Balwinder Singh

60
INDUSTRIAL TRAINING REPORT WAN DESIGN AND MANAGEMENT Submitted in partial fulfillment of the Requirements for the award of Degree of Bachelor of Technology in Computer Science Engineering Submitted By BALWINDER SINGH University Roll No.-1286735 SUBMITTED TO:

Transcript of Balwinder Singh

Page 1: Balwinder Singh

INDUSTRIAL TRAINING REPORT

WAN DESIGN AND MANAGEMENT

Submitted in partial fulfillment of the

Requirements for the award of

Degree of Bachelor of Technology in Computer Science Engineering

Submitted By

BALWINDER SINGHUniversity Roll No.-1286735

SUBMITTED TO:

Department of Computer Science & Engineering RIMT – MAHARAJA AGGRASEN ENGINEERING COLLEGE

Mandi Gobindgarh (Punjab).

Page 2: Balwinder Singh

DECLARATION

I hereby certify that the project entitled “WAN DESIGN AND MANAGEMENT

” developed by Balwinder Singh, University Roll No. 1286735 in partial fulfillment of

requirements for the award of degree of B.Tech (Computer Science & Engineering)

submitted in the Department of Computer Science & Engineering at RIMT –

MAHARAJA AGGRASEN ENGINEERING COLLEGE Mandi Gobindgarh (Punjab)

under PUNJAB TECHNICAL UNIVERSITY, JALANDHAR is an authentic record of

our own work carried out under the supervision of Er. RAJINDERPAL SINGH, SLR

Infotech Pvt Ltd Sec 34A, Chandigahr . The matter presented has not been submitted in

any other University / Institute for the award of B.Tech Degree.

Signature of student BALWINDER SINGH

1286735Date: ____________________

This is to certify that the above statement made by the candidate is correct to the best of

my knowledge.

Guide’s NameEr. Rajinderpal Singh

Head of Department(Signature and Seal)

Page 3: Balwinder Singh

PROJECT SUMMARY

An MNC company has been setup in India with its headquaters at UAE. It has started through its main offices at Delhi and Mumbai. Mumbai office is futher connected to offices at Banglore and Chandigarh. Delhi office to Jalandhar and Ludhiana main office at UAE is connected to Mumbai office through SERIAL connection which support static routing and is also connected to Delhi office through leased line which supports dynamic routing .Both offices at Delhi and Mumbai have routers acting as child routers so that the user cannot connect directly to main office at UAE for further security reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection .Mumbai branch is also connected to Banglore and Chennai branches by frame relay connection. These branches are to switches which are further connected to users via Ethernet port and users are accessing to various facilities provided to them ACL(Access control list)is also configured to switches for further security.

Page 4: Balwinder Singh

TABLE OF CONTENTS:

CH-1 INTRODUCTION 1.1BACKGROUND 1.2IMPORTANCE1.3OBJECTIVE

CH-2 SYSTEM ANALYSIS2.1 ANALYSIS OF EXISTING NETWORK2.2 REQUIREMENT SPECIFICATION OF EXISTING NETWORK2.3 FEASIBILITY STUDY

CH-3 SYSTEM DESIGN3.1 LAYOUT OF PROPOSED NETWORK3.2 DESIGN PARAMETERS

CH-4 SYSTEM IMPLEMENTATION4.1 SOFTWARE AND TECHNOLOGIES USED IN THE PROJECT4.2 PROJECT CONFIGURATION

CH-5 SYSTEM TESTING AND TROUBLESHOOTING5.1 PING AND TRACEROUTE

CH-6 CONCLUSION AND FUTURE SCOPE

REFERENCES:

Page 5: Balwinder Singh

CHAPTER – 1

INTRODUCTION

1.1 BACKGROUND

1.2 IMPORTANCE

1.3 OBJECTIVE

Page 6: Balwinder Singh

1.1 BACKGROUND.

An MNC company has been set up in India with its head quarters at UAE. It has started through its main offices at Delhi and Mumbai. Mumbai office is further connected to offices at Bangalore and Chandigarh . Delhi office to Jalandhar and Ludhiana main office at U.A.E is connected to Mumbai office through SERIAL connection which supports static routing and is also connected to Delhi office through leased lines which supports dynamic routing. Both offices at Delhi and Mumbai have routers acting as child routers so that the user can not connect directly to main office at U.A.E for security reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection. Mumbai branch is also connected to Bangaluru and Chandigarh branches by frame relay connections. These branches to switches which are further connected to users via ETHERNET port and users are accessing to various facilities provided to them. ACL(access control list) is also configured to switches for further security.

