0% found this document useful (0 votes)
34 views22 pages

CNMIni

The document discusses configuring basic network services like VLSM, HTTP, DNS, DHCP on a Cisco Packet Tracer network. It provides objectives and outcomes of the project and describes concepts related to these services and network configuration like VLSM tables, HTTP, DNS, DHCP servers and protocols. It also discusses routing, Cisco access points and their features.

Uploaded by

RITESH CHAVAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views22 pages

CNMIni

The document discusses configuring basic network services like VLSM, HTTP, DNS, DHCP on a Cisco Packet Tracer network. It provides objectives and outcomes of the project and describes concepts related to these services and network configuration like VLSM tables, HTTP, DNS, DHCP servers and protocols. It also discusses routing, Cisco access points and their features.

Uploaded by

RITESH CHAVAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

K.K.

Wagh Ins�tute of Engineering Educa�on and Research,


Nashik Department of Computer Science and Design

Sr. No Name of Student Roll no.

1. Pratik Puri 59

2. Harsh Tayade 67

3. Tejas Uphade 71

4. Hemant Yadav 74

Guided By: Prof. Jayashree Hase

SE Computer Science and Design (2019 Patern)


Computer Networks Project
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

Title: Basic Network Configuration and Services using Cisco Packet Tracer.
Objectives:
1. Design the Network Topology
2. Implement VLSM Table Addressing
3. Assign IP Addresses to Devices
4. Configure HTTP Service
5. Configure DNS Service
6. Configure DHCP Service
7. Configure Cisco Access Point
8. Configure SSH and Telnet on Devices
9. Test End-to-End Connectivity
Outcomes:
1. Efficient Network Addressing: By implementing VLSM table addressing, the network
will have optimized IP address allocation, resulting in efficient utilization of IP address
space.
2. Seamless Web-Based Management: Configuring the HTTP service on routers and
switches will enable administrators to manage and monitor network devices through
intuitive web-based interfaces.
3. Streamlined Name Resolution: By configuring the DNS service, devices in the network
will be able to resolve domain names to IP addresses, simplifying the process of
accessing network resources.
4. Automated IP Address Allocation: The DHCP service configuration will automate the
assignment of IP addresses to devices within the network, reducing the administrative
burden and potential for address conflicts.
5. Enhanced Wireless Connectivity: Configuring the Cisco Access Point will provide
wireless connectivity within a specific coverage area, enabling devices to connect
wirelessly and access network resources seamlessly.
6. Secure Remote Access: By configuring SSH and Telnet on devices, administrators will
have secure remote access options for managing and configuring network devices,
ensuring the confidentiality of sensitive information.
7. Verified Connectivity: Testing the end-to-end connectivity will verify the successful
communication between devices in the network, ensuring that all configured services
and connections are functioning as intended.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

Theory:
VLSM Table:
A VLSM table is a table that is used to store information about the different subnets that are
created by using Variable Length Subnet Masking (VLSM). VLSM is a subnetting technique
that allows network administrators to create subnets of different sizes. This can be useful in
situations where there are a variety of different requirements for the number of hosts that need
to be accommodated on each subnet.
A VLSM table typically contains the following information:
• The network address of each subnet
• The subnet mask for each subnet
• The number of hosts that can be accommodated on each subnet
VLSM tables can be used to help network administrators to plan and implement VLSM
configurations. They can also be used to troubleshoot problems that may occur with VLSM
configurations.
HTTP Protocol:
HTTP stands for Hypertext Transfer Protocol. It is a protocol that is used to transfer hypertext
documents, such as web pages, between a client and a server.
HTTP Server:
An HTTP server is a computer program that delivers web pages to users. When a user enters
a web address into their browser, the browser sends a request to the HTTP server for the
requested web page. The HTTP server then sends the web page back to the browser, which
displays it to the user.
DNS Protocol:
DNS stands for Domain Name System. It is a protocol that is used to translate domain names,
such as www.google.com, into IP addresses.
DNS Server:
A DNS server is a computer program that translates domain names into IP addresses. When a
user enters a domain name into their browser, the browser sends a request to the DNS server
for the IP address of the domain name. The DNS server then sends the IP address back to the
browser, which then connects to the website at that IP address.
DHCP Protocol:
DHCP stands for Dynamic Host Configuration Protocol. It is a protocol that is used to
automatically assign IP addresses to devices on a network.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

