Sunteți pe pagina 1din 52

DAV INSTITUTE OF ENGINEERING AND TECHNOLOGY

JALANDHAR

SIX MONTHS SOFTWARE TRAINING REPORT

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR


THE AWARD OF THE DEGREE

OF

BACHELOR OF TECHNOLOGY
(Electronics & Communication Engineering)
TO
IK GUJRAL PUNJAB TECHNICAL UNIVERSITY

SUBMITTED BY

DEPARTMENT OF ELECTRONICS AND COMMUNICATION


ENGINEERING
MAY-2019
DAV INSTITUTE OF ENGINEERING AND TECHNOLOGY,
JALANDHAR
CANDIDATE'S DECLARATION

I hereby certify that the work which is being presented in the report entitled “Six
Months Software Training Report” by me in partial fulfilment of requirements
for the award of degree of B.Tech in Electronics and Communication Engineering
submitted to the Department of Electronics and Communication Engineering at
DAV Institute of Engineering and Technology, in an authentic record of my own
work carried at ITRONIX SOLUTIONS from jan 2019.

Signature:

Signature of Internal Examiner(s)


ACKNOWLEDGEMENT

I wish to express my sincere thanks to Er.Karan Arora,Mr.Varun Nayyar and


Mr.Anil Talwara for providing me with all the necessary facilities for the research.
I am extremely thankful to Anil sir who had devoted a lot of time in guiding and
supervising me during my training . I would like to extend my deepest gratitude to
Principal, Dr. Manoj Kumar for providing me the opportunity to work under such
talented brains. I would also like to thank to my HOD-ECE Dr. Neeru Malhotra
and internal supervisor Ashish Malhotra, Assistant Professor for his constant
support, feedbacks and encouragement.
Vision
To produce technically competent and socially responsible professionals.

Mission
M1. To provide conducive learning environment for maximal knowledge transfer.
M2. To impart industry oriented training to the students in emerging domains.
M3. To provide platform for versatile development of students

Programme Educational Objectives (PEOs)


PEO1. Graduates of the programme will have skilful career in the domain of
Electronics and Communication Engineering and Information Technology.
PEO2. Graduates of the programme will have attitude of lifelong learning and
adaptability towards new technology.
PEO3. The socially responsible graduates will possess leadership and managerial
skills.

Programme Specific Outcomes (PSOs)


PSO1. Ability to design and solve problems in the field of Electronics &
Communication Engineering by applying the knowledge acquired from Analog
Devices and Circuits, DCLD, VLSI, Embedded systems, Analog& Digital
communication and other allied subjects.
PSO2. Provide with quality technical education & professional skills for preparing
students effectively for solving real time industrial needs and higher studies.
Programme Outcomes(POs)
PO1. Apply the knowledge of Mathematics, Science and Engineering
fundamentals to solve complex problems related to Electronics, Communication
Engineering and Information Technology.
PO2. Identify, formulate & review research literature and analyze complex
Electronics, Communication Engineering and Information Technology problems.
PO3. Design solutions for complex Electronics, Communication Engineering and
Information Technology problems and design system components or processes that
meet the specified needs with appropriate consideration for public health and
safety and cultural social considerations.
PO4. Design and conduct experiments, as well as to analyze and interpret data.
PO5. Apply appropriate techniques, resources and modern engineering & IT tools
for computing practice.
PO6. Analyze the local and global impact of computing on individuals,
organizations and society.
PO7. Knowledge of contemporary issues to understand the impact of engineering
solutions in a global, economic, environmental, and societal context.
PO8. An understanding of professional, ethical, legal, security and social issues
and responsibilities.
PO9. An abilityto function effectively individually and on teams, including diverse
and multidisciplinary, to accomplish a common goal.
PO10. An ability to communicate effectively with engineering community and
society at large.
PO11. An understanding of engineering and management principles and apply
these to one’s own work, as a member and leader in a team, to manage projects.
PO12. Recognize of the need for and an ability to engage in continuing
professional development.
TABLE OF CONTENT
Chapters Page no.
1. INTRODUCTION
1.1 Background 1
1.2 Aim and Objective 1
1.3 Problem Statement 2
1.4 Project Outline .2

2. LITERATURE REVIEW
2.1 Computer Networking .3
2.2 Network Design .3
2.3 Enterprise Network .4
2.4 Network Protocol 4
2.5 IP Addressing 5
2.6 Network Models
2.6.1 The TCP/IP Model 6
2.6.2 OSI Network Model 6

3. SYSTEM REQUIREMENT SPECIFICATION


3.1 Requirement of Enterprise Network 7
3.2 Client/Server Network 7
3.3 Network Devices .
3.3.1 Routers 8
3.3.2 Switches 9
3.3.2.1 VLAN in Switches 9
3.3.3 Servers 9
3.3.3.1 Types of Servers 10
3.4 Wireless Access Point 11
3.5 Voice over Internet Protocol (VoIP) 11
3.6 Access Control List (ACL)
3.6.1 Why use ACL 12
3.6.2 Types of ACL
3.6.2.1 Standard ACL 12
3.6.2.2 Extended ACL 13
3.7 Software Requirement
3.7.1 Cisco Packet Tracer 13
3.8 Hardware Requirement 14

