Project Report 1
Project Report 1
This College Network Scenario (CNS) is about designing a topology of a network that is a LAN
(Local Area Network) for a College in which various computers of different departments are set up
so that they can interact and communicate with each other by interchanging data. To design a
networking scenario for a college which connect various departments to each other’s, it puts
forward communication among different departments. CNS is used to design a systematic and well
planned topology, satisfying all the necessities of the college (i.e. client). CNS come up with a
network with good performance. CNS is also providing security and authentication to forbid
unauthorized logins.
1
CHAPTER 2
It is also called LAN and designed for small physical areas such as an office, group of
buildings or a factory. LANs are used widely as it is easy to design and to troubleshoot. Personal
computers and workstations are connected to each other through LANs. We can use different types
of topologies through LAN, these are Star, Ring, Bus, Tree etc.
LAN can be a simple network like connecting two computers, to share files and network
among each other while it can also be as complex as interconnecting an entire building.
2
LAN networks are also widely used to share resources like printers, shared hard-drive etc.
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and
uses the similar technology as LAN. It is designed to extend over the entire city. It can be means to
connecting a number of LANs into a larger network or it can be a single cable. It is mainly hold and
operated by single private company or a public company.
4
FIGURE 2.3 : A METROPOLITAN AREA NETWORK
5
2.3 Wide Area Network (WAN)
It is also called WAN. WAN can be private or it can be public leased network. It is used for
the network that covers large distance such as cover states of a country. It is not easy to design and
maintain. Communication medium used by WAN are PSTN or Satellite links. WAN operates on
low data rates.
Expensive things (such as printers or phone lines to the internet) can be shared by all the
computers on the network without having to buy a different peripheral for each computer.
6
Everyone on the network can use the same data. This avoids problems where some users
may have older information than others.
This chapter was about networking takes place, we discussed about advantages and disadvantages
of various kinds of networks. In chapter 3 we are going to discuss about reference models and its
layers.
CHAPTER 3
There are many users who use computer network and are located all over the world. To ensure
national and worldwide data communication ISO (ISO stands for International Organization of
Standardization.) developed this model. This is called a model for open system interconnection
(OSI) and is normally called as OSI model .OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete communication system. OSI Reference model is
explained in other chapter.
There are n numbers of users who use computer network and are located over the world. So to
ensure, national and worldwide data communication, systems must be developed which are
8
compatible to communicate with each other ISO has developed a standard. ISO stands
for International organization of Standardization. This is called a model for Open System
Interconnection (OSI) and is commonly known as OSI model.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a complete
communication system. They are:
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Datalink Layer
7. Physical Layer
Below we have the complete representation of the OSI model, showcasing all the layers and how
they communicate with each other.
9
In the table below, we have specified the protocols used and the data unit exchanged by each
layer of the OSI Model.
LAYER NAME OF PROTOCOL NAME OF UNIT EXCHANGED
Application Application protocol APDU-Application Protocol data unit .
Presentation Presentation protocol PPDU-Presentation Protocol data unit .
Session Session protocol SPDU-Session Protocol data unit.
Transport Transport protocol TPDU-Transport Protocol Data Unit.
Network Network layer –host router Packet .
protocol
Data Link Data link layer – host router Frame.
protocol
Physical Physical layer – host router Bit.
protocol
1. Big picture of communication over network is understandable through this OSI model.
2. We see how hardware and software work together.
3. We can understand new technologies as they are developed.
4. Troubleshooting is easier by separate networks.
5. Can be used to compare basic functional relationships on different networks.
The OSI reference model has 7 layers. The principles that were applied to arrive at the seven
layers can be briefly summarized as follows:
10
3.2 Merits of OSI reference model
1. OSI model distinguishes well between the services, interfaces and protocols.
2. Protocols of OSI model are very well hidden.
3. Protocols can be replaced by new protocols as technology changes.
4. Supports connection oriented services as well as connectionless service.
Physical layer is the lowest layer of the OSI reference model. It is responsible for sending
bits from one computer to another. This layer is not concerned with the meaning of the bits and
deals with the setup of physical connection to the network and with transmission and reception of
signals.
