Cisco Packet Tracer
Cisco Packet Tracer
ABSTRACT
The aim of this project is to design the topology of the university network using the software
Cisco Packet Tracer with the implementation of wireless networking systems. This univers ity
network consists of the following devices:
1) Router (1941)
1
2) Switches (2960-24TT)
3) Email server
4) DNS server
5) WEB server (HTTP)
6) Wireless Device (Access Point)
7) PCs
8) Laptops
9) Smartphones
______________________Table Of Content__________________________
1. Cover Page 1
3. Abstract 4
4. Table of Content 5
5. Chapter 1: Introduction 6
2
7. Chapter 3: Work Done 11
10. References 35
CHAPTER 1
INTRODUCTION
● Motivation
The word “digital” is very significant in today’s world, with an increase in the development of
technology the entire world is moving towards the digital era. The educational institution plays
an important role in this digitalization, hence the campus should adapt to digital means of
networking as well and become a “digital campus”. Going wireless plays an important role in
this digitalization. The wireless network makes the connection easy with a reduction in the use
3
of wires or cables. A wired connection makes it difficult to keep track of all the devices and to
manage the cable connection, which is not only chaotic but also challenging to handle.
Campus networking via wireless connection becomes an important part of campus life and
provides the main way for teachers and students to access educational resources, which gives
an important platform to exchange information. As laptops and intelligent terminals are widely
used, demand for access to information anytime and anywhere has become more and more
urgent, but traditional cable networks cannot meet this requirement. Then wireless network
construction becomes necessary and essential. The wireless network is one of the important
components of a digital campus and wisdom campus. It provides an efficient way to explore
the internet with a mobile terminal for teachers and students regardless of cables and places.
This is an important mark of the modern campus as a supplement of a cable network. With the
development of network and communication technology, cable networks on a univers ity
campus bring much convenience for teaching and research work. But for mobility and
flexibility, it has obvious shortcomings. A wireless network can overcome these drawbacks
and has been applied to the university campus.
● Project Statement
The major aim of this project is to show the wireless connectivity that is used in universities to
make the network efficient and mobile at the same time. Mobility is the major concentratio n
of this project. In order to provide equal functionality to all the users (college staff and
students), we have added DNS, Email, and HTTP servers for the maximum utilization of
resources.
4
Hence the campus network provides different services such as connecting the user to the
internet, data sharing among users (students, teachers, and different university members),
accessing different web services for different functionalities, so it needs wireless networking
for smooth processing.
CHAPTER 2
LITERATURE REVIEW
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command -
line interface. Packet Tracer makes use of a drag-and-drop user interface, allowing users to add
and remove simulated network devices as they see fit. The software is mainly focused on
Certified Cisco Network Associate Academy students as an educational tool for helping them
learn fundamental CCNA concepts. Previously students enrolled in a CCNA Academy
program could freely download and use the tool free of charge for educational use.
● Router
A router is a device like a switch that routes data packets based on their IP addresses. The router
is mainly a Network Layer device. Routers normally connect LANs and WANs together and
have a dynamically updating routing table based on which they make decisions on routing the
data packets. Router divides broadcast domains of hosts connected through it.
5
● Switch
A network switch (also called switching hub, bridging hub, officially MAC bridge is
networking hardware that connects devices on a computer network by using packet switching
to receive and forward data to the destination device. A network switch is a multiport network
bridge that uses MAC addresses to forward data at the data link layer (layer 2) of the OSI
model. Some switches can also forward data at the network layer (layer 3) by additiona lly
incorporating routing functionality. Such switches are commonly known as layer-3 switches or
multilayer switches.
● Network Packet
● Wireless Network
A wireless network broadcasts an access signal to the workstations or PCs. This enables
mobility among laptops, tablets, and PCs from room to room while maintaining a firm network
connection continuously. A wireless network also presents additional security requirements.