1. DESIGN METHODOLOGY
4.1 Network Design 15
4.1.1 Network Architecture 16
4.1.2 Network Protocol
4.1.2.1 Eigrp 17
4.1.2.2 RIP 19
4.1.3 VLAN Configuration 21
4.1.4 Dynamic Host Configuration Protocol 22
4.1.5 Wireless Connectivity 23
4.1.6 VoIP Configuration 24
4.1.7 ACL Configuration 25
4.1.8 Network Connectivity 25
4.1.9 Network Address Translation 26
4.1.10 Server Services 27
4.1.10.1 DHCP Server 28
4.1.10.2 Web Server28
4.1.10.3 Mail Server 29
4.1.10.4 File Server 31
4.1.10.5 DNS Server 33
4.1.10.6 IOT Server 34
4.1.10.7 Syslog Server 36
4.1.10.8 NTP Server 37
4.1.11 HSRP 38
4.1.12 Ping Command 39
4. CONCLUSIONS AND RECOMMENDATIONS
4.1 Significance 40
4.2 Conclusion 40
4.3 Limitation 40
4.4 Recommendation for Future Works 41
LIST OF ABBREVIATIONS
NAT - NETWORK ADDRESS TRANSLATOR

DHCP - DYNAMIC HOST CONFIGURATION PROTOCOL

DNS - DOMAIN NAME SERVER

VoIP - VOICE OVER INTERNET PROTOCOL

EIGRP - ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL

RIP - ROUTING INFORMATION PROTOCOL

OSPF - OPEN SHORTEST PATH FIRST

BGP - BORDER GATEWAY PROTOCOL

OSI - OPEN SYSTEMS INTERCONNECTIONS

ISO - INTERNATIONAL STANDARDS OF ORGANISATION

CPU - CENTRAL PROCESSING UNIT

Wi-Fi - WIRELESS FIDELITY

CIDR - CLASSLESS INTER DOMAIN ROUTING

VLSM– VARIABLE LENGTH SUBNET MASKING

ACL - ACCESS CONTROL LISTS

NIC – NETWORK INTERFACE CARD

VLAN – VIRTUAL LOCAL AREA NETWORK

LAN – LOCAL AREA NETWORK

WLAN - WIRELESS LOCAL AREA NETWORK


CHAPTER ONE
INTRODUCTION
1.1 Background

Information and communication are two of the most important strategic issues for
the success of every enterprise. While today nearly every organization uses a
substantial number of computers and communication tools (telephones, fax, and
personal handheld devices), they are often still isolated. While managers today are
able to use the newest applications, many departments still do not communicate
and much needed information cannot be readily accessed.

Networking is all about imagination and it’s difficult to track movement of


packets in a real-time environment, thus various networking concepts can be
explained by creating a virtual environment, showing the moment of packets,
exactly as it would happen in real-time. Networks must meet the current needs of
organizations and be able to support emerging technologies as new technologies
are adopted. Network design principles and models can help a network engineer
design and build an network that is flexible, resilient, and manageable. This project
introduces network design concepts ,principles, models, and architectures. It covers
the benefits that are obtained by using a systematic design approach. Emerging
technology trends that will affect network evolution are also discussed.

1.2 Aim and Objectives

This project aims at the design and simulation of an enterprise network using
Packet Tracer.

The objectives of the study are as follows:

a)Design and simulation of an enterprise network ,using Packet Tracer.

b)Configuration of network devices and evaluation of point-to-point connections.


1.3 Problem Statement

When network devices communicate with many other devices, the workload
required of the CPUs onthe devices can be burdensome. For example, in a large
flat (switched) network, broadcast packets areburdensome. As such the modular
nature of the hierarchical design model is to enable accuratecapacity planning
within each layer of the hierarchy, thus reducing wasted bandwidth.
Networkmanagement responsibility and network management systems should be
distributed to the different layers of a modular network architecture to control
management costs.

1.4 Project Outline

Chapter one gives a brief introduction, background, scope and methodologies used.
Chapter Two mostly dealt with the literature review where the fundamental
concepts were carried out. More emphasis wasmade in the methods used in
designing and implementing the project’s Chapter Three. Extensivesimulation and
network troubleshooting including their various results are presented in Chapter
Four andfinally, Chapter Five concluded with concise conclusions and
recommendations for future projects.
CHAPTER TWO
LITERATURE REVIEW
2.1 Computer Networking: A computer network is a system for combination
among two or more computers. These networks are fixed (cabled, permanent) or
temporary (as via modems). A computer network of computer networks that use
the TCP/IP network protocols to facilitate data transmission and exchange intranet
a restricted computer network; a private network created using World Wide Web
software.

2.2 Network Design


Regardless of network size or requirements, a critical factor for successful
implementation of any network design is to follow the good structured engineering
principles as listed below:

Hierarchy: In looking at how structured design rules should be applied to the


campus, it is useful to look at the problem from two perspectives. First, what is the
overall hierarchical structure of the campus and what features and functions should
be implemented at each layer of the hierarchy? Second, what are the key modules
or building blocks and how do they relate to each other and work in the overall
hierarchy.