1. Representation of Bits: Data in this layer consists of stream of bits. The bits must be
encoded into signals for transmission. It defines the type of encoding i.e. how 0's and 1's are
changed to signal.
2. Data Rate: This layer defines the rate of transmission which is the number of bits per
second.
3. Synchronization: It deals with the synchronization of the transmitter and receiver. The
sender and receiver are synchronized at bit level.
4. Interface: The physical layer defines the transmission interface between devices and
transmission medium.
11
5. Line Configuration: This layer connects devices with the medium: Point to Point
configuration and Multipoint configuration.
6. Topologies: Devices must be connected using the following topologies: Mesh, Star, Ring
and Bus.
7. Transmission Modes: Physical Layer defines the direction of transmission between two
devices: Simplex, Half Duplex, Full Duplex.
8. Deals with baseband and broadband transmission.
12
1. Framing: Frames are the streams of bits received from the network layer into manageable
data units. This division of stream of bits is done by Data Link Layer.
2. Physical Addressing: The Data Link layer adds a header to the frame in order to define
physical address of the sender or receiver of the frame, if the frames are to be distributed to
different systems on the network.
3. Flow Control: A flow control mechanism to avoid a fast transmitter from running a slow
receiver by buffering the extra bit is provided by flow control. This prevents traffic jam at the
receiver side.
4. Error Control: Error control is achieved by adding a trailer at the end of the frame.
Duplication of frames are also prevented by using this mechanism. Data Link Layers adds
mechanism to prevent duplication of frames.
5. Access Control: Protocols of this layer determine which of the devices has control over the
link at any given time, when two or more devices are connected to the same link.
13
4. Breaks larger packets into small packets.
The basic function of the Transport layer is to accept data from the layer above, split it up
into smaller units, pass these data units to the Network layer, and ensure that all the pieces arrive
correctly at the other end.
Furthermore, all this must be done efficiently and in a way that isolates the upper layers
from the inevitable changes in the hardware technology.
The Transport layer also determines what type of service to provide to the Session layer,
and, ultimately, to the users of the network. The most popular type of transport connection is
an error-free point-to-point channel that delivers messages or bytes in the order in which they were
sent.
The Transport layer is a true end-to-end layer, all the way from the source to the destination.
In other words, a program on the source machine carries on a conversation with a similar program
on the destination machine, using the message headers and control messages.
14
2. Segmentation and Reassembling: A message is divided into segments; each segment
contains sequence number, which enables this layer in reassembling the message. Message is
reassembled correctly upon arrival at the destination and replaces packets which were lost in
transmission.
3. Connection Control: It includes 2 types:
Connectionless Transport Layer : Each segment is considered as an independent
packet and delivered to the transport layer at the destination machine.
Connection Oriented Transport Layer : Before delivering packets, connection is
made with transport layer at the destination machine.
4. Flow Control: In this layer, flow control is performed end to end.
5. Error Control: Error Control is performed end to end in this layer to ensure that the
complete message arrives at the receiving transport layer without any error. Error Correction is
done through retransmission.
The primary goal of this layer is to take care of the syntax and semantics of the information
exchanged between two communicating systems. Presentation layer takes care that the data is sent
in such a way that the receiver will understand the information(data) and will be able to use the
data. Languages(syntax) can be different of the two communicating systems. Under this condition
presentation layer plays a role translator.
In order to make it possible for computers with different data representations to
communicate, the data structures to be exchanged can be defined in an abstract way. The
16
presentation layer manages these abstract data structures and allows higher-level data structures(eg:
banking records), to be defined and exchanged.
3.10.1 Functions of Presentation Layer
1. Translation: Before being transmitted, information in the form of characters and numbers
should be changed to bit streams. The presentation layer is responsible for interoperability
between encoding methods as different computers use different encoding methods. It translates
data between the formats the network requires and the format the computer.
