Você está na página 1de 43

1146552

INDUSTRIAL TRAINING
PROJECT REPORT
On

CCNA
At
Jetking
Submitted in partial fulfillment of the requirement for Bachelor of Technology in
Electronics & Communication Engineering course of Punjab Technical University,
Jalandhar

Submitted To:Er. Komal Babbar


A.P
ECE Deptt.

Submitted By:Shatrudhan Kumar


1146552/ECE/5th

KC COLLEGE OF ENGG. & IT


NAWANSHAHR
20

KCCEIT, Nawanshahr (PB)

1146552

DECLARATION
I hereby certify that the work which is being presented in the project report
entitled The cloud computing network by Shatrudhan Kumar in partial fulfillment
of requirements for the award of degree of B.Tech submitted in the department of
Electronics & Communication Engineering at KC COLLEGE OF ENGINEERING &
IT under PUNJAB TCCHNICAL UNIVERSITY, JALANDHAR is an authentic record
of my own work carried out during a period from 05/04/2013 to 20/05/2013 under the
supervision of.

Signature of the student


This is to certify that the above statement made by the candidate is correct to the best of
my /our knowledge.

Signature of the training coordinator


The B.Tech viva voice Examination of Shatrudhan kumar has been held on 06/10/2013
and accepted.

Signature of H.O.D.

20

KCCEIT, Nawanshahr (PB)

1146552

ACKNOWLEDGEMENT

I would like to thank KC College of Engg. & IT, Nawanshahr for providing me this
opportunity to carry out the 45 days industrial training in Jetking, Patna.
The constant guidance and encouragement received from Head of ECE dept., KCCEIT
has been of great help in carrying out the project work and its acknowledged with the
reverential thanks.
I would like to thank the project coordinator Mr. Rajeev Kumar for providing all the
material possible and encouraging throughout the course. It is great pleasure for me to
acknowledge the assistance and contributions for his prompt and timely help in the
official clearances and valuable suggestions during the development of this project
Last but not least, I express my heartiest gratitude to Almighty god, our Parents for their
love and blessings to complete the project successfully.

20

KCCEIT, Nawanshahr (PB)

1146552

PROJECT SUMMARY

An MNC company has been setup in India with its headquaters at UAE. It has started
through its main offices at Delhi and Mumbai. Mumbai office is futher connected to
offices at Banglore and Chandigarh. Delhi office to Jalandhar and Ludhiana main office
at UAE is connected to Mumbai office through SERIAL connection which support
static routing and is also connected to Delhi office through leased line which supports
dynamic routing .Both offices at Delhi and Mumbai have routers acting as child routers
so that the user cannot connect directly to main office at UAE for further security
reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame
relay connection .Mumbai branch is also connected to Banglore and Chennai branches
by frame relay connection. These branches are to switches which are further connected
to users via Ethernet port and users are accessing to various facilities provided to them
ACL (Access control list) is also configured to switches for further security.

20

KCCEIT, Nawanshahr (PB)

1146552

COMPANY PROFILE
Jetking is an organization came into establishment in 1947.Jetking is India's number one
Computer Hardware and Networking Institute.

Birth and Evolution


It took a lot of failure before mankind tasted technological success. Jetking evolved in
tune with the changing face of technology. During 55 years in the field of electronic
technology. Jetking successfully trained thousands of students to overcome failure for
High paying careers.
Mr. Suresh G.Bharwani is the CHAIRMAN and
MANAGING Director of Jetking Infotrain Ltd. India's leading Computer Hardware and
Networking Institute. With the vision to promote and the conviction to deliver the
widespread propagation of computer hardware and networking education across the
nation, Mr. Bharwani was the first to set up a training institute offering innovative
courses in computer hardware in 1990. Jetking's core competency lies in providing
complete training and developing hardware engineers and professionals with sound
technical knowledge. It focuses on the overall development of personality of an
individual with emphasis on personality development, presentation and communication
skills, leadership skills etc. Jetking has established more than 125 operational centers
and 250 faculties across the country and has trained over 3, 50,000 students who have
move onto the crave successful career. With its alumni placed in the best of
organizations in India and some abroad, Jetking's vocational training and placement
promises has helped build the career prospects of many young boys and girls.
The company has been awarded the ISO 9000:2000 certification in 2003.The company
has been awarded the " Maharashtra IT Award" for a key role in manpower activities in
year 2006-2007,it was felicitated with Franchise Award as Best Franchisor for the year
2007-2008.Also,ranked 4th in the list of 26th hot franchises as per outlook money
magazine.
Mr. Suresh Bharwani was awarded with "Pike's Peak Award" by the
Bob Pike Group USA for effective implementing smart lab plus for making technical
training fun, faster and easier for non-technical person.
Across all the sectors, industries are upgrading their information
technology system. Industries ranging from plastics, chemicals, textiles and power to
the automotive and telecom sector are now IT savy.Government and public sectors are
going hi-tech with EDI and computer networks.The IT industry, software companies,
data centers, IT-enabled services providers are all equipped with advance IT system and
20

KCCEIT, Nawanshahr (PB)