DHCP Server:
A DHCP server is a computer program that automatically assigns IP addresses to devices on a
network. When a device boots up on a network, it sends a request to the DHCP server for an IP
address. The DHCP server then assigns an IP address to the device and sends it back to the
device. The DHCP server also assigns other information to the device, such as the subnet mask,
the default gateway, and the DNS server addresses.
Helper Addresses:
A helper address is a special router configuration used to forward broadcast network traffic
from a client machine on one subnet to a server in another subnet.
When a client machine boots up on a network, it sends a broadcast DHCP request to the entire
subnet. The DHCP server that receives the request will respond with an IP address and other
configuration information. However, if the DHCP server is located on a different subnet, the
router will not be able to deliver the request directly. In this case, the router can be configured
with a helper address. The helper address is the IP address of a DHCP server that is located on
the same subnet as the client machine. When the router receives a broadcast DHCP request, it
will forward the request to the helper address. The helper address will then forward the request
to the DHCP server, which will respond with an IP address and other configuration information.
Helper addresses can also be used to forward other UDP traffic, such as BOOTP, DNS, TFTP,
TACACS, TIME, and NetBIOS name and datagram services.
Routing:
Routing is the process of determining the best path for a packet to travel from its source to its
destination. Routers are devices that perform routing. They use routing tables to store
information about the networks that they are connected to and the paths between those
networks.
When a router receives a packet, it looks up the destination address in its routing table. If the
destination address is in the routing table, the router will forward the packet to the next hop in
the path to the destination. If the destination address is not in the routing table, the router will
send a message back to the source indicating that it cannot deliver the packet.
Routing is a critical part of any network. Without routing, packets would not be able to find
their way to their destinations.
There are two main types of routing: static routing and dynamic routing.
• Static routing is when the administrator manually configures the routing table. This is
a simple and easy to understand, but it is not very flexible. If the network topology
changes, the administrator must manually update the routing table.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

• Dynamic routing is when the routers automatically exchange routing information with
each other. This is more complex than static routing, but it is more flexible and can
adapt to changes in the network topology.
Cisco Access Point:
A Cisco access point (AP) is a wireless device that connects wireless devices to a wired
network. It is a key component of a wireless network, and it is responsible for providing
wireless access to users and devices.
Cisco access points are available in a variety of models, each with its own set of features and
capabilities. Some of the features that are commonly found in Cisco access points include:
• Wireless security: Cisco access points support a variety of wireless security protocols,
including WPA2-Personal and WPA2-Enterprise.
• Wireless performance: Cisco access points are designed to provide high-performance
wireless connectivity. They support a variety of wireless standards, including
802.11a/b/g/n/ac.
• Wireless management: Cisco access points can be managed using a variety of methods,
including a web-based interface, a command-line interface, and a mobile app.
Cisco access points are a popular choice for businesses and organizations that need to provide
wireless access to their users and devices. They are reliable, secure, and easy to manage.
Secure Shell (SSH):
SSH, or Secure Shell, is a network protocol that provides a secure way to access a remote
computer. SSH uses encryption to protect your data from being intercepted by unauthorized
users.
SSH is a popular choice for system administrators and other users who need to access remote
computers. It is also used by businesses and organizations to provide secure access to their
employees and customers.
Here are some of the most common uses of SSH:
• Remote administration: SSH can be used to remotely administer a computer. This
means that you can log in to a computer from another computer and make changes to
its settings or files.
• File transfer: SSH can be used to transfer files between computers. This is a secure way
to transfer files, as they are encrypted during the transfer.
• Tunneling: SSH can be used to create a secure tunnel between two computers. This can
be used to access resources on a remote computer, such as a file share or a database.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