2. Encryption: It carries out encryption at the transmitter and decryption at the receiver.
3. Compression: It carries out data compression to reduce the bandwidth of the data to be
transmitted. The primary role of Data compression is to reduce the number of bits to be
0transmitted. It is important in transmitting multimedia such as audio, video, text etc.
1. Mail Services: This layer provides the basis for E-mail forwarding and storage.
2. Network Virtual Terminal: It allows a user to log on to a remote host. The application
creates software emulation of a terminal at the remote host. User's computer talks to the
software terminal which in turn talks to the host and vice versa. Then the remote host believes it
is communicating with one of its own terminals and allows user to log on.
17
3. Directory Services: This layer provides access for global information about various
services.
4. File Transfer, Access and Management (FTAM): It is a standard mechanism to access
files and manages it. Users can access files in a remote computer and manage it. They can also
retrieve files from a remote computer.
In this chapter we have studied about various layers of OSI model. In next chapter we are going to
discuss about TCP/IP reference model.
CHAPTER 4
18
FIGURE 4.1 : TCP/IP REFERENCE MODEL
Support for a flexible architecture. Adding more machines to a network was easy.
The network was robust, and connections remained intact untill the source and destination
machines were functioning.
19
The overall idea was to allow one application on one computer to talk to(send data
packets) another application running on different computer.
21
3. Replacing protocol is not easy.
4. It has not clearly separated its services, interfaces and protocols.
In next chapter we are going to discuss about the hardware used in an enterprise network like
Routers, Hub, Switches, Cables VoIP.
This chapter make us aware about TCP/IP model and further we in next chapter all the
hardwares used in our project has been used.
CHAPTER 5
HARDWARE DESCRIPTION
5.1 ROUTER
Router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. A data packet is
typically forwarded from one router to another router through the networks that constitute
an internetwork until it reaches its destination node.
22
A router is connected to two or more data lines from different networks. When a data packet
comes in on one of the lines, the router reads the network address information in the packet to
determine the ultimate destination. Then, using information in its routing table or routing policy,
it directs the packet to the next network on its journey.
The most familiar type of routers are home and small office routers that simply forward IP
packets between the home computers and the Internet. An example of a router would be the
owner's cable or DSL router, which connects to the Internet through an Internet service
provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or
ISP networks up to the powerful core routers that forward data at high speed along the optical
fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices,
software-based routers also exist.
Fig : Router
5.2 Switch
A network switch (also called switching hub, bridging hub, officially MAC bridge) is
a computer networking device that connects devices together on a computer network by
using packet switching to receive, process, and forward data to the destination device.
A network switch is a multiport network bridge that uses hardware addresses to process and
forward data at the data link layer (layer 2) of the OSI model. Some switches can also process data
at the network layer (layer 3) by additionally incorporating routing functionality. Such switches are
commonly known as layer-3 switches or multilayer switches.
Switches for Ethernet are the most common form of network switch. The first Ethernet
switch was introduced by Kalpana in 1990. Switches also exist for other types of networks
including Fibre Channel, Asynchronous Transfer Mode, and Infini Band.
Unlike less advanced repeater hubs, which broadcast the same data out of each of its ports
and let the devices decide what
data they need, a network switch
forwards data only to the devices
that need to receive it.
23
FIGURE 5.3 : SWITCH
A switch is a device in a computer network that connects together other devices. Multiple
data cables are plugged into a switch to enable communication between different networked
devices. Switches manage the flow of data across a network by transmitting a received network
packet only to the one or more devices for which the packet is intended. Each networked device
connected to a switch can be identified by its network address, allowing the switch to direct the
flow of traffic maximizing the security and efficiency of the network.
A switch is more intelligent than an Ethernet hub, which simply retransmits packets out of
every port of the hub except the port on which the packet was received, unable to distinguish
different recipients, and achieving an overall lower network efficiency.
