Documente Academic
Documente Profesional
Documente Cultură
JALANDHAR
OF
BACHELOR OF TECHNOLOGY
(Electronics & Communication Engineering)
TO
IK GUJRAL PUNJAB TECHNICAL UNIVERSITY
SUBMITTED BY
I hereby certify that the work which is being presented in the report entitled “Six
Months Software Training Report” by me in partial fulfilment of requirements
for the award of degree of B.Tech in Electronics and Communication Engineering
submitted to the Department of Electronics and Communication Engineering at
DAV Institute of Engineering and Technology, in an authentic record of my own
work carried at ITRONIX SOLUTIONS from jan 2019.
Signature:
Mission
M1. To provide conducive learning environment for maximal knowledge transfer.
M2. To impart industry oriented training to the students in emerging domains.
M3. To provide platform for versatile development of students
2. LITERATURE REVIEW
2.1 Computer Networking .3
2.2 Network Design .3
2.3 Enterprise Network .4
2.4 Network Protocol 4
2.5 IP Addressing 5
2.6 Network Models
2.6.1 The TCP/IP Model 6
2.6.2 OSI Network Model 6
1. DESIGN METHODOLOGY
4.1 Network Design 15
4.1.1 Network Architecture 16
4.1.2 Network Protocol
4.1.2.1 Eigrp 17
4.1.2.2 RIP 19
4.1.3 VLAN Configuration 21
4.1.4 Dynamic Host Configuration Protocol 22
4.1.5 Wireless Connectivity 23
4.1.6 VoIP Configuration 24
4.1.7 ACL Configuration 25
4.1.8 Network Connectivity 25
4.1.9 Network Address Translation 26
4.1.10 Server Services 27
4.1.10.1 DHCP Server 28
4.1.10.2 Web Server28
4.1.10.3 Mail Server 29
4.1.10.4 File Server 31
4.1.10.5 DNS Server 33
4.1.10.6 IOT Server 34
4.1.10.7 Syslog Server 36
4.1.10.8 NTP Server 37
4.1.11 HSRP 38
4.1.12 Ping Command 39
4. CONCLUSIONS AND RECOMMENDATIONS
4.1 Significance 40
4.2 Conclusion 40
4.3 Limitation 40
4.4 Recommendation for Future Works 41
LIST OF ABBREVIATIONS
NAT - NETWORK ADDRESS TRANSLATOR
Information and communication are two of the most important strategic issues for
the success of every enterprise. While today nearly every organization uses a
substantial number of computers and communication tools (telephones, fax, and
personal handheld devices), they are often still isolated. While managers today are
able to use the newest applications, many departments still do not communicate
and much needed information cannot be readily accessed.
This project aims at the design and simulation of an enterprise network using
Packet Tracer.
When network devices communicate with many other devices, the workload
required of the CPUs onthe devices can be burdensome. For example, in a large
flat (switched) network, broadcast packets areburdensome. As such the modular
nature of the hierarchical design model is to enable accuratecapacity planning
within each layer of the hierarchy, thus reducing wasted bandwidth.
Networkmanagement responsibility and network management systems should be
distributed to the different layers of a modular network architecture to control
management costs.
Chapter one gives a brief introduction, background, scope and methodologies used.
Chapter Two mostly dealt with the literature review where the fundamental
concepts were carried out. More emphasis wasmade in the methods used in
designing and implementing the project’s Chapter Three. Extensivesimulation and
network troubleshooting including their various results are presented in Chapter
Four andfinally, Chapter Five concluded with concise conclusions and
recommendations for future projects.
CHAPTER TWO
LITERATURE REVIEW
2.1 Computer Networking: A computer network is a system for combination
among two or more computers. These networks are fixed (cabled, permanent) or
temporary (as via modems). A computer network of computer networks that use
the TCP/IP network protocols to facilitate data transmission and exchange intranet
a restricted computer network; a private network created using World Wide Web
software.
