Networking Project 7 Sem
Networking Project 7 Sem
This project is totally dedicated to the fresh Network Engineer for new and smart learning of
the Network Structure. In this concept it is possible for the networker to check the incoming &
the outgoing traffic and to maintain some security concepts as well. In this logic we use the
multiple Routing Protocols in different areas of the countrywide WAN. Now it will show the
proper movement of the packet from one part of the country to the other part of the country.
The project starts working from Northern India. The user who is sitting at Patiala location need
to access Cisco server in bangalore. The project explains that how from Patiala location’s
computer, the packet moves out and reaches the Patiala’s Local ISP. From Patiala the WAN
comes into action and reaches Chandigarh followed by Delhi following the OSPF Multi-area
concept. The Packet flows out of Delhi towards the western Region of the country including
Gujrat & Maharashtra while following the EIGRP, The multiple Administrative Unit. The
Packet moves out of the West India and reaches the South-Western Part of India, Bangalore &
Southern Part of India by following Frame-Relay Switch Technology. The Bangalore’s Local
ISP make the packet reachable to the CISCO server. The Google webserver can be accessed at
the Southern Part of India as well.
The concept of Access Control List (ACL), Network Address Translation (NAT), and
Redistribution has also been applied along with the different Routing Protocols which have
been used including Routing Information Protocol (RIP), Open Shortest Path First (OSPF) &
Enhanced Interior Gateway Routing Protocol (EIGRP) as well.
Chapter 1
INTRODUCTION
Here are some ideas of projects in the Networking area. Some of these are new, and
some are ideas that have run before but could be run again. Note that, unlike the
normal project ideas, these ideas do not have a contact listed against them. They are
there to give you ideas of the sort of things that could be done. If a project idea
seems interesting, and you would like to pursue it further, then you should discuss it
with one of the lecturers who are experienced in the Networking area: Bill Buchanan,
Gordon Russell, Ahmed Al-Dubai, Imed Romdhani, Jim Jackson, Robert Ludwiniak
or Neil Urquhart. They may not be able to help you directly, but will at least be able to
point you to somebody better placed, perhaps because their specialist knowledge is
in the area of the project.
This introduces the underlying concepts behind networking using the
Internet and its protocols as examples. There are two goals:
(1) to give you an understanding of how networks, especially the Internet, work,
(2) to teach you network programming.
We will cover the first five chapters of Kurose in detail, working our way down
the network stack from the application layer to the data-link layer. Concurrent
with the lectures, you (in groups of two) will be building a functional TCP/IP
stack and a small web server that will run on it. What you build will be “real” –
your code will interoperate with other TCP/IP stacks and you’ll be able to talk to
your web server using any browser on any TCP/IP stack.
This is a learn-by-doing kind of class. You will get your hands dirty by
examining parts of our Internet infrastructure and building other parts. It will be
a lot of work, but it will also be a lot of fun, provided you enjoy this sort of thing.
We will assume that you do and that you will make a good faith effort. We don’t
want to have to spend too much time measuring your performance. If you care
about what we’re teaching, you’ll do a better job of that yourself, and if you don’t
care, then you should take some course that you do care about.
The goal of the networking project is to enable you to do the following:
Build implementations of the Internet protocols
Generalize this knowledge to other networking protocols.
Be a competent network and systems programmer.
Think like a networking practitioner
Read and judge articles on networking in trade magazines
Begin to read and judge research and technical articles on networking
Create simplicity and reliability out of complexity and unreliability
Structure and design software systems to achieve that simplicity and
Reliability
Chapter 2
Project Specification
2.1 Hardware Specification
CPU Speed :2GHz recommended or higher
Processor :Pentium Processor or above
Memory/RAM: 1GB minimum,2GB recommended or higher
Display Properties: Greater than 256 color depth
Size of Hard Disk:60 GB minimum
NIC Card
2.2.1Packet Tracer
Packet Tracer is a Cisco router simulator that can be utilized in training and education, but
also in research for simple computer network simulations. The tool is created by Cisco
Systems and provided for free distribution to faculty, students, and alumni who are or have
participated in the Cisco Networking Academy. The purpose of Packet Tracer is to offer
students and teachers a tool to learn the principles of networking as well as develop Cisco
technology specific skills.
