Sunteți pe pagina 1din 69

TRAINING REPORT

OF
SIX WEEK INDUSTRIAL TRAINING, UNDERTAKEN
AT

NETMAX TECHNOLOGIES PVT.LTD.


IN
NETWORKING DEPARTMENT
ON
INTRANET ENTERPRISE CONNECTION
SUBMITTED IN PARTIAL FULFILLMENT OF THE DEGREE
OF
BE (electronics and communication)

Under the Guidance of:


Name: Mr. Rajwinder Singh
Designation: Cisco Trainer
CCIE(#47727)
Department: Networking

Submitted By:
Name: Sushil Thakur
Id B100

Page | 1

ACKNOWLEDGEMENT

I express my sincere gratitude to Mr. Rajwinder Singh for giving me opportunity of


undergoing SIX WEEKS INDUSTRIAL TRAINING AT NETMAX
TECHNOLOGY PVT. LTD., Chandigarh. I would like to thank Mr. Rajwinder Singh,
and all executives for their valuable guidance, support and encouragement. Without their
encouragement and moral boosting, it would not have been possible to accomplish this
task successfully. I would like thank Mr.Harsharan Sehgal(training and placement
officer) for giving me an opportunity of undergoing this training.

I am extremely grateful to all technical staff of NETMAX TECHNOLOGY PVT.


LTD, Chandigarh for their Co-Operation and guidance that has helped me a lot during
the course of training. I will always be thankful to them for this valuable guidance to me.

Name

Sushil Thakur

University Roll No

B100020378

Year

BE (ECE) 4TH Year (IX Semester)

College

CSOET (Baddi H.P)


Page | 2

PREFACE
A lot of effort has been made to make this project report interesting and a learning experience for us.
The report has been explained with the help of diagrams and figures. The subject matter has been
compiled in a simple, illustrative and lucid manner.
This project report contains the description about integration of various network devices with 3 rd party
software which is Packet Tracer. First we done the feasibility study of that, then we have made the
technical specifications for this task and get done with the help of networking technical team.
My project is about connecting different offices of an enterprise spanned over wide area network. We
will use public infrastructure to fulfill this purpose. Enterprise will be running ipv6 routed protocols
and wide area network will have ipv4 protocol. In Wide Area Network we will have a combination of
routing protocols eigrp and ospf and redistribution will be used to allow route exchange between them.
Nat technology is also used to convert private ips into public ips.
We will also configure dhcp server in ipv4 domain to assign ip addresses dynamically to end devices.
Some policies will be used to restrict access among devices of different offices.

Page | 3

INDEX
1. About
Company.................................................................................................
............... 7
2. Networking
Basics
8-

3. Project Requirements.......................................................................................................... 3
3.1Cisco 2621 Router

3.2Wireless Linksys WRT-300 N Router

3.3Cisco WS-C3560 24PS

3.4Cisco WS-C2950 24PS

3.5 Server

3.6 Laptop & Desktop Pc

6
Page | 4

4. Model Used........................................................................................................................... 7
4.1 The Process/Application Layer Protocols

4.1.1 Telnet

4.1.2 File Transfer Protocol (FTP)

4.1.3 Simple Mail Transfer Protocol (SMTP)

4.1.4 Post Office Protocol (POP)

4.1.5 Secure Shell (SSH)

4.1.6 Hypertext Transfer Protocol (HTTP)

4.1.7 Simple Network Management Protocol (SNMP)


4.1.8 Domain Name Service (DNS)

9
10

4.1.9 Dynamic Host Configuration Protocol (DHCP)


Bootstrap Protocol (BootP)

10

4.2 The Host-to-Host Layer Protocol

11

4.2.1 Transmission Control Protocol (TCP)


4.2.2 User Datagram Protocol (UDP)
4.3 The Internet Layer Protocol

12
13
15

4.3.1 Internet Protocol

15

4.3.2 Internet Control Message Protocol (ICMP)

17

4.3.3 Address Resolution Protocol (ARP)

17

5. Software Requirement...................................................................................................... 18
5.1 System Requirement for Packet Tracer 5.2

18

6. Feasibility Study................................................................................................................ 20
6.1 Technical Feasibility

20

6.1.1 Routing

20

6.1.2 Frame Relay

20

6.1.3 Nat Implementation

21

6.1.4 Switching
6.1.5 VLAN
6.1.6 ACL
6.2 Operational Feasibility

21
21
Page | 5

7 Creating Vlans

30

7.1 Assigning Port for Particular Vlan

32

7.2 Creating Interval

32

7.3 Creating STP (Spanning Tree Protocol) For Vlan

34

7.4 Setting Frame Relay Connection

35

7.5 Enabling Routing To Connect Remote Areas

36

7.6 Nat Implementation

38

8. Servers................................................................................................................

COMPANY PROFILE
Netmax Technologies Pvt Ltd was set up in 2001 by young Indian entrepreneurs. It has
pioneered the concept of high quality IT education in North India and has trained over 10,000 plus
networking, embedded systems & software professionals in the country. In 2001, Netmax
Technologies set up education centre in Chandigarh (Punjab) and followed them with centers in
Patiala, Jalandhar, Ludhiana & Bhatinda in the years that followed.Netmax Technologies introduced
corporate training programs which as an initiative were highly appreciated by the industry and
corporate alike. NETMAX TECHNOLOGY provides Corporate Training according to their
requirements and standards. Our faculties are well versed with technologies so they can deliver
according to live envoiment
. We are a group of highly motivated IT professionals with an ability to innovate a strong desire to
excel.
Page | 6

NETMAX TECHNOLOGY PVT LTD is a customer focused company working to provide


software solutions, which are delivered with Reliability, Timeliness, Flexibility and low cost
customer satisfaction as the primary aim. The designing solutions are purely based on business and
technical requirements of the project in hand. Software Development Life Cycle is strictly followed
to ensure the timely delivery of the project without compromising on quality.
NETMAX TECHNOLOGY provides a broad range of offshore outsourcing services including
Application and Systems Level Programming on Leading Technologies. It also provides wide range
of Networking Solutions for Corporate, Industries and Software Development Firms.
NETMAX TECHNOLOGY has a niche in providing training to Engineering & MCA Students.
Thousands of engineering students from Chandigarh, Punjab, Haryana, and Rajasthan & Himachal
have successfully completed their Industrial and Summer Training. The focus of the Industrial
Training is to facilitate students with Live Projects on latest technologies like VB.NET, ASP.NET,
ORACLE DBA/DEVELOPER, J2EE, JDO, STRUTS, LINUX, Networking under the strict
guidance of Industry Experts.
Technology Expertise
Cisco Training
CCNA,CCNA Security, CCNA Voice, CCNP R&S, CCNP Security, CCNP Voice, CCIE
Java Technologies

INTRODUCTION OF ASSIGNED JOB


My job is about connecting different offices of an enterprise spanned over wide area network. We use
public infrastructure to fulfill this purpose.To fulfill this purpose we have used ip addressing and
various type of protocols like ripv2,eigrp,ospf.My job is to solve the network related problems and
connectivity issues.In Wide Area Network we will have a combination of routing protocols eigrp and
ospf and redistribution will be used to allow route exchange between them.Nat technology is also used
to convert private ips into public ips.
We will also configure dhcp server in ipv4 domain to assign ip addresses dynamically to end
devices.Some policies will be used to restrict access among devices of different offices.

NETWORKING BASICS
What is a Computer Network?
Page | 7

A computer network allows sharing of resources and information among interconnected devices. In
the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced
Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was
the first computer network in the world.[1] Development of the network began in 1969, based on
designs developed during the 1960s.
Computer networks can be used for a variety of purposes:
Facilitating communications. Using a network, people can communicate efficiently and easily
via email, instant messaging, chat rooms, telephone, video telephone calls, and video
conferencing.

Sharing hardware. In a networked environment, each computer on a network may access and
use hardware resources on the network, such as printing a document on a shared network
printer.

Sharing files, data, and information. In a network environment, authorized user may access data
and information stored on other computers on the network. The capability of providing access to
data and information on shared storage devices is an important feature of many networks.

Sharing software. Users connected to a network may run application programs on remote
computers.

Information preservation.

Security.

Speed up.

What is a Networking?
Networking is a common synonym for developing and maintaining contacts and personal connections
with a variety of people who might be helpful to you and your career.
Networking is the practice of linking two or more computing devices together for the purpose of
sharing data. Networks are built with a mix of computer hardware and computer software. It is an
especially important aspect of career management in the financial services industry, since it is helps you
keep abreast of:

Types of networks
Local area network
A local area network (LAN) is a network that connects computers and devices in a limited geographical
area such as home, school, computer laboratory, office building, or closely positioned group of
buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be
Page | 8

based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a
wired LAN using existing home wires (coaxial cables, phone lines and power lines)

Personal area network


A personal area network (PAN) is a computer network used for communication among computer and
different information technological devices close to one person. Some examples of devices that are
used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even
video game consoles. A PAN may include wired and wireless devices. The reach of a PAN typically
extends to 10 meters.[4] A wired PAN is usually constructed with USB and Firewire connections while
technologies such as Bluetooth and infrared communication typically form a wireless PAN.

Home area network


A home area network (HAN) is a residential LAN which is used for communication between digital
devices typically deployed in the home, usually a small number of personal computers and accessories,
such as printers and mobile computing devices. An important function is the sharing of Internet access,
often a broadband service through a CATV or Digital Subscriber Line (DSL) provider. It can also be
referred to as an office area network (OAN).

Wide area network


A wide area network (WAN) is a computer network that covers a large geographic area such as a city,
country, or spans even intercontinental distances, using a communications channel that combines many
types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities
provided by common carriers, such as telephone companies. WAN technologies generally function at
the lower three layers of the OSI reference model: the physical layer, the data link layer, and the
network layer.