1146552

networks.The increasing number of call centers, BPOs etc., have given a further boost
to the hardware and networking industry.
The courses in jetking comprises lecture and theory session, with a great
focus on active participation through smart lab plus, that focuses on audio visual and
learning with hands-on training and equips students with an in depth domain knowledge
that is technical; it also equips students with soft skills, to face the multi-faceted
challenges of corporate world.
PLACEMENT: Jetking is the first and only institute that promises the 100% jobs
guarantee to its students. The companies that have recruited jetkings students include:
Samsung, Sun Micro System, IBM,Canon, Siemen, Reliance, TATA, Compaq HP
invent, IT-T Solutions,Videsh Sanchar Nigam Limted,D-link,Novell,Dell,Wipro,
LG, ICIC Ifotech and several other MNCs.
Any student who has qualified his or her HSC/SSC examination is eligible to take up a
course at jetking. The one year program Jetking certified hardware and networking
professionals give 680 hours of in-depth knowledge to a student in Basic electronics and
computer applications.Computer hardware and peripherals, window 2003 administrator
and network administrator(soon it will be replaced with window server 2008).Apart
frame technical knowledge there are personality development sessions which groom the
student's personality, their ability to perform better.
Jetking, Indias leading hardware and networking training institute
has trained over 3,00,000 students from its 125 centers spread across India. With its
alumni placed in the best of organizations in India and some abroad, Jetking vocational
training and placement promises has helped build the career prospects of many young
boys and girls.
Jetking has partnered with some of the worlds most renowned
names in networking to provide you with cutting edge courses and technologies. With
academic Partnerships with Microsoft, Comp TIA, LINUX, NOVELL, and person
VUE.
Jetking Patna is a division of Hi-Tech point. Hi-Tech point is an
ISO 9001-2000 IT Company. It was established in year 1993 and run by a company of
IT professionals. Jetking Patna branch is considered to be the best center among all
centres.It has bagged number 1 center award consecutively for last 7 years. Here
training on various fields in going on like Basic Electronics, Hardware, Networking,
JCHNP Analog and Digital electronics and Hardware,RHCE, RHCSS, MNA,
MCSE(Microsoft system Engineers),MCITP, MNA, CCNA (Cisco Certified Network
Associate),CCNP (Cisco Certified Network Professional).
Partnership with industry leaders like Microsoft and Red Hat
Jetking ensure its Students Authentic courseware and technology.

20

KCCEIT, Nawanshahr (PB)

1146552

TABLE OF CONTENTS:
CH-1 INTRODUCTION
1.1BACKGROUND
1.2IMPORTANCE
1.3OBJECTIVE

CH-2 SYSTEM ANALYSIS


2.1 ANALYSIS OF EXISTING NETWORK
2.2 REQUIREMENT SPECIFICATION OF EXISTING NETWORK
2.3 FEASIBILITY STUDY

CH-3 SYSTEM DESIGN


3.1 LAYOUT OF PROPOSED NETWORK
3.2 DESIGN PARAMETERS

CH-4 SYSTEM IMPLEMENTATION


4.1 SOFTWARE AND TECHNOLOGIES USED IN THE PROJECT
4.2 PROJECT CONFIGURATION

CH-5 SYSTEM TESTING AND TROUBLESHOOTING


5.1 PING AND TRACEROUTE

CH-6 CONCLUSION AND FUTURE SCOPE


REFERENCES:

20

KCCEIT, Nawanshahr (PB)

1146552

CHAPTER 1
INTRODUCTION

1.1 BACKGROUND.
An MNC company has been set up in India with its head quarters at UAE. It has started through its
main offices at Delhi and Mumbai. Mumbai office is further connected to offices at Bangalore and
Chandigarh. Delhi office to Jalandhar and Ludhiana main office at U.A.E is connected to Mumbai
office through SERIAL connection which supports static routing and is also connected to Delhi office
through leased lines which supports dynamic routing. Both offices at Delhi and Mumbai have routers
acting as child routers so that the user can not connect directly to main office at U.A.E for security
reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection.
Mumbai branch is also connected to Bengaluru and Chandigarh branches by frame relay connections.
These branches to switches which are further connected to users via ETHERNET port and users are
accessing to various facilities provided to them. ACL (access control list) is also configured to switches
for further security.

1.2 IMPORTANCE OF PROJECT.


Wide Area Networks are spread over a (very) wide area so that companies and institutes
that are located far from each other are directly connected via the network. Wide Area
Networks have mostly on more than one location external connections with other
big networks. Internet Service Providers (ISPs) and multinationals with many offices
frequently own a WAN themselves. Regional education networks and company
networks between several establishments are also examples of Wide Area Networks.
Two great advantages of WAN are allowing secure and fast data transmission between
the different nodes in the network. The data transmission is also reliable and
inexpensive. The characteristics of the transmission facilities lead to an emphasis on
efficiency of communications techniques in the design of WANs. Controlling the
volume of traffic and avoiding excessive delays is important. Since the topologies of
WANs are likely to be more complex than those of LANs, routing algorithms also
receive more emphasis. Many WANs also implement sophisticated monitoring
20

KCCEIT, Nawanshahr (PB)

1146552

procedures to account for which users consume the network resources. This is, in some
cases, used to generate billing information to charge individual users.

1.3 OBJECTIVE OF PROJECT.


Objective of the project is to connect various offices of the MNC Company by using
LAN and WAN technologies.

