0% found this document useful (0 votes)
469 views

Project Report: On Networking Communication

This project report summarizes Damanpreet Singh's networking communication project completed from July to December 2011 at A2IT(ZCCINDIA) PVT LTD under the guidance of Miss. Navjot kaur and Mr. SUMIT MALHOTRA. The project involved installing over 100 computers and creating a network using Cisco Packet Tracer to simulate routing, switching, and protocols. Key aspects covered included IP addressing, subnetting, routing protocols, and ensuring network connectivity and security.

Uploaded by

Rocky Singh
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
469 views

Project Report: On Networking Communication

This project report summarizes Damanpreet Singh's networking communication project completed from July to December 2011 at A2IT(ZCCINDIA) PVT LTD under the guidance of Miss. Navjot kaur and Mr. SUMIT MALHOTRA. The project involved installing over 100 computers and creating a network using Cisco Packet Tracer to simulate routing, switching, and protocols. Key aspects covered included IP addressing, subnetting, routing protocols, and ensuring network connectivity and security.

Uploaded by

Rocky Singh
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

PROJECT REPORT

(Project Semester July- December 2011)

On NETWORKING COMMUNICATION

Submitted by

Damanpreet singh
Registration No. 10804845 Roll No. E28T7b37 Program: B. Tech (ECE)
Under the Guidance of

Miss. Navjot kaur (Faculty Coordinator)

Mr. SUMIT MALHOTRA (Company Coordinator)

Department of ECE Lovely School of Technology and Sciences

DECLARATION
I hereby declare that the project work entitled NETWORKING COMMUNICATION is an authentic record of my work carried out at A2IT(ZCCINDIA) PVT LTD. as requirements of Industry Internship Project for the award of degree of B. Tech, Lovely Professional University, Phagwara under the guidance of miss navjot kaur. (Industry coordinator) during July to December 2011.

(Signature of Student) Name of Student:DAMANPREET SINGH Registration no: 10804845

Date: ___________________

Certified that the above statement made by the student is correct to the best of our knowledge and belief.

Miss. Navjot kaur (Faculty Coordinator)

Mr. SUMIT (Company Coordinator)

ACKNOWLEDGEMENT

I take this opportunity to present my votes of thanks to all those guidepost who really acted as lightening pillars to enlighten our way throughout this term paper that has led to successful and satisfactory completion of this study. I am really grateful to Lpu. for providing me with an opportunity to undertake this six month training outside this university and providing me with all the facilities. I am highly thankful to MR Sumit malhotra for his active support, valuable time and advice, whole-hearted guidance, sincere cooperation and pains-taking involvement during the study and in completing the assignment of preparing the given term paper within the time stipulated. Lastly, I am thankful to all those, particularly the various friends, who have been instrumental in creating proper, healthy and conductive environment and including new and fresh innovative ideas for me during the term paper, their help, it would have been extremely difficult for us to prepare the term paper in a time bound framework.

ORGANIZATION OVERVIEW
Name of the Company:-A2IT(ZCCINDIA) PVT LTD. Location: CHANDIGARH

A2IT(ZCCINDIA) was established on 1st July 2001. It offers higher education in computer Hardware and Networking and also provides coaching in International certifications like CCNA,Linux .

A2IT also provides training of international standards. A2IT institutes own placement cell assures quality placement on local, national, and international level to good performer. ZCC Institute has 100% placement record in different companies like HCL, Targus, Wipro, Allegers and Tulip IT etc. Our primary focus is on providing quality education to our Students and provide better placement. The vision of the ZCC Program is to provide students with knowledge and experience that adds value to computer education and Information Technologies through research, product development, and application of current tools to solving educational problem. 1. Profile of the problem My project is regarding about the creation of small organization in which I am going to install more than 100 computers to create a small network. The whole scenario is going to done with the help of software simulator known as CISCO PACKER TRACER in which concepts of routing switching are going to be implemented to show how connectivity is done between different blocks and with main database of organization and along with the outside world . Different kinds of protocols are required to ensure connectivity but as we know sometimes problems arises. One problem that may arise is the issue of a duplicate IP address, problems in the configurations of routing and switching paths in order to ensure connectivity greenlits of router on both sides should be ON , traffic problems over the internet in packet sending and the most important issue is about the security of network. In order to overcome from all these threats I am going to use the implementation of DHCP(domain host configuration protocol),network security concepts implementation along with other procedures.

2 Existing desgin
In the existing design hubs and bridges are used to ensure connectivity between two LAN network. What is the difference between the hub and router? Hub : it is a device that carry information only with in a network over a fixed distance and work in physical layer. Bridge a bridge operaetes in both in phsica and data link layer in physical layer it recie the signal as a data link layer bridge has capability to check MAC ADDRESS.