Campus Network
A campus network is a computer network made up of an interconnection of local area networks
(LAN's) within a limited geographical area. The networking equipments (switches, routers) and
transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the
campus tenant / owner: an enterprise, university, government etc.).
In the case of a university campus-based campus network, the network is likely to link a variety of
campus buildings including; academic departments, the university library and student residence halls.

Metropolitan area network


A Metropolitan area network is a large computer network that usually spans a city or a large campus.

Virtual private network


A virtual private network (VPN) is a computer network in which some of the links between nodes are
carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by
physical wires. The data link layer protocols of the virtual network are said to be tunneled through the
larger network when this is the case. One common application is secure communications through the
public Internet, but a VPN need not have explicit security features, such as authentication or content
encryption. VPNs, for example, can be used to separate the traffic of different user communities over an
underlying network with strong security features.

What is network topology?

Page | 9

Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.)
of a computer network.[1][2] Network topologies may be physical or logical. Physical topology means
the physical design of a network including the devices, location and cable installation. Logical topology
refers to how data is actually transferred in a network as opposed to its physical design.

Various topologies ::
Bus topology

Many devices connect to a single cable "backbone". If the backbone is broken, the entire segment fails.
Bus topologies are relatively easy to install and don't require much cabling compared to the
alternatives.

Ring Topology

Page | 10

In a ring network, every device has exactly two neighbours for communication purposes. All messages
travel through a ring in the same direction. Like the bus topology, a failure in any cable or device
breaks the loop and will take down the entire segment. A disadvantage of the ring is that if any device is
added to or removed from the ring, the ring is broken and the segment fails until it is "reforged" (by
dwarfish goldsmiths?) It is also considerably more expensive than other topologies.

Star Topology

A star network has a central connection point - like a hub or switch. While it takes more cable, the
benefit is that if a cable fails, only one node will be brought down.
All traffic emanates from the hub of the star. The central site is in control of all the nodes attached to it.
The central hub is usually a fast, self contained computer and is responsible for routing all traffic to
other nodes. The main advantages of a star network is that one malfunctioning node does not affect the
rest of the network. However this type of network can be prone to bottleneck and failure problems at
the central site.

Tree Topology

Page | 11

Also known as the 'Hierarchical topology', the tree topology is a combination of bus and star
topologies. They are very common in larger networks. A typical scenario is: a file server is connected to
a backbone cable (e.g. coaxial) that runs through the building, from which switches are connected,
branching out to workstations.

Mesh topology

Page | 12

In the topologies shown above, there is only one possible path from one node to another node. If any
cable in that path is broken, the nodes cannot communicate.
Mesh topology uses lots of cables to connect every node with every other node. It is very expensive to
wire up, but if any cable fails, there are many other ways for two nodes to communicate. Some WANs,
like the Internet, employ mesh routing. In fact the Internet was deliberately designed like this to allow
sites to communicate even during a nuclear war.

Hybrid Topology
Hybrid network is the combination of different topologies such as star, Ring, Mesh, Bus etc. For
example, if a department uses a Bus network, second department uses the ring network, third
department uses the Mesh network and fourth department uses the star network. All the networks of
different types (of four departments) can be connected together through a central hub (in the form of
star network) as shown in the figure below.

Basic networking devices

Page | 13

Computer networking devices are units that mediate data in a computer network. Computer networking
devices are also called network equipment, Intermediate Systems (IS) or InterWorking Unit (IWU).
Units which are the last receiver or generate data are called hosts or data terminal equipment.

Routers
A router is a communication device that is used to connect two logically and physically different
networks, two LANs, two WANs and a LAN with WAN. The main function of the router is to sorting
and the distribution of the data packets to their destinations based on their IP addresses. Routers
provides the connectivity between the enterprise businesses, ISPs and in the internet infrastructure,
router is a main device. Cisco routers are widely used in the world. Every router has routing software,
which is known as IOS. Router operates at the network layer of the OSI model. Router does not
broadcast the data packets.
We have two types of router:
1.Hardware
2.software. this router is provided by RRAS SERVICE.

Switches
Like the router, a switch is an intelligent device that maps the IP address with the MAC address of the
LAN card. Unlike the hubs, a switch does not broadcast the data to all the computers, it sends the data
packets only to the destined computer. Switches are used in the LAN, MAN and WAN. In an Ethernet
network, computers are directly connected with the switch via twisted pair cables. In a network,
switches use the three methods to transmit the data i.e. store and forward, cut through and fragment
free.
We have two types of switch.
1.Mangeable switch: it has console port by using this we can mange this switch according to our
need .
2.non-mangeable : it ha no console port we use this switch as we purchase it.

Hubs
Page | 14

The central connecting device in a computer network is known as a hub. There are two types of a hub
i.e. active hub and passive hub. Every computer is directly connected with the hub. When data packets
arrives at hub, it broadcast them to all the LAN cards in a network and the destined recipient picks them
and all other computers discard the data packets. Hub has five, eight, sixteen and more ports and one
port is known as uplink port, which is used to connect with the next hub.

Modems
A modem is a communication device that is used to provide the connectivity with the internet. Modem
works in two ways i.e. Modulation and Demodulation. It converts the digital data into the analogue and
analogue to digital.

LAN Cards
Page | 15

LAN cards or network adapters are the building blocks of a computer network. No computer can
communicate without a properly installed and configured LAN card. Every LAN card is provided with
a unique IP address, subnet mask, gateway and DNS (if applicable). An UTP/STP cable connects a
computer with the hub or switch. Both ends of the cable have the RJ-45 connectors one is inserted into
the LAN card and one in the hub/switch. LAN cards are inserted into the expansion slots inside the
computer. Different LAN cards support different speed from 10/100 to 10/1000.
Ethernet = speed 10mbps
Fast Ethernet = 100mbps
Giga Ethernet = 1000mbps
Fastgiga Ethernet = 10000mbps

Network Repeater
A repeater connects two segments of your network cable. It retimes and regenerates the signals to
proper amplitudes and sends them to the other segments. When talking about, ethernet topology, you
are probably talking about using a hub as a repeater. Repeaters require a small amount of time to
regenerate the signal. This can cause a propagation delay which can affect network communication
when there are several repeaters in a row. Many network architectures limit the number of repeaters that
can be used in a row. Repeaters work only at the physical layer of the OSI network model.

Page | 16

Bridge
A bridge reads the outermost section of data on the data packet, to tell where the message is going. It
reduces the traffic on other network segments, since it does not send all packets. Bridges can be
programmed to reject packets from particular networks. Bridging occurs at the data link layer of the
OSI model, which means the bridge cannot read IP addresses, but only the outermost hardware address
of the packet. In our case the bridge can read the ethernet data which gives the hardware address of the
destination address, not the IP address. Bridges forward all broadcast messages. Only a special bridge
called a translation bridge will allow two networks of different architectures to be connected. Bridges
do not normally allow connection of networks with different architectures.

The hardware address is also called the MAC (media access control) address. To determine the
network segment a MAC address belongs to, bridges use one of:
Page | 17

Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If the
address is not in the bridging table, the packet is forwarded to all segments other than the one it came
from. This type of bridge is used on ethernet networks.
Source route bridging - The source computer provides path information inside the packet. This is used
on Token Ring networks.

Gateway
A gateway can translate information between different network data formats or network architectures. It
can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand
computers. Most gateways operate at the application layer, but can operate at the network or session
layer of the OSI model. Gateways will start at the lower level and strip information until it gets to the
required level and repackage the information and work its way back toward the hardware layer of the
OSI model. To confuse issues, when talking about a router that is used to interface to another network,
the word gateway is often used. This does not mean the routing machine is a gateway as defined here,
although it could be.

Network Models
When dealing with networking, you may hear the terms "network model" and "network layer" used
often. Network models define a set of network layers and how they interact. There are several different
network models depending on what organization or company started them. The most important two are:

The TCP/IP Model - This model is sometimes called the DOD model since it was designed for the
department of defense It is also called the internet model because TCP/IP is the protocol used on the
internet.
OSI Network Model - The International Standards Organization (ISO) has defined a standard
called the Open Systems Interconnection (OSI) reference model. This is a seven layer architecture
listed in the next section.

Page | 18

Layers in the TCP/IP model


Application Layer (process-to-process): This is the scope within which applications create user data
and communicate this data to other processes or applications on another or the same host. The
communications partners are often called peers. This is where the "higher level" protocols such as
SMTP, FTP, SSH, HTTP, etc. operate.
Transport Layer (host-to-host): The Transport Layer constitutes the networking regime between two
network hosts, either on the local network or on remote networks separated by routers.
Internet Layer (internetworking): The Internet Layer has the task of exchanging datagrams across
network boundaries. It is therefore also referred to as the layer that establishes internetworking, indeed,
it defines and establishes the Internet. This layer defines the addressing and routing structures used for
the TCP/IP protocol suite.
Link Layer: This layer defines the networking methods with the scope of the local network link on
which hosts communicate without intervening routers. This layer describes the protocols used to
describe the local network topology and the interfaces needed to affect transmission of Internet Layer
datagrams to next-neighbor hosts.
Page | 19

OSI Model
The OSI, or Open System Interconnection, model defines a networking framework for implementing
protocols in seven layers. Control is passed from one layer to the next, starting at the application layer
in one station, and proceeding to the bottom layer, over the channel to the next station and back up the
hierarchy.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality
of service is identified, user authentication and privacy are considered, and any constraints on data
syntax are identified.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets
up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at
each end. It deals with session and connection coordination.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for
end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node.
Data Link (Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC)
layer and the Logical Link Control (LLC) layer.
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the
electrical and mechanical level. .