20

KCCEIT, Nawanshahr (PB)

1146552

CHAPTER 2
SYSTEM ANALYSIS
2.1 Analysis of Existing Network
The existing network consists of hubs and there are dial up connections in between
various offices of the MNC Company because of which both LAN and WAN links are
very slow and users regularly face problem in transmitting their data over the links.
Most of the time there is network conjestion in the network because of which the work
is suffering and users are not able to perform up expectation.

2.2 Requirement Specification of proposed Network.


In the proposed design, hubs will be replaced with switches so as to improve the LAN
connectivity. Switches would be operating at 100 Mbps as compared to hubs which
operate at 10 Mbps. Moreover switches are manageable so VLANS can be created on
them so as to decrease broadcast traffic and to enhance security as well. As far as WAN
is concerned all the dial up links would be replaced with ISDN, Frame-Relay and
Leased Line connection so as to improve WAN connectivity and users dont face
network congestion during working hours.

2.3 FEASIBILITY STUDY


Economic feasibility
Economic analysis is the most frequently used method for evaluating the effectiveness
of a new system. More commonly known as cost/benefit analysis, the procedure is to
determine the benefits and savings that are expected from a candidate system and
compare them with costs. If benefits outweigh costs, then the decision is made to design
and implement the system. An entrepreneur must accurately weigh the cost versus
benefits before taking an action
Cost Based: No special investment is needed to manage the tool. No specific training is
required for employees to use the tool. Investment requires only once at the time of
installation. The software used in this project is freeware so the cost of developing the
tool is minimal

20

KCCEIT, Nawanshahr (PB)

1146552

Legal feasibility
Determines whether the proposed system conflicts with legal requirements e.g. a Data
Processing system must comply with the local Data Protection Acts.
Operational feasibility
Is a measure of how well a proposed system solves the problems, and takes advantages
of the opportunities identified during scope definition and how it satisfies the
requirements identified in the requirements analysis phase of system development.
Schedule feasibility
A project will fail if it takes too long to be completed before it is useful. Typically this
means estimating how long the system will take to develop, and if it can be completed
in a given time period using some methods like payback period. Schedule feasibility is a
measure of how reasonable the project timetable is. Given our technical expertise, are
the project deadlines reasonable? Some projects are initiated with specific deadlines.
You need to determine whether the deadlines are mandatory or desirable.

Market and real estate feasibility


Market Feasibility Study typically involves testing geographic locations for a real estate
development project, and usually involves parcels of real estate land. Developers often
conduct market studies to determine the best location within a jurisdiction, and to test
alternative land uses for a given parcels. Jurisdictions often require developers to
complete feasibility studies before they will approve a permit application for retail,
commercial, industrial, manufacturing, housing, office or mixed-use project. Market
Feasibility takes into account the importance of the business in the selected area.
Resource feasibility
This involves questions such as how much time is available to build the new system,
when it can be built, whether it interferes with normal business operations, type and
amount of resources required, dependencies, etc. Contingency and mitigation plans
should also be stated here.

20

KCCEIT, Nawanshahr (PB)

1146552

Cultural feasibility
In this stage, the project's alternatives are evaluated for their impact on the local and
general culture. For example, environmental factors need to be considered and these
factors are to be well known. Further an enterprise's own culture can clash with the
results of the project

20

KCCEIT, Nawanshahr (PB)

1146552

CHAPTER 3
SYSTEM DESIGN
3.1. Layout of the proposed Network

20

KCCEIT, Nawanshahr (PB)

1146552

3.2 Design Parameters


The various devices that are being used in designing the network of the MNC
Company as follows:

ROUTER
A router is a device that forwards data packets along networks. A router is connected to
at least two networks, commonly two LANs or WANs or a LAN and its ISP's network.
Routers are located at gateways, the places where two or more networks connect, and
are the critical device that keeps data flowing between networks and keeps the networks
connected to
the internet.
When data is sent between locations on one network or from one network to a second
network the data is always seen and directed to the correct location by the router. The
router accomplishes this by using headers and forwarding tables to determine the best
path for forwarding the data packets, and they also use protocols such as ICMP to
communicate with each other and configure the best route between any two hosts.

SWITCH
A switch is an electrical component that can break an electrical circuit, interrupting the
current or diverting it from one conductor to another. The most familiar form of switch
is a manually operated electromechanical device with one or more sets of electric
contacts. Each set of contacts can be in one of two states: either 'closed' meaning the
contacts are touching and electricity can flow between them, or 'open', meaning the
contacts are separated and non conducting.
A switch may be directly manipulated by a human as a control signal to a system, such
as a computer keyboard button, or to control power flow in a circuit, such as a light
switch. Automatically-operated switches can be used to control the motions of
machines, for example, to indicate that a garage door has reached its full open position
or that a machine tool is in a position to accept another work piece. Switches may be
operated by process variables such as pressure, temperature, flow, current, voltage, and
force, acting as sensors in a process and used to automatically control a system. For
example, a thermostat is an automatically-operated switch used to control a heating
20

KCCEIT, Nawanshahr (PB)

1146552

process. A switch that is operated by another electrical circuit is called a relay. Large
switches may be remotely operated by a motor drive mechanism.

