Escolar Documentos
Profissional Documentos
Cultura Documentos
Training Report
ON
VOIP (Voice Over Internet Protocol)
For the training undergone at
Chapter 1
INTRODUCTION
INTRODUCTION:
In this project the main branch is connected to 2 other networks or locations using Microsoft and Cisco
technologies. The main branch includes Domain Name Server, Dynamic Host Configuration Protocol,
Internet Information Services, Exchange Server, IP Phones, Cisco Switches, and Cisco Routers. It also
includes Cisco Link sys wireless Router.
The project is based on the concepts of networking. It includes configuring different network devices
such as Router, Switch connecting it with PCs and IP phones by using different types of connecting
wires by allocating the IP Addresses to all the interfaces after the sub-netting of network id. The beauty
of configuring network devices is that it helps users access the network with few constraints like
allowing some to access the website but not allowing them to access the mail server on the internet on
private IP address which are otherwise excluded by internet service provider (ISP).
Exchange server is used to provide messaging, support for mobile and web access to info. & support for
data storage device. Main server & systems as well as exchange server relies on IP, DNS, DHCP, IIS
and other technologies for communicating between themselves.
Switch here is Cisco switch which provides services like creation & management of systems and IP
phones in main branch and it is the device which connects the devices in main branch, main router and
links to other locations to each other in a network. The information from each system or device i.e.
client or server in main branch, router, IP phones and from other locations passes through switch
interface.
Main Router is responsible for communication between different networks that is, main branch and
other networks. The main router here describes the best path to reach the system in a network from a
system in another network.
IP Phones refers to the communication protocols, technologies & transmission technique involved in the
delivery of voice communication. IP phones uses voice over IP (VOIP) technology allowing telephones
calls to be made over an IP network such as the internet.
Other routers are used at the entrance of the each network. These routers Receives & send routing
updates to and from main router which ensure the reliability of whole network.
Page 1
INTRODUCTION TO NETWORKING:
What is Network?
In a network, there is more than one computer connected with each other through centralized device.
They can share files and resources with each other.
Page 2
LAN:LAN stands for Local Area Network. The scope of the LAN is within one building, one school or within
one lab.
Page 3
Page 4
SWITCH:Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has special
kind of memory called MAC address/filter/lookup table. Switch reads MAC addresses. Switch
stores MAC addresses in its filter address table. Switch when receives frame, it reads the destination
MAC address and consult with its filter table. If he has entry in its filter table then he forwards the
frame to that particular MAC address, if not found then it performs broadcasting to all its connected
nodes.
There are two types of switches: (i) Manageable switches (can be configured with console cable).
(ii) Non-manageable switches.
We can perform LAN segmentation by using switches.
BRIDGE:Bridge is a hardware device, which is used to provide LAN segmentation means it is used for break the
collision domain. It has same functionality as performed by switch. We can use bridge between two
different topologies. It has fewer ports. Each port has its own buffer memory. It works on Data Link
Layer of OSI model. It also read MAC address and stores it in its filter table. In case of bridge there is
one broadcast domain.
Page 6
Page 7
Coaxial
Connector Type
Coaxial Thick
Page 8
- UTP
Page 9
Page 10
Base band
10
10
10
10/100(present)
100
100
1000(Server)
1000
10000
Base 2
Base 5
Base T
Base
Base T4
Base FX
Base TX
Base FX
Base FX
200 meter
500 meter
100 meter
100 meter
100 meter
up to 4 kms
100 meter
up to 10 kms
Coaxial cable
Thick Coaxial cable
Twisted Pair (UTP)
UTP
UTP 4 Pairs used
Fiber Optic
UTP
Fiber Optic
Fiber Optic
Color
Green Green white
Orange Orange white
Blue
Blue white
Pin Configuration:Cross
Straight
Straight Cable
1
Orange white -
Orange white
Orange
Orange
Page 11
Green white
Green white
Blue
Blue
Blue white
Blue white
Green
Green
Brown white
Brown white
Brown
Brown
Cross Cable
1
Orange white -
Green white
Orange
Green
Green white
Orange white
Blue
Blue
Blue white
Blue white
Green
Orange
Brown white -
Brown white
Brown
Brown
RJ45 Connector
Page 12
Page 13
OSI (Open Systems Interconnection) Model:OSI model is the layer approach to design, develop and implement network. OSI provides following
advantages: (i)
Designing of network will be standard base.
(ii)
Development of new technology will be faster.
(iii)
Devices from multiple vendors can communicate with each other.
(iv)
Implementation and troubleshooting of network will be easy.
Page 14
interface
Page 15
this
(4) Transport Layer: Transport layer is responsible for connection oriented and connection less communication.