Modularity: The modules of the system are the building blocks that are assembled
into the larger campus. The advantage of the modular approach is largely due to
the isolation that it can provide.
Elasticity: The ability to modify portions of the network, add new services, or
increase capacity without going through a major fork-lift upgrade are key
considerations to the effectiveness enterprise designs.
Resilience: While the principles of structured design and the use of modularity
and hierarchy are integral to the design of campus networks they are not sufficient
to create a sustainable and scalable network infrastructure
2.3Enterprise Networks
An enterprise network can be thought of as a “plug-and-play” platform for
connecting many different computing devices. In this platform scenario, no user or
group is an island. All systems can potentially communicate with all other systems
while maintaining reasonable performance, security, and reliability. This has
largely been achieved with Internet protocols and Web technologies that provide
better results at lower cost and fewer configuration problems than the enterprise
computing models. A web browser is like a universal client, and Web servers can
provide data to any of those clients. Web servers are distributed throughout the
enterprise, following distributed computing models. The use of Multi-tiered
Architecture, Enterprise networking, network security, ACL’s, Network Protocols,
IP addressing, VoIP are all important aspects that make up this project. An
enterprise network would connect the isolated departmental or workgroup
networks into an intercompany network, with the potential for allowing all
computer users in a company to access any data or computing resource. It would
provide interoperability among autonomous and heterogeneous systems and have
the eventual goal of reducing the number of communication protocols in use.
Default subnet masks: The following are the default subnet masks:
a) Scalability–How well will the system(s) scale under volume and load.
b)Reliability– What is the elasticity or fault tolerance under multiple conditions
and stimuli.
c) Extensibility – Can the system’s core functionality do more without rewrite
d)Flexibility-How well does the system respond to integration or implementation
in different environments
e) Availability - How dependable is the system uptime
f)Maintainability- How easy is it to maintain the code &components.
g) Usability- Are the interfaces intuitive and desirable.
3.2 Client/server networks
Client/server networks, are more
suitable for larger networks. A central
computer,or 'server', acts as the storage
location for files and applications shared
on the network. Usually theserver is a
higher than average performance
computer. The server also controls the
network access ofthe other computers
which are referred to as the 'client'
computers.
3.3.3 Servers
Servers are often categorized in terms of their purpose. A few examples of the
types of servers available are:
Sys log Server: Syslog is a way for network devices to send event messages
to a logging server – usually known as a Sys log server. The Sys log
protocol is supported by a wide range of devices and can be used to log
different types of events. For example, a router might send messages about
users logging on to console sessions, while a web-server might log access-
denied events.
Voice over Internet Protocol is a category of hardware and software that enables
people to use the Internet as the transmission medium for telephone calls by
sending voice data in packets using I Prather than
by traditional circuit
Access Control List (ACL) are filters that enables one to control which routing
updates or packetsare permitted or denied in or out of a network. They are
specifically used by network administratorsto filter traffic and to provide extra
security for their networks. ACLs provide a powerful way tocontrol traffic into and
out of your network; this control can be as simple as permitting or denyingnetwork
hosts or addresses. ACLs can be configured for all routed network protocols.The
most important reason to configure ACLs is to provide network security.
The following are some of the reasons for configuring ACL in a network:
b) ACLs provide traffic flow control by restricting the delivery of routing updates.
The types of ACLs used in networks are described in the following sub-sections:
Standard access lists create filters based on source addresses and are used for
server based filtering.Address based access lists distinguish routes on a network
you want to control by using networkaddress number .
3.6.2.2 Extended Access Lists
a)The top-down approach: The top-down design approach simplifies the design
process by splitting the design tasks to make it more focused on the design scope
and performed in a more controlled manner, which can ultimately help network
designers to view network design solutions from a business-driven approach.
The network was designed using different technologies which were important and
crucial forthe completion of the task at hand. These technologies deployed were
• EIGRP uses Diffusing Update Algorithm (DUAL) to determine the best path
among all “feasible” paths. DUAL also helps ensure a loopfree routing
environment.