The various WAN technologies that are being used in the design of
MNC network as as follows:
FRAME-RELAY
Frame Relay is a high-performance WAN protocol that operates at the physical and data
link layers of the OSI reference model. Frame Relay originally was designed for use
across Integrated Services Digital Network (ISDN) interfaces. Today, it is used over a
variety of other network interfaces as well. This chapter focuses on Frame Relay's
specifications and applications in the context of WAN services.
Frame Relay is an example of a packet-switched technology. Packet-switched networks
enable end stations to dynamically share the network medium and the available
bandwidth. The following two techniques are used in packet-switching technology:
Variable-length packets
Statistical multiplexing
Variable-length packets are used for more efficient and flexible data transfers. These
packets are switched between the various segments in the network until the destination
is reached.
Statistical multiplexing techniques control network access in a packet-switched
network. The advantage of this technique is that it accommodates more flexibility and
more efficient use of bandwidth. Most of today's popular LANs, such as Ethernet and
Token Ring, are packet-switched networks.
Frame Relay often is described as a streamlined version of X.25, offering fewer of the
robust capabilities, such as windowing and retransmission of last data that are offered in
X.25. This is because Frame Relay typically operates over WAN facilities that offer
more reliable connection services and a higher degree of reliability than the facilities
available during the late 1970s and early 1980s that served as the common platforms for
X.25 WANs. As mentioned earlier, Frame Relay is strictly a Layer 2 protocol suite,
whereas X.25 provides services at Layer 3 (the network layer) as well. This enables
Frame Relay to offer higher performance and greater transmission efficiency than X.25,
20

KCCEIT, Nawanshahr (PB)

1146552

and makes Frame Relay suitable for current WAN applications, such as LAN
interconnection.

Frame Relay Devices


Devices attached to a Frame Relay WAN fall into the following two general categories:
Data terminal equipment (DTE)
Data circuit-terminating equipment (DCE)
DTEs generally are considered to be terminating equipment for a specific network and
typically are located on the premises of a customer. In fact, they may be owned by the
customer. Examples of DTE devices are terminals, personal computers, routers, and
bridges.
DCEs are carrier-owned internetworking devices. The purpose of DCE equipment is to
provide clocking and switching services in a network, which are the devices that
actually transmit data through the WAN. In most cases, these are packet switches.
Figure 10-1 shows the relationship between the two categories of devices.
DCEs Generally Reside Within Carrier-Operated WANs
The connection between a DTE device and a DCE device consists of both a physical
layer component and a link layer component. The physical component defines the
mechanical, electrical, functional, and procedural specifications for the connection
between the devices. One of the most commonly used physical layer interface
specifications is the recommended standard (RS)-232 specification. The link layer
component defines the protocol that establishes the connection between the DTE device,
such as a router, and the DCE device, such as a switch. This chapter examines a
commonly utilized protocol specification used in WAN networking: the Frame Relay
protocol.

Frame Relay Network Implementation


A common private Frame Relay network implementation is to equip a T1 multiplexer
with both Frame Relay and non-Frame Relay interfaces. Frame Relay traffic is
forwarded out the Frame Relay interface and onto the data network. Non-Frame Relay

20

KCCEIT, Nawanshahr (PB)

1146552

traffic is forwarded to the appropriate application or service, such as a private branch


exchange (PBX) for telephone service or to a video-teleconferencing application.
A typical Frame Relay network consists of a number of DTE devices, such as routers,
connected to remote ports on multiplexer equipment via traditional point-to-point
services such as T1, fractional T1, or 56-Kb circuits. An example of a simple Frame
Relay network is shown in Figure 10-3.
A Simple Frame Relay Network Connects Various Devices to Different Services over a
WAN
The majority of Frame Relay networks deployed today are provisioned by service
providers that intend to offer transmission services to customers. This is often referred
to as a public Frame Relay service. Frame Relay is implemented in both public carrierprovided networks and in private enterprise networks. The following section examines
the two methodologies for deploying Frame Relay.

20

KCCEIT, Nawanshahr (PB)

1146552

CHAPTER 4
SYSTEM IMPLEMENTATION
4.1 SOFTWARE:
SIMULATOR
A network simulator is a piece of software or hardware that predicts the behavior of a
network, without an actual network being present.
Network simulators serve a variety of needs. Compared to the cost and time involved in
setting up an entire test bed containing multiple networked computers, routers and data
links, network simulators are relatively fast and inexpensive. They allow engineers to
test scenarios that might be particularly difficult or expensive to emulate using real
hardware- for instance, simulating the effects of a sudden burst in traffic or a DoS attack
on a network service. Networking simulators are particularly useful in allowing
designers to test new networking protocols or changes to existing protocols in a
controlled and reproducible environment.
Network simulators, as the name suggests are used by researchers, developers and QA
to design various kinds of networks, simulate and then analyze the effect of various
parameters on the network performance .A typical network simulator encompasses a
wide range of networking technologies and help the users to build complex networks
from basic building blocks like variety of nodes and links. With the help of simulators
one can design hierarchical networks using various types of nodes like computers, hubs,
bridges, routers, optical cross-connects, multicast routers, mobile units, MSAUs etc.
The simulator that we have used to create a simulation of the network design of the
MNC Company is CISCO PACKET TRACER.