An Ethernet switch operates at the data link layer (layer 2) of the OSI model to create a
separate collision domain for each switch port. Each device connected to a switch port can transfer
data to any of the other ports at any time and the transmissions will not
interfere. Because broadcasts are still being forwarded to all connected devices by the switch, the
newly formed network segment continues to be a broadcast domain. Switches may also operate at
higher layers of the OSI model, including the network layer and above. A device that also operates
at these higher layers is known as a multilayer switch.
Segmentation involves the use of a switch to split a larger collision domain into smaller
ones in order to reduce collision probability, and to improve overall network throughput. In the
extreme case (i.e. micro-segmentation), each device is located on a dedicated switch port. In
contrast to an Ethernet hub, there is a separate collision domain on each of the switch ports. This
allows computers to have dedicated bandwidth on point-to-point connections to the network and
also to run in full-duplex mode. Full-duplex mode has only one transmitter and one receiver per
collision domain, making collisions impossible.
The network switch plays an integral role in most modern Ethernet local area
networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small
office/home office (SOHO) applications typically use a single switch, or an all-purpose device such
as a residential gateway to access small office/home broadband services such as DSL or cable
Internet. In most of these cases, the end-user device contains a router and components that interface
to the particular physical broadband technology. User devices may also include a telephone
interface for Voice over IP (VoIP).
5.2.1 Role of switches in networking
Switches are most commonly used as the network connection point for hosts at the edge of a
network. In the hierarchical internetworking model and similar network architectures, switches are
also used deeper in the network to provide connections between the switches at the edge.
24
In switches intended for commercial use, built-in or modular interfaces make it possible to
connect different types of networks, including Ethernet, Fibre Channel, RapidIO, ATM, ITU-
T G.hn and 802.11. This connectivity can be at any of the layers mentioned. While the layer-2
functionality is adequate for bandwidth-shifting within one technology, interconnecting
technologies such as Ethernet and token ring is performed more easily at layer 3 or via routing.
[6]
Devices that interconnect at the layer 3 are traditionally called routers, so layer 3 switches can
also be regarded as relatively primitive and specialized routers.[7]
Where there is a need for a great deal of analysis of network performance and security,
switches may be connected between WAN routers as places for analytic modules. Some vendors
provide firewall, network intrusion detection, and performance analysis modules that can plug into
switch ports. Some of these functions may be on combined modules.
Through port mirroring, a switch can create a mirror image of data that can go to an external
device such as intrusion detection systems and packet sniffers.
A modern switch may implement power over Ethernet (PoE), which avoids the need for
attached devices, such as a VoIP phone or wireless access point, to have a separate power supply.
Since switches can have redundant power circuits connected to uninterruptible power supplies, the
connected device can continue operating even when regular office power fails.
5.2.2 Layers
Modern commercial switches use primarily Ethernet interfaces. The core function of an
Ethernet switch is to provide a multiport layer 2 bridging function. Many switches also perform
operations at other layers. A device capable of more than bridging is known as a multilayer switch.
Switches may learn about topologies at many layers and forward at one or more layers.
5.2.2.1 Layer 1
In contrast to a switch that operates at layer 2, an Ethernet hub is a simple layer 1 network
device that does not manage any of the traffic coming through it. Any packet entering a port is
repeated to the output of every other port except for the port of entry. Specifically, each bit or
symbol is repeated as it flows in. A repeater hub can therefore only receive and forward at a single
speed.[] Since every packet is repeated on every other port, packet collisions affect the entire
network, limiting its overall capacity.
By the early 2000s, there was little price difference between a hub and a low-end
switch. Hubs remained useful for a time for specialized applications, such supplying a copy of
network traffic to a packet analyzer. A network tap may also be used for this purpose and many
network switches now have a port mirroring feature that provides the same functionality.
5.2.2.2 Layer 2
A switch operating as a network bridge may interconnect devices in a home or office. The
bridge learns the MAC address of each connected device. Bridges also buffer an incoming packet
and adapt the transmission speed to that of the outgoing port. While there are specialized
applications, such as storage area networks, where the input and output interfaces are the same
bandwidth, this is not always the case in general LAN applications. In LANs, a switch used for end
user access typically concentrates lower bandwidth and uplinks into a higher bandwidth.