1.2 IMPORTANCE OF PROJECT.

Wide Area Networks are spread over a (very) wide area so that companies and institutes that are located far from each other are directly connected via the network. Wide Area Networks have – mostly on more than one location – external connections with other big networks. Internet Service Providers (ISPs) and multinationals with many offices frequently own a WAN themselves. Regional education networks and company networks between several establishments are also examples of Wide Area Networks. Two great advantages of WAN are allowing secure and fast data transmission between the different nodes in the network. The data transmission is also reliable and inexpensive. The characteristics of the transmission facilities lead to an emphasis on efficiency of communications techniques in the design of WANs. Controlling the volume of traffic and avoiding excessive delays is important. Since the topologies of WANs are likely to be more complex than those of LANs, routing algorithms also receive more emphasis. Many WANs also implement sophisticated monitoring procedures to account for which users consume the network resources. This is, in some cases, used to generate billing information to charge individual users.

Page 7: Balwinder Singh

1.3 OBJECTIVE OF PROJECT.

Objective of the project is to connect various offices of the MNC company by using LAN and WAN technologies.

Page 8: Balwinder Singh

CHAPTER – 2

SYSTEM ANALYSIS

2.1 ANALYSIS OF EXISTING NETWORK2.2 REQUIREMENT SPECIFICATION OF EXISTING

NETWORK2.3 FEASIBILITY STUDY

2.1 Analysis of Existing Network

Page 9: Balwinder Singh

The existing network consists of hubs and there are dial up connections in between various offices of the MNC company because of which both LAN and WAN links are very slow and users regularly face problem in transmitting their data over the links. Most of the time there is network conjestion in the network because of which the work is suffering and users are not able to perform up expectation.

2.2 Requirement Specification of proposed Network.

In the proposed design, hubs will be replaced with switches so as to improve the LAN connectivity. Switches would be operating at 100 Mbps as compared to hubs which operate at 10 Mbps. Moreover switches are manageable so VLANS can be created on them so as to decrease broadcast traffic and to enhance security as well. As far as WAN is concerned all the dial up links would be replaced with ISDN, Frame-Relay and Leased Line connection so as to improve WAN connectivity and users don’t face network congestion during working hours.

2.3 FEASIBILITY STUDY

Economic feasibility

Economic analysis is the most frequently used method for evaluating the effectiveness of a new system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. An entrepreneur must accurately weigh the cost versus benefits before taking an action

Cost Based: No special investment is needed to manage the tool. No specific training is required for employees to use the tool. Investment requires only once at the time of installation. The software used in this project is freeware so the cost of developing the tool is minimal

Page 10: Balwinder Singh

Legal feasibility

Determines whether the proposed system conflicts with legal requirements e.g. a Data Processing system must comply with the local Data Protection Acts.

Operational feasibility

Is a measure of how well a proposed system solves the problems, and takes advantages of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.

Schedule feasibility

A project will fail if it takes too long to be completed before it is useful. Typically this means estimating how long the system will take to develop, and if it can be completed in a given time period using some methods like payback period. Schedule feasibility is a measure of how reasonable the project timetable is. Given our technical expertise, are the project deadlines reasonable? Some projects are initiated with specific deadlines. You need to determine whether the deadlines are mandatory or desirable.

Market and real estate feasibility

Market Feasibility Study typically involves testing geographic locations for a real estate development project, and usually involves parcels of real estate land. Developers often conduct market studies to determine the best location within a jurisdiction, and to test alternative land uses for a given parcels. Jurisdictions often require developers to complete feasibility studies before they will approve a permit application for retail, commercial, industrial, manufacturing, housing, office or mixed-use project. Market Feasibility takes into account the importance of the business in the selected area.

Resource feasibility

This involves questions such as how much time is available to build the new system, when it can be built, whether it interferes with normal business operations, type and amount of resources required, dependencies, etc. Contingency and mitigation plans should also be stated here.

Page 11: Balwinder Singh

Cultural feasibility

In this stage, the project's alternatives are evaluated for their impact on the local and general culture. For example, environmental factors need to be considered and these factors are to be well known. Further an enterprise's own culture can clash with the results of the project

CHAPTER – 3

Page 12: Balwinder Singh

SYSTEM DESIGN

3.1 LAYOUT OF PROPOSED NETWORK3.2 DESIGN PARAMETERS

3.1. Layout of the proposed Network

Page 13: Balwinder Singh

3.2 Design Parameters

Page 14: Balwinder Singh

The various devices that are being used in designing the network of the MNC Company as follows:

ROUTER

A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect, and are the critical device that keeps data flowing between networks and keeps the networks connected to

the internet.