Features
The current version of Packet Tracer supports an array of simulated Application Layer
protocols, as well as basic routing with RIP,OSPF, and EIGRP, to the extent required by the
current CCNA curriculum. While Packet Tracer aims to provide a realistic simulation of
functional networks, the application itself utilizes only a small number of features found
within the actual hardware running a current CiscoIOS version. Thus, Packet Tracer is
unsuitable for modeling production networks. With the introduction of version 5.3, several
new features were added, including BGP. BGP is not part of the CCNA curriculum, but part
of the CCNP curriculum.
2.3PROJECT DETAIL
2.3.1Description:
Here we have 6 branches of a company in different cities, they are accessing internet through
ISP
2.3.2DEVICES USED
1. 16 SERIAL CABLES
2. 12 COPPER CROSS OVER
3. 22 COPPER STRAIGHT THROUGH
4. 7 ROUTERS
5. 6 SWITCHES(LAYER 2)
6. 13 PCs
7. 2 SERVERs- PT
As shown in Figure; the hub is a hardware device that contains multiple, independent ports that
match the cable type of the network. Most common hubs interconnect Category 3 or 5 twisted-
pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs also exist. The hub
is considered the least common denominator in device concentrators. Hubs offer an
inexpensive option for transporting data between devices, but hubs don't offer any form of
intelligence. Hubs can be active or passive.
3.2SWITCHES
Switches are a special type of hub that offers an additional layer of intelligence to basic,
physical-layer repeater hubs. A switch must be able to read the MAC address of each frame it
receives. This information allows switches to repeat incoming data frames only to the computer
or computers to which a frame is addressed. This speeds up the network and reduces
congestion.
Switches operate at both the physical layer and the data link layer of the OSI Model.
3.3 BRIDGES
A bridge is used to join two network segments together, it allows computers on either segment
to access resources on the other. They can also be used to divide large networks into smaller
segments. Bridges have all the features of repeaters, but can have more nodes, and since the
network is divided, there is fewer computers competing for resources on each segment thus
improving network performance.
3.4 ROUTERS
Routers Are networking devices used to extend or segment networks by forwarding packets
from one logical network to another. Routers are most often used in large internetworks that
use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs)
to the Internet using dedicated leased lines.
Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI)
reference model for networking to move packets between networks using their logical
addresses (which, in the case of TCP/IP, are the IP addresses of destination hosts on the
network). Because routers operate at a higher OSI level than bridges do, they have better
packet-routing and filtering capabilities and greater processing power, which results in routers
costing more than bridges.
Routers contain internal tables of information called routing tables that keep track of all known
network addresses and possible paths throughout the internetwork, along with cost of reaching
each network. Routers route packets based on the available paths and their costs, thus taking
advantage of redundant paths that can exist in a mesh topology network.
Because routers use destination network addresses of packets, they work only if the configured
network protocol is a routable protocol such as TCP/IP or IPX/SPX. This is different from
bridges, which are protocol independent. The routing tables are the heart of a router; without
them, there's no way for the router to know where to send the packets it receives.
Unlike bridges and switches, routers cannot compile routing tables from the information in the
data packets they process. This is because the routing table contains more detailed information
than is found in a data packet, and also because the router needs the information in the table to
process the first packets it receives after being activated. A router can't forward a packet to all
possible destinations in the way that a bridge can.
Static routers: These must have their routing tables configured manually with all network
addresses and paths in the internetwork.
Dynamic routers: These automatically create their routing tables by listening to network
traffic.
Routing tables are the means by which a router selects the fastest or nearest path to the next
"hop" on the way to a data packet's final destination. This process is done through the use of
routing metrics.
