/0 | 192. But 168. 255.2.0.1 | 255.255. |
Honestly, this part trips people up more than it should.
The network is divided into three sub‑nets:
- 192.168.1.0/24 – PC0 and Router0’s Fa0/0.
- 192.168.2.0/24 – PC1 and Router0’s Fa0/1.
- 10.0.0.0/24 – Server0 and Router1’s Fa0/0.
Router1 also has a connection to a 172.Also, 16. 0.0/24 segment (used for future expansion) Easy to understand, harder to ignore..
Understanding this layout is the first step to visualising the packet’s journey.
2. Enabling Simulation Mode
- Click the “Simulation” tab at the bottom of the Packet Tracer window.
- In the “Simulation Panel” set the “Capture/Forward” mode to “Auto‑Capture”.
- Choose a protocol filter – for this exercise select “ICMP” because we will ping from PC0 to Server0.
Simulation mode lets you see each PDU (Protocol Data Unit) as it moves from one device to the next.
3. Generating a Test Packet
- On PC0, open the Command Prompt (click the device → Desktop → Command Prompt).
- Type
ping 10.0.0.5and press Enter.
The ping request creates an ICMP Echo Request packet that will travel through the network Most people skip this — try not to. But it adds up..
4. Tracing the Packet Flow
4.1. From PC0 to Switch0
- Layer 2: PC0 builds an Ethernet frame with:
- Source MAC: PC0’s NIC MAC address.
- Destination MAC: MAC of the default gateway (Router0’s Fa0/0).
- The frame is sent to Switch0, which learns the MAC address of PC0 on port 1 and forwards the frame out the port that leads to Router0.
4.2. Router0 – Inter‑VLAN Routing
- Router0 receives the frame on Fa0/0.
- It de‑encapsulates the Ethernet header, inspects the IP header, and sees the destination IP 10.0.0.5.
- The routing table shows that the 10.0.0.0/24 network is reachable via Fa0/1 (next‑hop 192.168.2.1).
- Router0 re‑encapsulates the packet into a new Ethernet frame with:
- Source MAC: Router0’s Fa0/1 MAC.
- Destination MAC: MAC of the next‑hop (Router1’s Fa0/0).
4.3. Switch1 (if present) and Router1
- The frame reaches Router1 on its Fa0/0 interface.
- Router1 strips the Ethernet header, checks the IP destination, and because 10.0.0.5 belongs to its directly connected 10.0.0.0/24 network, it forwards the packet out Fa0/1 (or the appropriate interface that connects to Server0).
- A new Ethernet frame is built with the destination MAC of Server0’s NIC.
4.4. Arrival at Server0
- Server0 receives the frame, extracts the ICMP Echo Request, and generates an ICMP Echo Reply.
- The reply follows the reverse path: Server0 → Router1 → Router0 → Switch0 → PC0.
5. Observing the PDUs in the Simulation Panel
While the simulation runs, the PDU list on the right side shows each packet with:
- Time – when the PDU was generated.
- Source/Destination IP – the logical addresses.
- Source/Destination MAC – the data‑link addresses for that hop.
- Protocol – ICMP, ARP, etc.
Click on any entry to see a detailed breakdown of the headers (e., TTL, Flags, Options). Practically speaking, g. This is a great way to verify that each device is correctly rewriting the MAC addresses while preserving the original IP information.
6. Key Concepts Illustrated
| Concept | How It Appears in the Lab |
|---|---|
| ARP | When PC0 first pings Server0, an ARP request is broadcast to resolve the MAC of Router0’s Fa0/0. |
| Routing Table Lookup | Router0 and Router1 examine their routing tables to determine the outgoing interface. |
| Encapsulation/De‑encapsulation | Each hop strips the previous Layer 2 header and adds a new one appropriate for the |
4.4. Encapsulation/De-encapsulation (Continued)
- Router1 receives the frame on Fa0/0, de-encapsulates the Ethernet header, and inspects the IP header. Since 10.0.0.5 is on its directly connected network (10.0.0.0/24), it forwards the packet directly to Server0 via Fa0/1.
- Server0 receives the frame, processes the ICMP Echo Request, and sends an ICMP Echo Reply back. This reply is encapsulated in a new Ethernet frame with Server0’s MAC as the source and Router1’s Fa0/1 MAC as the destination.
- The reply travels back through Router1 → Router0 → Switch0 → PC0, with each device re-encapsulating the packet at each hop, ensuring the MAC addresses are updated for the next link while preserving the IP address.
7. Conclusion
This lab demonstrates the fundamental processes of inter-VLAN routing and packet encapsulation/de-encapsulation in a network. By simulating the journey of an ICMP Echo Request from PC0 to Server0, it highlights how Layer 2 devices (switches) handle MAC address forwarding and how Layer 3 devices (routers) manage IP routing. Key takeaways include:
- ARP is critical for resolving MAC addresses of routers or default gateways when IP addresses are known but MAC addresses are not.
- Routing tables enable routers to make informed decisions about the next hop for a given destination IP.
- Encapsulation allows packets to traverse multiple networks by wrapping IP headers in Ethernet frames designed for each link.
- The simulation panel’s PDU list provides a practical tool to visualize and verify the transformation of headers at each hop, reinforcing the separation of concerns between Layer 2 and Layer 3.
Understanding these concepts is essential for designing and troubleshooting networks, as they form the backbone of how data moves across interconnected devices. This lab not only clarifies the theoretical aspects of routing but also offers hands-on insight into the real-world behavior of network traffic.
4.5. Troubleshooting and Validation
Once the simulation is complete, it’s crucial to validate that the packet has successfully traversed the entire network. Consider this: the simulation panel can be used to check the PDU list and confirm that each step of encapsulation and de-encapsulation occurred as expected. To give you an idea, the ICMP Echo Request should be seen encapsulated in an Ethernet frame at every hop, with the appropriate headers added or removed.
Additionally, verifying the routing tables on Router0 and Router1 ensures that the correct paths have been established for the destination IP addresses. Misconfigurations, such as incorrect gateway settings or missing static routes, could lead to packets being dropped or sent to the wrong interface, causing connectivity issues.
8. Conclusion
This lab provided a comprehensive exploration of network routing and packet traversal through a simulated network environment. Consider this: by focusing on the encapsulation and de-encapsulation process, students gained a deeper understanding of how data packets figure out from one device to another across multiple network layers. The use of the simulation panel and PDU list offered a tangible way to observe and confirm these processes, bridging the gap between theory and practice Most people skip this — try not to..
Such hands-on experience is invaluable for building confidence in network design and troubleshooting, as it equips learners with the tools to diagnose and resolve issues in real-world scenarios. This lab not only solidified key concepts like ARP, routing tables, and encapsulation but also emphasized the importance of attention to detail in network configuration. As networks grow in complexity, the ability to visualize and verify data flow becomes increasingly critical, making this lab an essential component of any networking curriculum.