When data is sent between locations on one network or from one network to a second network the data is always seen and directed to the correct location by the router. The router accomplishes this by using headers and forwarding tables to determine the best path for forwarding the data packets, and they also use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

SWITCH

A switch is an electrical component that can break an electrical circuit, interrupting the current or diverting it from one conductor to another. The most familiar form of switch is a manually operated electromechanical device with one or more sets of electric contacts. Each set of contacts can be in one of two states: either 'closed' meaning the contacts are touching and electricity can flow between them, or 'open', meaning the contacts are separated and non conducting.

A switch may be directly manipulated by a human as a control signal to a system, such as a computer keyboard button, or to control power flow in a circuit, such as a light switch. Automatically-operated switches can be used to control the motions of machines, for example, to indicate that a garage door has reached its full open position or that a machine tool is in a position to accept another work piece. Switches may be operated by process variables such as pressure, temperature, flow, current, voltage, and force, acting as sensors in a process and used to automatically control a system. For

Page 15: Balwinder Singh

example, a thermostat is an automatically-operated switch used to control a heating process. A switch that is operated by another electrical circuit is called a relay. Large switches may be remotely operated by a motor drive mechanism.

The various WAN technologies that are being used in the design of MNC’ network as as follows:

FRAME-RELAY

Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. Frame Relay originally was designed for use across Integrated Services Digital Network (ISDN) interfaces. Today, it is used over a variety of other network interfaces as well. This chapter focuses on Frame Relay's specifications and applications in the context of WAN services.

Frame Relay is an example of a packet-switched technology. Packet-switched networks enable end stations to dynamically share the network medium and the available bandwidth. The following two techniques are used in packet-switching technology:

•Variable-length packets

• Statistical multiplexing

Variable-length packets are used for more efficient and flexible data transfers. These packets are switched between the various segments in the network until the destination is reached.

Statistical multiplexing techniques control network access in a packet-switched network. The advantage of this technique is that it accommodates more flexibility and more efficient use of bandwidth. Most of today's popular LANs, such as Ethernet and Token Ring, are packet-switched networks.

Frame Relay often is described as a streamlined version of X.25, offering fewer of the robust capabilities, such as windowing and retransmission of last data that are offered in X.25. This is because Frame Relay typically

Page 16: Balwinder Singh

operates over WAN facilities that offer more reliable connection services and a higher degree of reliability than the facilities available during the late 1970s and early 1980s that served as the common platforms for X.25 WANs. As mentioned earlier, Frame Relay is strictly a Layer 2 protocol suite, whereas X.25 provides services at Layer 3 (the network layer) as well. This enables Frame Relay to offer higher performance and greater transmission efficiency than X.25, and makes Frame Relay suitable for current WAN applications, such as LAN interconnection.

Frame Relay Devices

Devices attached to a Frame Relay WAN fall into the following two general categories:

• Data terminal equipment (DTE)

• Data circuit-terminating equipment (DCE)

DTEs generally are considered to be terminating equipment for a specific network and typically are located on the premises of a customer. In fact, they may be owned by the customer. Examples of DTE devices are terminals, personal computers, routers, and bridges.

DCEs are carrier-owned internetworking devices. The purpose of DCE equipment is to provide clocking and switching services in a network, which are the devices that actually transmit data through the WAN. In most cases, these are packet switches. Figure 10-1 shows the relationship between the two categories of devices.

DCEs Generally Reside Within Carrier-Operated WANs

The connection between a DTE device and a DCE device consists of both a physical layer component and a link layer component. The physical component defines the mechanical, electrical, functional, and procedural specifications for the connection between the devices. One of the most commonly used physical layer interface specifications is the recommended standard (RS)-232 specification. The link layer component defines the protocol that establishes the connection between the DTE device, such as a router, and the DCE device, such as a switch. This chapter examines a

Page 17: Balwinder Singh

commonly utilized protocol specification used in WAN networking: the Frame Relay protocol.

Frame Relay Network Implementation

A common private Frame Relay network implementation is to equip a T1 multiplexer with both Frame Relay and non-Frame Relay interfaces. Frame Relay traffic is forwarded out the Frame Relay interface and onto the data network. Non-Frame Relay traffic is forwarded to the appropriate application or service, such as a private branch exchange (PBX) for telephone service or to a video-teleconferencing application.

A typical Frame Relay network consists of a number of DTE devices, such as routers, connected to remote ports on multiplexer equipment via traditional point-to-point services such as T1, fractional T1, or 56-Kb circuits. An example of a simple Frame Relay network is shown in Figure 10-3.