TCP/IP Model vs OSI Model


Sr.
No.

TCP/IP Reference Model

OSI Reference Model

Defined after the advent of Internet.

Defined before advent of internet.

Service interface and protocols were not clearly distinguished Service interface and protocols are clearly
before
distinguished

TCP/IP supports Internet working

Internet working not supported

Loosely layered

Strict layering

Page | 20

Protocol Dependant standard

Protocol independent standard

More Credible

Less Credible

TCP reliably delivers packets, IP does not reliably deliver


packets

All packets are reliably delivered

Basic Networking Cables


Networking Cables are used

to connect one network device to other or to connect two or more computers


to share printer, scanner etc. Different types of network cables like Coaxial cable, Optical fiber
cable, Twisted Pair cables are used depending on the network's topology, protocol and size. The devices
can be separated by a few meters (e.g. via Ethernet) or nearly unlimited distances (e.g. via the
interconnections of the Internet).
While wireless may be the wave of the future, most computer network today still utilize cables to
transfer signals from one point to another

Twisted pair
Twisted pair cabling is a type of wiring in which two conductors (the forward and return conductors of a single circuit) are
twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources; for
instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs. It
was invented by Alexander Graham Bell.

Unshielded twisted pair cable with different twist rates

Shielded

twisted pair

Advantages

It is a thin, flexible cable that is easy to string between walls.

More lines can be run through the same wiring ducts.

UTP costs less per meter/foot than any other type of LAN cable.

Page | 21

Disadvantages

Twisted pairs susceptibility to electromagnetic interference greatly depends on the pair twisting schemes (usually
patented by the manufacturers) staying intact during the installation. As a result, twisted pair cables usually have
stringent requirements for maximum pulling tension as well as minimum bend radius. This relative fragility of twisted
pair cables makes the installation practices an important part of ensuring the cables performance.

In video applications that send information across multiple parallel signal wires, twisted pair cabling can introduce
signaling delays known as skew which results in subtle color defects and ghosting due to the image components not
aligning correctly when recombined in the display device

Optical fiber cable


An optical fiber cable is a cable containing one or more optical fibers. The optical fiber elements are typically individually
coated with plastic layers and contained in a protective tube suitable for the environment where the cable will be deployed.

Page | 22

An optical fiber is a single, hair-fine filament drawn from molten silica glass. These fibers are
replacing metal wire as the transmission medium in high-speed, high-capacity
communications systems that convert information into light, which is then transmitted via
fiber optic cable. Currently, American telephone companies represent the largest users of fiber
optic cables, but the technology is also used for power lines, local access computer networks,
and video transmission.

Coaxial cable
Coaxial cable, or coax, is an electrical cable with an inner conductor surrounded by a flexible, tubular insulating layer,
surrounded by a tubular conducting shield. The term coaxial comes from the inner conductor and the outer shield sharing the
same geometric axis. Coaxial cable was invented by English engineer and mathematician Oliver Heaviside, who first
patented the design in 1880.[1]
Coaxial cable is used as a transmission line for radio frequency signals, in applications such as connectingradio
transmitters and receivers with their antennas, computer network (Internet) connections, and distributingcable
television signals. One advantage of coax over other types of radio transmission line is that in an ideal coaxial cable
the electromagnetic field carrying the signal exists only in the space between the inner and outerconductors. This allows
coaxial cable runs to be installed next to metal objects such as gutters without the power losses that occur in other types of
transmission lines, and provides protection of the signal from externalelectromagnetic interference.

Page | 23

Straight Cable

You usually use straight cable to connect different type of devices. This type of cable will be used most of the time and can
be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
5) Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other one using normal port.

Crossover Cable

A crossover cable connects two devices of the same type, for example DTE-DTE or DCE-DCE, usually connected
asymmetrically (DTE-DCE), by a modified cable called a crosslink. Such distinction of devices was introduced by IBM
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A crossover cable can be used to:
1) Connect 2 computers directly.
2) Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding network)
3) Connect 2 switches/hubs by using normal port in both switches/hubs

We use two types of cable in networking :


1. straight cable
2. cross cable
Colour cording of cable:
Straight:
1. orange white 1.orange white
2. orange 2.orange
3. green white 3.green white
4. blue 4. blue
5. blue white 5. blue white
6. green 6. green
7. brown white 7. brown white
8. brown 8. Brown
Cross cable:
13
26
31
62
1. orange white 1.green white
2. orange 2.green
3. green white 3.orange white
4. blue 4. blue
5. blue white 5. blue white

Page | 24

6. green 6. orange
7. brown white 7. brown white
8. brown 8. Brown

Colour coding for cables

T-568B Straight-Through Ethernet Cable

RJ-45 Crossover Ethernet Cable

INSTALLING CABLES
In today networks, UTP CABLES are commonly used to connect computers in a network.
Depending on the colorcodings, we have different cables like straight cable, cross cable and roll-over
cable.
Page | 25

STRAIGHT CABLE
The cable used between the PC and the hub/switch is called straight cable.
Straight cable can be used between
PC - SWITCH
PC- HUB
HUB(UPLINK PORT) - HUB
According to TIA/EIA(Telecommunications industry standard/Electronics industry standard),we have
the following
two standards for making straight cable:
CROSS-OVER CABLE
The cable used to connect two PCs is called cross-over cable.
Cross cable can be used between:
PC - PC
HUB - HUB
SWITCH - SWITCH
ROUTER - PC
ROLL-OVER CABLE
The cable used between a hardware router and a PC is called roll-over cable.
In this cable,thecolor coding used in one end is reversed in the other end.
DATA TRAVELL ONLY GREEN OR ORANGE PAIR OF CABLE.

ADDRESSING IN COMPUTER NETWORKING


There are two kinds of addresses used in networks:
1.Physical address
2.Logical address
PHYSICAL ADDRESS

1.It is also called hardware address or MAC address.MAC stands for media access control.
2.It is present in the chip of a NIC card.
3.It is unique for every NIC card and cannot be changed.
4.It is 48 bits.Out of 48 bits,24 bits of address is given by the manufacturer of NIC card and the
remaining 24 bits of address is defined as per instructions given by IEEE.
5.IEEE stands for Institute of Electronics and Electrical Engineers.
LOGICAL ADDRESS

1.It is also called software address.


2.It is given by the user and can be changed anytime.
3.Several schemes or protocols are used to define logical address in a computer.
4.These protocols are :
TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL)
IPX/SPX (Internetwork Packet Exchange/Sequential Packet EXchange)
NetBeuI
DLC (Data Link Control)
AppleTalk
PROTOCOL is a set of rules which in communication between computers.
TCP/IP
1.It has become industry-standard
Page | 26

2.It was developed by DOD(Department of Defence) of USA.


3.It is used both in Internet(public network) and Intranet(private network).
4.It is of 32 bits.
5.Currently used version is IP v4.
6.IP v6 is also available.
7.It has four fields or octetes.
8.Each octet is of 8 bits.
9.It can be represented by
w.x.y.z
10.Minimum value of a octet is 0 and maximum is 255
11.Eaxh octet or field can have decimal values ranging from 0 to 255.
12.According to the value of w or first field, we have five classes of TCP/IP Addresses.
The first three classes are only used for computer addressing in a network.

IP ADDERSSING
IP (INTERNER PROTOCOL) ip stands on internet protocol it is 32 bit.it is divided in 4 octet each
octet contain 8 bit.it is numerical identification of computer on network .it is divided in to two parts one
is network and second is host .we use private ip address in LAN which is provided by
IANA(INTERNET ASSIGNING NUMBRING AUTHOURTIY). The minimum value (per octet) is 0
and the maximum value is 255.IP address are divided in five classes.
1. Network ID : it represent no. of on bit that is (1).
2. Host ID : it represent the no. of off bit that is (0).

class Range N/W ID Host/ID Subnet Mask Total IP Valid IP


A 1-126 8 24 255.0.0.0 16777216 16777214
B 128-191 16 16 255.255.0.0 65536 65534
C 192-223 24 8 255.255.255.0 256 254
D 224-239 it is reserved for multicasti.
E 240-255 it is reserved for research /scientific use.

We use only first three class which is provide by IANA in LAN .