Transport layer also performs other functions like
a. Error checking
b. Flow Control:Buffering, Windowing, Multiplexing
c. Sequencing
d. Positive Acknowledgement
e. Response
(5) Network Layer :This layer performs function like logical addressing and path determination. Each networking
device has a physical address that is MAC address. But logical addressing is easier to
communicate on large size network.
Logical addressing defines network address and host address. This type of addressing is used to
simplify implementation of large network. Some examples of logical addressing are: - IP
addresses, IPX addresses etc.
(6) Data Link Layer:The functions of Data Link layer are divided into two sub layers
(i)
Logical Link Control defines the encapsulation that will be used by the NIC to
delivered data to destination. Some examples of Logical Link Control are ARPA
(Ethernet), 802.11 Wi-Fi.
(ii)
Media Access Control defines methods to access the shared media and establish the
identity with the help of MAC address. Some examples of Media Access Control are
CSMA/CD, Token Passing.
(7) Physical Layer:Physical Layer is responsible to communicate bits over the media this layer deals with the
standard defined for media and signals. This layer may also perform modulation and
demodulation as required
Page 16
Chapter 2
PROJECT REQUIREMENTS
2.1 SOFTWARE REQUIREMENTS
Page 17
CISCO ROUTER:
SWICHES:
CABLES:
Clients/Nodes:
Pentium 4 or up
Windows XP Professional
512 MB RAM
80 GB Hard Disk
Page 18
IP Phones:
Chapter 3
ABOUT CISCO PACKET TRACER
3.1 Packet tracer overview
Page 19
Purpose:
The purpose of this lab is to become familiar with the Packet Tracer interface. Learn how to us
Page 20
Page 21
Page 22
Page 23
Chapter 4
NETWORK DESIGN
4.1 Network design:
Page 24
Page 25
ADMINISTRATOR ROOM has end devices connected to Cisco 2960 series Switch-SWITCH
1.
FTP server is connected to Cisco 2811 series Routers-ROUTER 0 for the service to BRANCH
1.
BRANCH 1 area is LAN 1 in my project and BRANCH 1 router is connected with so many ISPs
i.e ( INTERNET SERVICE PROVIDER) via via cross-over cables.
SWITCH 6
are
ADMINISTRATOR ROOM has end devices connected to Cisco 2960 series Switch-SWITCH
11.
Page 26
C3 lab has end devices connected to Cisco 2960 series Switch-SWITCH 10.
SWITCH 8,SWITCH 9, SWITCH 10, and SWITCH 11 are connected via straight wires to
SWITCH 7.
BRANCH 2 area is LAN 2 in my project and BRANCH 2 router is also connected with so many
ISPs i.e ( INTERNET SERVICE PROVIDER) via via cross-over cables.
SWITCH 12 is connected via straight wires to ROUTER 7 and there is a NAT configured on the
ROUTER 7 for SWITCH 12.
A google server, a yahoo server, a facebook server, Punjab Technical University server and a
domain name server are inter-connected via cross-over cables.
Routers
Switches
Devices
Other Media
Page 27
Fig. 4.2
Workgroup Switch:
Workgroup switches add more intelligence to data transfer management.
Switches can determine whether data should remain on a LAN or not, and they can transfer the data to
the connection that needs that data.
Page 28
Internet
R1
Fig.4.4
Cables:
10
Page 29
Page 30
Fig. 4.8
4.4
Device configuration
Router to router:
To connectivity of router to router, first we have select serial ports from WIC 2T.
Fig. 4.9
Select serial ports:
Fig: 4.10
Page 31
Router to switch:
For connectivity of router to switch, we used straight wire at fast Ethernet port Fa0/0 to Fa0/1.
Fig. 4.11
Switch to switch: For connectivity of switch to switch, we used straight wire at fast Ethernet port
Fat0/1 to Fat 0/3.
Fig. 4.12
Switch to servers and IP phones: For connectivity of switch to servers and IP phones, we used
straight wire at fast Ethernet port.
Page 32
Fig.4.13
Chapter 5
IP ROUTING & ROUTING
PROTOCOLS
5.1 IP Routing:
When we want to connect two or more networks using different n/w addresses then we have to use IP
Routing technique. The router will be used to perform routing between the networks. A router will
perform following functions for routing.
(1) Path determination
(2) Packet forwarding
(1) Path determination
The process of obtaining path in routing table is called path determination. There are three different
methods to which router can learn path.
i) Automatic detection of directly connected n/w.
ii) Static & Default routing
iii) Dynamic routing
(2) Packet forwarding
It is a process that is by default enable in router. The router will perform packet forwarding only if
route is available in the routing table.
In this project, we are using only DYNAMIC ROUTING.