• Port forwarding: SSH can be used to forward ports from one computer to another. This
can be used to access services on a remote computer, such as a web server or a game
server.
SSH is a versatile tool that can be used for a variety of tasks. If you need to access a remote
computer, then SSH is the best way to do it.
Telnet:
Telnet is a network protocol that provides a text-based interface to a remote computer. It is a
very old protocol, and it is not considered to be very secure. Telnet sends all data in cleartext,
which means that anyone who can eavesdrop on the network can see what you are typing.
Telnet is still sometimes used for simple tasks, such as checking the status of a remote server.
However, it is generally not recommended for use in any situation where security is important.
Implementation:
1. Design the topology for the project:
• Create a network topology that includes routers, switches, and devices.
• Identify the connections between the devices and their respective interfaces.

2. Assign IP Addresses to the Devices:


Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

• Assign IP addresses based on the VLSM addressing scheme to each


interface of the routers, switches, and other devices.
• We are implementing DHCP for half the devices so assign only 2 LANs
(Server and LAN 1) static IP addresses.
• Ensure that each device has a unique IP address within its assigned subnet.

3. Basic Settings on Router and Switches:


• Configure the hostname for each router and switch.
• Set up administrative passwords to secure access to the devices if required
• Enable necessary interfaces and assign IP addresses.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

Do this for all the ports also configure IP if not done already

• Set up Static Routing on the routers


Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

4. VLSM Table Addressing:


• Determine the network requirements and design a VLSM (Variable Length
Subnet Mask) addressing scheme.
• Calculate the required subnet sizes for each network segment.
• Assign appropriate IP address ranges to each subnet.

LAN Required Subnet Mask Usable IP Range Network ID Broadcast ID


Hosts
1 10 /26 192.168.2.1 - 192.168.2.0 192.168.2.63
(255.255.255.192) 192.168.2.62
2 10 /26 192.168.4.1 - 192.168.4.0 192.168.4.63
(255.255.255.192) 192.168.4.62
3 - Server 4 /27 192.168.1.1 - 192.168.1.0 192.168.1.31
(255.255.255.224) 192.168.1.30
4 – Routing 2 /30 192.168.0.1 - 192.168.0.0 192.168.0.3
(255.255.255.252) 192.168.0.2
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

5. Configure HTTP Service:


• Enable the HTTP service on the server.

• Test the HTTP service by accessing it from a web browser by typing in it’s
IP address (192.168.1.3)
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

6. Configure DNS Service:


• Set up a DNS (Domain Name System) server. Turn it On in the Server
Services.
• Specify DNS server IP address (192.168.1.2).
• Add DNS records.

• Test DNS resolution by performing DNS queries.


Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

7. Configure DHCP Service:


• Enable the DHCP (Dynamic Host Configuration Protocol) service on the
Server.

• Define the DHCP address pool.


• Configure DHCP options, such as DNS server and default gateway settings.

• Configure Helper Addresses on respective Routers.


Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

• Test DHCP functionality by connecting a client device and verifying IP


address assignment, if static routing and helper addresses were added
successfully the DHCP assignment should work. If it doesn’t check these 2
factors.

8. Configure the Cisco Access Point:


• Make Sure the devices you use support wireless connections. If using
PC/Laptop, you need to change a hardware module. Refer pics below
• Turn the laptop/PC off first. Then remove the highlighted module.
• Replace the empty space with WPC300N module. This should enable
wireless connectivity.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

• Set the appropriate SSID (Service Set Identifier) and security settings (e.g.,
WPA2, passphrase) if required.