IP Addresses are divided into two parts:
1. Private IP address
2. Public (live) IP address.
Range of private IP address: 10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
Range of public IP address: 1.0.0.0 to 9.255.255.255
11.0.0.0 to 126.255.255.255
128.0.0.0 to 172.15.255.255
172.32.0.0 to 192.167.255.255
192.169.0.0 to 223.255.255.255
And another range is called APIPA (Automatic private internet protocol addressing ) range is
169.254.0.0 to 169.254.255.255.
we can assign the IP address by using two methods:
(1) Statically or manually
(2) Dynamically (by using DHCP server- dynamic host configuration protocol)
Page | 27

But in case of your computer has no IP address then IP address is assigned to the computer from APIPA
Range . but communication is not possible when computer has IP address from APIPA.
127.0.0.1 it is the loop back address it is used for self communication and for troubleshooting purpose.
Subnet mask: subnet mask is also 32 bit address, which tell us how many bits are used for network and
how many bits are used for host address.
In subnet mask network bits are always 1 and host bits are always 0.
IP Address invalid or reserve IP Address:
When we are going to assign IP Address to our computer interface then we have to follow some rules:
Rules: 1. All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved for
router.
2. All Host bit cannot be 1 (10.255.255.255.), because it is broadcast address of that network
(10th)network.
3. All bits cannot be 0 (0.0.0.0), because this address is reserved for default routing.
Default routing is used in case of stub n/w (means our network has no exit point).
4. All bits cannot be 1 (255.255.255.255), because it reserved for Broadcasting
127.0.0.1 this is loopback address, which is used for self-communication or troubleshooting purpose.
C:\> IPCONFIG (this command is use for IP check).
C:\> IPCONFIG /ALL (This cmd is show all detail of your interface.).
Ping Packet Internet Groper
This command is used to check the connectivity with other computer. Ping is performed with in
network or outside the network. In this process four packets are send to destination address and four
packets received from the destination address. ICMP (Internet control massage protocol ) is used for
this process.
ICMP
Internet Control Messaging Protocol is used by ping and traceroute utilities.
Ping (Packet Internet Groper) enables you to validate that an IP address exists and can accept
requests. The following transmissions are used by the Ping utility:
. Ping sends an echo request packet to receive the echo response.
. Routers send Destination Unreachable messages when they cant reach the destination
network and they are forced to drop the packet. The router that drops the packet sends
the ICMP DU message.
C:\> ping (IP of destination) for e.g 10.0.0.1
C:\> ping (IP of destination ) t (for continue).
Press ctrl+c to stop ping.
1.Reply from Destination :
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Ping statistics for 10.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Page | 28

1 Minimum = 0ms, Maximum = 0ms, Average = 0ms


This massage appear when destination computer properly configured and connected with same netwok
ip address.
2.Request time out (R.T.O):- This massage appear when Destination computer has some problem .For
e.g : IP address does not exit, network cable unplugged, computer shutdown, interconnection firewall
enable.
3.Destination host unreachable :- This massage appear when our computer desire to communicate
with another n/w but our computer has no gateway IP address.
4.Reply from gateway but Destination host unreachable:-This massage appear when computer
desire to communicate with another network computer but our router has no route information in its
routing table for Destination n/w.
5.Hardware error:- This massage appears when during communication our network goes unplugged.
6.Negoshating IP sequirty:- This massage appears when our computer has IP-Sec service enabled with
sequre communication rule negoshation.

3. PROJECT REQUIREMENTS
The following are the requirements in order to make the infrastructure and to connect the remote
branches and to provide communication between them.

Cisco 2621 Router


Wireless Linksys WRT-300 N Router
Cisco WS-C3560-24PS (Layer 3 Switch)
Cisco WS-C2950T-24 (Layer 2 Switch)
Server
Wireless Laptops
Desktop PC

2.1 CISCO 2621 ROUTER


The Cisco 2600 series features single or dual fixed LAN interfaces, a network module slot, two Cisco
WAN interface card (WIC) slots, and a new Advanced Integration Module (AIM) slot. LAN support
includes single and dual Ethernet options; 10/100 Mbps auto-sensing Ethernet; mixed Token-Ring and
Ethernet; and single Token Ring chassis versions. WAN interface cards support a variety of serial,
ISDN BRI, and integrated CSU/DSU options for primary and backup WAN connectivity, while
available network modules support multi-service voice/data/fax integration, departmental dial
concentration, and high-density serial options. The AIM slot supports integration of advanced services
such as hardware-assisted data compression and encryption. All Cisco 2600 series routers include an
auxiliary port supporting 115Kbps Dial On Demand Routing, ideal for back-up WAN connectivity.
Page | 29

FIGURE1: CISCO ROUTER 2621

The physical interfaces include power plug for the power supply and a power switch. The router has
two Fast Ethernet (10/100 RJ-45) connectors for data transfers in and out. The module also has two
other RJ-45 connectors on the back panel for a console terminal for local system access and an
auxiliary port for remote system access or dial backup using a modem. The 10/100Base-T LAN ports
have Link/Activity, 10/100Mbps, and half/full duplex LEDs

FIGURE 2: REAR PANEL


2.2 WIRELESS LINKSYS WRT-300 N ROUTER
Page | 30

The Wireless-N Broadband Router will allow you to network wirelessly better than ever, sharing
Internet access, files and fun, easily and securely and with greater range of up to three times farther
than standard Wireless-G. A router is a device that allows access to an Internet connection over a
network. With the Wireless-N Broadband Router, this access can be shared over the four switched ports
or via the wireless broadcast.
Use wireless security to secure your wireless network while the whole network is protected through a
Stateful Packet Inspection (SPI) firewall and Network Address Translation (NAT) technology. The
Router also offers VPN pass-through and other features, which can be configured through the easy-touse, browser-based utilityFIGURE 3: WRT-300NP a g e |4
2.3 CISCO WS-C3560 24PS
The Cisco Catalyst 3500 Series XL is a scalable line of stackable 10/100 and Gigabit Ethernet switches
that deliver premium performance, manageability, and flexibility, with

excellent investment protection. Catalyst 3500 XL stackable switches allow management of all
switched ports from a single IP address and provide interconnected switches with an
independent high-speed stack bus that preserves valuable desktop ports. It can used at Layer 3and it
can provide the same facilities as a router at layer 3by enabling IP routing on it .

FIGURE 4: CISCO SWITCH 3500 SERIES


2.4 CISCO WS-C2950 24PS
It is similar in looks as Cisco3500 series switch between difference in working. Cisco Catalyst 2960
Series Intelligent Ethernet Switches are a new family of fixed-configuration standalone devices that
provide desktop FastEthernet and Gigabit Ethernet connectivity, enabling enhanced LAN services for
entry-level enterprise, mid-market, and branch office networks.
The Catalyst 2960 Series offers integrated security, including network admission control (NAC),
advanced quality of service (QoS), and resiliency to deliver intelligent services for the network edge. It
dont operate on layer 3 it operates on Layer 2 it is used to learn Mac address in Lan network and for
providing path selection according to spanning tree selection .
Page | 31

FIGURE 5: 2900 SERIES SWICH


2.5 SERVER
A server is a computer program running to serve the requests of other programs, the "clients". Thus, the
"server" performs some computational task on behalf of "clients". The clients either run on the same
computer or connect through the network.
In most common use, server is a physical computer (a computer hardware system) dedicated to running
one or more such services (as a host),to serve the needs of users of the other computers on the network.
Depending on the computing service that it offers it could be a database server, file server, mail server,
print server, web server, or some other kind of server.

FIGURE6: SERVER OVERIEW

2.6 LAPTOP AND DESKTOP PC


The desktop pc should normal in operation has the facilities of web browsing, command prompt,
minimum storage memory and Laptop should have wireless connection option .

Page | 32

3. MODEL USED
TCP/IP is so central to working with the Interne so in the working of the project we make use of
TCP/IP model. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite was created by the
Department of Defense (DoD) to ensure and preserve data integrity as well as maintain
communications in the event of catastrophic war. So it follows that if designed and implemented
correctly, aTCP/IP network can be a truly dependable and resilient one.
TCP/IP and the DoD Model
The DoD model is basically a condensed version of the OSI modelits composed of four, instead of
seven, layers:
Process/Application layer
Host-to-Host layer
Internet layer
Network Access layer

Page | 33

FIGURE7:SHOWS A COMPARISON OF DOD AND OSI MODEL.

A vast array of protocols combine at the DoD models Process/Application layer to integrate the
various activities and duties spanning the focusof the OSIs corresponding top three layers
(Application, Presentation, and Session).
The Process/Application layer defines protocols for node-to-node application communication and also
controls user-interfacespecifications
.
The Host-to-Host layer parallels the functions of the OSIs Transport layer, defining protocols for
setting up the level of transmission service forapplications. It tackles issues such as creating reliable
end-to-end communication and ensuring the error-free delivery of data. It handles packetsequencing
and maintains data integrity.
The Internet layer corresponds to the OSIs Network layer, designating the protocols relating to the
logical transmission of packets over theentire network. It takes care of the addressing of hosts by giving
them an IP (Internet Protocol) address, and it handles the routing of packets amongmultiple networks.
At the bottom of the DoD model, the Network Access layer implements the data exchange between the
host and the network. The equivalent of
the Data Link and Physical layers of the OSI model, the Network Access layer oversees hardware
addressing and defines protocols for the
physical transmission of data
.
The DoD and OSI models are alike in design and concept and have similar functions in similar layers.
3.1The Process/Application Layer Protocols
In this layer we will discuss the protocols that are used for communication and their utility.
3.1.1 Telnet
Telnet is the chameleon of protocolsits specialty is terminal emulation. It allows a user on a remote
client machine, called the Telnet client, toaccess the resources of another machine, the Telnet server.
Telnet achieves this by pulling a fast one on the Telnet server and making the clientmachine appears as
though it were a terminal directly attached to the local network. This projection is actually a software
imagea virtual terminalthat can interact with the chosen remote host.
These emulated terminals are of the text-mode type and can execute defined procedures such as
displaying menus that give users theopportunity to choose options and access the applications on the
duped server. Users begin a Telnet session by running the Telnet client softwareand then logging into
the Telnet server.