Routing metrics which are the means of determining how much distance or time a packet will
require to reach the final destination. Routing metrics are provided in different forms.
hop is simply a router that the packet must travel through.
Ticks measure the time it takes to traverse a link. Each tick is 1/18 of a second. When the router
selects a route based on tick and hop metrics, it chooses the one with the lowest number of ticks
first.
You can use routers, to segment a large network, and to connect local area segments to a single
network backbone that uses a different physical layer and data link layer standard. They can
also be used to connect LAN's to a WAN's.
3.5 GATEWAYS
A gateway is a device used to connect networks using different protocols. Gateways operate at
the network layer of the OSI model. In order to communicate with a host on another network,
an IP host must be configured with a route to the destination network. If a configuration route
is not found, the host uses the gateway (default IP router) to transmit the traffic to the
destination host. The default gateway is where the IP sends packets that are destined for remote
networks. If no default gateway is specified, communication is limited to the local network.
Gateways receive data from a network using one type of protocol stack, removes that protocol
stack and repackages it with the protocol stack that the other network can use.
Examples
E-mail gateways-for example, a gateway that receives Simple Mail Transfer Protocol
(SMTP) e-mail, translates it into a standard X.400 format, and forwards it to its
destination
Gateway Service for NetWare (GSNW), which enables a machine running Microsoft
Windows NT Server or Windows Server to be a gateway for Windows clients so that
they can access file and print resources on a NetWare server
Gateways between a Systems Network Architecture (SNA) host and computers on a
TCP/IP network, such as the one provided by Microsoft SNA Server
A packet assembler/disassembler (PAD) that provides connectivity between a local area
network (LAN) and an X.25 packet-switching network
3.6 NICs (Network Interface Card)
Every networked computer must also have a network adapter driver, which controls the
network adapter. Each network adapter driver is configured to run with a certain type of
network adapter.
3.6.1Network card
A modem is a device that makes it possible for computers to communicate over telephone lines.
The word modem comes from Modulate and Demodulate. Because standard telephone lines
use analog signals, and computers digital signals, a sending modem must modulate its digital
signals into analog signals. The computers modem on the receiving end must then demodulate
the analog signals into digital signals.
Modems can be external, connected to the computers serial port by an RS-232 cable or internal
in one of the computers expansion slots. Modems connect to the phone line using standard
telephone RJ-11 connectors.
3.8 FIREWALLS
whether the communication is being done between a single node and the network, or
between two or more networks
whether the communication is intercepted at the network layer, or at the application
layer
whether the communication state is being tracked at the firewall or not
A networked computer must also have one or more protocol drivers (sometimes called a
transport protocol or just a protocol). The protocol driver works between the upper-level
network software and the network adapter to package data to be sent on the network.
In most cases, for two computers to communicate on a network, they must use identical
protocols. Sometimes, a computer is configured to use multiple protocols. In this case, two
computers need only one protocol in common to communicate. For example, a computer
running File and Printer Sharing for Microsoft Networks that uses both NetBEUI and TCP/IP
can communicate with computers using only NetBEUI or TCP/IP.
RIPV2
OSPF
EIGRP
3.9.1 RIPV2
3.9.2 OSPF
Open Shortest Path First (OSPF) is a link-state routing protocol for Internet Protocol (IP)
networks. It uses a link state routing algorithm and falls into the group of interior routing
protocols, operating within a single autonomous system (AS). It is defined as OSPF Version
2 in (1998) for IPv4 The updates for IPv6 are specified as OSPF Version 3
OSPF is perhaps the most0 widely used interior gateway protocol (IGP) in large enterprise
networks. IS-IS, another link-state dynamic routing protocol, is more common in large
service provider networks. The most widely used exterior gateway protocol is the Border
Gateway Protocol (BGP), the principal routing protocol between autonomous systems on the
Internet
.OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets solely within
a single routing domain (autonomous system). It gathers link state information from available
routers and constructs a topology map of the network. The topology determines the routing
table presented to the Internet Layer which makes routing decisions based solely on the
destination IP address found in IP packets. OSPF was designed to support variable-length
subnet masking (VLSM) or Classless Inter-Domain Routing (CIDR) addressing models.