A Simple Frame Relay Network Connects Various Devices to Different Services over a WAN

The majority of Frame Relay networks deployed today are provisioned by service providers that intend to offer transmission services to customers. This is often referred to as a public Frame Relay service. Frame Relay is implemented in both public carrier-provided networks and in private enterprise networks. The following section examines the two methodologies for deploying Frame Relay.

Page 18: Balwinder Singh

CHAPTER – 4

SYSTEM IMPLEMENTATION

4.1 SOFTWARE AND TECHNOLOGIES USED IN THE PROJECT

4.2 PROJECT CONFIGURATION

4.1 SOFTWARE:

SIMULATOR

Page 19: Balwinder Singh

A network simulator is a piece of software or hardware that predicts the behavior of a network, without an actual network being present.

Network simulators serve a variety of needs. Compared to the cost and time involved in setting up an entire test bed containing multiple networked computers, routers and data links, network simulators are relatively fast and inexpensive. They allow engineers to test scenarios that might be particularly difficult or expensive to emulate using real hardware- for instance, simulating the effects of a sudden burst in traffic or a DoS attack on a network service. Networking simulators are particularly useful in allowing designers to test new networking protocols or changes to existing protocols in a controlled and reproducible environment.

Network simulators, as the name suggests are used by researchers, developers and QA to design various kinds of networks, simulate and then analyze the effect of various parameters on the network performance .A typical network simulator encompasses a wide range of networking technologies and help the users to build complex networks from basic building blocks like variety of nodes and links. With the help of simulators one can design hierarchical networks using various types of nodes like computers, hubs, bridges, routers, optical cross-connects, multicast routers, mobile units, MSAUs etc.

The simulator that we have used to create a simulation of the network design of the MNC Company is CISCO PACKET TRACER.

Page 20: Balwinder Singh

OSPF

Stands for "Open Shortest Path First" OSPF is a method of finding the shortest path from one router to another in a local area network (LAN). As long as a network is IP-based, the OSPF algorithm will calculate the most efficient way for data to be transmitted. If there are several routers on a network, OSPF builds a table (or topography) of the router connections. When data is sent from one location to another, the OSPF algorithm compares the available options and chooses the most efficient way for the data to be sent. This limits unnecessary delays in data transmission and prevents infinite loops. DEFINITION: OSPF (Open Shortest Path First) is a router protocol used within larger autonomous system networks in preference to the Routing Information Protocol (RIP), an older routing protocol that is installed in many of today's corporate networks. Like RIP, OSPF is designated by the Internet Engineering Task Force (IETF) as one of several Interior Gateway Protocols (IGPs).

Page 21: Balwinder Singh

So that all will have the same routing table information. Unlike the RIP in which the entire routing table is sent, the host using OSPF sends only the part that has Using OSPF, a host that obtains a change to a routing table or detects a change in the network immediately multicasts the information to all other hosts in the network changed. With RIP, the routing table is sent to a neighbor host every 30 seconds. OSPF multicasts the updated information only when a change has taken place. Rather than simply counting the number of hops, OSPF bases its path descriptions on "link states" that take into account additional network information. OSPF also lets the user assign cost metrics to a given host router so that some paths are given preference. OSPF supports a variable network subnet mask so that a network can be subdivided. RIP is supported within OSPF for router-to-end station communication. Since many networks using RIP are already in use, router manufacturers tend to include RIP support within a router designed primarily for OSPF.

ACCESS CONTROL LISTS:

Cisco provides basic traffic filtering capabilities with access control lists (also referred to as access lists). Access lists can be configured for all routed network protocols (IP, AppleTalk, and so on.) to filter those protocols' packets as the packets pass through a router.

You can configure access lists at your router to control access to a network: access lists can prevent certain traffic from entering or exiting a network.

About Access Control Lists

This section briefly describes what access lists do; why and when you should configure access lists; and basic vs. advanced access lists.

What Access Lists Do

Access lists filter network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces. Your router examines each packet to determine whether to forward or drop the packet, based on the criteria you specified within the access lists. Access list criteria could be the source address of the traffic, the destination address of the traffic, the upper-layer protocol, or other information. Note that sophisticated use can

Page 22: Balwinder Singh

sometimes successfully evade or fool basic access lists because no authentication is required..