Page | 34

3.1.2 File Transfer Protocol (FTP)


File Transfer Protocol (FTP) is the protocol that actually lets us transfer files, and it can accomplish
this between any two machines using it. But
FTP isnt just a protocol; its also a program.
3.1.3 Simple Mail Transfer Protocol (SMTP)
Simple Mail Transfer Protocol (SMTP), answering our ubiquitous call to email, uses a spooled, or
queued, method of mail delivery. Once a message has been sent to a destination, the message is spooled
to a deviceusually a disk. The server software at the destination posts a vigil, regularly checking the
queue for messages. When it detects them, it proceeds to deliver them to their destination. SMTP is
used to send mail;POP3 or IMAP is used to receive mail.
3.1.4 Post Office Protocol (POP)
Post Office Protocol (POP) gives us a storage facility for incoming mail, and the latest version is called
POP3. It doesnt allow messages to be downloaded selectively, but once they are, the client/server
interaction ends and you can delete and tweak your messages locally at will.
3.1.5 Secure Shell (SSH)
Secure Shell (SSH) protocol sets up a secure Telnet session over a standard TCP/IP connection and is
employed for doing things like logging into
Systems, running programs on remote systems, and moving files from one system to another. And it
does all of this while maintaining a nice, strong, encrypted connection. You can think of it as the newgeneration protocol thats now used in place of rsh and rlogineven Telnet.
3.1.6 Hypertext Transfer Protocol (HTTP)
All those snappy websites comprising a mlange of graphics, text, links, and so onthe Hypertext
Transfer Protocol (HTTP) is making it allpossible. Its used to manage communications between web
browsers and web servers and opens the right resource when you click a link, wherever that resource
may actually reside.
3.1.7 Simple Network Management Protocol (SNMP)
Simple Network Management Protocol (SNMP) collects and manipulates valuable network information.
It gathers data by polling the devices onthe network from a management station at fixed or random
intervals, requiring them to disclose certain information. When all is well, SNMPreceives something
Page | 35

called a baselinea report delimiting the operational traits of a healthy network. This protocol can also
stand as a watchdogover the network, quickly notifying managers of any sudden turn of events.

3.1.8 Domain Name Service (DNS)


Domain Name Service (DNS) resolves hostnamesspecifically, Internet names, such as
www.google.com.We dont have to use DNS; we can just type in the IP address of any device you want
to communicate with. An IP address identifies hosts on a network and the Internet as well.However,
DNS was designed to make our lives easier.
3.1.9Dynamic Host Configuration Protocol (DHCP)/Bootstrap Protocol (BootP)
Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts. It allows easier
administration and works well in small to even very
large network environments. All types of hardware can be used as a DHCP server, including a Cisco
router.
But there is a lot of information a DHCP server can provide to a host when the host is requesting an IP
address from the DHCP server. Heres alist of the information a DHCP server can provide:

IP address
Subnet mask
Domain name
Default gateway (routers)
DNS server address
WINS server address

The following is the four-step process a client takes to receive an IP address from a DHCP server:
The DHCP client broadcasts a DHCP Discover message looking for a DHCP server (Port 67).
The DHCP server that received the DHCP Discover message sends a unicast DHCP Offer
message back to the host
The client then broadcasts to the server a DHCP Request message asking for the offered IP
address and possibly other information.
The server finalizes the exchange with a unicast DHCP Acknowledgment message

Page | 36

FIGURE 8: SHOWS THE PROCESS OF A CLIENT/SERVER RELATIONSHIP


3.2 The Host-to-Host Layer Protocols.
The main purpose of the Host-to-Host layer is to shield the upper-layer applications from the
complexities of the network. This layer says to the upper layer, Just give me your data stream, with
any instructions, and Ill begin the process of getting your information ready to send.
The following sections describe the two protocols at this layer:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
In addition, well look at some of the key host-to-host protocol concepts, as well as the port numbers.

3.2.1 Transmission Control Protocol (TCP)


Page | 37

Transmission Control Protocol (TCP) takes large blocks of information from an application and breaks
them into segments. It numbers andsequences each segment so that the destinations TCP stack can put
the segments back into the order the application intended. After thesesegments are sent, TCP (on the
transmitting host) waits for an acknowledgment of the receiving ends TCP virtual circuit session,
retransmittingthose that arent acknowledged.
TCP is a full-duplex, connection-oriented, reliable, and accurate protocol, but establishing all these
terms and conditions, in addition to errorchecking, is no small task.
TCP Segment Format
Since the upper layers just send a data stream to the protocols in the Transport layers, Ill demonstrate
how TCP segments a data stream andprepares it for the Internet layer. When the Internet layer receives
the data stream, it routes the segments as packets through an internetwork. Thesegments are handed to
the receiving hosts Host-to-Host layer protocol, which rebuilds the data stream to hand to the upperlayer applications orprotocols.
Figureshows the TCP segment format. The figure shows the
different fields within the TCP header.
The TCP header is 20 bytes long, or up to 24 bytes with options. You need to understand what each
field in the TCP segment is:
Source port The port number of the application on the host sending the data. (Port numbers will be
explained a little later in this section.)
Destination port The port number of the application requested on the destination host.
Sequence number A number used by TCP that puts the data back in the correct order or retransmits
missing or damaged data, a process called sequencing.
Acknowledgment number The TCP octet that is expected next.

FIGURE9: TCP SEGMENT FORMAT


Page | 38

Header length The number of 32-bit words in the TCP header. This indicates where the data begins.
The TCP header (even one includingoptions) is an integral number of 32 bits in length.
Reserved Always set to zero.
Code bits/flags Control functions used to set up and terminate a session
.
Window The window size the sender is willing to accept, in octets.
Checksum The cyclic redundancy check (CRC), because TCP doesnt trust the lower layers and checks
everything. The CRC checks theheader and data fields.
Urgent A valid field only if the Urgent pointer in the code bits is set. If so, this value indicates the
offset from the current sequence number, inoctets, where the segment of non-urgent data begins
.
Options May be 0 or a multiple of 32 bits, if any. What this means is that no options have to be present
(option size of 0). However, if anyoptions are used that do not cause the option field to total a multiple
of 32 bits, padding of 0s must be used to make sure the data begins on a32-bit boundary.
Data Handed down to the TCP protocol at the Transport layer, which includes the upper-layer headers.
3.2.2 User Datagram Protocol (UDP)
UDP doesnt offer all the bells and whistles of TCP either, but it does do a fabulous job of transporting
information that doesnt require reliable deliveryand it does so using far fewer network resources.
There are some situations in which it would definitely be wise for developers to opt for UDP rather than
TCP. One circumstance is when reliability is already handled at the Process/Application layer. Network
File System (NFS) handles its own reliability issues, making the use of TCP both impractical and
redundant. But ultimately, its up to the application developer to decide whether to use UDP or TCP, not
the user who wants to transfer data faster.
UDP does not sequence the segments and does not care in which order the segments arrive at the
destination. Rather, UDP sends the segments off and forgets about them. It doesnt follow through,
check up on them, or even allow for an acknowledgment of safe arrivalcomplete abandonment.
Because of this, its referred to as an unreliable protocol. This does not mean that UDP is ineffective,
only that it doesnt handle
issues of reliability.

Further, UDP doesnt create a virtual circuit, nor does it contact the destination before delivering
information to it. Because of this, its alsoconsidered a connectionless protocol. Since UDP assumes
that the application will use its own reliability method, it doesnt use any. This gives anapplication
Page | 39

developer a choice when running the Internet Protocol stack: TCP for reliability or UDP for faster
transfers.
UDP Segment Format
Source port The port number of the application on the host sending the data
Destination port The port number of the application requested on the destination
host

FIGURE10: UDP SEGMENT


Length TheLength of UDP header and UDP data
Checksum TheChecksum of both the UDP header and UDP data fields
Data Upper-layer data

Port Numbers
TCP and UDP must use port numbers to communicate with the upper layers because theyre what keep
track of different conversations crossingthe network simultaneously. Originating-source port numbers
are dynamically assigned by the source host and will equal some number starting at1024.

FIGURE11: PORT NUMBER FOR PROTOCOLS


3.3 The Internet Layer Protocols
Page | 40

In the DoD model, there are two main reasons for the Internet layers existence: routing and providing a
single network interface to the upper layers. None of the other upper- or lower-layer protocols have any
functions relating to routingthat complex and important task belongs entirely to the Internet layer.
The Internet layers second duty is to provide a single network interface to the upper-layer protocols.
Without this layer, application programmers would need to write hooks into every one of their
applications for each different Network Access protocol.
The following sections describe the protocols at the Internet layer:

Internet Protocol (IP)


Internet Control Message Protocol (ICMP)
Address Resolution Protocol (ARP)

3.3.1INTERNET PROTOCOL
Internet Protocol (IP)essentially is the Internet layer. IP looks at each packets address. Then, using a
routing table, it decides where a packet is to be sent next, choosing the best path.
An IP header. This will give you an idea of what the IP protocol has to go through every time user data
is sent from the upper layers and is to be sent to a remote network
.
The following fields make up the IP header:
Version IP version number.
Header length Header length (HLEN) in 32-bit words.
Priority and Type of Service Type of Service tells how the datagram should be handled. The first 3
bits are the priority bits which is nowcalled the differentiated services bits.
Total lengthLength of the packet including header and data.
Identification Unique IP-packet value used to differentiate fragmented packets from different
datagrams.
Flags Specifies whether fragmentation should occur.

Page | 41

FIGURE12: IP HEADER
Fragment offset Provides fragmentation and reassembly if the packet is too large to put in a frame. It
also allows different maximumtransmission units (MTUs) on the Internet.
Header checksum Cyclic redundancy check (CRC) on header only.
Time To Live The time to live is set into a packet when it is originally generated. If it doesnt get to
where it wants to go before the TTLexpires, boomits gone. This stops IP packets from continuously
circling the network looking for a home.
Protocol Port of upper-layer protocol (TCP is port 6 or UDP is port 17). Also supports Network layer
protocols, like ARP and ICMP (this canbe called Type field in some analyzers). Well talk about this
field in more detail in a minute.
Source IP address 32-bit IP address of sending station.
Destination IP address 32-bit IP address of the station this packet is destined for.
Options Used for network testing, debugging, security, and more.
Data After the IP option field will be the upper-layer data.