Modularity: The modules of the system are the building blocks that are assembled
into the larger campus. The advantage of the modular approach is largely due to
the isolation that it can provide.

Elasticity: The ability to modify portions of the network, add new services, or
increase capacity without going through a major fork-lift upgrade are key
considerations to the effectiveness enterprise designs.

Resilience: While the principles of structured design and the use of modularity
and hierarchy are integral to the design of campus networks they are not sufficient
to create a sustainable and scalable network infrastructure
2.3Enterprise Networks
An enterprise network can be thought of as a “plug-and-play” platform for
connecting many different computing devices. In this platform scenario, no user or
group is an island. All systems can potentially communicate with all other systems
while maintaining reasonable performance, security, and reliability. This has
largely been achieved with Internet protocols and Web technologies that provide
better results at lower cost and fewer configuration problems than the enterprise
computing models. A web browser is like a universal client, and Web servers can
provide data to any of those clients. Web servers are distributed throughout the
enterprise, following distributed computing models. The use of Multi-tiered
Architecture, Enterprise networking, network security, ACL’s, Network Protocols,
IP addressing, VoIP are all important aspects that make up this project. An
enterprise network would connect the isolated departmental or workgroup
networks into an intercompany network, with the potential for allowing all
computer users in a company to access any data or computing resource. It would
provide interoperability among autonomous and heterogeneous systems and have
the eventual goal of reducing the number of communication protocols in use.

2.4 Network Protocol


Network protocols are standards that allow computers to communicate. A protocol
defines howcomputers identify one another on a network, the form that the data
should take in transit, and howthis information is processed once it reaches its final
destination. Protocols also define procedures forhandling lost or damaged
transmissions or "packets" . TCP/IP (for UNIX, Windows NT,Windows 95 and
other platforms), IPX (for Novell NetWare), DEC net (for networking
DigitalEquipment Corp. computers), AppleTalk (for Macintosh computers), and
NetBIOS/NetBEUI (forLAN Manager and Windows NT networks) are the main
types of network protocols in use today.Although each network protocol is
different, they all share the same physical cabling. This commonmethod of
accessing the physical network allows multiple protocols to peacefully coexist over
thenetwork media, and allows the builder of a network to use common hardware
for a variety ofprotocols.
2.5IPAddressing
An IP (Internet Protocol) address is a unique identifier for a node or host
connection on an IPnetwork. An IP address is a 32 bit binary number usually
represented as 4 decimal values, eachrepresenting 8 bits, in the range 0 to 255
separated by decimal points. This is known as "dotted decimal" notation. Every IP
address consists of two parts, one identifying the network and one identifying the
node. There are 5 different address classes. One can determine which class any IP
address is in by examining the first 4 bits of the IP address as follows:

Class A addresses begin with 0xxx, or 1 to 126 decimal.


Class B addresses begin with 10xx, or 128 to 191 decimal.
Class C addresses begin with 110x, or 192 to 223 decimal.
Class D addresses begin with 1110, or 224 to 239 decimal.
Class E addresses begin with 1111, or 240 to 254 decimal.
Subnet Masking: Applying a subnet mask to an IP address allows you to identify
the network and node parts of theaddress. The network bits are represented by
the 1s in the mask, and the node bits are represented bythe 0s. Performing a bitwise
logical AND operation between the IP address and the subnet maskresults in the
Network Address or Number.

Default subnet masks: The following are the default subnet masks:

Class A - 255.0.0.0 - 11111111.00000000.00000000.00000000

Class B - 255.255.0.0 - 11111111.11111111.00000000.00000000

Class C - 255.255.255.0 - 11111111.11111111.11111111.00000000

CIDR -Classless InterDomain Routing.CIDR was invented several years ago to


keep the internet from running out of IP addresses. The"Classful" system of
allocating IP addresses can be very wasteful; anyone who could reasonablyshow a
need for more than 254 host addresses was given a Class B address block of 65533
hostaddresses. Even more wasteful were companies and organizations that were
allocated Class Aaddress blocks, which contain over 16 Million host addresses
2.6Network Models
These are models that define a set of network layers and how they interact. There
are severaldifferent network models depending on what organization or company
started them. The mostimportant two are described in the following subsections.

2.6.1 The TCP/IP Model

This model is sometimes called the DOD model


since it was designed for the department ofdefense.
It is also called the internet model because TCP/IP
is the protocol used on theinternet. It is the basic
communication language or protocol of the Internet.