VLSM

A Variable Length Subnet Mask (VLSM) is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule. Of the IP routing protocols supported by CISCO, OSPF, Dual IS-IS, BGP-4, and EIGRP support "classless" or VLSM routes.Historically, EGP depended on the IP address class definitions, and actually exchanged network numbers (8, 16, or 24 bit fields) rather than IP addresses (32 bit numbers); RIP and IGRP exchanged network and subnet numbers in 32 bit fields, the distinction between network number, subnet number, and host number being a matter of convention and not exchanged in the routing protocols. More recent protocols (see VLSM) carry either a prefix length (number of contiguous bits in the address) or subnet mask with each address, indicating what portion of the 32 bit field is the address being routed on. A simple example of a network using variable length subnet masks is found in Cisco engineering. There are several switches in the engineering buildings, configured with FDDI and Ethernet interfaces and numbered in order to support 62 hosts on each switched subnet; in actuality, perhaps 15-30 hosts (printers, workstations, disk servers) are physically attached to each. However, many engineers also have ISDN or Frame Relay links to home, and a small subnet there. These home offices typically have a router or two and an X terminal or workstation; they may have a PC or Macintosh as well. As such, they are usually configured to support 6 hosts, and a few are configured for 14. The point to point links are generally unnumbered.

Using "one size fits all" addressing schemes, such as are found in RIP or IGRP, the home offices would have to be configured to support 62 hosts each; using numbers on the point to point links would further compound the address bloat. One configures the router for Variable Length Subnet Masking by configuring the router to use a protocol (such as OSPF or EIGRP) that supports this, and configuring the subnet masks of the various

Page 23: Balwinder Singh

interfaces in the ‘IP address interface sub-command. To use super nets, one must further configure the use of 'IP classless' routes.

4.2 PROJECT CONFIGURATIONMAIN OFFICE (U.A.E) CONFIGURATION

MAIN OFFICE IN U.A.E

Router>EnableRouter# Configure TerminalRouter(config)#interface serial 1/0Router(config-if)#ip address 11.0.0.1 255.0.0.0Router(Config-If)#Clock Rate 64000

Page 24: Balwinder Singh

Router(Config-If)#no shutdownRouter(config)#exitRouter(config)#interface serial 1/1Router(config-if)#ip address 10.0.0.1 255.0.0.0Router(config-if)#Clock Rate 64000Router(config)# no shutdownRouter(config)#exitRouter(config)#interface fast Ethernet 0/0Router(config-if)#ip address 192.168.1.1 255.255.255.0Router(config-if)#no shutdownRouter(config)#exitRouter(config)#router ospf 90Router(config-router)#network 10.0.0.0 0.255.255.255 area 50Router(config-router)#network 11.0.0.0 0.255.255.255 area 50Router(config-router)#network 192.168.1.0 0.0.0.255 area 50Router(config-router)#exitRouter(config)#access-list 120 deny tcp 1.0.0.2 0.0.0.0 192.168.1.2 0.0.0.0Router(config)#access-list 120 permit ip any anyRouter(config)#interface serial 1/1Router(config-if)#ip access-group 120 inRouter(config-if)#exit

SERVER CONFIGURATION

Page 25: Balwinder Singh

MUMBAI BRANCH CONFIGURATION:

MAIN BRANCH IN MUMBAI

Page 26: Balwinder Singh

Router >Enable

Router#configure terminal

Router(config)#interface serial 1/0

Router(Config-if)#Ip address 10.0.0.2 255.0.0.0 Router(Config-if)#No ShutRouter(Config-if)#exitRouter(Config)#interface serial 1/1Router(Config-if)#ip address 14.0.0.1 255.0.0.0Router(Config-if)#no shutdownRouter(Config-if)#exitRouter(Config)# interface serial 1/2Router(Config-if)#ip address 15.0.0.1 255.0.0.0Router(Config-if)#No ShutdownRouter(Config-if)#exitRouter(config)#router ospf 92Router(config-router)#network 10.0.0.0 0.255.255.255 area 50Router(config-router)#network 14.0.0 0.255.255.255 area 50Router(config-router)#network 15.0.0.0 0.255.255.255 area 50Router(config-router)#exitRouter(config)#interface serial 1/1Router(config-if)#encapsulation frame-relayRouter(config-if)#ip ospf network broadcastRouter(config-if)#frame-relay map ip 14.0.0.2 104 broadcastRouter(config-if)#frame-relay lmi-type ansiRouter(config-if)#exitRouter(config)#interface serial 1/2Router(config-if)#encapsulation frame-relayRouter(config-if)#ip ospf network broadcastRouter(config-if)#frame-relay map ip 15.0.0.2 105 broadcastRouter(config-if)#frame-relay lmi-type ansiRouter(config-if)#exit