3.3.2 Internet Control Message Protocol (ICMP)


Page | 42

Internet Control Message Protocol (ICMP)works at the Network layer and is used by IP for many
different services. ICMP is a management protocol and messaging service provider for IP. Its messages
are carried as IP datagram. RFC 1256 is an annex to ICMP, which affords hostsextended capability in
discovering routes to gateways.
ICMP packets have the following characteristics:

They can provide hosts with information about network problems.


They are encapsulated within IP datagram.

The following are some common events and messages that ICMP relates to:
Destination Unreachable If a router cant send an IP datagram any further, it uses ICMP to send a
message back to the sender, advising it ofthe situation.
Buffer Full/Source Quench If a routers memory buffer for receiving incoming datagram is full; it will
use ICMP to send out this message until the congestion abates.
Hops/Time Exceeded Each IP datagram is allotted a certain number of routers, called hops, to pass
through. If it reaches its limit of hops before arriving at its destination, the last router to receive that
datagram deletes it. The executioner router then uses ICMP to send an obituary message, informing the
sending machine of the demise of its datagram.
Ping Packet Internet Groper (Ping) uses ICMP echo request and reply messages to check the physical
and logical connectivity of machines on an internetwork.
3.3.3 Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) finds the hardware address of a host from a known IP address.
Heres how it works: When IP has a datagram to send, it must inform a Network Access protocol, such
as Ethernet or wireless, of the destinations hardware address on the local network. (It has already been
informed by upper-layer protocols of the destinations IP address.) If IP doesnt find the destination
hosts hardware address in the
ARP cache, it uses ARP to find this information..
As IPs detective, ARP interrogates the local network by sending out a broadcast asking the machine
with the specified IP address to reply withits hardware address. So basically, ARP translates the
software (IP) address into a hardware addressfor example, the destination machines.
Ethernet adapter addressand from it, deduces its whereabouts on the LAN by broadcasting for this
address.

4. SOFTWARE REQUIREMENT
Cisco Packet Tracer is a comprehensive, networking technology teaching and learning program that
offers a unique combination of realistic simulation and visualization experiences, assessment and
Page | 43

activity authoring capabilities, and opportunities for multiuser collaboration and competition.
Innovative features of Packet Tracer will help students and teachers collaborate, solve problems, and
learn concepts in an engaging and dynamic social environment.
Some of the benefits of Packet Tracer are as follows:

Provides a realistic simulation and visualization learning environment that supplements


classroom equipment

Enables multiuser, real-time collaboration and competition for dynamic learning

Enables authoring and localization of structured learning activities such as labs,


demonstrations, quizzes, exams, and games

Empowers students to explore concepts, conduct experiments, and test their


understanding

Allows students and teachers to design, build, configure, and troubleshoot networks
using virtual equipment

Supports a variety of teaching and learning opportunities such as lectures, group and
individual labs, homework, and competitions

Supports feature expansion through external applications using an API to enhance the
functionality of Cisco Packet Tracer in areas such as curriculum and assessment
delivery, games, accessibility, and interfacing with real equipment.

Packet Tracer 5.2 is compatible with the following platforms: Windows (Windows XP, Windows 2000,
Vista Home Basic, and Vista Home Premium) and Linux (Ubuntu 7.10 and Fedora 7).
4.1 System requirements for Packet Tracer 5.2
To successfully install and run Packet Tracer 5.2, the following minimum prerequisites must be met:
CPU: Intel Pentium 300 MHz or equivalent

OS: Microsoft Windows 2000, Windows XP, Vista Home Basic, Vista Home Premium,
Fedora 7, or Ubuntu 7.10

1
2
3
4
5
6
7

RAM: 96 MB

Storage: 250 MB of free disk space

Screen resolution: 800 x 600 or higher

Macromedia Flash Player 6.0 or higher


Page | 44

Language fonts supporting Unicode encoding (if viewing in languages other than
English)

Latest video card drivers and operating system updates

For optimal performance, the following capabilities are recommended:

CPU: Intel Pentium II 500 MHz or better

OS: Microsoft Windows XP

RAM: 256 MB or more

Storage: 300 MB of free disk space

Screen resolution: 1024 x 768

Sound card and speakers

Internet connection: 56K dial-up or faster (if using the multiuser feature)

5. FEASIBILITY STUDY
During the phase of the project completion, the technical and the operational aspects of the project
required for its completion were looked upon.

Page | 45

5.1 Technical Feasibility


5.1.1ROUTING AND ROUTED PROTOCOLS
Routing is the act of moving information across an internetwork from a source to a destination. Routing
is used for taking a packet from one device and sending it through the network to another device on a
different network. If your network has no routers, then you are not routing. Routers route traffic to all
the networks in your internetwork. Routing directs packet forwarding, the transit of logically
addressed packets from their source toward their ultimate destination through intermediate nodes;
typically hardware devices called routers, bridges, gateways, firewalls, or switches. Generalpurpose
computers with multiple network cards can also forward packets and perform routing, though they are
not specialized hardware and may suffer from limited performance. The routing process usually directs
forwarding on the basis of routing tables which maintain a record of the routes to various network
destinations. Thus, constructing routing tables, which are held in the routers' memory, is very important
for efficient routing.
Different Types of Routing
Static routing
Default routing
Dynamic routing
Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many
kinds of networks, including the telephone network (Circuit switching) , electronic data networks (such as the Internet),
and transportation networks. This article is concerned primarily with routing in electronic data networks using packet
switching technology.
In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source
toward their ultimate destination through intermediate nodes, typically hardware devices
called routers, bridges, gateways, firewalls, or switches. General-purpose computers can also forward packets and perform
routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually
directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus,
constructing routing tables, which are held in the router's memory, is very important for efficient routing. Most routing
algorithms use only one network path at a time, but multipath routing techniques enable the use of multiple alternative
paths.

Page | 46

Types of routing

Static routing
Static routing is a data communication concept describing one way of configuring path selection
ofrouters in computer networks. It is the type of routing characterized by the absence of communication
between routers regarding the current topology of the network.[1] This is achieved by manually
adding routes to the routing table. The opposite of static routing isdynamic routing, sometimes also
referred to as adaptive routing.

Example
To configure a static route to network 10.10.20.0/24, pointing to a next-hop router with the IP address of 192.168.100.1,
type: (Note that this example is written in the Cisco IOScommand line syntax and will only work on certain Cisco routers [2])
Router> enable
Router# configure terminal
Router(config)# ip route 10.10.20.0 255.255.255.0 192.168.100.1
The other option is to define a static route with reference to the outgoing interface which is connected to the next hop
towards the destination network.
Router> enable
Router# configure terminal
Router(config)# ip route 10.10.20.0 255.255.255.0 Serial 0/0

Dynamic Routing
Dynamic routing performs the same function as static routing except it is more robust. Static routing
allows routing tables in specific routers to be set up in a static manner so network routes for packets are
set. If a router on the route goes down the destination may become unreachable. Dynamic routing
allows routing tables in routers to change as the possible routes change. There are several protocols
used to support dynamic routing including RIP and OSPF

Default routing
.A default route, also known as the gateway of last resort, is the network route used by a router when no other known route
exists for a given IP packet's destination address. All the packets for destinations not known by the router's routing table are
sent to the default route. This route generally leads to another router, which treats the packet the same way: If the route is
known, the packet will get forwarded to the known route. If not, the packet is forwarded to the default-route of that
router which generally leads to another router. And so on. Each router traversal adds a one-hop distance to the route.

Page | 47

ROUTING PROTOCOLS

Routed and
Routing
Protocols
Routing

Routed
IP

IP
X

Dist
-V
RIPv
1,2
Novell
RIP
RTM
P

Interior
Gateway
Protocols

App
le

IGR
P

LinkS
OSP
F
NLS
P
ISIS

Exterior
Gateway
Protocols

Hybr
id

EIG
RP

BGP
v4

Routed protocols:
TCP/IP, IPX-SPX are protocols which are used in a Local Area Network (LAN) so computers can communicate between
with each other and with other computers on the Internet.
Chances are that in your LAN you are most probably running TCP/IP. This protocol is what we call a "routed" protocol. The
term "routed" refers to something which can be passed on from one place (network) to another. In the example of TCP/IP,
this is when you construct a data packet and send it across to another computer on the Internet

Routing protocols:

Page | 48

Routing protocols were created for routers. These protocols have been designed to allow the exchange of routing tables, or
known networks, between routers. There are a lot of different routing protocols, each one designed for specific network
sizes, so I am not going to be able to mention and analyse them all, but I will focus on the most popular.

Dynamic Routing Protocols


There are 3 types of Dynamic routing protocols, these differ mainly in the way that they discover and make calculations
about routes (click to select):
1) Distance Vector
2) Link State
3) Hybrid

Distance Vector routers compute the best path from information passed to them from neighbors

Link State routers each have a copy of the entire network map

Link State routers compute best routes from this local map

DISTANCE VECTOR ROUTING PROTOCOLS


Distance Vector routing protocols use frequent broadcasts (255.255.255.255 or FF:FF:FF:FF) of their entire routing table
every 30 sec. on all their interfaces in order to communicate with their neighbours. The bigger the routing tables, the more
broadcasts. This methodology limits significantly the size of network on which Distance Vector can be used.

RIPV1:
Routing Information Protocol (RIP) is a true Distance-Vector routing protocol. It sends the complete routing table out to all
active interfaces every 30 seconds. RIP only uses hop count to determine the best way to a remote network, but it has a

Page | 49

maximum allowable hop count of 15, meaning that 16 is deemed unreachable. RIP works well in small networks, but it is
inefficient on large networks with slow WAN links or on networks with large number of routers installed.
RIP comes in two different versions. RIP version 1 uses only classful routing, which means that all devices in the network
must use the same subnet mask. This is because RIP version 1 does not include the subnet mask when it sends updates. RIP
v1 uses broadcasts (255.255.255.255).
RIP version 2 does, however, and this is what we call classless routing (check the Subnetting section for more details). RIP
v2 uses multicasts (224.0.0.9) to update its routing tables.

