0% found this document useful (0 votes)
30 views23 pages

Batch 8

Uploaded by

sahasb360
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views23 pages

Batch 8

Uploaded by

sahasb360
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

SRM Institute of Science and Technology,

Ramapuram Campus, Chennai-89

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


End-To-End Packet Flow in an Airport Network Using
Cisco Packet Tracer
Batch No: 8
DETAILS OF THE PROJECT
SUPERVISOR DETAILS
MEMBERS:
RA1911003020006 Sanjay S Dr. C. Shanmuganathan
RA1911003020024 P V S Abhinav
RA1911003020040 Sahas Bhupathi

Jun 19, 2024 Department of Computer Science and Engin 1


eering
OBJECTIVE
• The Main objective is to centralize the management of network using Simple
Network Management in an enterprise network.
• A fully functional network topology is created using Cisco Packet Tracer, and
Gigabitethernet and Serial cables are used to interconnect networking
equipment.
• The proposed method aims to reduce the work of network practitioners, by
enabling engineers to remotely organize, monitor and configure parameters
associated with networking devices.

Jun 19, 2024 Department of Computer Science and Engin 2


eering
SCOPE
• The project aims to implement Simple Network Management Protocol,
Dynamic Host Configuration Protocol and Open Shortest Path First Protocol in
the airport network.
• Dynamic Host Configuration Protocol reduces the work on a larger scale by
automating the process of assigning an IP address, subnet masks and default
gateway to end devices
• In order to reduce the time taken for the packet to desired destination from the
source, Cisco access integrated router 2911 is configured with Open shortest
Path First protocol.

Department of Computer Science and


Jun 19, 2024 3
Engineering
ABSTRACT
Networking is the process of exchanging information within a system or devices
being a part of another network. The method of message transfer follows specific
protocols before reaching the recipient’s device. Several parameters must be
considered while designing a network for industrial and domestic purposes. The
network must be capable of scaling whenever necessary. Routine analyses of the
network are to be performed in order to prevent downtime of the network.
Subnetting of the network must be performed in order to divide the network into
smaller portions required for different phases of the airport which include
domestic and international terminal arrival and departure, and air traffic control.
Simple Network Managing Protocol helps network practitioners remotely identify
device location, equipment uptime, routing table associated with the device,
interface description, port connections, OSPF area, physical address, and various
other parameters that can be determined using SNMP protocol. The Open Short
Path finding Protocol works on the basis of Dijkstra’s Shortest Path Finding
algorithm, it determines the shortest path between the source and destination IP.
OSPF is the best-suited algorithm for inter-VLAN routing.

Department of Computer Science and


Jun 19, 2024 4
Engineering
INTRODUCTION
• The usage of Cisco-based networking devices for enterprise networks demands
manual configuration while other vendor devices such as Tp-link support plug
and play, are not encouraged for large-scale networks.
• The devices used for the network include Cisco 2900 series routers, Cisco 2911
Integrated Services routers, Cisco unified computing system rack servers, and
Cisco 2520 Wireless controlled access points.
• The Cisco 2900 routers are configured using type 7 encryption, while type 5
encryption can be deciphered using third party tools.

Jun 19, 2024 Department of Computer Science and Engin 5


eering
SYSTEM REQUIREMENTS
Hardware Requirements:
Processor - Intel i9 9750h - 8250 CPU @1.60GHz 1.80GHz
512 GB SSD
NVIDIA GEFORCE GTX
CPU QUAD CORES
Software Requirements:
Cisco packet
Command Line Interface
Shell/Bash scripting

Jun 19, 2024 Department of Computer Science and Engin 6


eering
Literature survey - Paper 1
• Title : OVERVIEW OF OPEN SHORTEST PATH FIRST, VERSION 2 (OSPF V2)
ROUTING IN TACTICAL ENVIRONMENT
• Authors: William V. Wollman, Yosry Barsoum
• Year : 2015
• Inference: OSPF V2 is a link-state routing protocol that employs a version of Dijkstra's
shortest path first protocol, and is an open standard. OSPF V2 is defined by the Internet
Engineering Task Force in Request for Comments (RFC) 1583.OSPF allows collections
of contiguous networks and hosts to be grouped together. RFC 1583 labels such a group,
together with the routers having interfaces to any one of the included networks, an area.
OSPF areas are interconnected via a backbone area, which is called area zero. OSPF
requires that IP datagram exchanges between areas must traverse the OSPF backbone.
• Advantages: Open Shortest Path Finding algorithm finds the shortest path for inter-
VLAN routing by constantly flooding neighbouring IP addresses.
• Disadvantages: To calculate the best route, it runs the Shortest Path algorithm that
requires extra CPU processing.