20

KCCEIT, Nawanshahr (PB)

1146552

OSPF
Stands for "Open Shortest Path First" OSPF is a method of finding the shortest path
from one router to another in a local area network (LAN). As long as a network is IPbased, the OSPF algorithm will calculate the most efficient way for data to be
transmitted. If there are several routers on a network, OSPF builds a table (or
topography) of the router connections. When data is sent from one location to another,
the OSPF algorithm compares the available options and chooses the most efficient way
for the data to be sent. This limits unnecessary delays in data transmission and prevents
infinite loops.
DEFINITION: OSPF (Open Shortest Path First) is a router protocol used within larger
autonomous system networks in preference to the Routing Information Protocol (RIP),
an older routing protocol that is installed in many of today's corporate networks. Like
RIP, OSPF is designated by the Internet Engineering Task Force (IETF) as one of
several Interior Gateway Protocols (IGPs).

20

KCCEIT, Nawanshahr (PB)

1146552

So that all will have the same routing table information. Unlike the RIP in which the
entire routing table is sent, the host using OSPF sends only the part that has Using
OSPF, a host that obtains a change to a routing table or detects a change in the network
immediately multicasts the information to all other hosts in the network changed. With
RIP, the routing table is sent to a neighbor host every 30 seconds. OSPF multicasts the
updated information only when a change has taken place. Rather than simply counting
the number of hops, OSPF bases its path descriptions on "link states" that take into
account additional network information. OSPF also lets the user assign cost metrics to a
given host router so that some paths are given preference. OSPF supports a variable
network subnet mask so that a network can be subdivided. RIP is supported within
OSPF for router-to-end station communication. Since many networks using RIP are
already in use, router manufacturers tend to include RIP support within a router
designed primarily for OSPF.

ACCESS CONTROL LISTS:


Cisco provides basic traffic filtering capabilities with access control lists (also referred
to as access lists). Access lists can be configured for all routed network protocols (IP,
AppleTalk, and so on.) to filter those protocols' packets as the packets pass through a
router.
You can configure access lists at your router to control access to a network: access lists
can prevent certain traffic from entering or exiting a network.
About Access Control Lists
This section briefly describes what access lists do; why and when you should configure
access lists; and basic vs. advanced access lists.
What Access Lists Do
Access lists filter network traffic by controlling whether routed packets are forwarded or
blocked at the router's interfaces. Your router examines each packet to determine
whether to forward or drop the packet, based on the criteria you specified within the
access lists. Access list criteria could be the source address of the traffic, the destination
address of the traffic, the upper-layer protocol, or other information. Note that
sophisticated use can sometimes successfully evade or fool basic access lists because no
authentication is required..

20

KCCEIT, Nawanshahr (PB)

1146552

VLSM
A Variable Length Subnet Mask (VLSM) is a means of allocating IP addressing
resources to subnets according to their individual need rather than some general
network-wide rule. Of the IP routing protocols supported by CISCO, OSPF, Dual
IS-IS, BGP-4, and EIGRP support "classless" or VLSM routes.
Historically, EGP depended on the IP address class definitions, and actually exchanged
network numbers (8, 16, or 24 bit fields) rather than IP addresses (32 bit numbers); RIP
and IGRP exchanged network and subnet numbers in 32 bit fields, the distinction
between network number, subnet number, and host number being a matter of convention
and not exchanged in the routing protocols. More recent protocols (see VLSM) carry
either a prefix length (number of contiguous bits in the address) or subnet mask with
each address, indicating what portion of the 32 bit field is the address being routed on. A
simple example of a network using variable length subnet masks is found in Cisco
engineering. There are several switches in the engineering buildings, configured with
FDDI and Ethernet interfaces and numbered in order to support 62 hosts on each
switched subnet; in actuality, perhaps 15-30 hosts (printers, workstations, disk servers)
are physically attached to each. However, many engineers also have ISDN or Frame
Relay links to home, and a small subnet there. These home offices typically have a
router or two and an X terminal or workstation; they may have a PC or Macintosh as
well. As such, they are usually configured to support 6 hosts, and a few are configured
for 14. The point to point links are generally unnumbered.
Using "one size fits all" addressing schemes, such as are found in RIP or IGRP, the
home offices would have to be configured to support 62 hosts each; using numbers on
the point to point links would further compound the address bloat. One configures the
router for Variable Length Subnet Masking by configuring the router to use a protocol
(such as OSPF or EIGRP) that supports this, and configuring the subnet masks of the
various interfaces in the IP address interface sub-command. To use super nets, one must
further configure the use of 'IP classless' routes.

20

KCCEIT, Nawanshahr (PB)

1146552

4.2 PROJECT CONFIGURATION


MAIN OFFICE (U.A.E) CONFIGURATION

MAIN OFFICE IN U.A.E


Router>Enable
Router# Configure Terminal
Router (config)#interface serial 1/0
Router (config-if)#ip address 11.0.0.1 255.0.0.0
Router(Config-If)#Clock Rate 64000
Router(Config-If)#no shutdown
Router(config)#exit
Router(config)#interface serial 1/1
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#Clock Rate 64000
Router(config)# no shutdown
Router(config)#exit
Router(config)#interface fast Ethernet 0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#no shutdown
20

KCCEIT, Nawanshahr (PB)