Interconnect between switches may be regulated using spanning tree protocol (STP) that
disables links so that the resulting local area network is a tree without loops. In contrast to routers,
25
spanning tree bridges must have topologies with only one active path between two points. Shortest
path bridging is a layer 2 alternative to STP allows all paths to be active with multiple equal cost
paths.
5.2.2.3 Layer 3
A layer-3 switch can perform some or all of the functions normally performed by a router.
Most network switches, however, are limited to supporting a single type of physical network,
typically Ethernet, whereas a router may support different kinds of physical networks on different
ports.
A common layer-3 capability is awareness of IP multicast through IGMP snooping. With
this awareness, a layer-3 switch can increase efficiency by delivering the traffic of a multicast
group only to ports where the attached device has signalled that it wants to listen to that group.
Layer-3 switches typically support IP routing between VLANs configured on the switch.
Some layer-3 switches support the routing protocols that routers use to exchange information about
routes between networks.
5.2.2.4 Layer 4
While the exact meaning of the term layer-4 switch is vendor-dependent, it almost always
starts with a capability for network address translation, but then adds some type of load
distribution based on TCP sessions.
The device may include a stateful firewall, a VPN concentrator, or be an IPSec security gateway.
5.2.2.5 Layer 7
Layer-7 switches may distribute the load based on uniform resource locators (URLs), or by
using some installation-specific technique to recognize application-level transactions. A layer-7
switch may include a web cache and participate in a content delivery network (CDN).
5.3 CABLES
Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some cases, a
network will utilize only one type of cable, other networks will use a variety of cable types. The
type of cable chosen for a network is related to the network's topology, protocol, and size.
Understanding the characteristics of different types of cable and how they relate to other aspects of
a network is necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other related topics.
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists
per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter
the twisting, the higher the supported transmission rate and the greater the cost per foot . The
EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has
established standards of UTP and rated six categories of wire (additional categories are emerging).
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be
27
inserted only one way. RJ stands for Registered Jack, implying that the connector follows a
standard borrowed from the telephone industry. This standard designates which wire goes with each
pin inside the connector.
Although UTP cable is the least expensive cable, it may be susceptible to radio and
electrical frequency interference (it should not be too close to electric motors, fluorescent lights,
etc.). If you must place cable in environments with lots of potential interference, or if you must
place cable in extremely sensitive environments that may be susceptible to the electrical current in
the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the
maximum distance of the cables.
Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield. The metal shield helps to block
any outside interference from fluorescent lights, motors, and other computers.
28
Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In
addition, it can support greater cable lengths between network devices than twisted pair cable. The
two types of coaxial cabling are thick coaxial and thin coaxial.
Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin
coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length
being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable has
been popular in school networks, especially linear bus networks.
Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for
thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being
500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away
from the center conductor. This makes thick coaxial a great choice when running longer lengths in a
linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult
to install.
The most common type of connector used with coaxial cables is the Bayone-Neill-
Concelman (BNC) connector . Different types of adapters are available for BNC connectors,
including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest
points in any network. To help avoid problems with your network, always use the BNC connectors
that crimp, rather screw, onto the cable.
Fiber optic cabling consists of a center glass core surrounded by several layers of protective
materials. it transmits light rather than electronic signals eliminating the problem of electrical
interference. This makes it ideal for certain environments that contain a large amount of electrical
interference. It has also made it the standard for connecting networks between buildings, due to its
immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial
and twisted pair. It also has the capability to carry information at vastly greater speeds. This
capacity broadens communication possibilities to include services such as video conferencing and
interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is
more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable
carrying Ethernet signals.
29
The center core of fiber cables is made from glass or plastic fibers .A plastic coating then
cushions the fiber center, and kevlar fibers help to strengthen the cables and prevent breakage. The
outer insulating jacket made of teflon or PVC.