Page 27: Balwinder Singh

BANGALORE OFFICE CONFIGURATION:

MAIN OFFICE BANGALORE

Router>EnableRouter #configure terminalRouter(config)#interface serial 1/0Router(Config-if)#Ip address 14.0.0.2 255.0.0.0Router(config-if)#no shutdownRouter(config-if)#exitRouter(config)#interface fastethernet0/0Router(Config-if)#Ip address 3.0.0.1 255.0.0.0

Page 28: Balwinder Singh

Router(Config-if)#No ShutdownRouter(Config-if)#exitRouter(config)#router ospf 95Router(config-router)#network 14.0.0.0 0.255.255.255 area 50Router(config-router)#network 3.0.0.0 0.255.255.255 area 50Router(config-router)#exitRouter(config)#interface serial 1/0Router(config-if)#encapsulation frame-relayRouter(config-if)#ip ospf network broadcastRouter(config-if)#frame-relay map ip 14.0.0.1 401 broadcastRouter(config-if)#frame-relay lmi-type ansiRouter(config-if)#exitRouter(config)#hostname BangaloreBangalore(config)#enable password CISCOBangalore(config)#username MUMBAI password CCNABangalore(config)#interface serial 1/0Bangalore(Config-if)#encapsulation pppBangalore(config-if)#ppp authentication papBangalore(config-if)#ppp pap sent username-bangalore password CISCOBangalore(config-if)#exitBangalore(config)#exitBangalore#show interface serial 1/0

Page 29: Balwinder Singh

USER CONFIGURATION

USER CONFIGURATION

Page 30: Balwinder Singh

CHANDIGARH OFFICE CONFIGURATION

MAIN OFFICE CHANDIGARH

Router>enable

Router#Configure terminalRouter(config)#interface serial 1/0Router(config-if)#ip address 15.0.0.2 255.0.0.0Router(config-if)#no shutdownRouter(config-if)#exitRouter(Config)#interface fastethernet0/0Router(Config-if)#ip address 4.0.0.1 255.0.0.0Router(Config-if)#No ShutdownRouter(Config-if)#exitRouter(config)#router ospf 96Router(config-router)#network 15.0.0.0 0.255.255.255 area 50Router(config-router)#network 4.0.0.0 0.255.255.255 area 50Router(config-router)#exit

Page 31: Balwinder Singh

Router(config)#interface serial 1/0Router(config-if)#encapsulation frame-relayRouter(config-if)#ip ospf network broadcastRouter(Config-if)#frame-relay map ip 15.0.0.1 501 broadcastRouter(config-if)#frame-relay lmi-type ansiRouter(config-if)#exit

CHANDIGARH OFFICE SWITCH CONFIGURATION

Page 32: Balwinder Singh

CHANDIGARH OFFICE LAN CONFIGURATION

Switch>enableSwitch# configure terminalSwitch (config)#vlan 2 Switch (config-vlan)# name SalesSwitch (config-vlan)#vlan 3 AccountsSwitch (config-vlan)#exitSwitch(config)#interface fastethernet 0/2Switch(config-if)#switchport access vlan 2Switch(config-if)#interface fastethernet 0/3Switch(config-if)#switchport access vlan 2Switch(config-if)#interface fastethernet 0/4Switch(config-if)#switchport access vlan 3Switch(config-if)#interface fastethernet 0/5Switch(config-if)#switchport access vlan 3Switch(config-if)#exit

Page 33: Balwinder Singh

USER CONFIGURATION

DELHI OFFICE CONFIGURATION

Page 34: Balwinder Singh

MAIN OFICE DELHI

Router > enableRouter#configure terminalRouter(config)#interface serial 1/0Router(config-if)#Ip address 11.0.0.2 255.0.0.0Router(config-if)#No shutdownRouter(config-if)#ExitRouter(config)#interface serial1/1Router(config-if)#Ip address 12.0.0.1 255.0.0.0 Router(config-if)#No shutdownRouter(config-if)#exitRouter(config)#Interface serial 1/2Router(config-if)#Ip address 13.0.0.1 255.0.0.0Router(config-if)#No shutdownRouter(config-if)#exitRouter(config)#router ospf 91Router(config-router)#network 11.0.0.0 0.255.255.255 area 50Router(config-router)#network 12.0.0.0 0.255.255.255 area 50Router(config-router)#network 13.0.0.0 0.255.255.255 area 50Router(config-router)#exit