● Server
A server is a computer or system that provides resources, data, services, or programs to other
computers, known as clients, over a network. In theory, whenever computers share resources
with client machines they are considered servers. There are many types of servers, includ ing
web servers, mail servers, and virtual servers.
Many networks contain one or more of the common servers. The servers used in our project
are as follows:
6
➢ DNS Server
DNS stands for Domain Name System servers which are application servers that
provide a human-friendly naming method to the user computers in order to make IP
addresses readable by users. The DNS system is a widely distributed database of names
and other DNS servers, each of which can be used to request an otherwise unknown
computer name. When a user needs the address of a system, it sends a DNS request
with the name of the desired resource to a DNS server. The DNS server responds with
the necessary IP address from its table of names.
➢ WEB Server
One of the widely used servers in today’s market is a web server. A web server is a
special kind of application server that hosts programs and data requested by users across
the Internet or an intranet. Web servers respond to requests from browsers running on
client computers for web pages, or other web-based services.
➢ EMAIL Server
An e-mail server is a server that handles and delivers e-mail over a network, using
standard email protocols. For example, the SMTP protocol sends messages and handles
outgoing mail requests. The POP3 protocol receives messages and is used to process
incoming mail. When you log on to a mail server using a webmail interface or email
client, these protocols handle all the connections behind the scenes.
● Ethernet
This is the backbone of our network. It consists of the cabling and is typically able to
Transfer data at a rate of 100mb/s. It is a system for connecting a number of computer systems
to form a local area network, with protocols to control the passing of information and to avoid
simultaneous transmission by two or more systems. Among the different types of ethernet, we
have used Gigabit Ethernet, which is a type of Ethernet network capable of transferring data at
7
a rate of 1000 Mbps and fast Ethernet is a type of Ethernet network that can transfer data at a
rate of 100 Mbps.
● Computing Device
Computing devices are the electronic devices that take user inputs, process the inputs, and then
provide us with the end results. These devices may be Smartphones, PC Desktops, Laptops,
printer, and many more.
● Internet Protocol
Internet Protocol (IP) is one of the fundamental protocols that allow the internet to work. IP
addresses are a unique set of numbers on each network and they allow machines to address
each other across a network. It is implemented on the internet layer in the IP/TCP model.
● SSH Protocol
Secure Shell enables a user to access a remote device and manage it remotely. However, with
SSH, all data transmitted over a network (including usernames and passwords) is encrypted
and secure from eavesdropping.
SSH is a client-server protocol, with an SSH client and an SSH server. The client
machine (such as a PC) establishes a connection to an SSH server running on a remote device
(such as a router). Once the connection has been established, a network admin can execute
commands on the remote device.
8
● Simulation Environment
The simulations of our network topology can be easily achieved using cisco packet tracer.
Using a simulation mode, you can see packets flowing from one node to another and can also
click on a packet to see detailed information about the OSI layers of the networking. Packet
Tracer offers a huge platform to combine realistic simulation and visualize them
simultaneously. Cisco Packet Tracer makes learning and teaching significantly easier by
supporting multi-user collaboration and by providing a realistic simulation environment for
experimenting with projects.
CHAPTER 3
WORK DONE
In order to make our project understandable, we have divided the content into steps. They are
as follows:
Before heading towards the implementation we need to make sure of the following
requirements.
9
2. Network Requirements
GLA University Mathura outline is considered for this wireless university network.
The network is divided into 2 areas :
1. Campus Area
The Campus area is further divided into various accessing points like Dome
building, Library, Academic Blocks (AB1 and AB2), Server Center, and IT
consulting.
2. Hostel Area
The Hostel area is further divided into Boys blocks and Girls blocks
respectively.
3. Layout
10
Devices Quantity
1) Router (1941) 3
2) Switches (2960-24TT) 3
3) EMAIL server 1
4) DNS server 1
7) PCs 12
8) Laptops 10
9) Smartphones 2
● Firstly, we placed the main router at the center of the university outline, which
was further connected to the server switch using the gigabit ethernet port with
copper straight-through cable and sub routers (campus router and hostel
router) using the serial port with serial DCE cable at the hostel area and campus
area respectively.