(In order to ensure connectivity we using hubs and bridges)

New in this system design


What is new in this to design:-in this project we are using the concept of routing and switching techniques with the implementation of different kinds of protocols on software simulator CISCO PACKET TRACER. Now why we are using router because it hav the capacity to work upon network layer of OSI model. Difference between rouerts and switches A switch sorts and distributes the network packets sent between the devices on a local area network

(LAN), while a router is a gateway that connects two or more networks, which can be any combination of LANs, wide area networks (WAN), or the Internet. In addition, a router uses tables to determine the best path to use to distribute the network packets it receives, and a protocol such as EIGRP RIP AND OSPF to communicate with other routers.

Connectivity using switches and routers And my whole project is based on this technique and I am going to implement on packet tracer software which basically uses commands to ensure connectivity and during the time of presentation I will show how network A send a message to network B. Project analysis Project definition: As I already told you I am going to create a network a organization to show how data flow over the internet between different junctions. Throughout my journey I am only using commands in order to implement the whole scenario. We should know about the concepts of allocation of ip addresses what Is mac address sub netting because every pc require unique identity IP ADDRESS which we can allow with the help of subnetting . should have strong command over packet tracer to make connections. problems of traffic is common in now these days over internet and I am going to show you by using the concept of frame relay and DHCP and last not at least security of network

Project defination I am going to use the installation of more than 100 computers by creating sub blocks under the organization by creating VLANS(virtual local area network) . sub blocks which are basically a kind of departments like library management education uses vlans concepts with the help of switches and routing techniques with commands. here is the below scenario regarding about my project and my whole presentation based on upon this

Using routing techniques to ensure connectivity Software machine requirements 1: cisco packet tracer current version 5.3 2 knowledge about allocation of ip addresses 3:routers 4:switches 5:implementation of different kind of protocols RIP OSPF EIGRP

PACKET TRACER
Packet Tracer is a medium fidelity, network-capable, simulation-based learning environment for networking novices to design, configure, and troubleshoot computer networks at a CCNA-level of complexity. Packet Tracer is an integrated simulation, visualization, collaboration, and assessment environment. Packet Tracer supports student and instructor creation of simulations, visualizations, and animations of networking phenomena. Like any simulation, Packet Tracer relies on a simplified model of networking devices and protocols. Real computer networks, experienced both in-person/hands-on and remotely, remain the benchmark for understanding network behavior and developing networking skills.

Protocols LAN: Ethernet (including CSMA/CD*) Switching: VLANs, 802.1q, trunking, trunking modes *, multilayer switching*, TCP/IP: HTTP, HTTPS, DHCP, Telnet, DNS, TCP*, UDP, IPv4*, IPv6*, ARP, FTP, POP3, Routing: static, default, RIPv1, RIPv2, EIGRP, single-area OSPF, multi-area OSPF, BGP, Logical Workspace Network topology creation Devices: Routers, switches, hosts (Server, Desktop and Laptop), hubs, bridges, wireless access points, wireless routers, clouds, and DSL/cable modems Device interconnection through a variety of networking mediaMultiuser remote networks Ip addresses The Internet Protocol moves data between hosts in the form of datagrams. Each datagram is delivered to the address contained in the Destination Address of the datagram's header. The Destination Address is a standard 32-bit IP address that contains sufficient information to uniquely identify a network and a specific host on that network. An IP address contains a network part and a host part, but the format of these parts is not the same in every IP address. The numbers of address bits used to identify the network, and the number used to identify the host, vary according to the prefix length of the address. There are two ways the prefix length is determined: by address class or by a CIDR method.

Classes of ip addresses We can easily find the class of ip addresses with the help of the range possessed by them

In TCP/IP by default three sizes of networks are available: (1) Class A -224 PC -> 16777216 (2) Class B - 216 PC-> 65536 (3) Class C 28 PC -> 256 In class a ip address total no of addresses are more than 16 milloions with the allocation of 128 blocks so each block in this class contains 16 millions addresses its is unable to install more than 16 milloions computers in one organsation so most of the ip addresses are wasted. Similarly is the story of class b ip addresses in which more than 16000 thousands blocks are available 65000 addresses available so same reason thousands of addresses gone wasted. Infact we give more priority to c class addresses total availability 256 addresses so single block can afford 256 addresses

Subnetting
In subneting, we will divide class A,B & C network into small size sub networks. This procedure is called subneting.

Why to Sub?
(i) Default Class Network provide us large no. of PCs in comparison to the requirement of PCs in the network. (ii) It is practical never possible to create a class A or class B sized network.

To reduce the broadcast of network, we have to perform LAN segmentation of routers. In each sub network, we need different network addresses.