COMMANDS:Configure RIP:
Use the following command to enable RIP on RouterA:

RouterA(config)#router rip
Configure the router to receive and send only RIP Version 2 packets using the following command:

RouterA(config-router)#version 2
Use the following commands to specify the networks directly connected to the router:

RouterA(config-router)#network 192.168.11.0
RouterA(config-router)#network 192.168.22.0

Interior Gateway Protocol - IGRP


Interior Gateway Routing Protocol (IGRP) is a Cisco proprietary Distance-Vector routing protocol. This means that all your
routers must be Cisco routers in order to use IGRP in your network, keep in mind that Windows 2000 now supports it as
well because they have bought a licence from Cisco to use the protocol !
Cisco created this routing protocol to overcome the problems associated with RIP.
IGRP has a maximum hop count of 255 with a default of 100. This is helpful in larger networks and solves the problem of
there being only 15 hops maximum possible in a RIP network. IGRPalso uses a different metric from RIP. IGRP uses
bandwidth and delay of the line by default as a metric for determining the best route to an internetwork. This is called a
composite metric. Reliability, load and Maximum Transmission Unit (MTU) can also be used, although they are not used by
default.

COMMANDS:RouterA#configure terminal
Enter configuration commands, one per line. End with Cntl/z
RouterA#(config)#router igrp AS no.
RouterA#(config-router)#network ip address
RouterA#(config-router)#exit

Page | 50

Link State Routing Protocols


Link State protocols, unlike Distance Vector broadcasts, use multicast.Link State routing protocols do not view networks in
terms of adjacent routers and hop counts, but they build a comprehensive view of the overall network which fully describes
the all possible routes along with their costs. Using the SPF (Shortest Path First) algorithm, the router creates a "topological
database" which is a hierarchy reflecting the network routers it knows about. It then puts it's self on the top of this hierarchy,
and has a complete picture from it's own perspective.
Link State protocols in comparison to Distance Vector protocols have:

Big memory requirements

Shortest path computations require many CPU circles

If network is stable little bandwidth is used; react quickly to topology changes

Announcements cannot be filtered. All items in the database must be sent to neighbors

All neighbors must be trusted

Authentication mechanisms can be used to avoid undesired adjacencies

No split horizon techniques are possible

Open Shortest Path First (OSPF) Routing Protocol

Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the interior
gateway protocol (IGP) working group of the Internet Engineering Task Force (IETF). The working group was
formed in 1988 to design an IGP based on the shortest path first (SPF) algorithm for use in the Internet. Similar to
the Interior Gateway Routing Protocol (IGRP), OSPF was created because in the mid-1980s, the Routing
Information Protocol (RIP) was increasingly unable to serve large, heterogeneous internetworks.
OSPF is a classless routing protocol, which means that in its updates, it includes the subnet of each route it knows
about, thus, enabling variable-length subnet masks. With variable-length subnet masks, an IP network can be
broken into many subnets of various sizes. This provides network administrators with extra network-configuration
flexibility. These updates are multicasts at specific addresses (224.0.0.5 and 224.0.0.6).
OSPF has two primary characteristics:

1) The protocol is open (non proprietary), which means that its specification is in the public domain.
The OSPF specification is published as Request For Comments (RFC) 1247.

2) The second principal characteristic is that OSPF is based on the SPF algorithm, which sometimes is referred to
as the Dijkstra algorithm, named for the person credited with its creation.

Page | 51

COMMANDS:Router#config terminal
Router(config)#router ospf process-id
Router(config-router)#network network-number mask area area-id
Example:
Router(config-router)#network 192.168.10.0 255.255.255.0 area
0.0.0.0

Hybrid Routing Protocols


Hybrid Routing, commonly referred to as balanced-hybrid routing, is a combination of distance-vector
routing, which works by sharing its knowledge of the entire network with its neighbors and link-state
routing which works by having the routers tell every router on the network about its closest neighbours

Eigrp

.Enhanced

Interior Gateway Routing Protocol (EIGRP) is another Cisco proprietary, hybrid (has feature
of Distance Vector and Link State protocols), interior gateway protocol (IGP) used by routers to
exchange routing information. EIGRP uses a composite metric composed of Bandwidth, Delay,
Reliability, and Loading to determine the best path between two locations.
EIGRP can route IP, IPX and Appletalk. Along with IS-IS, it is one of the few multi-protocol routing
protocols.
The Diffusing Update Algorithm (DUAL) is the heart of EIGRP. In essence, DUAL always keeps a
backup route in mind, in case the primary route goes down. DUAL also limits how many routers are
affected when a change occurs to the network.
There is no maximum allowable number of hops. In a EIGRP network, each router multi-casts "hello"
packs to discover its adjacent neighbor. This adjacency database is shared with other router to build a
topology database. From the topology database the best route (Successor) and the second best route
(Feasible Successor) is found.
EIGRP is classless, meaning it does include the subnet mask in routing updates. However, by default
'auto-summary' is enable. You must disable if you want subnet information from other major networks.

Page | 52

The EIGRP metric is a can be a complex calculation, but by default it only uses bandwidth and delay to
determine the best path.

COMMANDS:Router#config terminal

Router (config)# router eigrp AS


Router (config-router)# network X.X.X.X

5.1.2FRAME RELAY
It has the concept of joining remote areas through the single interface with the help of Frame Relay
Switches.
It has concept of:

Virtual Circuits
Frame Relay Encapsulation

5.1.3NAT IMPLEMENTATION

Page | 53

It is use for translating private to public IP address. So we can connect our private network running in
the department to connect to the global network .It converts the private IP to Public IP in order to
communicate
It has concept of :

Static NAT
Dynamic NAT
PAT (Port Address Translation)

5.1.4SWITCHING
Switching is the process of using the hardware address of devices on a Lan to communicate with the
external network. It is used to carry data packets from different vlan to the main router. It provides
Spanning Tree Protocol to choose the best path for carrying the data packets with minimum cost and
less transmission loss in the network.
It has the concept of:

Port Security
Creating Vlans
What is a VLAN?

As I said, a VLAN is a virtual LAN. In technical terms, a VLAN is a broadcast domain created by switches. Normally, it is a router
creating that broadcast domain. With VLANs, a switch can create the broadcast domain.
This works by, you, the administrator, putting some switch ports in a VLAN other than 1, the default VLAN. All ports in a single VLAN
are in a single broadcast domain.
Because switches can talk to each other, some ports on switch A can be in VLAN 10 and other ports on switch B can be in VLAN 10.
Broadcasts between these devices will not be seen on any other port in any other VLAN, other than 10. However, these devices can all
communicate because they are on the same VLAN. Without additional configuration, they would not be able to communicate with any
other devices, not in their VLAN.

How can devices on different VLANs communicate?


Devices on different VLANs can communicate with a router or a Layer 3 switch. As each VLAN is its own subnet, a router or Layer 3
switch must be used to route between the subnets.

What is a trunk port?


When there is a link between two switches or a router and a switch that carries the traffic of more than one VLAN, that port is a trunk
port.
A trunk port must run a special trunking protocol. The protocol used would be Ciscos proprietary Inter-switch link (ISL) or the IEEE
standard 802.1q.

Page | 54

How do I create a VLAN?


Configuring VLANs can vary even between different models of Cisco switches. Your goals, no matter what the commands are, is to:

Create the new VLANs


Put each port in the proper VLAN

Lets say we wanted to create VLANs 5 and 10. We want to put ports 2 & 3 in VLAN 5 (Marketing) and ports 4 and 5 in VLAN 10
(Human Resources). On a Cisco 2950 switch, here is how you would do it:

At this point, only ports 2 and 3 should be able to communicate with each other and ports 4 & 5 should be able to communicate. That is
because each of these is in its own VLAN. For the device on port 2 to communicate with the device on port 4, you would have to
configure a trunk port to a router so that it can strip off the VLAN information, route the packet, and add back the VLAN information.

What do VLANs offer?


VLANs offer higher performance for medium and large LANs because they limit broadcasts. As the amount of traffic and the number of
devices grow, so does the number of broadcast packets. By using VLANs you are containing broadcasts.
VLANs also provide security because you are essentially putting one group of devices, in one VLAN, on their own network.

INTER VLAN ROUTING:


Applicable Network Scenarios
As shown in the figure below, the addition of a router makes it possible to send traffic between VLANs
while still containing broadcast traffic within VLAN boundaries.
Page | 55

The router uses IP subnets to move traffic between VLANs. Each VLAN has a different IP subnet, and
there is a one-to-one correspondence of VLAN and IP subnet boundaries. If a host is in a given IP
subnet,
it is also in a given VLAN, and vice-versa.

ACL:
Access Control List, ACL is a listing containing one or more ACE that tells a computer operating
system or other network device what rights users have to each item on a computer or network device.
For example, an ACL may specify if a user or the users group have access to a file or folder on that
computer or network.