2.6.2 OSI Network Model

The International Standards Organization (ISO) has


defined a standard called the Open Systems
Interconnection (OSI). It is a conceptual model that
characterized and standardizes the internal functions
of a communication system by partitioning it into
abstraction layers. THE OSI AND TCP LAYERS
CHAPTER THREE
SYSTEM REQUIREMENT SPECIFICATION
3.1 Requirements of an Enterprise Network
The following gives an insight into how good an enterprise network should be

a) Scalability–How well will the system(s) scale under volume and load.
b)Reliability– What is the elasticity or fault tolerance under multiple conditions
and stimuli.
c) Extensibility – Can the system’s core functionality do more without rewrite
d)Flexibility-How well does the system respond to integration or implementation
in different environments
e) Availability - How dependable is the system uptime
f)Maintainability- How easy is it to maintain the code &components.
g) Usability- Are the interfaces intuitive and desirable.
3.2 Client/server networks
Client/server networks, are more
suitable for larger networks. A central
computer,or 'server', acts as the storage
location for files and applications shared
on the network. Usually theserver is a
higher than average performance
computer. The server also controls the
network access ofthe other computers
which are referred to as the 'client'
computers.

Fig 3.1 Client Server Network


3.3Network Devices

Typical network devices are described in this section.

3.3.1Routers: Arouter is a physical network device (usually running proprietary


software) that is used to connectseveral network segments into one network or an
existing large network into smaller subnets. Routers operate on the Network layer
3 of the OSI model and unite multiple physical networksegments into a single
seamless, logical network by understanding how to forward traffic from asender to
ultimately reach an intended receiver. This means that routing behavior is
influencedstrongly by the protocols in use.

a) Routing Information Protocol (RIP)/RIPv2:RIP is a standardized Distance


Vector protocol, designed for use on smaller networks. RIP was one of the first
true Distance Vector routing protocols, and is supported on a wide variety of
systems.

b) Enhanced Interior Gateway Routing Protocol (EIGRP):EIGRP is a Cisco-


proprietary Hybrid routing protocol, incorporating features of both Distance-
Vector and Link-State routing protocols.

c) Open Shortest Path First


(OSPF):OSPF is a standardized
Link-State routing protocol,
designed to scaleefficiently to
support larger networks.

d)Border Gateway Protocol


(BGP):BGP is a standardized
exterior gateway protocol (EGP),
as opposed to RIP,OSPF, and
EIGRP which are interior gateway
protocols (IGP’s). BGPVersion 4
(BGPv4) is the current standard
deployment.
3.3.2 Switches

Switches, as in Figure 2.2 are a special type of


hub that offers an additional layer of
intelligence tobasic, physical-layer repeater
hubs. A switch must be able to read the MAC
address of each frame itreceives. This
information allows switches to repeat
incoming data frames only to the computer
orcomputers to which a frame is addressed.

Fig 3.3The Interface of Switch

3.3.2.1 Virtual LANS in Switches

A VLAN is a logical grouping of network users and resources connected to


administratively definedports on a switch. When VLANs are created, it becomes
possible to create smaller broadcast domainswithin a layer 2 switched internetwork
by assigning different ports on the switch to service differentsubnetworks. A
VLAN is treated like its own subnet or broadcast domain, meaning that
framesbroadcast onto the network are only switched between the ports logically
grouped within the sameVLAN.

3.3.3 Servers

A server is a computer, a device or a program


that is dedicated to managing network resources.
Servers are often referred to as dedicated because
they carry out hardly any other tasks apart from
their server tasks.There are a number of
categories of servers, including print servers, file
servers, network servers and database servers.In
theory, whenever computers share resources with
client machines they are considered servers.
Fig. 3.4 Servers
3.3.3.1 Types of Server

Servers are often categorized in terms of their purpose. A few examples of the
types of servers available are:

 A Web server is a computer program that serves requested HTML pages or


files. In this case, a Web browser acts as the client.

 An application server is a program in a computer in


a distributed network that provides the business logic for an application
program.

 A mail server is an application that receives incoming e-mails from local


users (people within the same domain) and remote senders and forwards
outgoing e-mails for delivery.

 A file server is a computer responsible for the central storage and


management of data files so that other computers on the same network can
access them.

 A DNS server is a type of name server that manages, maintains and


processes Internet domain names and their associated records. In other
words, a DNS server is the primary component that implements the DNS
(Domain Name System) protocol and provisions domain name resolution
services to Web hosts and clients on an IP-based network.

 A DHCP Server is a network server that automatically provides and assigns


IP addresses, default gateways and other network parameters to client
devices. It relies on the standard protocol known as Dynamic Host
Configuration Protocol or DHCP to respond to broadcast queries by clients.

 Internet of things (IoT) is the extension of Internet connectivity into


physical devices and everyday objects. Embedded with electronics, Internet
connectivity, and other forms of hardware (such as sensors), these devices
can communicate and interact with others over the Internet, and they can be
remotely monitored and controlled.

 Sys log Server: Syslog is a way for network devices to send event messages
to a logging server – usually known as a Sys log server. The Sys log
protocol is supported by a wide range of devices and can be used to log
different types of events. For example, a router might send messages about
users logging on to console sessions, while a web-server might log access-
denied events.

 NTP is intended to synchronize all participating computers to within a


few milliseconds of Coordinated Universal Time (UTC).

3.4 Wireless Access Point (WAP)


A wireless network adapter card with a transceiver
sometimes called an access point, broadcasts
andreceives signals to and from the surrounding
computers and passes back and forth between
thewireless computers and the cabled network .