OSPF detects changes in the topology, such as link failures, and converges on a new loop-
free routing structure within seconds. It computes the shortest path tree for each route using a
method based on Dijkstra's algorithm, a shortest path first algorithm.
The OSPF routing policies to construct a route table are governed by link cost factors
(external metrics) associated with each routing interface. Cost factors may be the distance of
a router (round-trip time), network throughput of a link, or link availability and reliability,
expressed as simple unitless numbers. This provides a dynamic process of traffic load
balancing between routes of equal cost.
An OSPF network may be structured, or subdivided, into routing areas to simplify
administration and optimize traffic and resource utilization. Areas are identified by 32-bit
numbers, expressed either simply in decimal, or often in octet-based dot-decimal notation,
familiar from IPv4 address notation.
3.9.3 EIGRP
Enhanced Interior Gateway Routing Protocol - (EIGRP) is an open routing
protocol loosely based on their original IGRP created by Cisco. EIGRP is an
advanced distance-vector routing protocol, with optimizations to minimize both
the routing instability incurred after topology changes, as well as the use of bandwidth and
processing power in the router. Routers that support EIGRP will automatically redistribute
route information to IGRP neighbors by converting the 32 bit EIGRP metric Update
Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a
mechanism for fast convergence
CHAPTER 4
SNAPSHOTS
4.1PROJECT SCENARIO
hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
!
interface FastEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.1.9 255.255.255.248
!
interface FastEthernet0/0.20
encapsulation dot1Q 20
ip address 192.168.1.17 255.255.255.248
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 192.168.2.1 255.255.255.0
!
interface Serial0/0/1
no ip address
shutdown
!
interface Vlan1
no ip address
shutdown
!
router ospf 1
router-id 1.1.1.1
log-adjacency-changes
network 192.168.1.0 0.0.0.255 area 1
network 192.168.2.0 0.0.0.255 area 0
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login
hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
ipv6 unicast-routing
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
!
interface Serial0/0/0
ip address 192.168.2.2 255.255.255.0
clock rate 64000
!
interface Serial0/0/1
ip address 172.16.1.2 255.255.255.0
clock rate 64000
!
interface Vlan1
no ip address
shutdown
!
router ospf 1
router-id 2.2.2.2
log-adjacency-changes
network 172.16.1.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 0
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login
hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
ip address 172.16.4.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 172.16.3.4 255.255.255.0
!
interface Serial0/0/1
ip address 172.16.5.4 255.255.255.0
clock rate 64000
!
interface Vlan1
no ip address
shutdown
!
router eigrp 100
network 172.16.5.0 0.0.0.255
network 172.16.4.0 0.0.0.255
network 172.16.3.0 0.0.0.255
no auto-summary
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login
hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
ip address 10.1.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 10.1.2.5 255.255.255.0
encapsulation frame-relay
frame-relay map ip 10.1.2.6 506 broadcast
!
interface Serial0/0/1
ip address 172.16.5.5 255.255.255.0
!
interface Vlan1
no ip address
shutdown
!
router eigrp 100
redistribute eigrp 50
network 172.16.5.0 0.0.0.255
no auto-summary
!
router eigrp 50
redistribute eigrp 100
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
no auto-summary
!
router ospf 1
log-adjacency-changes
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login
hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
ip address 10.1.3.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 10.1.5.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface Serial0/0/0
ip address 200.10.10.1 255.255.255.0
ip nat outside
!
interface Serial0/0/1
ip address 10.1.2.6 255.255.255.0
encapsulation frame-relay
frame-relay map ip 10.1.2.5 605 broadcast
ip nat inside
!
interface Vlan1
no ip address
shutdown
!
router eigrp 50
redistribute rip metric 1000 0 1 255 1500
redistribute static
network 10.1.2.0 0.0.0.255
no auto-summary
!
router rip
version 2
redistribute eigrp 50 metric 2
network 10.0.0.0
default-information originate
no auto-summary
!
ip nat inside source list 10 interface Serial0/0/0 overload
ip nat inside source static 10.1.5.2 200.10.10.2
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
!