Page 33
Pass periodic copies of routing table to neighbor routers and accumulate distance vectors
Routers discover the best path to destination from each neighbor
Updates proceed step-by-step from router to router
Link state routing algorithm - (also called Shortest Path First) Routing algorithm in which each router
broadcasts (floods) or multicasts information regarding the cost of reaching each of its neighbors to all
nodes in the internetwork. Link state algorithms create a consistent view of the network and are
therefore not prone to routing loops, but they achieve this at the cost of relatively greater computational
difficulty and more widespread traffic (compared with distance vector routing algorithms).
Convergence - The speed and ability of a group of internetworking devices running a specific routing
protocol to agree on the topology of an internetwork after a change in that topology.
Convergence occurs when all routers use a consistent perspective of network topology (When all
routers in an internetwork are operating with the same knowledge)
After a topology changes, routers must re-compute routes, which disrupts routing
The process and time required for router re-convergence varies in routing protocols
Autonomous System (AS) - consists of routers, run by one or more operators, that present a consistent
view of routing to the external world. (Routers under a common administration). The Internet Network
Information Center (Inter NIC) assigns a unique autonomous system to enterprises. This autonomous
Page 34
The network subcommand is a mandatory configuration command for each IP routing process
(allows the routing process to determine which interfaces will participate in the sending and
receiving of routing updates)
network-number - specifies a directly connected network (must be based on
the NIC network numbers, not subnet numbers or individual addresses)
Page 35
RIP (Routing Information Protocol) - IGP supplied with UNIX BSD systems. The most common is
IGP in the Internet scenario. RIP uses hop count as a routing metric.
IGRP (Interior Gateway Routing Protocol) - IGP developed by Cisco to address the problems
associated with routing in large, heterogeneous networks.
EIGRP (Enhanced Interior Gateway Routing Protocol) -Advanced version of IGRP developed by
Cisco. Provides superior convergence properties and operating efficiency, and combines the advantages
of link state protocols with those of distance vector protocols.
OSPF (Open Shortest Path First) - Link-state, hierarchical IGP routing protocol proposed as a
successor to RIP in the Internet community. OSPF features include least-cost routing, multipath routing,
and load balancing. OSPF was derived from an early version of the ISIS protocol
Configuring RIP
Router#conf ter
Router(config)#router rip
Router(config-router)#network <own net address>
Router(config-router)#network <own net address>
--------------------------Router(config-router)#exit
172.16.0.6
10.0.0.1
172.16.0.5
175.2.1.1
R
1
200.100.100.12
Page 36
Router(config-router)#network 10.0.0.0
Router(config-router)#network 172.16.0.0
Router(config-router)#network 200.100.100.0
Serial E1
modem
2048 k
Serial E1
2048 k
256 k
Sync
Configuring EIGRP
Router(config)#router eigrp <as no>
Router(config-router)#network <net addr.>
Router(config-router)#network <net addr.>
Router(config-router)#exit
Page 37
wild mask
R1
Router(config)#router ospf 33
Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
Router(config-router)#network 200.100.100.64 0.0.0.31 area 0
Router(config-router)#exit
R2
Router(config)#router ospf 2
Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
Router(config-router)#network 200.100.100.128 0.0.0.63 area 0
Router(config-router)#exit
Internetworking functions of the 3Network Layer include 'network addressing' and 'best path
selection' for traffic.
'Network addressing' uses one part to identify the path used by the router and one part for ports
or devices on the net.
'Routed protocols' carry user traffic, while 'Routing protocols' work between routers to maintain
path tables.
Network discovery for 'Distance vector' involves exchange of routing tables; problems can
include 'slower convergence'.
Page 38
Bandwidth
Delay
Load
Reliability
Maximum transmission unit (MTU)
MTU (Maximum transmission unit) - Maximum packet size, in bytes, that a particular interface
can handle.
EXAMPLE:
Router(config)# router igrp 109
show ip protocol - Displays IP routing protocol, routing timers and network information
associated with the entire router. The algorithm used to calculate the routing metric for IGRP is
also shown as well as information about routing metrics (like hop count) and routing filters.
Page 40
Chapter 6
IP PHONES
6.1 IP Phones
A IP phone uses voice over IP (VoIP) technologies allowing telephone calls to be made over an IP
network such as the Internet instead of the ordinary PSTN system. Calls can traverse the Internet, or a
private IP network such as that of a company. The phones use control protocols such as Session
Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP) or one of various proprietary
protocols such as that used bySkype. It is commonly refers to the communication protocols,
technologies and transmission techniques involved in the delivery of voice communications and
multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Session Initiation Protocol (SIP) is a signaling protocol widely used [citation needed] for controlling
communication sessions such as voice and video calls over Internet Protocol (IP). The protocol can be
used for creating, modifying and terminating two-party (Uni-cast) or multiparty (Multi-cast) sessions.
Sessions
may
consist
of
one
or
several
media
streams.