1146552

Router(config)#exit
Router(config)#router ospf 90
Router(config-router)#network 10.0.0.0 0.255.255.255 area 50
Router(config-router)#network 11.0.0.0 0.255.255.255 area 50
Router(config-router)#network 192.168.1.0 0.0.0.255 area 50
Router(config-router)#exit
Router(config)#access-list 120 deny tcp 1.0.0.2 0.0.0.0 192.168.1.2 0.0.0.0
Router(config)#access-list 120 permit ip any any
Router(config)#interface serial 1/1
Router(config-if)#ip access-group 120 in
Router(config-if)#exit

SERVER CONFIGURATION

20

KCCEIT, Nawanshahr (PB)

1146552

MUMBAI BRANCH CONFIGURATION:

MAIN BRANCH IN MUMBAI


Router >Enable
Router#configure terminal
Router(config)#interface serial 1/0
Router(Config-if)#Ip address 10.0.0.2 255.0.0.0
Router(Config-if)#No Shut
Router(Config-if)#exit
Router(Config)#interface serial 1/1
Router(Config-if)#ip address 14.0.0.1 255.0.0.0
Router(Config-if)#no shutdown
Router(Config-if)#exit
Router(Config)# interface serial 1/2
Router(Config-if)#ip address 15.0.0.1 255.0.0.0
Router(Config-if)#No Shutdown
Router(Config-if)#exit
Router(config)#router ospf 92
Router(config-router)#network 10.0.0.0 0.255.255.255 area 50
Router(config-router)#network 14.0.0 0.255.255.255 area 50
Router(config-router)#network 15.0.0.0 0.255.255.255 area 50
Router(config-router)#exit
Router(config)#interface serial 1/1
Router(config-if)#encapsulation frame-relay
Router(config-if)#ip ospf network broadcast
Router(config-if)#frame-relay map ip 14.0.0.2 104 broadcast
20

KCCEIT, Nawanshahr (PB)

1146552

Router(config-if)#frame-relay lmi-type ansi


Router(config-if)#exit
Router(config)#interface serial 1/2
Router(config-if)#encapsulation frame-relay
Router(config-if)#ip ospf network broadcast
Router(config-if)#frame-relay map ip 15.0.0.2 105 broadcast
Router(config-if)#frame-relay lmi-type ansi
Router(config-if)#exit
CLOUD BETWEEN MUMBAI BRANCH AND BANGALORE:

20

KCCEIT, Nawanshahr (PB)

1146552

BANGALORE OFFICE CONFIGURATION:

MAIN OFFICE BANGALORE


Router>Enable
Router #configure terminal
Router(config)#interface serial 1/0
Router(Config-if)#Ip address 14.0.0.2 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fastethernet0/0
Router(Config-if)#Ip address 3.0.0.1 255.0.0.0
Router(Config-if)#No Shutdown
Router(Config-if)#exit
Router(config)#router ospf 95
Router(config-router)#network 14.0.0.0 0.255.255.255 area 50
Router(config-router)#network 3.0.0.0 0.255.255.255 area 50
Router(config-router)#exit
Router(config)#interface serial 1/0
Router(config-if)#encapsulation frame-relay
Router(config-if)#ip ospf network broadcast
20

KCCEIT, Nawanshahr (PB)

1146552

Router(config-if)#frame-relay map ip 14.0.0.1 401 broadcast


Router(config-if)#frame-relay lmi-type ansi
Router(config-if)#exit
Bangalore#show interface serial 1/0

USER CONFIGURATION

20

KCCEIT, Nawanshahr (PB)

1146552

USER CONFIGURATION

CHANDIGARH OFFICE CONFIGURATION

20

KCCEIT, Nawanshahr (PB)

1146552

MAIN OFFICE CHANDIGARH


Router>enable
Router#Configure terminal
Router(config)#interface serial 1/0
Router(config-if)#ip address 15.0.0.2 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(Config)#interface fastethernet0/0
Router(Config-if)#ip address 4.0.0.1 255.0.0.0
Router(Config-if)#No Shutdown
Router(Config-if)#exit
Router(config)#router ospf 96
Router(config-router)#network 15.0.0.0 0.255.255.255 area 50
Router(config-router)#network 4.0.0.0 0.255.255.255 area 50
Router(config-router)#exit
Router(config)#interface serial 1/0
Router(config-if)#encapsulation frame-relay
Router(config-if)#ip ospf network broadcast
Router(Config-if)#frame-relay map ip 15.0.0.1 501 broadcast
Router(config-if)#frame-relay lmi-type ansi
Router(config-if)#exit

CHANDIGARH OFFICE SWITCH CONFIGURATION

20

KCCEIT, Nawanshahr (PB)

1146552

CHANDIGARH OFFICE LAN CONFIGURATION


Switch>enable
Switch# configure terminal
Switch (config)#vlan 2
Switch (config-vlan)# name Sales
Switch (config-vlan)#vlan 3 Accounts
Switch (config-vlan)#exit
Switch(config)#interface fastethernet 0/2
Switch(config-if)#switchport access vlan 2
Switch(config-if)#interface fastethernet 0/3
Switch(config-if)#switchport access vlan 2
Switch(config-if)#interface fastethernet 0/4
Switch(config-if)#switchport access vlan 3
Switch(config-if)#interface fastethernet 0/5
Switch(config-if)#switchport access vlan 3
Switch(config-if)#exit

20

KCCEIT, Nawanshahr (PB)

1146552

USER CONFIGURATION

DELHI OFFICE CONFIGURATION

20

KCCEIT, Nawanshahr (PB)