Jun 19, 2024 Department of Computer Science and Engin 7


eering
Literature survey - Paper 2
• Title : The Secure DHCP System with User Authentication
• Authors : Jianqing Liu, Guangyong Liu
• Year : 2015
• Inference: Every device on a TCP/IP-based network must have a unique unicast IP
address to access the network and its resources. Without DHCP, IP addresses for new
computers or computers that are moved from one subnet to another must be configured
manually; IP addresses for computers that are removed from the network must be
manually reclaimed.
• Advantages: It has great benefit to mobile users as valid configuration parameters are
automatically obtained from the new network.
• Disadvantages: DHCP automation can be a serious security risk if a rogue DHCP server
is introduced to the network. A rogue server isn't under control of the network staff, and
can offer IP addresses to users connecting to the network.

Jun 19, 2024 Department of Computer Science and Engin 8


eering
Literature survey - Paper 3
• Title : Research and Implementation of SNMP-based Network Management System
Authors : Jianqing Liu, Guangyong Liu
• Year : 2015
• Inference: SNMP software agents on network devices and services communicate with a
network management system to relay status information and configuration changes. The
NMS provides a single interface from which administrators can issue batch commands
and receive automatic alerts.
• Advantages: Standardized device monitoring, eliminating the need for complex
monitoring configurations Vendorless monitoring.
• Disadvantages: Some of the most serious security problems include access control,
authentication, and data privacy.

Jun 19, 2024 Department of Computer Science and Engin 9


eering
Architecture Diagram

Jun 19, 2024 Department of Computer Science and Engin 10


eering
ISSUES
• The major issue with the existing system is that threshold values are to be
constantly configured in networking devices, in the event of device failure the
failing device is identified only by symptoms events.

• The process of collecting sample message packets becomes tedious process


without the use simple network management protocol

• The lack of a graphical user interface makes the process of analyzing network
performance tedious.

Jun 19, 2024 Department of Computer Science and Engin 11


eering
Algorithm Used
• Dynamic Host Configuration Protocol (DHCP)
• Open Shortest Path First Protocol (OSPF)
• Simple Network Management Protocol (Version 3)
• Virtual Local Area Network
• Type 7 encryption
• Trunking

Jun 19, 2024 Department of Computer Science and Engin 12


eering
Proposed Methodology
• The methodology carried out in this topology, first of all, a blueprint, and
topological view of the airport is prepared, and subnetting is done to divide the
airport into various segments VLSM (Variable Length Subnetting Mask)
procedure is used.
• An estimate is drafted to find the required amount of network devices which
include routers, switches, servers, network controller, end–devices, and other IoT
detection devices.
• This consists of 3 Modules:
1. Dynamic Host Configuration (DHCP)
2. Open Shortest Path First (OSPF)
3. Simple Network Management Protocol(SNMP)

Jun 19, 2024 Department of Computer Science and Engin 13


eering
Module 1 : Configuring DHCP
• Every device on a TCP/IP-based network must have a unique unicast IP address to
access the network and its resources. Without DHCP, IP addresses for new
computers or computers that are moved from one subnet to another must be
configured manually; IP addresses for computers that are removed from the
network must be manually reclaimed.
• With DHCP, this entire process is automated and managed centrally. The DHCP
server maintains a pool of IP addresses and leases an address to any DHCP-enabled
client when it starts up on the network. Because the IP addresses are dynamic
(leased) rather than static (permanently assigned), addresses no longer in use are
automatically returned to the pool for reallocation.
• The network administrator establishes DHCP servers that maintain TCP/IP
configuration information and provide address configuration to DHCP-enabled
clients in the form of a lease offer.

Jun 19, 2024 Department of Computer Science and Engin 14


eering
Module 2 : Configuring OSPF

• The OSPF (Open Shortest Path First) protocol is one of a family of IP Routing
protocols, and is an Interior Gateway Protocol (IGP) for the Internet, used to
distribute IP routing information throughout a single Autonomous System (AS) in
an IP network.
• The OSPF protocol is a link-state routing protocol, which means that the routers
exchange topology information with their nearest neighbors. The topology
information is flooded throughout the AS, so that every router within the AS has a
complete picture of the topology of the AS.
• This picture is then used to calculate end-to-end paths through the AS, normally
using a variant of the Dijkstra algorithm. Therefore, in a link-state routing protocol,
the next hop address to which data is forwarded is determined by choosing the best
end-to-end path to the eventual destination.

