Sunteți pe pagina 1din 11

ENTERPRISE LAN AND WAN CONFIGURATION

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF DEGREE OF

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING

Submitted By:
Jasmeet Singh
University Roll No.: 1154461

UNDER THE SUPERVISION OF:


Er. ASHISH DUTT SHARMA
Assistant Professor

July 2014 Nov 2014

COMPUTER SCIENCE ENGINEERING


SHAHEED UDHAM SINGH COLLEGE OF ENGG. & TECHNOLOGY

ACKNOWLEDGEMENT

The satisfaction that accompanies that the successful completion of any task would be
incomplete without the mention of people whose ceaseless cooperation made it possible,
whose constant guidance and encouragement crown all efforts with success.
I am grateful to my project guide Mr Ashish Dutt Sharma for the guidance, inspiration
and constructive suggestions that helpful us in the preparation of this project.
I own my regards to the entire faculty of the department of computer science at Shaheed
Udham Singh College of Engineering and Technology Tangori, Mohali from where I
have learnt the basics of Computer Science and whose informal discussions and able
guidance was a become light for me in the entire duration of this work.
I also thank my colleagues who have helped in successful completion of the project.
Finally, I express my indebtedness to all who have directly or indirectly contributed to
the successful completion of my project.

Jasmeet Singh

AIM

To use less number of IP addresses in order to reduce the complexity of any network.
SOFTWARE REQUIREMENTS

To complete the work on Lan and Wan configuration, I need a help from some software
requirements. Software requirements are as follow:
Cisco Packet Tracer:

Used to do the project work easily & proper understanding.


Windows Server 2008:

Server is the operating system used for domain network. In the domain model network, server
mainly provides the resources to the clients, and applies the security to the clients
Windows 7:

It is an operating system. It is an interface unit between the user and hardware device.
Microsoft Office:

It is used to save the work done on the project.


HARDWARE REQUIREMENTS
CISCO ROUTER:

13 2811 series (modular)

SWITCHES:

9 Cisco 2960 series 24 port

CABLES:

Cat 5 and Cat 6


Console cable, Serial cable
Length as per requirement

Clients/Nodes:

Pentium 4 or up
Windows XP Professional
512 MB RAM
80 GB Hard Disk

METHODOLOGY USED
The project is based on the concepts of networking. It includes configuring different network
devices such as Router, Switch connecting it with PCs by using different types of connecting
wires by allocating the IP Addresses to all the interfaces after the sub-netting of network id. The
beauty of configuring network devices is that it helps users access the network with few
constraints like allowing some to access the website but not allowing them to access the mail
server on the internet on private IP address which are otherwise excluded by internet service
provider (ISP).

IP Address:
IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts
one is network address and second is host address. in local area network, we can used private IP
address, which is provided by IANA (Internet Assigning Numbering Authority). When IP was
first standardized, the specification required that each system attached to an IP-based internet be
assigned a unique, 32-bitninternet address value. Systems that have interface to more than one
network require a unique IP address for each network interface. The first part of an internet
address identifies the network on which the host resides, while the second part identifies the
particular host on the given network. IP addresses are divided into five classes.

Class Range

N/w bits Host bits

Subnet mask

1 126

24

255.0.0.0

128 191

16

16

255.255.0.0

192 223

24

255.255.255.0

224 239

it is reserved for multicast.

240 255

it is reserved for research/scientific use.

Total IP

Valid IP

16777216 16777214
65536
256

65534
254

We can use first three classes. IANA provides private IP addresses from first three classes.

Subnet Mask:
Subnet mask is also 32-bit address, which tells us how many bits are used for network and how
many bits are used for host address.
In Subnet mask Network bits are always 1 and Host bits are always 0.
When we are going to assign IP addresses to our computers then we have to follow some rules.