Page 41
Fig. 6.1
Skinny Client Control Protocol (SCCP) is a proprietary network terminal controlprotocol. SCCP is a
lightweight protocol for session signaling with Cisco CallManager.
Examples of SCCP clients include the Cisco 7900 series of IP phones, Cisco IP Communicator
softphone along with Cisco Unity voicemail server. CallManager acts as a signaling proxy for call
events initiated over other common protocols such as Session Initiation Protocol (SIP), ISDN.A SCCP
client uses TCP/IP to communicate with one or more Call Manager applications in a cluster. It uses the
Real-time Transport Protocol (RTP) over UDP-transport for the bearer traffic (real-time audio stream).
Page 42
Next you will need to configure your switch with the following commands:
Switch(config)#interface range fa0/1 6
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport voice vlan 1
Then we need to configure our router to provide IP address to IP phones and set the calling numbers for
phones , we will use CME call manager express embedded with router IOS itself.
Router(config)#interface fa 0/0
Router(config-if)#ip add 10.0.0.1 255.0.0.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#ip dhcp pool HCL
Router(dhcp-config)#network 10.0.0.0 255.0.0.0
Router(dhcp-config)#default-router 10.0.0.1
Router(dhcp-config)#option 150 ip 10.0.0.1
Router(dhcp-config)#exit
Page 43
Page 44
Fig. 6.2
3.
4.
5.
Plug the wire in the port to ON the device. Then select GUI.
Click on the receiver.
Enter the number of IP phone4 that is 103. Ring out to the IP phone 1.
Page 45
Fig. 6.2
Fig. 6.3
Page 46
Fig. 6.4
After receiving the receiver, now both IP phones are connected...
Fig. 6.5
Page 47
Chapter 7
ADVANTAGES AND DISADVANTAGES OF PROJECT
Advantages of VOIP
Low call costs.
Low cost of performing moves, ads and changes on a business VOIP phone
system.
Increased functionality and integration with other IT business systems.
Ability to have your land-line phone number follows you anywhere.
Low infrastructure costs.
Future proof.
Disadvantages of VOIP
Loss of service during outages.
Without power VOIP phones are useless, so in case of emergencies during power
cuts it can be a major disadvantage.
With VOIP emergency calls, it is hard to locate you and send help in time.
Some times during calls, there may be periods of silence when data is lost while it
is being unscrambled.
Latency and traffic.
No standard protocol is applicable
Page 48
Chapter 8
FUTURE ENHANCEMENT
Future Enhancement:
Voice over Internet Protocol (VoIP) is one of the hottest and most hyped technologies in the
communications industry. Businesses and consumers are already taking advantage of the cost savings
and new features of making calls over a converged voice-data network, and the logical next step is to
take those advantages to the wireless world. The most widely publicized benefit of VoIP is the ability to
save costs on long distance charges and to network multiple offices together. Businesses that have a data
connection between their offices can utilize VoIP technology to bypass long distance networks and
provide more efficient communications between offices. In a traditional setting, someone would have to
dial the phone number to a branch office, possibly paying a long distance charge for the call, wait for a
receptionist or automated system to answer and then become connected to the party theyre trying to
reach. Using VoIP, a person can simply dial an extension number and be connected immediately to a
party in another office, whether across town or around the world avoiding costly long distance charges.
A second benefit is in the design of many telephone systems, often called IP based systems. Rather than
traditional phone systems with their own wiring infrastructure, IP based systems use a data network
infrastructure. This convergence of voice and data into a single platform has tremendous advantages in
simplifying the administration of the communications network. Plus, IP utilizes data infrastructure that
most likely already exists in many companies.
A third benefit is the ability to have remote phones with a single telephone number. For example, an
employee could work out of their home in New York, utilizing a phone number with a California area
code. This enables corporations to truly take advantage of having a virtual office and or remote agents
working out of a variety of location
.
Page 49
Chapter-9
CONCLUSION
CONCLUSION:
The project VOIP (VOICE OVER INTERNET PROTOCOL) NETWORK is an effort to help the
readers understand the network scenario of corporate world. I thoroughly studied the available hardware
and software solutions available. In the market, before implementing them in my project. Moreover, I
developed this project at minimal cost. This project will definitely help users in some from or the
others, since it has been developed keeping both. Ease of use and understanding features in mind. I
planned to enhance this project in future, with help of various users input too.
Concluding compactly, through this project, I intend to serve the users the best and in turn serve myself
for there is a profound sense of satisfaction and pride.
Page 50
Chapter 10
BIBLIOGRAPHY
BIBLIOGRAPHY:
Books:
1. Cisco Certified Network Associate Study
2. CCNA study- guide
3. Computer Networking
4. MCITP
Author:
Todd Lammle
Sybex
James F. Kurose
Darril Gibson
Page 51