• Configure the access point to use the correct VLAN or network segment.
• Test wireless connectivity by connecting to the access point from a wireless
device. If everything is successful, this is how the devices connected will
look like.
• And due to this being in the same subnet where we have used DHCP IP
addressing. Switching the IP config to DHCP should assign these devices
with addresses.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

9. Configure SSH and Telnet on Devices:


• Enable SSH (Secure Shell) and Telnet services on the routers and switches.
• Configure the authentication methods (e.g., username/password or public
key) for SSH access.
• Set up access control lists (ACLs) to restrict SSH and Telnet access if
necessary.
• config terminal: Enters global configuration mode.
• enable secret <password>: Sets the enable password. This is the password
that you need to enter to get into privileged mode.
• hostname <hostname>: Sets the hostname of the router.
• ip domain-name <domain-name>: Sets the domain name of the router.
• line vty 0 15: Configures the virtual terminal lines (VTYs). The VTYs are
used to connect to the router from a remote device. The range of 0 to 15
specifies the number of VTYs that are available.
• transport input SSH: Enables SSH on the router. SSH is a secure protocol
that can be used to connect to the router from a remote device.
• crypto key generate rsa (non-exportable): Generates an RSA key pair.
The RSA key pair is used to encrypt traffic between the router and a remote
device. The (non-exportable) option specifies that the key pair cannot be
exported to another device.
• username <username> privilege 15 password <password>: Creates a
new user account. The <username> specifies the name of the user account,
the privilege 15 specifies that the user has the highest level of privileges,
and the <password> specifies the password for the user account.
• write: Saves the configuration to NVRAM. NVRAM is a non-volatile
memory that retains its contents even when the router is powered off.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

• On the PC side, you can use the ssh command to connect to the router. The
SSH command takes two arguments: the username and the destination. The
username is the name of the user account that you created on the router, and
the destination is the IP address of the router.
Command - ssh -l <username> <destination ip>
• Once you are connected to the router, you can use the show interface and
show SSH commands to display information about the interfaces and the
SSH configuration.
Commands – show ssh, show interface.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

• Test SSH and Telnet connectivity by establishing remote sessions to the


devices.
• You can now configure the terminal using a PC instead of using CLI of
router.

10. Test End-to-End Connectivity:


• Verify connectivity between devices by sending pings or sending packets.
• Test connectivity from various devices within the network to ensure proper
routing and reachability.
• Troubleshoot and resolve any connectivity issues that arise.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

Final Layout:

IP configuration Table:
DNS (for all devices) : 192.168.1.2
Device Interface IP Address Subnet Mask Default
Gateway
Router0 Gig0/0 192.168.0.1 255.255.255.252 -
Gig0/1 192.168.1.1 255.255.255.224 -
Gig0/2 192.168.2.1 255.255.255.192 -
Router3 Gig0/0 192.168.0.2 255.255.255.252 -
Gig0/1 192.168.4.1 255.255.255.192 -
PC(Pratik, - 192.168.2.2 – 255.255.255.192 192.168.2.1
Harsh, Tejas, 192.168.2.5
Hemant)
DNS Server 192.168.1.2
Fa0 255.255.255.224
HTTP Server 192.168.1.2 192.168.1.1

DHCP Server 192.168.1.2


Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003

Computer Networks
SE Computer Science & Design Semester: II

PC6 – PC09, DHCP(automatic)


Smartphone, - range(x.x.4.2- 255.255.255.192 192.168.4.1
Laptop, x.x.4.60)
Tablet

Conclusion:
In conclusion, this project focused on designing and implementing a network infrastructure
using VLSM (Variable Length Subnet Masking) techniques. By effectively dividing the IP
address space, we were able to optimize address allocation and efficiently utilize available
resources. Through the configuration of routers, switches, and services like HTTP, DNS,
DHCP, and SSH, we established a secure and functional network environment. This project
provided hands-on experience in subnetting, network addressing, and device configuration,
enabling a better understanding of network design principles and practical implementation.
Overall, it contributed to enhancing network management skills and ensuring smooth and
reliable connectivity within the network infrastructure.

You might also like