• EIGRP will form neighbor relationships with adjacent routers in the same
Autonomous System (AS).
RIP sends out the full routing table every periodic update.
• RIP uses a form of distance as its metric (in this case, hopcount).
• RIP uses the Bellman-Ford Distance Vector algorithm to determine the best
“path” to a particular destination.
• RIP utilizes UDP port 520 • RIP routes have an administrative distance of 120.
Any network that is 16 hops away or more is considered unreachable to RIP, thus
the maximum diameter of the network is 15 hops. A metric of 16 hops in RIP is
considered a poison route or infinity metric.
If multiple paths exist to a particular destination, RIP will load balance between
those paths (by default, up to 4) only if the metric (hopcount) is equal. RIP uses a
round-robin system of load-balancing between equal metric routes, which can lead
to pinhole congestion.
RIP Versions RIP has two versions, Version 1 (RIPv1) and Version 2 (RIPv2).
RIPv1 (RFC 1058) is classful, and thus does not include the subnet mask with its
routing table updates. Because of this, RIPv1 does not support Variable Length
Subnet Masks (VLSMs). When using RIPv1, networks must be contiguous, and
subnets of a major network must be configured with identical subnet masks.
Otherwise, route table inconsistencies (or worse) will occur.
Due to segmentation of blocks and devices, each switch acted as a VLAN of its
own. The VLAN were first configured from the VLAN data base by assigning a
number and a name to each VLAN.For example the VLANs assigned to the
classroom switches were named A-CLASS and B-CLASSwith numbers 100 and
200 respectively.When assigning IP addresses, all the ports on a switch were
assigned to the VLAN meant for itthereafter configuring it in global configuration
mode as thus:
Router(DHCPconfig)#exit
Router(config)#telephony-service
Router(config-telephony)#max-dn 10
Router(config-telephony)#max-ephones 10
Router(configt-etephony)#IP source-address
10.0.111.1 port 2000
Router(config-telephony)#auto assign 1 to 9
Router(config-telephony)#exit
Router(config)#ephone-dn 1
Router(config-ephone-dn)#number 12345
Router(config-ephone-dn)#exit
Router(config)#ephone-dn 2
Router(config-ephone-dn)#number 33341
To secure and control the network from accessing certain networks, the access
control list wasconfigured and assigned for example students were denied
accessing the private web server as suchthe Fa 3/0 interface was configured while
those in the admin block were permitted.
CORE ROUTER>enable
CORE ROUTER# configure terminal
CORE ROUTER(config)# access-list 10 deny 10.0.20.0 0.0.0.255
CORE ROUTER(config)# access-list 10 permit host 10.0.92.1 0.0.0.255
CORE ROUTER(config)# access-list 10 deny 10.0.30.0 0.0.0.255
CORE ROUTER(config)# access-list 10 permit any
CORE ROUTER(config)# interface Fa 3/0
CORE ROUTER(config-if)# ip access-group 1 in
CORE ROUTER(config-if)# exit
CORE ROUTER(config)# interface Fa 0/0
CORE ROUTER(config-if)# ip access-group 1 in
CORE ROUTER(config-if)# exit
4.1.8Network Connectivity
As the packet tracer layer three switches (the multi-layer switch) could not provide
fiber opticconnectivity, generic devices were used.
.
4.1.9 Network Address Translation
In Network Address Translation, Addresses can be assigned dynamically. Dynamic
NAT allowshosts on a private network that have IP addresses to access a public
network such as the internet.Dynamic NAT occurs when a router assigns an
outside global address from a predefined address, orpool of address to an inside
private network device. The NAT advantage is that individual hosts arenot directly
accessibly from the public internet.
FTP may run in active or passive mode, which determines how the data connection
is established.[5] In both cases, the client creates a TCP control connection from a
random, usually an unprivileged, port N to the FTP server command port 21.