1146552

MAIN OFICE DELHI


Router > enable
Router#configure terminal
Router(config)#interface serial 1/0
Router(config-if)#Ip address 11.0.0.2 255.0.0.0
Router(config-if)#No shutdown
Router(config-if)#Exit
Router(config)#interface serial1/1
Router(config-if)#Ip address 12.0.0.1 255.0.0.0
Router(config-if)#No shutdown
Router(config-if)#exit
Router(config)#Interface serial 1/2
Router(config-if)#Ip address 13.0.0.1 255.0.0.0
Router(config-if)#No shutdown
Router(config-if)#exit
Router(config)#router ospf 91
Router(config-router)#network 11.0.0.0 0.255.255.255 area 50
Router(config-router)#network 12.0.0.0 0.255.255.255 area 50
Router(config-router)#network 13.0.0.0 0.255.255.255 area 50
Router(config-router)#exit

CLOUD BETWEEN DELHI AND JALANDHAR

20

KCCEIT, Nawanshahr (PB)

1146552

LUDHIANA OFFICE CONFIGURATION

MAIN OFFICE LUDHIANA


Router>Enable
Router#Configure terminal
Router(Config)#Interface serial1/0
Router(Config-if)#Ip address 13.0.0.2 255.0.0.0
Router(Config-if)#No Shutdown
Router(Config-if)#exit
Router(Config)#interface fastethernet0/0
Router(Config-if)#Ip address 2.0.0.1 255.0.0.0
Router(Config-if)#No Shutdown
Router(Config-if)#exit
Router(config)#router ospf 94
Router(config-router)#network 13.0.0.0 0.255.255.255 area 50
Router(config-router)#network 2.0.0.0 0.255.255.255 area 50
Router(config-router)#exit

20

KCCEIT, Nawanshahr (PB)

1146552

LUDHIANA OFFICE SWITCH CONFIGURATION

USER CONFIGURATION

20

KCCEIT, Nawanshahr (PB)

1146552

JALANDHAR OFFICE CONFIGURATION

MAIN OFFICE JALANDHAR


Router>Enable
Router#configure terminal
Router(Config)#Interface serial 1/0
Router(Config-if)#Ip address 12.0.0.2 255.0.0.0
Router(Config-if)#No Shutdown
Router(Config-if)#exit
Router(Config)#Interface fastethernet 0/0
Router(Config-if)#Ip address 1.0.0.1 255.255.255.252
Router(Config-if)#No Shutdown
Router(Config-if)#exit
20

KCCEIT, Nawanshahr (PB)

1146552

Router(config)#router ospf 93
Router(config-router)#network 12.0.0.0 0.255.255.255 area 50
Router(config-router)#network 1.0.0.0 0.255.255.255 area 50
Router(config-router)#exit
Router(config)#exit
Router>enable
Router#configure terminal
Router(config)#hostname jalandhar
Jalandhar(config)#enable password CISCO
Jalandhar(config)#username Delhi password CISCO
Jalandhar(config)#interface serial 1/0
Jalandhar(config-if)#encapsulation ppp
Jalandhar(config-if)#ppp authentication chap
Jalandhar(config-if)#exit
Jalanhar(Config)#exit
Jalandhar#show interface serial 1/0
Jalandhar#exit

JALANDHAR OFFICE-SWITCH CONFIGURATION

20

KCCEIT, Nawanshahr (PB)

1146552

USER CONFIGURATION

20

KCCEIT, Nawanshahr (PB)

1146552

CHAPTER 5
SYSTEM TESTING &TROUBLESHOOTING

5.1 PING AND TRACEROUTE:


PING
Ping can test the speed of your connection, "distance" to target, and whether or not your
connection is even up and running. It tells you how long a packet of data takes to travel
from your computer to a specified host, and back again(in this case, the packet is 32
bytes in size).
Ping Tests
Once you have your command prompt (or WhatRoute) open, enter ping 127.0.0.1 and
press Enter. You should receive 4 responses similar to the lines below. This ping test
verifies the operation of the base TCP/IP stack. If TCP/IP is working correctly, there
will be no problems with the ping. If you receive a timeout or error message, there is a
problem with TCP/IP in which case you may have to uninstall and reinstall TCP/IP.
C:\WINDOWS>ping
Pinging

127.0.0.1

127.0.0.1
with

32

bytes

of

data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128


Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Ping

statistics
for
127.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0
(0%
loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
20

KCCEIT, Nawanshahr (PB)

1146552

Ping your IP* and press Enter. The "XXX" indicates your IP address and can be found
by using the ipconfig /all command. Pinging your IP verifies that the physical network
device can be addressed. If you cannot ping your own IP address, make sure the IP is
correctly entered in the Network Control Panel (NCP). If it is correct, replace TCP/IP. If
this does not work, the network card may not be properly installed or 'bad' in which case
you may need to reinstall the NIC.