There are two common types of fiber cables -- single mode and multimode. Multimode cable has a
larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can
provide more distance, but it is more expensive.
30
The steps and principles involved in originating VoIP telephone calls are similar to
traditional digital telephony and involve signalling , channel setup, digitization of the analog voice
signals, and encoding. Instead of being transmitted over a circuit-switched network, the digital
information is packetized, and transmission occurs as IP packets over a packet-switched network.
They transport media streams using special media delivery protocols that encode audio and video
with audio codecs, and video codecs. Various codecs exist that optimize the media stream based on
application requirements and network bandwidth; some implementations rely
on narrowband and compressed speech, while others support high-fidelity stereo codecs.
Early providers of voice-over-IP services offered business models and technical solutions
that mirrored the architecture of the legacy telephone network. Second-generation providers, such
as Skype, built closed networks for private user bases, offering the benefit of free calls and
convenience while potentially charging for access to other communication networks, such as the
PSTN. This limited the freedom of users to mix-and-match third-party hardware and software.
Third-generation providers, such as Google Talk, adopted the concept of federated VoIP—which is
a departure from the architecture of the legacy networks. [1] These solutions typically allow dynamic
interconnection between users on any two domains on the Internet when a user wishes to place a
call.
This chapter was describing about hardware and in upcoming chapter we are going to have
knowledge about Ethernet.
31
CHAPTER 6
ETHERNET
Ethernet is a family of computer networking technologies commonly used in local area
networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was
commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3and has since been
refined to support higher bit rates and longer link distances. Over time, Ethernet has largely
replaced competing wired LAN technologies such as Token Ring, FDDI and ARCNET.
The original 10BASE5 Ethernet uses coaxial cable as a shared medium, while the newer
Ethernet variants use twisted pair and fiber optic links in conjunction with hubs or switches. Over
the course of its history, Ethernet data transfer rates have been increased from the original
2.94 megabits per second (Mbit/s) to the latest 400 gigabits per second (bit/s). The Ethernet
standards comprise several wiring and signalling variants of the OSI physical layer in use with
Ethernet.
Next we are going to discuss about the Packet Tracer over which one works to implement
this project.
CHAPTER 7
PACKET TRACER
32
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that
allows users to create network topologies and imitate modern computer networks. The software
allows users to simulate the configuration of Cisco routers and switches using a simulated
command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users
to add and remove simulated network devices as they see fit. The software is mainly focused
towards Certified Cisco Network Associate Academy students as an educational tool for helping
them learn fundamental CCNA concepts. Previously students enrolled in a CCNA Academy
program could freely download and use the tool free of charge for educational use. Since August
2017 with version 7.1 is free to everyone.
Packet Tracer can be run on iOS, Linux and Microsoft Windows. A
similar Android and iOS apps are also available. Packet Tracer allows users to create simulated
network topologies by dragging and dropping routers, switches and various other types of network
devices. A physical connection between devices is represented by a "cable" item. Packet Tracer
supports an array of simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP, BGP, to the extents required by the current CCNA curriculum. As of
version 5.3, Packet Tracer also supports the Border Gateway Protocol.
In addition to simulating certain aspects of computer networks, Packet Tracer can also be
used for collaboration. As of Packet Tracer 5.0, Packet Tracer supports a multi-user system that
enables multiple users to connect multiple topologies together over a computer network. Packet
Tracer also allows instructors to create activities that students have to complete. Packet Tracer is
often used in educational settings as a learning aid. Cisco Systems claims that Packet Tracer is
useful for network experimentation.
Further in chapter 8 ,Design and Simulation has been discussed that is how the projects work upon
the Cisco Packet Tracer.
CHAPTER 8
PROJECT MODULES
The project is to design a proposal for setting up in an airport There are 3 department .