Fig 3.5 Wireless router

3.5 Voice over Internet Protocol (VoIP)

Voice over Internet Protocol is a category of hardware and software that enables
people to use the Internet as the transmission medium for telephone calls by
sending voice data in packets using I Prather than
by traditional circuit

transmissions of the PSTN.One advantage of


VoIP is that the telephone calls over the Internet
do not incur a surcharge beyondwhat the user is
paying for Internet access, much in the same way
that the user does not pay forsending individual
emails over the Internet.
3.6Access Control Lists

Access Control List (ACL) are filters that enables one to control which routing
updates or packetsare permitted or denied in or out of a network. They are
specifically used by network administratorsto filter traffic and to provide extra
security for their networks. ACLs provide a powerful way tocontrol traffic into and
out of your network; this control can be as simple as permitting or denyingnetwork
hosts or addresses. ACLs can be configured for all routed network protocols.The
most important reason to configure ACLs is to provide network security.

3.6.1 Why Use ACL

The following are some of the reasons for configuring ACL in a network:

a) Limits network traffic to increase network performance.

b) ACLs provide traffic flow control by restricting the delivery of routing updates.

c) It can be used as additional security.

d) Controls which type of traffic are forwarded or blocked by the router.

e)Ability to control which areas a client access.

3.6.2 Types of Access Control Lists

The types of ACLs used in networks are described in the following sub-sections:

3.6.2.1 Standard Access-List

Standard access lists create filters based on source addresses and are used for
server based filtering.Address based access lists distinguish routes on a network
you want to control by using networkaddress number .
3.6.2.2 Extended Access Lists

Extended access lists create filters based on source addresses, destination


addresses, protocol, portnumber and other features .

3.7 Software Requirement

3.7.1 Cisco Packet Tracer

It is a powerful network simulation that allows us to experiment with the network


behavior and ask what if questions. Packet tracer provides simulation,
visualization, authoring assessment and collaboration capabilities and facilitates
the teaching and learning of complex technology concepts , It supplements the
physical equipment which helps us to create a network with an unlimited number
of devices.
It is a cross platform network simulator designed by Cisco Systems to run on Mac
OS Linux and Microsoft windows. A similar mobile application is also available. It
allows user to create a simulated network topology using dragging and dropping
routers ,switches and various other type of network devices. A physical connection
between devices is represented by using a cable connection. Packet tracer supports
an array of simulated application layer protocols like RIP, OSPF, EIGRP and BGP.
3.8 Hardware Requirements
1. Intel core-i3 based PC
2. Monitor
3. IBM compatible
4. Keyboard
5. Mouse
6. System must have 1 GB Ram
7. Hard disk 80 GB.
8. Switches ( 2 nos)
CHARTER FOUR
DESIGN METHODOLOGY
4.1 Network Design
There are two common approaches to analyze and design networks:

a)The top-down approach: The top-down design approach simplifies the design
process by splitting the design tasks to make it more focused on the design scope
and performed in a more controlled manner, which can ultimately help network
designers to view network design solutions from a business-driven approach.

b)The bottom-up approach: In contrast, the bottom-up approach focuses on


selecting network technologies and design models first. This can impose a high
potential for design failures, because the network will not meet the business or
applications’ requirements.

The network was designed using different technologies which were important and
crucial forthe completion of the task at hand. These technologies deployed were

a)The Network Architecture


b) Routing Protocol
c)VLAN
d)DHCP Configuration
e)Wireless Routing Configurations
f)VoIP
g)Access Control Lists Configuration
h) Network Connectivity
i)Network Address Translation
j)Server Services
k)HSRP
l)Ping Command.
4.1.1 Network Architecture
DFD OF ENTERPRISE NETWORK

4.1.2 Network Protocol


4.1.2.1TheEIGRP (Enhanced Interior Gateway Routing Protocol) was used as
it is a hybrid routing protocol specifically meant for routing numerous routers
across an enterprise network. A totalnumber of ten routers were configured with
the routing protocols. As such with the networkaddresses the adjacent neighbors to
each router were recognized.

EIGRP adheres to the following Hybrid characteristics:

• EIGRP uses Diffusing Update Algorithm (DUAL) to determine the best path
among all “feasible” paths. DUAL also helps ensure a loopfree routing
environment.

• EIGRP will form neighbor relationships with adjacent routers in the same
Autonomous System (AS).

• EIGRP traffic is either sent as unicasts, or as multicasts on address 224.0.0.10,


depending on the EIGRP packet type.

• Reliable Transport Protocol (RTP) is used to ensure delivery of most EIGRP


packets.
• EIGRP routers do not send periodic, full-table routing updates, Updates are sent.

Other characteristics of EIGRP include: • EIGRP supports IP, IPX, and


Appletalk routing.
• EIGRP applies an Administrative Distance of 90 for routes originating within the
local Autonomous System.
• EIGRP applies an Administrative Distance of 170 for external routes coming
from outside the local Autonomous System .
• EIGRP uses Bandwidth and Delay of the Line, by default, to calculate its distance
metric
• EIGRP has a maximum hop-count of 224, though the default maximum hop-
count is set to 100.
EIGRP, much like OSPF, builds three separate tables:
• Neighbor table – list of all neighboring routers. Neighbors must belong to the
same Autonomous System
• Topology table – list of all routes in the Autonomous System
• Routing table – contains the best route for each known network
For example the core router was configured in global configuration mode as
follows:
COREROUTER(config)#router eigrp 1
COREROUTER(router)#network 10.0.0.0
4.1.2.2Routing Information Protocol (RIP)RIP is a standardized Distance Vector
protocol, designed for use on smaller networks. RIP was one of the first true
Distance Vector routing protocols, and is supported on a wide variety of systems.