Access Control Lists (ACLs) allow a router to permit or deny packets based on a variety of criteria. The
ACL is configured in global mode, but is applied at the interface level. An ACL does not take effect
until it is expressly applied to an interface with the ip access-group command. Packets can be filtered as
they enter or exit an interface.
If a packet enters or exits an interface with an ACL applied, the packet is compared against the criteria
of the ACL. If the packet matches the first line of the ACL, the appropriate permit or deny action is
taken. If there is no match, the second lines criterion is examined. Again, if there i

Page | 56

Each of these rules has some powerful implications when filtering IP and IPX packets with access lists.
There are two types of access lists used with IP and IPX:
Standard access lists
These use only the source IP address in an IP packet to filter the network. This basically permits or
denies an entire suite of protocols. IPX standards can filter on both source and destination IPX address.
Extended access lists
These check for both source and destination IP address, protocol field in the Network layer header, and
port number at the Transport layer header. IPX extended access lists use source and
destination IPX addresses, Network layer protocol fields, and socket numbers in the Transport layer
header.

7.4 CREATING VLANS


By default all switch port are the member of the single broadcast domain so all port share the same
broadcast to solve this problem switch support Vlans.
Vlan is a single broadcast domain so that all devices connect to Vlan receive broadcast send by any
other V lan member but different Vlan will not receive those same broadcast .
All switch ports are the member of Vlan 1 called as Native Vlan .
Following commonds are entered:
Switch>enable
Switch#vlan database
FIGURE19: CREATING VLANS

Page | 57

Switch (vlan) #vlan 10 name IT


VLAN 10 added:
Name: IT
Switch (vlan) #vlan 20 name HR
VLAN 20 added:
Name: HR
Switch (vlan) #vlan 30 name ACCOUNTS
VLAN 30 added:
Name: ACCOUNTS
Switch (vlan) #exit
APPLY completed.
Before assigning ports for particular Vlan they all are part of Vlan 1 called Native Vlan
FIGURE20: ALL PORTS ARE MEMBER OF VLAN 1 BY DEFAULT

Page | 58

7.4.1 ASSIGNING PORTS FOR PARTICULAR VLAN


In order to assign ports for particular Vlan first go to global mode then enter the commands.
Commands to be entered:
Switch>enable
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface range f0/3 -24
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 10
FIGURE21: PORTS ASSIGNED TO PARTICULAR VLAN

Page | 59

7.5CREATING INTER VLANS


It is the concept of connecting different different Vlan by using layer 3 device.

As a core layer switch is connected to the Fast Ethernet port i.e.f0/0 of the router and we have so many
Vlan in our network so we create sub interface of Fast Ethernet port to assign particular Vlan to specific
sub interface port and assign the IP address to particular sub interface.
Following commands are entered:
Router>enable

(To enter into the privilege mode)

Router#>configure terminal (To enter into global mode)


Router(config)#interface f0/0(To enter the interface of which sub interfaces are created)
FIGURE22: CREATING SUB INTERFACE AND ASSIGNING FOR VLAN

Page | 60

Router(config-if)#no ip address(No IP is assigned to Fast Ethernet port)


Router(config-if)#no shut
Router(config-if)#interface f0/0.1 (Sub interface is created and make the link up)
%LINK-5-CHANGED: Interface FastEthernet0/0.1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0.1, changed state to up
Router(config-subif)#encapsulation dot1Q 10 (Assigning the sub interfaces for Vlan 10 )
Router(config-subif)#ip address 10.1.1.1 255.255.255.0 (IP is assigned to sub interface)
7.6 CREATING STP FOR VLAN
When we connect multiple switches and multiple paths exists from one switch to another the switching
loop can occur we use multiple paths for reduancy but it possibly creates loops.
All switch in STP (Spanning Tree Protocol) to design loop free topology they select one person for
guidance that is called Root bridge.
To assign a particular switch as a root bridge for particular Vlan we follow the procedure of setting that
switch priority to 0 for particular Vlan.
Following commands are entered:
Switch>enable
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#spanning-tree vlan 10 priority 0
FIGURE23: SETTING SWITCH AS ROOT BRIDGE FOR VLAN
Page | 61

7.8 ENABLING ROUTING TO CONNECT REMOTE AREAS


In order to provide connectivity between remote areas means that one branch is running on particular IP
and another Branch is running on another IP so in order to provide communication between different
networks we make use of routing.
Routing is the act of moving information across an internetwork from a source to a destination. Routing
is used for taking a packet from one device and sending it through the network to another device on a
different network. If your network has no routers, then you are not routing. Routers route traffic to all
the networks in your internetwork. Routing directs packet forwarding, the transit of logically
addressed packets from their source toward their
ultimate destination through intermediate nodes; typically hardware devices called routers, bridges,
gateways, firewalls, or switches.
Following commands are to be entered:
Router>enable

(To enter into the privilege mode)

Router#>configure terminal (To enter into global mode)


Router(config)#router eigrp 1(Routing protocol is run)
Router(config-router)#no auto-summary
Router(config-router)#network 10.0.0.0(Network running on particular router)
Router(config-router)#network 192.168.1.0
Page | 62

FIGURE25: ENABLING ROUTING

7.9 NAT IMPLEMENTATION


It is use for translating private to public IP address. So we can connect our private network running in
the department to connect to the global network .It converts the private IP to Public IP in order to
communicate
Following command are entered:
Router>enable
Router#>configure terminal
Router (config)#>ip nat pool karam 192.168.1.1 192.168.1.1 netmask 255.255.255.0
Router (config)#>access-list 10 permit any
Router (config)#>ip nat inside source list 10 pool karamoverlaod
Router (config)#>interface s0/0
Router (config-if)#>ip nat outside
Router (config)#>interface f0/0.1
Page | 63

Router (config)#>ip nat inside


FIGURE26: PRIVATE IP IS CONVERTED TO PUBLIC IP USING NAT

Servers
A server is primarily a program that runs on a machine, providing a particular and specific service to
other machines connected to the machine on which it is found.
Nowadays, server functionality has become so rich, complex and varied in nature that there are whole
very powerful computers dedicated to being exclusively servers. This has led many non-technical
people to denote servers as being machines that run services.
A network server is a computer designed to process requests and deliver data to other (client)
computers over a local network or the Internet. Network servers typically are configured with
additional processing, memory and storage capacity to handle the load of servicing clients.
DHCP SERVER
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows a central
computer to automatically assign the TCP/IP network configuration to
individual work-stations on a private network.
With DHCP enabled it suffices to enable the "Obtain an IP address
automatically" in the TCP/IP configuration on the private network. The DHCP
Page | 64

Server then takes over the responsibility of assigning the TCP/IP parameters,
significantly lowering the task of network maintenance

How Does DHCP Work?


At boot time the computer has no network parameters assigned to it. The
following list provides an overview of the typical network parameters:
 IP address and network mask
 Default route/gateway an IP address which will be used for forwarding
packets whose destinations are beyond local network
 DNS servers for resolving Internet names (e.g. internet.com) to IP
addresses
 Workstation parameters, e.g., domain name or workgroup/workstation
name
 Static routes
 IP forwarding setting
 MTU size
 Other settings (a complete list can be found in the DHCP RFCs)
 Static configuration.
With static configuration, the client computer uses pre-configured network parameters. The
disadvantages of this approach include the possibility of IP address conflicts and the administrative
issues possible when manually configuring many internal clients.
 DHCP configuration (automatic).
With automatic configuration, the computer obtains its network parameters from the DHCP Server.
This way the IP addresses are automatically managed and accordingly address conflicts are avoided. If
manual and automatic network configurations are used together, the administrator must ensure that the
DHCP Server wont assign IP addresses used by manually-configured computers
Page | 65

How to configure the DHCP server.


Once you have considered the implications of DHCP in your network, you are ready to get started with
the simple configuration.

For a small network, the configuration of the DHCP Server is not very challenging and the InJoy DHCP
Server Plugin is deliberately designed to be extremely simple. In fact, in the InJoy Firewall, you can
immediately enable the DHCP Server and have it operational in less than a minute. Here is how.

PROJECT UNDERTAKEN

Page | 66

INTRANET COMMUNICATION
BETWEEN TWO SITES
This project is about the communication of the two sites (India and Australia) of the same enterprise
situated in different locations and communicating over the intranet between two Sites.
I have created six vlans in customers sites (India) and these vlans are connected to a switch creating
six collision domains and six broadcast domains. And further these two switches are connected to two
different routers of these two different sites in and these two routers are connected to two different
routers of two different service providers.
In these company routers I have used PAT for converting private IPs into public address that is used
over the internet. I put default route to the service provider and tunnel to securely perform the
communication between the customer sites.
In the service provider end I have used OSPF (open shortest path first) for routing purpose.
Page | 67

To overview the service provider I have created a syslog server which will generate the log of routers
and provide updated feedback. For the syslog server I have created a loopback adapter and connected
my laptop as a server.
10. Conclusion and Future Scope :
Communication between Remote Areas and Security has it application in almost every field including
business, education, entertainment, etc. My main goal in this project is to develop a communication
bridge between two customer sites having connectivity with each other with security Its a onetime
Investment project.
Cisco Packet Tracer used in this project is one of the latest cutting edge technologies for Student in this
field. During the initial phases of developing this project I faced several challenges in understanding
some concept in CPR but it got cleared after study and practice.
Being a trainee, I got an excellent opportunity to follow the practices of Networking. Working on the
project help me learn and explore various networking features. There is always a scope for
enhancement in the project ,which currently is for seen in the integration of the modules that were
developed so far during training.

Page | 68

11. REFRENCE
1. Todd Lammle
A Cisco Certified Network Associate Study Guide 7th edition.
2. www.wikepedia.com
A solution to all the to all problems a encyclopaedia with all solution.
3. www.wwgsolution.com
A Pdf file giving a brief description about Frame Relay concepts.
4. Cisco networking Academy
Explain the concept of the working of the Cisco Packet Tracer with system requirement.
5. Interconnecting Cisco Network Devices Part 1 & 2
A Self Guide for understanding the concept of internetwork and introduction to Cisco
routers.

Page | 69

S-ar putea să vă placă și