Page 35: Balwinder Singh

LUDHIANA OFFICE CONFIGURATION

Page 36: Balwinder Singh

MAIN OFFICE LUDHIANA

Router>EnableRouter#Configure terminalRouter(Config)#Interface serial1/0Router(Config-if)#Ip address 13.0.0.2 255.0.0.0 Router(Config-if)#No ShutdownRouter(Config-if)#exitRouter(Config)#interface fastethernet0/0 Router(Config-if)#Ip address 2.0.0.1 255.0.0.0Router(Config-if)#No ShutdownRouter(Config-if)#exitRouter(config)#router ospf 94Router(config-router)#network 13.0.0.0 0.255.255.255 area 50Router(config-router)#network 2.0.0.0 0.255.255.255 area 50Router(config-router)#exitRouter(

LUDHIANA OFFICE SWITCH CONFIGURATION

Page 37: Balwinder Singh

USER CONFIGURATION

JALANDHAR OFFICE CONFIGURATION

Page 38: Balwinder Singh

MAIN OFFICE JALANDHAR

Router>EnableRouter#configure terminalRouter(Config)#Interface serial 1/0Router(Config-if)#Ip address 12.0.0.2 255.0.0.0Router(Config-if)#No ShutdownRouter(Config-if)#exitRouter(Config)#Interface fastethernet 0/0Router(Config-if)#Ip address 1.0.0.1 255.255.255.252Router(Config-if)#No ShutdownRouter(Config-if)#exitRouter(config)#router ospf 93Router(config-router)#network 12.0.0.0 0.255.255.255 area 50Router(config-router)#network 1.0.0.0 0.255.255.255 area 50Router(config-router)#exitRouter(config)#exitRouter>enableRouter#configure terminalRouter(config)#hostname jalandharJalandhar(config)#enable password CISCOJalandhar(config)#username Delhi password CISCOJalandhar(config)#interface serial 1/0Jalandhar(config-if)#encapsulation pppJalandhar(config-if)#ppp authentication chapJalandhar(config-if)#exitJalanhar(Config)#exitJalandhar#show interface serial 1/0Jalandhar#exit

Page 39: Balwinder Singh

JALANDHAR OFFICE-SWITCH CONFIGURATION

USER CONFIGURATION

Page 40: Balwinder Singh

CHAPTER – 5

SYSTEM TESTING &TROUBLESHOOTING

51 PING AND TRACEROUTE

Page 41: Balwinder Singh

5.1 PING AND TRACEROUTE:

PING

Ping can test the speed of your connection, "distance" to target, and whether or not your connection is even up and running. It tells you how long a packet of data takes to travel from your computer to a specified host, and back again(in this case, the packet is 32 bytes in size).

Ping Tests

Once you have your command prompt (or WhatRoute) open, enter ping 127.0.0.1 and press Enter. You should receive 4 responses similar to the lines below. This ping test verifies the operation of the base TCP/IP stack. If TCP/IP is working correctly, there will be no problems with the ping. If you receive a timeout or error message, there is a problem with TCP/IP in which case you may have to uninstall and reinstall TCP/IP.

C:\WINDOWS>ping 127.0.0.1

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:     Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds:     Minimum = 0ms, Maximum = 0ms, Average = 0ms

Ping your IP* and press Enter. The "XXX" indicates your IP address and can be found by using the ipconfig /all command. Pinging your IP verifies that the physical network device can be addressed. If you cannot ping your own IP address, make sure the IP is correctly entered in the Network Control Panel (NCP). If it is correct, replace TCP/IP. If this does not work, the

Page 42: Balwinder Singh

network card may not be properly installed or 'bad' in which case you may need to reinstall the NIC.

C:\WINDOWS>ping 209.166.xxx.xxx

Pinging 209.166.xxx.xxx with 32 bytes of data:

Reply from 209.166.xxx.xxx: bytes=32 time<1ms TTL=44 Reply from 209.166.xxx.xxx: bytes=32 time=1ms TTL=44 Reply from 209.166.xxx.xxx: bytes=32 time=2ms TTL=44 Reply from 209.166.xxx.xxx: bytes=32 time<1ms TTL=44

Ping statistics for 209.166.xxx.xxx:     Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds:     Minimum = 0ms, Maximum = 2ms, Average = 1ms

Enter ping 209.166.161.121 and press Enter. This test checks that your connection to the Internet is active and that the network can be accessed. You should receive 4 responses similar to the lines below.