RIP adheres to the following Distance Vector characteristics:

• RIP sends out periodic routing updates (every 30 seconds) •

RIP sends out the full routing table every periodic update.

• RIP uses a form of distance as its metric (in this case, hopcount).

• RIP uses the Bellman-Ford Distance Vector algorithm to determine the best
“path” to a particular destination.

Other characteristics of RIP include:

• RIP supports IP and IPX routing.

• RIP utilizes UDP port 520 • RIP routes have an administrative distance of 120.

• RIP has a maximum hopcount of 15 hops.

Any network that is 16 hops away or more is considered unreachable to RIP, thus
the maximum diameter of the network is 15 hops. A metric of 16 hops in RIP is
considered a poison route or infinity metric.

If multiple paths exist to a particular destination, RIP will load balance between
those paths (by default, up to 4) only if the metric (hopcount) is equal. RIP uses a
round-robin system of load-balancing between equal metric routes, which can lead
to pinhole congestion.

RIP Versions RIP has two versions, Version 1 (RIPv1) and Version 2 (RIPv2).
RIPv1 (RFC 1058) is classful, and thus does not include the subnet mask with its
routing table updates. Because of this, RIPv1 does not support Variable Length
Subnet Masks (VLSMs). When using RIPv1, networks must be contiguous, and
subnets of a major network must be configured with identical subnet masks.
Otherwise, route table inconsistencies (or worse) will occur.

RIPv2 is a classless, distance vector routing protocol as defined in RFC 1723.


Being a classless routing protocol, means, it includes the subnet mask with the
network addresses in its routing updates.
As with other classless routing protocols, RIPv2
supports CIDR supernets, VLSM and discontiguous networks.
Due to the deficiencies of RIPv1, RIP version 2 (RIPv2) was developed in
1993 and was equipped with the ability to support subnet information and supports
Classless Inter-Domain Routing (CIDR).
A router that receives routing updates from multiple routers advertising the same
classful summary route cannot determine which subnets belong to which summary
route. This inability leads to unexpected results including misrouted packets .
4.1.3 VLAN Configuration

Due to segmentation of blocks and devices, each switch acted as a VLAN of its
own. The VLAN were first configured from the VLAN data base by assigning a
number and a name to each VLAN.For example the VLANs assigned to the
classroom switches were named A-CLASS and B-CLASSwith numbers 100 and
200 respectively.When assigning IP addresses, all the ports on a switch were
assigned to the VLAN meant for itthereafter configuring it in global configuration
mode as thus:

A-CLASS (config) #interface VLAN 100

A-CLASS (config-if) #IP add 10.0.91.2 255.255.255.0

A-CLASS (config-if) #IP default-gateway 10.0.91.1

4.1.4 Dynamic Host Configuration Protocol (DHCP)


Devices in the access layer were many and there appeared a possibility that it
might expand,therefore DHCP used to automatically assign IP addresses via
routers acting as gateways to eachswitch as seen below

Fig 4.6 Creating pool for DHCP


4.1.5 Wireless Connectivity

Wireless access points were configured to


automatically assign IP addresses to
computers nearby.This was done to ease
excess connection of devices. Added to the
fact that there will be need forflexibility
any time a device has to be added to the
network. For this purpose, a Linksys Wi-Fi
wasconfigured. For it to be connected to
the network, its interfaces had to be
connectedto a switch port. Devices nearby
require a Linksys module to be connected.

Fig 4.8 Wireless Connectivity

Fig 4.9 GUI of linksys Wi-Fi


4.1.6 VoIP Configuration

To enable voice communication via IP phones, routers and switches were


configured. The onlyrouter that could enable telephony service was the 2811
router. Hence the connection had to be doneby fast Ethernet cabling. From IP
phones to 2811 router. Thereafter connecting the 2811 router to theDMZ router
using a serial DCE cable with the help of an NM8A/S module on the
router.Configurations were done sequentially as seen below (a DHCP pool to
accommodate the IP phoneshas to be configured first).

Commands on Router for VOIP

Router(config)#IP DHCP pool voice Router

(DHCPconfig)#option 150 IP 10.0.111.1

Router(DHCPconfig)#exit

Router(config)#telephony-service

Router(config-telephony)#max-dn 10

Router(config-telephony)#max-ephones 10

Router(configt-etephony)#IP source-address
10.0.111.1 port 2000

Router(config-telephony)#auto assign 1 to 9

Router(config-telephony)#exit

Router(config)#ephone-dn 1

Router(config-ephone-dn)#number 12345

Router(config-ephone-dn)#exit

Router(config)#ephone-dn 2

Router(config-ephone-dn)#number 33341

Router(config-ephone-dn)#exitFig 4.10 VoIP Configration


4.1.7 Access Control List Configuration

To secure and control the network from accessing certain networks, the access
control list wasconfigured and assigned for example students were denied
accessing the private web server as suchthe Fa 3/0 interface was configured while
those in the admin block were permitted.