How to Subnet?
In this formula, we will first modify our requirement according to the no. of subnet possible then we calculate new subnet mask and create IP range. Example A service provider has given you the Class C network range 209.50.1.0. Your company must break the network into 20 separate subnets.

Step 1) Determine the number of subnets and convert to binary - In this example, the binary representation of 20 = 00010100. Step 2) Reserve required bits in subnet mask and find incremental value - The binary value of 20 subnets tells us that we need at least 5 network bits to satisfy this requirement (since you cannot get the number 20 with any less than 5 bits 10100) - Our original subnet mask is 255.255.255.0 (Class C subnet) - The full binary representation of the subnet mask is as follows: 255.255.255.0 = 11111111.11111111.11111111.00000000 - We must convert 5 of the client bits (0) to network bits (1) in order to satisfy the requirements: New Mask = 11111111.11111111.11111111.11111000 - If we convert the mask back to decimal, we now have the subnet mask that will be used on all the new networks 255.255.255.248 - Our increment bit is the last possible network bit, converted back to a binary number: New Mask = 11111111.11111111.11111111.1111(1)000 bit with the parenthesis is your increment bit. If you convert this bit to a decimal number, it becomes the number 8 209.50.1.0 209.50.1.7 209.50.1.8 209.50.1.15 209.50.1.16 209.50.1.23

Routers interfaces : Interface is used to connect LAN networks or wan networks to the router.
Interface will use protocol stacks to send/receive data. Ports are used for the configuration of routers. Ports are not used to connect different n/ws. The primary purpose of port is the management of router. Router access modes: When we access router command prompt the router will display different modes. According to the modes, privileges and rights are assigned to the user.

User mode In this mode, we can display basic parameter and status of the router we can test connectivity and perform telnet to other devices. In this mode we are not enable to manage & configure router.

Privileged mode In this mode, we can display all information, configuration, perform administration task, debugging, testing and connectivity with other devices. We are not able to perform here configuration editing of the router.The command to enter in this mode is enable. We have to enter enable password or enable secret password to enter in this mode. Enable secret has more priority than enable password. If both passwords are configured then only enable secret will work. Interface configuration mode This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc. Router(config)#interface <type> <number> Router(config)#interface serial 1

Routing configuration mode This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc. Router(config)#router <protocol> [<option>] Router(config)#router rip Router(config)#router eigrp 10 Configuring secondary IP Router#config terminal Router(config)#interface <type> <no> Router(config-if)#IP address 192.168.10.5 255.255.255.0

Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary Router(config-if)#no shutdown (to enable the interface because they always shutdown) Router(config-if)#exit Router#show run (to display secondary IP

Protocols
1:eigrp 2:ospf

Configuring EIGRP Router(config)#router eigrp <as no> Router(config-router)#network <net addr.> Router(config-router)#network <net addr.> Router(config-router)#exit

Configuring EIGRP Metric If we want our router to use additional metric then we can use following command: Router(config)#Router eigrp <as no> Router(config-router)#metric weights 0 <k1> <k2> <k3> <k4> <k5> Type of service (default) 1 Router(config-router)#ex Ospf configuration Commands to configure OSPF Router#conf ter Router(config)#router ospf <process no> Router(config-router)#network <net address> <wild mask> area <area id> Router(config-router)#network <net address> <wild mask> area <area id> Router(config-router)#exit 0 1 0 0

LAN Switching
Ethernet switches are used in LAN to create Ethernet n/ws. Switches forward the traffic on the basis of MAC address. Switches maintain a switching table in which mac addresses and port no.s are used to perform switching decision. Working of bridge and switch is similar to each other. Types of switches based on command mode (only in Cisco) (1) IOS based (2) CLI based Configuring IP and Gateway on switch We can configure IP address on switch for web access or telnet IP address is required for the administration of the switch. If we have to access switch from remote n/w then we will configure default gateway in addition to IP address. IP address is assigned to the logical interface of switch with following command:Switch(config)#interface vlan 1 Switch(config)#IP address <ip> <mask> Switch(config)#no sh Switch(config)#exit

Design

Implementation of a project
Attendance management o Using this system we can have a record of candidate attendance and the whole staff working under the organsation

Library management o This system can also be implemented inside the library. Records of books keep under computer database records of overdue books and whole

Fee management o o Whenever we submit our tuition fee ,our college provides us a fee receipt but with the help of this system they can directly send the data to the data base.

Current status of the project Till far now I got knowledge how to configure different commands with the help of protocols infact the scenario that I described above I have been going through last 3 months and hav full confidence about implementation on simulator packet tracer. Till far now I use routing aand switching concepts after mid term my area is going to expand in the field of network secutiry DNS,DHCP ,telnet and many more

You might also like