In active mode, the client starts listening for incoming data connections from the
server on port M. It sends the FTP command PORT M to inform the server on
which port it is listening. The server then initiates a data channel to the client from
its port 20, the FTP server data port.
In situations where the client is behind a firewall and unable to accept incoming
TCP connections, passive mode may be used. In this mode, the client uses the
control connection to send a PASV command to the server and then receives a
server IP address and server port number from the serverwhich the client then uses
to open a data connection from an arbitrary client port to the server IP address and
server port number received.
4.1.10.5)ADNS server is a type of name server that manages, maintains and
processes Internet domain names and their associated records. In other words, a
DNS server is the primary component that implements the DNS (Domain Name
System) protocol and provisions domain name resolution services to Web hosts
and clients on an IP-based network.
Primarily designed to locate and deliver websites to end users over the Internet or a
private network, a DNS server is developed on typical hardware but runs
specialized DNS software. It is always connected to the Internet or a network.
Most network equipment, like routers and switches, can send Syslog messages.
Not only that, but *nix servers also have the ability to generate Syslog data, as do
most firewalls, some printers, and even web-servers like Apache.
Windows-based servers don’t support Syslog natively, but a large number of third-
party tools make it easy to collect Windows Event Log or IIS data and forward it to
a Syslog server.
It is a routing protocol that allows host computers on the Internet to use multiple
routers that act as a single virtual router, maintaining connectivity even if the first
hop router fails, because other routers are on "hot standby" - ready to go.
Configured on Cisco routers running the Internet Protocol (IP) over Ethernet, Fiber
Distributed-Data Interface (FDDI), and token ring local area networks (LANs),
HSRP provides automatic router backup. The protocol is fully compatible with
Novell's Internetwork Packet Exchange (IPX), AppleTalk, and Banyan VINES,
and (in some configurations) with Xerox Network Systems (XNS) and DECnet.
Developed by Cisco and specified in IETF Request for Comments (RFC) 2281,
HSRP ensures that only a single router (called the active router) is forwarding
packets on behalf of the virtual router at any given time. A standby router is chosen
to be ready to become the active router, in the event that the current active router
fails. HSRP defines a mechanism used to determine active and standby routers by
referring to their IP addresses. Once these are determined, the failure of an active
router will not cause any significant interruption of connectivity.
4.1.12 Ping Command
Ping is a basic Internet program that allows a user to verify that a particular IP
address exists and can accept requests.
Ping is used diagnostically to ensure that a host computer the user is trying to reach
is actually operating. Ping works by sending an Internet Control Message Protocol
(ICMP) Echo Request to a specified interface on the network and waiting for a
reply. Ping can be used for troubleshooting to test connectivity and determine
response time.
As a verb, ping means "to get the attention of" or "to check for the presence of"
another party online. The computer acronym (for Packet Internet or Inter-Network
Groper) was contrived to match the submariners' term for the sound of a returned
sonar pulse.
Tip: To find out the dot address (such as 205.245.172.72) for a given domain
name, Windows users can go to their command prompt screen (start/run/cmd) and
enter ping xxxxx.yyy (where xxxxx is the second-level domain name like "whatis"
and yyy is the top-level domain name like "com").
CHAPTER FIVE
CONCLUSION AND RECOMMENDATIONS
5.1 Significance
5.2 Conclusion
With the recent advancements in technology, more reliable and convenient means
of designingnetworks will be required The aim of this project being an enterprise
network, is to ensure that nodevice remains onto itself, there should be speed in the
connectivity, addition of devices should nothinder the transfer of packets, added to
that interfaces not meant to accesses should be blocked. It canbe concluded that
this aims were accomplished and totally completed to working and
troubleshootingstandards.
5.3 Limitations
a)There will be need to create fiber optic modules in the 3560 layer 3 switch.
b)Generic routers should have modules that enable telephony service, rather than
being specific to2811 routers alone.