CORE ROUTER>enable
CORE ROUTER# configure terminal
CORE ROUTER(config)# access-list 10 deny 10.0.20.0 0.0.0.255
CORE ROUTER(config)# access-list 10 permit host 10.0.92.1 0.0.0.255
CORE ROUTER(config)# access-list 10 deny 10.0.30.0 0.0.0.255
CORE ROUTER(config)# access-list 10 permit any
CORE ROUTER(config)# interface Fa 3/0
CORE ROUTER(config-if)# ip access-group 1 in
CORE ROUTER(config-if)# exit
CORE ROUTER(config)# interface Fa 0/0
CORE ROUTER(config-if)# ip access-group 1 in
CORE ROUTER(config-if)# exit

4.1.8Network Connectivity

As the packet tracer layer three switches (the multi-layer switch) could not provide
fiber opticconnectivity, generic devices were used.

.
4.1.9 Network Address Translation
In Network Address Translation, Addresses can be assigned dynamically. Dynamic
NAT allowshosts on a private network that have IP addresses to access a public
network such as the internet.Dynamic NAT occurs when a router assigns an
outside global address from a predefined address, orpool of address to an inside
private network device. The NAT advantage is that individual hosts arenot directly
accessibly from the public internet.

There are 3 types of NAT:


 Static NAT – In this, a single private IP address is mapped with single Public IP
address, i.e., a private IP address is translated to a public IP address. ...
 Dynamic NAT – In this type of NAT, multiple private IP address are mapped to a
pool of public IP address
 Port Address Translation (PAT) –This is also known as NAT overload. In this,
many local (private) IP addresses can be translated to single public IP address.

4.1.10Server Services
Servers in networking provide various services.A server is a computer program or
device that provides a service to another computer program and its user, also
known as the client. In a data center, the physical computer that a server program
runs on is also frequently referred to as a server. That machine may be a dedicated
server or it may be used for other purposes as well.

4.1.10.1)A DHCP Server is a network server that automatically provides and


assigns IP addresses, default gateways and other network parameters to client
devices. It relies on the standard protocol known as Dynamic

Host Configuration Protocol or DHCP to respond to broadcast queries by clients.


4.1.10.2)A Web server is a computer program that serves requested HTML pages
or files. In this case, a Web browser acts as the client.
4.1.10.3)A mail server is an application that receives incoming e-mails from local
users (people within the same domain) and remote senders and forwards outgoing
e-mails for delivery.

Fig.16adding username and password in mail server


Fig-4 composing e-mail
4.1.10.4)A file server is a computer responsible for the central storage and
management of data files so that other computers on the same network can access
them.

FTP may run in active or passive mode, which determines how the data connection
is established.[5] In both cases, the client creates a TCP control connection from a
random, usually an unprivileged, port N to the FTP server command port 21.

In active mode, the client starts listening for incoming data connections from the
server on port M. It sends the FTP command PORT M to inform the server on
which port it is listening. The server then initiates a data channel to the client from
its port 20, the FTP server data port.

In situations where the client is behind a firewall and unable to accept incoming
TCP connections, passive mode may be used. In this mode, the client uses the
control connection to send a PASV command to the server and then receives a
server IP address and server port number from the serverwhich the client then uses
to open a data connection from an arbitrary client port to the server IP address and
server port number received.
4.1.10.5)ADNS server is a type of name server that manages, maintains and
processes Internet domain names and their associated records. In other words, a
DNS server is the primary component that implements the DNS (Domain Name
System) protocol and provisions domain name resolution services to Web hosts
and clients on an IP-based network.

Primarily designed to locate and deliver websites to end users over the Internet or a
private network, a DNS server is developed on typical hardware but runs
specialized DNS software. It is always connected to the Internet or a network.

A DNS server stores a database of different domain names, network names,


Internet hosts, DNS records and other related data. The most basic function of a
DNS server is to translate a domain name into its respective IP address. During a
domain name resolution query, DNS records are searched, and if found, the
domain name record is returned. If the domain name is not registered or added to
that DNS server, the query is then passed to other DNS servers until the domain
name record is found
4.1.10.6)Internet of things (IoT) is the extension of Internet connectivity into
physical devices and everyday objects. Embedded with electronics, Internet
connectivity, and other forms of hardware (such as sensors), these devices can
communicate and interact with others over the Internet, and they can be remotely
monitored and controlled.
Setting of iot design
4.1.10.7)Syslog Server: Syslog is a way for network devices to send event
messages to a logging server – usually known as a Syslog server. The Syslog
protocol is supported by a wide range of devices and can be used to log different
types of events. For example, a router might send messages about users logging on
to console sessions, while a web-server might log access-denied events.

Most network equipment, like routers and switches, can send Syslog messages.
Not only that, but *nix servers also have the ability to generate Syslog data, as do
most firewalls, some printers, and even web-servers like Apache.