11
● The server switch was further connected to the EMAIL, DNS, and WEB
servers respectively.
● Campus router was connected to the campus switch which was further
connected with wireless access points of the academic block (AB1 and AB2),
dome building, library, and IT consulting.
● The wireless access points were then connected to computing devices (PCs,
laptops, and smartphones).
● Similarly, the hostel router was connected to the hostel switch which was furthe r
connected with the wireless access point of boys block and girls block.
● The wireless access points were then connected to the computing devices (PCs,
laptops, and smartphones), every area has a dedicated access point which can
only be connected with the help of a password.
● All these connections are made through ethernet ports (gigabit ethernet and fast
ethernet) using copper straight-through cables.
12
This is the flow diagram for a better understanding of the steps mentioned above.
13
5. Configuring IP Addresses
We have attached the screenshots of all the IP configuration below:
GigabitEthernet0/1
Serial0/1/0
Serial0/1/1
RIP
14
● DNS SERVER
● WEB SERVER
15
● EMAIL SERVER
● COLLEGE ROUTER
GigabitEthernet0/0
Serial0/1/0
16
● ACADEMIC BLOCK 1
● ACADEMIC BLOCK 2
17
● DOME BUILDING
● LIBRARY
18
Subnet Mask- 255.255.255.0
Default Gateway- 192.168.1.1
DNS Server- 192.168.2.3
● IT Consulting
● HOSTEL ROUTER
GigabitEthernet0/0
19
Serial0/1/0
● Boys Block
● Girls Block
20
IP Addresses are as follows
192.168.3.2- PC
192.168.3.3-Laptop
192.168.3.4- PC
192.168.3.5- Smartphone
Subnet Mask- 255.255.255.0
Default Gateway- 192.168.3.1
DNS Server- 192.168.2.3
SSID Password
1)muj_dome 1234567890
2)muj_library 1234567890
3)muj_ITC 1234567890
4)muj_AB1 1234567890
5)muj_AB2 1234567890
6)muj_boys 1234567890
21
7)muj_girls 1234567890
Passwords are used in accessing the router and all the wireless networks (mentioned in
step 5 wireless access point) to make the access limited to University authorized users
only.
Routers are also secured with ssh (Secure Shell). Routers and their assigned passwords
are mentioned below:
22
2)Router1(College Router) Console password:muj@123 ssh
password: admin
23
24
Connectivity of wireless network on computing devices
25
CHAPTER 4
Finally, we have combined all the steps as mentioned in chapter 3 (work done) and
implemented the desired wireless network for University. We have the complete
network providing various facilities to the teaching staff, non-teaching staff, and
students.
The complete diagram of the University Area Network Scenario created in Packet
Tracer environment
26
● Final Simulation
In Simulation Mode, you can watch your network run at a slower pace, observing the paths that
packets take and inspecting them in detail. The proposed architecture, when simulated on Cisco
Packet Tracer, produced results which are demonstrated as follows:
Final simulation for the network system to check all the connections
27
● Ping Test: Network connectivity and communication can be tested using the ping command,
followed by the domain name or the IP address of the device (equipment) whose connectivity
one wishes to verify.
28
SCREENSHOTS –
Logical View
29
Racks –
Basic Layout –
30
Final Network Design –
CHAPTER 5
31
CONCLUSION AND FUTURE WORK
● Conclusion
We started our discussion with the word “digitalization” and in order to achieve it, we
aimed to start with an educational institute, and finally, we designed a network for a
University, which is wireless. As we mentioned, mobility and efficiency are the key
aspects of wireless networks, which were our main goal, and hence, we decided to shift
to a wireless network instead of a wired one, making our network clean and less chaotic.
● Future Work
The configuration and specifications are for the initial prototype and can further be developed
and additional functionality can be added to increase support and coverage of our existing
network.
32