Documente Academic
Documente Profesional
Documente Cultură
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
Submitted By:
Jasmeet Singh
University Roll No.: 1154461
ACKNOWLEDGEMENT
The satisfaction that accompanies that the successful completion of any task would be
incomplete without the mention of people whose ceaseless cooperation made it possible,
whose constant guidance and encouragement crown all efforts with success.
I am grateful to my project guide Mr Ashish Dutt Sharma for the guidance, inspiration
and constructive suggestions that helpful us in the preparation of this project.
I own my regards to the entire faculty of the department of computer science at Shaheed
Udham Singh College of Engineering and Technology Tangori, Mohali from where I
have learnt the basics of Computer Science and whose informal discussions and able
guidance was a become light for me in the entire duration of this work.
I also thank my colleagues who have helped in successful completion of the project.
Finally, I express my indebtedness to all who have directly or indirectly contributed to
the successful completion of my project.
Jasmeet Singh
AIM
To use less number of IP addresses in order to reduce the complexity of any network.
SOFTWARE REQUIREMENTS
To complete the work on Lan and Wan configuration, I need a help from some software
requirements. Software requirements are as follow:
Cisco Packet Tracer:
Server is the operating system used for domain network. In the domain model network, server
mainly provides the resources to the clients, and applies the security to the clients
Windows 7:
It is an operating system. It is an interface unit between the user and hardware device.
Microsoft Office:
SWITCHES:
CABLES:
Clients/Nodes:
Pentium 4 or up
Windows XP Professional
512 MB RAM
80 GB Hard Disk
METHODOLOGY USED
The project is based on the concepts of networking. It includes configuring different network
devices such as Router, Switch connecting it with PCs by using different types of connecting
wires by allocating the IP Addresses to all the interfaces after the sub-netting of network id. The
beauty of configuring network devices is that it helps users access the network with few
constraints like allowing some to access the website but not allowing them to access the mail
server on the internet on private IP address which are otherwise excluded by internet service
provider (ISP).
IP Address:
IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts
one is network address and second is host address. in local area network, we can used private IP
address, which is provided by IANA (Internet Assigning Numbering Authority). When IP was
first standardized, the specification required that each system attached to an IP-based internet be
assigned a unique, 32-bitninternet address value. Systems that have interface to more than one
network require a unique IP address for each network interface. The first part of an internet
address identifies the network on which the host resides, while the second part identifies the
particular host on the given network. IP addresses are divided into five classes.
Class Range
Subnet mask
1 126
24
255.0.0.0
128 191
16
16
255.255.0.0
192 223
24
255.255.255.0
224 239
240 255
Total IP
Valid IP
16777216 16777214
65536
256
65534
254
We can use first three classes. IANA provides private IP addresses from first three classes.
Subnet Mask:
Subnet mask is also 32-bit address, which tells us how many bits are used for network and how
many bits are used for host address.
In Subnet mask Network bits are always 1 and Host bits are always 0.
When we are going to assign IP addresses to our computers then we have to follow some rules.
Rules: (1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved
for router.
(2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network
(10th network).
(3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default
routing is used in case of Stub n/w (means our network has one exit point).
(4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting.
(5) 127.0.0.1 - This is Loopback address, which is used for self-communication or
troubleshooting purpose.
C:\>ipconfig
C:\>ipconfig/all
It shows all detail.
Private IP Addresses:
Early network design, when global end to end connectivity was envisioned for all internet hosts,
intended that IP addresses be uniquely assigned to a particular computer or device. However, it
was found that it was not always necessary as private networks developed and address space
needed to be conserved (IPv4 address exhaustion).
Computer not connected to the internet, such as factory machines that communicate only with
each other via TCP/IP, need not have globally unique IP addresses. Three ranges of IPv4
addresses for private networks, one range for each class (A, B, C) are reserved. These addresses
are not routed on the Internet, and thus their use need not be coordinated with an IP address
registry.
Today, such private networks typically connect to the internet through Network Address
Translation (NAT).
Private IP addresses are another solution to the problem of the impending exhaustion of public IP
addresses. As mentioned, public networks require hosts to have unique IP addresses.
However, private networks that are not connected to the Internet may use any host addresses, as
long as each host within the private network is unique.
Class
Private IP Range
10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255
192.168.0.0 192.168.255.255
PROJECT
(ENTERPRISE LAN AND WAN CONFIGURATION)
1 What is it about ?
The project is based on the concepts of networking. It includes configuring different network
devices like Router, Switch, Bridge & connecting it with Switches & PCs by using different
types of connecting wires by allocating the IP Addresses to all the interfaces after the subnetting
of network id. The beauty of configuring network devices is that it helps users access the
network with few constraints like allowing some to access the website but not allowing them to
access the mail server on the internet on private IP address which are otherwise excluded by
internet service provider (ISP).
2 Description of project:
Fig: 1
Fig.:2
Fig.:3
WORKING:
In project two companies are shown:
-Company 1
- Company 2
Both companies work using ACL.
It is used by a device (firewall , router or computer) that sits between an internal network
and the rest of the world.
Three homes have the same IP address-192.168.1.0.
So, these three networks communicate with each other easily and it becomes possible only with
the use of NAT, as we cannot provide same IP address to any other network.
In order to communicate with each other these networks use two ISPs.
LINKSYS wireless router is used in this project.This router is used to communicate with laptops
without using any connection cables.So,this makes our work much easy.
Result :
ACL is successfully implemented and can be tested by checking the connectivity between the
same departments and between the different departments of companies.
REFRENCE
1. Todd Lammle
2. www.wikepedia.com
3. www.wwgsolution.com
Explain the concept of the working of the Cisco Packet Tracer with system
requirement.