C:\WINDOWS>ping 209.166.161.121

Pinging 209.166.161.121 with 32 bytes of data:

Reply from 209.166.161.121: bytes=32 time<1ms TTL=44 Reply from 209.166.161.121: bytes=32 time=1ms TTL=44 Reply from 209.166.161.121: bytes=32 time=2ms TTL=44 Reply from 209.166.161.121: bytes=32 time<1ms TTL=44

Ping statistics for 209.166.161.121:     Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds:     Minimum = 0ms, Maximum = 2ms, Average = 1ms

Page 43: Balwinder Singh

Now enter ping www.expedient.net or another server name (e.g., www.yahoo.com) and press Enter. This test checks that your computer is able to translate name addresses (like www.expedient.net or www.yahoo.com) to numbers (like 209.166.165.174 or 64.58.76.224) - DNS resolution. You should receive 4 responses similar to the lines below. If you do not receive responses, check your DNS configuration settings.

C:\WINDOWS>ping www.expedient.net

Pinging corp01.web.pitdc1.expedient.net [208.40.175.241] with 32 bytes of data:

Reply from 208.40.175.241: bytes=32 time<1ms TTL=44 Reply from 208.40.175.241: bytes=32 time=1ms TTL=44 Reply from 208.40.175.241: bytes=32 time=2ms TTL=44 Reply from 208.40.175.241: bytes=32 time<1ms TTL=44

Ping statistics for 208.40.175.241:     Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds:     Minimum = 0ms, Maximum = 2ms, Average = 1ms

TRACEROUTE

Traceroute tracks the path that a packet takes from your computer to a destination address. A traceroute also shows how many times your packets are being rebroadcast by other servers until it gets to the final destination. For windows users, the command is tracert. For Macintosh OS X users, its traceroute.

In this example we will trace the hops from a computer to yahoo.com:

C:\WINDOWS>tracert yahoo.com Tracing route to yahoo.com [66.218.71.198] over a maximum of 30 hops:

  1 <1 ms <1 ms <1 ms 208.170.243.1   2 44 ms 14 ms 18 ms sl-gw15-rly-6-0-1.sprintlink.net [144.232.246.165]   3 31 ms 25 ms 13 ms sl-bb22-rly-1-0.sprintlink.net [144.232.25.232]   4 21 ms 17 ms 17 ms sl-st20-ash-15-1.sprintlink.net [144.232.20.106]   5 15 ms 17 ms 19 ms so-0-0-0.edge1.Washington1.Level3.net [209.244.219.169]   6 16 ms 17 ms 15 ms so-5-0-0.gar1.Washington1.Level3.net [209.244.11.9]

Page 44: Balwinder Singh

  7 82 ms 82 ms 82 ms so-3-0-0.mp2.SanJose1.Level3.net [64.159.1.130]   8 87 ms 87 ms 83 ms gige10-0.ipcolo3.SanJose1.Level3.net [64.159.2.41]   9 87 ms 84 ms 93 ms unknown.Level3.net [64.152.69.30]  10 90 ms 88 ms 92 ms w1.rc.vip.scd.yahoo.com [66.218.71.198]

Trace complete.

UNDERSTANDING THE OUTPUT

The first line is the command we typed: tracert yahoo.com. Note the space between the command "ping" and the host computer "yahoo.com."

The next line shows the traceroute program acquiring the ip address from the domain. "Maximum of 30 hops" is how many routers the packet will go through before giving up trying to find the host.

The next lines show each server the packets traveled through to get to the destination yahoo.com. These show both the IP address and domain name of the actual servers that the packets passed through.

Page 45: Balwinder Singh

CHAPTER – 6

CONCLUSION AND FUTURE SCOPE

Page 46: Balwinder Singh

CONCLUSION:

It was a great learning experience while working on the project as we experienced the real taste of networking. The MNC company’s network performance was not up to the mark because of the slow WAN links and hub connectivity in the LANs. The MNC company wanted to actually feel the improvement in network performance by replacing the existing WAN technologies and networking hardware devices. They wanted a simulation of the actual network before they decide to actually upgrade their hardware infrastructure.

We prepared a network design according to their specifications and implement the new WAN technologies. We replaced the WAN links with more faster and efficient WAN technologies. When we started the project for the MNC company, we had decided to implement Leased Line technology on all the WAN links but because of financial constraint and limited budget for the project, we were not able to do so however we did implement Leased Line technology on the WAN link between UAE office and Delhi office. On another WAN link between UAE office and Mumbai office we implemented ISDN. All of the other locations were connected through Frame Relay.

What we feel is that there is still scope for betterment and network performance could be improved further by implementing leased lines on all WAN links.

REFERENCE:WWW.CISCOPRESS.COMCCNA BOOK

Page 47: Balwinder Singh

CISCO DESIGNING SECURITY