1. Airport authority
2. Flight service provider
33
3. Guest department
FIGURE 8.1.1
FIGURE 8.2.1
8.3 Departments and Labs
34
There are various department are present in the CNS like Computer science department,
Mechanical Department, Civil Department, Electrical Department etc. In this module Head of
department and professors are connected with each other and maintain the activities of department
and labs only.Labs module is used to maintain the all pc’s to ping with each other and provide all
facilities to student.
FIGURE 8.3.1
This room is maintain all the calls of IP phones only three modules are connected with them i.e;
Network administration , Reception and Director’s office.
FIGURE 8.4.1
35
FIGURE- Main Structure of CNS
CHAPTER 9
PROJECT DESCRIPTION
36
Cisco routers can be configured to function as DHCP servers. The first step is to create a DHCP
pool
Router(config)# ip dhcp pool mypool
Router(dhcp-config)# network 192.168.1.0 255.0.0.0
The first command creates a dhcp pool named mypool. The second command can create our DHCP
scope, indicating the range of address to be leased. The above command indicates any address
between 192.168.1.1-192.168.1.255 can be leased.
FIGURE 9.1.1
37
FIGURE 9.1.2 FIGURE 9.1.3
FIGURE 9.2.1
38
9.2.1 Snapshot of our project
we connect the Network administration, Reception, Director office, Head of Department and
Professor by SMTP server for sending mail.
FIGURE 9.2.2
FIGURE 9.2.3
FIGURE 9.2.4
39
FIGURE 9.2.5
In fig 8.2.2 show how to given IP address to all pc’s in CNS for apply SMTP server and fig 8.2.3,
fig 8.2.4 and fig 8.2.5 show the sending and receiving of the mail from one PC to another PC by
using username and password of individual PC’s.
FIGURE 9.3.1
40
9.3.1 Snapshot of VoIP
FIGURE 9.3.1
Fig 9.3.2 and Fig 9.3.3 show the configuration of VoIP on router in this we add the IP address,
make DHCP pool for IP phones and enable the telephony service for phones and assign the number
to IP-phone.
41
FIGURE 9.3.4 FIGURE 9.3.5
FIGURE 9.3.6
FIGURE 9.3.7
42
In Fig 9.3.4 show configuration of switch which enable the Switchport access and Vlan. In fig 9.3.5
show how the cable is connected physically with IP phone. In fig 9.3.6 show the connection of two
different IP phone with each other after dialing a number of another phone and receiving. In fig
9.3.7 both IP phones are connected with each other.
FIG 9.4.3
In above figures we show the configuration of password on router and rest all routers have same
configuration but different IP address
43
9.5 Configured IP address on routers interface for PC’s
R# config t
R(config)# int f0/0
R(config-if)# add 10.0.0.1 255.255.255.0
R(config-if)# no shut
FIGURE 9.5.1
9.6 PING
Ping is perhaps the most commonly used tool to troubleshoot a network. Ping (Packet Internet
Groper) is included with most operating systems. It is invoked using a ping command and
uses ICMP (Internet Control Message Protocol) to reports errors and provides information related
to IP packet processing. Ping works by sending an ICMP echo request message to the specified IP
address. If the computer with the destination IP address is reachable, it responds with an ICMP
echo reply message.
A ping command usually outputs some other information about a network performance, e.g. a
round-trip time, a time to send an ICMP request packet and receive an ICMP reply packet.
44
FIGURE 9.5.1
FIGURE 9.5.2
In the example above we have pinged the IP address 10.10.100.1. By default, ping on Windows
sends four ICMP request packets. As you can see from the output above, the host with the IP
address of 10.10.100.1 is reachable and has replied with four ICMP reply packets. You can also see
that the remote host has replied within 1 ms (time<1ms), which indicates that the network is not
congested.
45
CONCLUSION
The process of designing a good network requires concerted efforts by network designers and
technicians, who identify network requirements and select the best solutions to meet the needs of a
business. The four fundamental technical requirements of network design are scalability,
availability, security, and Manageability. Our Purpose is to just design an College network only for
software based not practically. The main Purpose of this paper is:
46