!
access-list 10 permit 192.168.1.8 0.0.0.7
access-list 10 permit 192.168.1.16 0.0.0.7
access-list 10 permit 192.168.2.0 0.0.0.255
access-list 10 permit 172.16.1.0 0.0.0.255
access-list 10 permit 172.16.3.0 0.0.0.255
access-list 10 permit 172.16.2.0 0.0.0.255
access-list 10 permit 172.16.4.0 0.0.0.255
access-list 10 permit 172.16.5.0 0.0.0.255
access-list 10 permit 10.1.1.0 0.0.0.255
access-list 10 permit 10.1.2.0 0.0.0.255
access-list 10 permit 10.1.3.0 0.0.0.255
access-list 10 permit 10.1.4.0 0.0.0.255
access-list 10 permit 10.1.5.0 0.0.0.255
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login
RUNNING CONFIG (ISP)
hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 0.0.0.0
!
!
spanning-tree mode pvst
!
!
!
!
interface Loopback0
ip address 200.10.20.200 255.255.255.0
!
interface Loopback1
ip address 200.10.30.200 255.255.255.0
!
interface FastEthernet0/0
ip address 200.10.40.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 200.10.50.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 200.10.10.200 255.255.255.0
clock rate 64000
!
interface Serial0/0/1
no ip address
shutdown
!
interface Vlan1
no ip address
shutdown
!
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login
VLAN (SWITCH 1)
Switch>sh vlan
ROUTING COMMANDS
EIGRP COMMANDS:
In global config mode) # router eigrp <AD value>
-config) # router eigrp 100
-router) # network < n/w id of directly connected><wild card mask>
-router) # network 10.1.1.0 0.0.0.255
OSPF COMMANDS:
IN global config mode) # router ospf <process id>
-config) # router ospf 100
-router) # network <network id of directly connected><subnet mask><area 0>
-router) # network 192.168.1.0 0.0.0.255 area 0
-router) # do show ip ospf neigbour(to check the neighbourship)
-router) # do show ip ospf database(to check the database of the events)
1. Standard
-config) # access-list 10 deny host 10.1.1.2
-config) # access-list 10 permit any
-config) # int fa0/0
-int) # ip access-group 10 in
2. Extended
-config) # access-list 10 deny ip host 10.1.1.2 host 20.1.1.2
-config) # access-list 10 permit ip any any
-config) # int fa0/0
-Int) # ip access group 10 in
) # no access list
TO CREATE VLANs
1. To give name to vlan:
-config) # vlan 2
-config) # name xyz
2. To add interfaces to VLAN
-config) # int fa0/0
-int) # switchport mode access
-int) # switchport access vlan2
3. To do trunking
-config) # int fa0/0
-int) # switchport mode trunk
-int) # switchport mode dynamic desirable
4. TO APPLY VTP:
-config) # vtp mode server
-config) # vtp domain cisco.com
-config) # vtp cisco123
-config) # do show vtp status
-config) # debug sw-vlan vtp events
-config) # do show cdp neighbours
The good news is that a sound network infrastructure can address all these issues. At the
foundation of a robust e-commerce infrastructure are the routers and switches.
An integrated approach to routing and switching lets all workers—even those at different
sites—have the same access to business applications, unified communications, and
videoconferencing as their colleagues at headquarters.
Cisco lets you grow your network over time, adding features and functionality as you need
them while ensuring complete investment protection. An added benefit of this integrated
approach is that your IT personnel can centrally
manage the network from headquarters, which keeps staffing counts low.
REFERENCES
1. www.google.com
2. www.cbtnuggets.com