Rules: (1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved
for router.
(2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network
(10th network).
(3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default
routing is used in case of Stub n/w (means our network has one exit point).
(4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting.
(5) 127.0.0.1 - This is Loopback address, which is used for self-communication or
troubleshooting purpose.
C:\>ipconfig
C:\>ipconfig/all
It shows all detail.

Private IP Addresses:
Early network design, when global end to end connectivity was envisioned for all internet hosts,
intended that IP addresses be uniquely assigned to a particular computer or device. However, it
was found that it was not always necessary as private networks developed and address space
needed to be conserved (IPv4 address exhaustion).
Computer not connected to the internet, such as factory machines that communicate only with
each other via TCP/IP, need not have globally unique IP addresses. Three ranges of IPv4
addresses for private networks, one range for each class (A, B, C) are reserved. These addresses
are not routed on the Internet, and thus their use need not be coordinated with an IP address
registry.
Today, such private networks typically connect to the internet through Network Address
Translation (NAT).

Private IP addresses are another solution to the problem of the impending exhaustion of public IP
addresses. As mentioned, public networks require hosts to have unique IP addresses.
However, private networks that are not connected to the Internet may use any host addresses, as
long as each host within the private network is unique.

Class

Private IP Range

10.0.0.0 10.255.255.255

172.16.0.0 172.31.255.255

192.168.0.0 192.168.255.255

PROJECT
(ENTERPRISE LAN AND WAN CONFIGURATION)

1 What is it about ?
The project is based on the concepts of networking. It includes configuring different network
devices like Router, Switch, Bridge & connecting it with Switches & PCs by using different
types of connecting wires by allocating the IP Addresses to all the interfaces after the subnetting
of network id. The beauty of configuring network devices is that it helps users access the
network with few constraints like allowing some to access the website but not allowing them to
access the mail server on the internet on private IP address which are otherwise excluded by
internet service provider (ISP).

2 Description of project:

Fig: 1

Fig.:2

Fig.:3

WORKING:
In project two companies are shown:
-Company 1
- Company 2
Both companies work using ACL.

ACL(ACCESS CONTROL LIST) & its router configutation :


Are lists of instructions you apply to the routers interface.
It filters network traffic by controlling whether routed packets are forwarded or blocked at the
routers interface.
Three departments are shown in both companiesAccounts, Sales and Technical department.
All these departments transfer their information and send packets only to their respective
departments in these companies.
As accounts department will send packets only to accounts department of other company not to
other departments.
For this standard ACL is used.

CLUSTER 0 and CLUSTER 1


These are the two clusters consisting of number of routers. These two clusters represent Internet
Service Providers(ISPs).ISPs provide service of internet to all other networks connecting to it
and it is quite difficult to send data without using these ISPs.

HOME 1,HOME 2 and HOME 3


These 3 homes are used to understand the working of NAT.

NAT & its router configuration:


NAT is a method of connecting multiple computers to the internet (or any other IP network)
using one IP address.

It is used by a device (firewall , router or computer) that sits between an internal network
and the rest of the world.
Three homes have the same IP address-192.168.1.0.
So, these three networks communicate with each other easily and it becomes possible only with
the use of NAT, as we cannot provide same IP address to any other network.

In order to communicate with each other these networks use two ISPs.

LINKSYS wireless router is used in this project.This router is used to communicate with laptops
without using any connection cables.So,this makes our work much easy.

Result :
ACL is successfully implemented and can be tested by checking the connectivity between the
same departments and between the different departments of companies.

REFRENCE

1. Todd Lammle

A Cisco Certified Network Associate Study Guide 7th edition.

2. www.wikepedia.com

A solution to all the to all problems a encyclopaedia with all solution.

3. www.wwgsolution.com

A Pdf file giving a brief description about Frame Relay concepts.

4. Cisco networking Academy

Explain the concept of the working of the Cisco Packet Tracer with system
requirement.

5. Interconnecting Cisco Network Devices Part 1 & 2

A Self Guide for understanding the concept of internetwork and introduction to


Cisco routers.

S-ar putea să vă placă și