Jun 19, 2024 Department of Computer Science and Engin 15


eering
Module 3 : Configuring SNMP

• SNMP works by sending messages, called protocol data units (PDUs), to


devices within your network that “speak” SNMP. These messages are called
SNMP Get-Requests.
• The SNMP TRAP command is a common way for devices to send alerts. These
are asynchronous messages sent to the manager by an agent when something
needs to be reported. A storage appliance, for example, might send a trap to the
manager when it loses access to a drive.
• All of the information SNMP tracks can be provided to a product that asks for
it. That product can either display or store the data, depending on an
administrator’s preferences.

Jun 19, 2024 Department of Computer Science and Engin 16


eering
Result
• MAC Address, Simple Network
Management, and Management
Information Base (MIB) provide
information about the physical address
(Medium Access Control) address which is
unique to each device, using the mib
graphical user interface the user can find
the mac addresses of the devices
connected to the router on which SNMP is
configured.

Jun 19, 2024 Department of Computer Science and Engin 17


eering
Result
• Device Status, the admin status in
Management Information Base is used to
identify the status of the devices connected
to the router under study, and the up-time
of the device, it is also used to determine
the location of the device the figure below
represents the list of the active device and
inactive along with the Object Identifiers.

Jun 19, 2024 Department of Computer Science and Engin 18


eering
Result
• Interface Description, the interface
description is viewed by using .sysDecr in
the Management Information Base browser.
It provides the required information about
the device under study, interface used. In
the case of a switch, it provides the model
of the switch (i.e.) Cisco Catalyst 2960. In
the figure below it can be seen that the
Command Line Interface version is
specified (Cisco IOS C2900 software)

Jun 19, 2024 Department of Computer Science and Engin 19


eering
Result
• Port Connection, the Management Information
Base describes the no of devices connected to each
port of the router and the type of connection
established between the router and the end device,
in the below figure port Gigabit Ethernet 0/0,
Gigabit Ethernet 0/1, Gigabit Ethernet 0/2, Serial
0/0/0, Serial 0/1/0 are specified.

Jun 19, 2024 Department of Computer Science and Engin 20


eering
Conclusion
• A fully functional end-to-end network has been successfully implemented using
cisco packet tracer, in the above network the routers are secured by encrypting
access passwords.
• The packet flow in the network is demonstrated using simulation mode. The
network is designed to be highly scalable and fault tolerant
• The DHCP protocol reduces network engineer work by automatically
provisioning IP addresses, subnet masks & default gateway from the DHCP
pool.
• OSPF protocol configured works on the basis of Dijkstra's algorithm and finds
the shortest distance for inter-VLAN routing with the help of a link state
database (LSDB).

Jun 19, 2024 Department of Computer Science and Engin 21


eering
REFERENCES
[1] Sangita Mullick, Yashwant Srinivasa, Ashutosh Kumar Sahu, Jhanvi
Tharun Sata “A Comprehensive Study on Space Debris, Threats Posed by
Space Debris, and Removal Techniques” ,Issue 1, 17 May 2019
[2] Nikhil P. Khanolkar; Nikita Shukla; Vivek Kumar; Ankur Vats “Advanced
space debris removable technique and proposed laser ablation technique: A
review” ,IEEE 2017, 20 DEC 2017
[3] Benjamin Bastida Virgili , ” DELTA (DEBRIS ENVIRONMENT LONG-TERM
ANALYSIS)” 2015
[4] Minghe Shan , Lingling Shi "Comparison of Tethered Post-Capture System Models
for Space Debris Removal" 8 Nov 2021
[5] Analysis of the effectiveness of space debris mitigation measures using the delta
model : R.Walker, C.E.Marti, P.H.Stokes, J.E.Wilkinson, H.Klinkrad 2019

Department of Computer Science and


Jun 19, 2024 22
Engineering
REFERENCES LINKS

• www.gns.com

• www.cisco.com

• https://www.netacad.com/courses/packet-tracer

• https://www.geeksforgeeks.org/simple-network-management-protocol-
snmp/.org/wiki/Space_debris

Department of Computer Science and


Jun 19, 2024 23
Engineering

You might also like