Windows-based servers don’t support Syslog natively, but a large number of third-
party tools make it easy to collect Windows Event Log or IIS data and forward it to
a Syslog server.

.1.10.8)NTP is intended to synchronize all participating computers to


within a few milliseconds of Coordinated Universal Time (UTC).
It uses the intersection algorithm, a modified version of Marzullo's
algorithm, to select accurate time servers and is designed to mitigate the
effects of variable network latency. NTP can usually maintain time to
within tens of milliseconds over the public Internet, and can achieve
better than one millisecond accuracy in local area networks under ideal
conditions. Asymmetric routes and network congestion can cause errors
of 100 ms or more.
The protocol is usually described in terms of a client-server model, but
can as easily be used in peer-to-peer relationships where both peers
consider the other to be a potential time source. Implementations send
and receive timestamps using the User Datagram Protocol (UDP)
on port number 123. They can also use broadcasting or multicasting,
where clients passively listen to time updates after an initial round-trip
calibrating exchange.[3] NTP supplies a warning of any impending leap
second adjustment, but no information about local time zones or daylight
saving time is transmitted.
4.1.11Hot Standby Router Protocol (HSRP)

It is a routing protocol that allows host computers on the Internet to use multiple
routers that act as a single virtual router, maintaining connectivity even if the first
hop router fails, because other routers are on "hot standby" - ready to go.
Configured on Cisco routers running the Internet Protocol (IP) over Ethernet, Fiber
Distributed-Data Interface (FDDI), and token ring local area networks (LANs),
HSRP provides automatic router backup. The protocol is fully compatible with
Novell's Internetwork Packet Exchange (IPX), AppleTalk, and Banyan VINES,
and (in some configurations) with Xerox Network Systems (XNS) and DECnet.

Developed by Cisco and specified in IETF Request for Comments (RFC) 2281,
HSRP ensures that only a single router (called the active router) is forwarding
packets on behalf of the virtual router at any given time. A standby router is chosen
to be ready to become the active router, in the event that the current active router
fails. HSRP defines a mechanism used to determine active and standby routers by
referring to their IP addresses. Once these are determined, the failure of an active
router will not cause any significant interruption of connectivity.
4.1.12 Ping Command

Ping is a basic Internet program that allows a user to verify that a particular IP
address exists and can accept requests.

Ping is used diagnostically to ensure that a host computer the user is trying to reach
is actually operating. Ping works by sending an Internet Control Message Protocol
(ICMP) Echo Request to a specified interface on the network and waiting for a
reply. Ping can be used for troubleshooting to test connectivity and determine
response time.

As a verb, ping means "to get the attention of" or "to check for the presence of"
another party online. The computer acronym (for Packet Internet or Inter-Network
Groper) was contrived to match the submariners' term for the sound of a returned
sonar pulse.

Tip: To find out the dot address (such as 205.245.172.72) for a given domain
name, Windows users can go to their command prompt screen (start/run/cmd) and
enter ping xxxxx.yyy (where xxxxx is the second-level domain name like "whatis"
and yyy is the top-level domain name like "com").
CHAPTER FIVE
CONCLUSION AND RECOMMENDATIONS
5.1 Significance

After the implementation and testing of network; Troubleshooting became easy as


there were nocomplex routing interaction. It was seen to it that devices could reach
out to any point of the networki.e. connectivity within all devices was
ensured.Moreso the network could double or triple in sizewithout major design
changes i.e. it can be flexible at any instant.

5.2 Conclusion

With the recent advancements in technology, more reliable and convenient means
of designingnetworks will be required The aim of this project being an enterprise
network, is to ensure that nodevice remains onto itself, there should be speed in the
connectivity, addition of devices should nothinder the transfer of packets, added to
that interfaces not meant to accesses should be blocked. It canbe concluded that
this aims were accomplished and totally completed to working and
troubleshootingstandards.

5.3 Limitations

When evaluating management solutions for enterprise networks, design simulators


should keep inmind the following:

a)There will be need to create fiber optic modules in the 3560 layer 3 switch.

b)Generic routers should have modules that enable telephony service, rather than
being specific to2811 routers alone.

c)Servers should have interfaces that will enable VoIP configuration.

d)Access points should have the Command Line Interface (CLI).


5.4 Recommendations for Future Work

a) Additional access control lists (ACLs) should be implemented throughout the


network to provide robust end-to-end security.

b) IPv6 addressing can be implemented to overcome any limitations in the number


of hosts that can be used due to the available address space.

c) Additional configuration can be implemented on the network so as to make


video conferencing possible in addition to the currently-available VoIP
capabilities.
REFRENCES
 www.cisco.com
 toddlammleccna book
 http://www.academia.edu
 https://www.csd.uoc.gr/~hy435/material/GNS3-0.5-tutorial.pdf
 www.google.com
 Data Communication and networking by Behrouz A. Forouzan
 http://www-scf.usc.edu/\
 https://www.orbit-computer-solutions.com/ripv2/
https://www.ccnablog.com/dhcp-dynamic-host-configuration-protocol/

S-ar putea să vă placă și