C:\WINDOWS>ping 209.166.xxx.xxx
Pinging 209.166.xxx.xxx with 32 bytes of data:
Reply
Reply
Reply
Reply

from
from
from
from

209.166.xxx.xxx:
209.166.xxx.xxx:
209.166.xxx.xxx:
209.166.xxx.xxx:

bytes=32
bytes=32
bytes=32
bytes=32

time<1ms
time=1ms
time=2ms
time<1ms

TTL=44
TTL=44
TTL=44
TTL=44

Ping statistics for 209.166.xxx.xxx:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 2ms, Average = 1ms

Enter ping 209.166.161.121 and press Enter. This test checks that your connection to
the Internet is active and that the network can be accessed. You should receive 4
responses similar to the lines below.
C:\WINDOWS>ping 209.166.161.121
Pinging 209.166.161.121 with 32 bytes of data:
Reply from
TTL=44
Reply from
TTL=44
Reply from
TTL=44
Reply from
TTL=44

209.166.161.121: bytes=32 time<1ms


209.166.161.121: bytes=32 time=1ms
209.166.161.121: bytes=32 time=2ms
209.166.161.121: bytes=32 time<1ms

Ping statistics for 209.166.161.121:

20

KCCEIT, Nawanshahr (PB)

1146552

Packets: Sent = 4, Received = 4, Lost = 0


(0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 2ms, Average = 1ms

Now enter ping www.expedient.net or another server name (e.g., www.yahoo.com) and
press Enter. This test checks that your computer is able to translate name addresses
(like www.expedient.net or www.yahoo.com) to numbers (like 209.166.165.174 or
64.58.76.224) - DNS resolution. You should receive 4 responses similar to the lines
below. If you do not receive responses, check your DNS configuration settings.

C:\WINDOWS>ping www.expedient.net
Pinging corp01.web.pitdc1.expedient.net [208.40.175.241]
with 32 bytes of data:
Reply
Reply
Reply
Reply

from
from
from
from

208.40.175.241:
208.40.175.241:
208.40.175.241:
208.40.175.241:

bytes=32
bytes=32
bytes=32
bytes=32

time<1ms
time=1ms
time=2ms
time<1ms

TTL=44
TTL=44
TTL=44
TTL=44

Ping statistics for 208.40.175.241:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 2ms, Average = 1ms

TRACEROUTE
Traceroute tracks the path that a packet takes from your computer to a destination
address. A traceroute also shows how many times your packets are being rebroadcast by
other servers until it gets to the final destination. For windows users, the command is
tracert. For Macintosh OS X users, its traceroute.
In this example we will trace the hops from a computer to yahoo.com:
C:\WINDOWS>tracert yahoo.com
Tracing route to yahoo.com [66.218.71.198] over a maximum of 30 hops:

20

KCCEIT, Nawanshahr (PB)

1146552

1 <1 ms <1 ms <1


2 44 ms 14 ms 18
3 31 ms 25 ms 13
4 21 ms 17 ms 17
5 15 ms 17 ms 19
[209.244.219.169]
6 16 ms 17 ms 15
7 82 ms 82 ms 82
8 87 ms 87 ms 83
9 87 ms 84 ms 93
10 90 ms 88 ms 92

ms
ms
ms
ms
ms

208.170.243.1
sl-gw15-rly-6-0-1.sprintlink.net [144.232.246.165]
sl-bb22-rly-1-0.sprintlink.net [144.232.25.232]
sl-st20-ash-15-1.sprintlink.net [144.232.20.106]
so-0-0-0.edge1.Washington1.Level3.net

ms
ms
ms
ms
ms

so-5-0-0.gar1.Washington1.Level3.net [209.244.11.9]
so-3-0-0.mp2.SanJose1.Level3.net [64.159.1.130]
gige10-0.ipcolo3.SanJose1.Level3.net [64.159.2.41]
unknown.Level3.net [64.152.69.30]
w1.rc.vip.scd.yahoo.com [66.218.71.198]

Trace complete.

UNDERSTANDING THE OUTPUT


The first line is the command we typed: tracert yahoo.com. Note the space between the
command "ping" and the host computer "yahoo.com."
The next line shows the traceroute program acquiring the ip address from the domain.
"Maximum of 30 hops" is how many routers the packet will go through before giving up
trying to find the host.
The next lines show each server the packets traveled through to get to the destination
yahoo.com. These show both the IP address and domain name of the actual servers that
the packets passed through.

20

KCCEIT, Nawanshahr (PB)

1146552

CHAPTER 6
CONCLUSION AND FUTURE SCOPE
CONCLUSION:
It was a great learning experience while working on the project as we experienced the
real taste of networking. The MNC companys network performance was not up to the
mark because of the slow WAN links and hub connectivity in the LANs. The MNC
company wanted to actually feel the improvement in network performance by replacing
the existing WAN technologies and networking hardware devices. They wanted a
simulation of the actual network before they decide to actually upgrade their hardware
infrastructure.

We prepared a network design according to their specifications and implement the new
WAN technologies. We replaced the WAN links with more faster and efficient WAN
technologies. When we started the project for the MNC company, we had decided to
implement Leased Line technology on all the WAN links but because of financial
constraint and limited budget for the project, we were not able to do so however we did
implement Leased Line technology on the WAN link between UAE office and Delhi
office. On another WAN link between UAE office and Mumbai office we implemented
ISDN. All of the other locations were connected through Frame Relay.

What we feel is that there is still scope for betterment and network performance could
be improved further by implementing leased lines on all WAN links.

20

KCCEIT, Nawanshahr (PB)

1146552

20

KCCEIT, Nawanshahr (PB)

Você também pode gostar