The Report - WordPress.com

advertisement
ABSTRACT
On the first day we discussed various topics and the final topic that we decided to work on
was WAN NETWORKING. It is because networking is the topic which is responsible for the
birth and formation of big concepts like internet, cloud computing, hadoop technology, world
wide web (www), web designing and many more which are today not only a concept or
process but are totally different field of studies where one can make a booming career and
succeed in the same. There have been many work and investment in the earlier mentioned
fields but certainly the field which responsible for the concepts, there have been very less
studies done on it.
We went through different projects that have been made till now but certainly there have been
very less projects that may have portrayed the actual power of networking using different
available networking devices.
We decided to work on the project created a blue print of the project that contains and
portrays almost all the concepts of networking. In one networking project we have tried to
create almost all the concepts using all possible devices that are efficient and can do multiple
tasks and also it requires less commands and labour to configure them, and also they are cost
effective.
We later extended the project and decided to create several networks using routers and
connect them all together and we did it. Later we decided to connect them all and we did the
same by connecting them all with another router but by using it we observed that many of the
link of many ports, especially the ports of multilayer switches used to create different VLANs
of PCs and IP Phones. We tried to configure and reconfigure the router but we did not get
better result, even when the link of many ports were made up, the packets being transferred
and also pinging the different IP address (IPv4) of the devices on the command prompt of a
device the result used to be ‘the transmission of the packet is failed’.
To rectify the problem we started the study of other internetworking device that can create a
wide area network with complete efficiency and that has a good security concepts, can be
interfaced easily with the routers, easy to handle, better efficiency and also it is robust and
cost effective. On doing so we came across the FRAME RELAY CLOUD. The device is
exactly what we wanted which proved to be one of the best internetworking devices. It
worked for us the way we wanted it to.
1
At the last phase of our project we decide to connect four different servers using one of the
multilayer switches of one of the networks such that all the networks can store and fetch the
data from the servers. Further we removed all the IP addresses (IPv4) of the devices and
configured them in such a way that they all automatically get the IP address (IPv4) from the
server using DHCP technique.
We then reconfigured all the routers used in the network creation and did a dynamic routing
using the protocol RIPv2 that decides because using this method we need not need to provide
or specify any kind of path to router for the transmission of the packets and is also very
efficient.
Later on, using commands we configured some basic and important security in the
internetworking and networking devices which are the multilayer switches and routers as
there is a high tendency for them to be cracked by the crackers or illegal hackers.
The complete project work that included configuration of different networking and
internetworking devices and other hardware that play an integral part in the communication
and sharing of data, also the simulation of the packet being shared was done on one of the
best network solution software being developed by CISCO is CISCO PACKET TRACER.
We would like to convey that the basic need behind taking on the networking as the project is
to show the community of engineers especially the engineers of electronics and
communications is that networking is also a part of their field because the most important and
known internetworking device router is a device which is based on embedded system
technology and also to show how much the field of networking technology is important.
2
INTRODUCTION
When we connect two or more than two devices (pc) via cable or wifi device for the purpose
of communication and to share files or resources then it is networking.
A Network is a series of points or nodes interconnected by communication paths. The nodes
& points may be device dedicated to single function such as computer used for client
application or router used for connecting networks. The whole purpose of any network is to
enable two end points, networks, server, and router & so on to communicate with each other
& transfer data.
A network is a collection of computers and other hardware components interconnected by
communication channels that allow sharing of resources and information. Where at least one
process in one device is able to send/receive data to/from at least one process residing in a
remote device, then the two devices are said to be in a network. Simply, more than one
computer interconnected through a communication medium for information interchange is
called a computer network.
Networks may be classified according to a wide variety of characteristics, such as the medium
used to transport the data, communications protocol used, scale, topology, and organizational
scope.
Communications protocols define the rules and data formats for exchanging information in a
computer network, and provide the basis for network programming. Well-known
communications protocols include Ethernet, hardware and link layer. Standard that is
ubiquitous in local area networks, and the Internet protocol suite, which defines a set of
protocols for internetworking, i.e. for data communication between multiple networks, as well
as host-to-host data transfer, and application-specific data transmission formats.
Networking
is
sometimes
considered
a
sub-discipline
of
electrical
engineering,
telecommunications, computer science, information technology or computer engineering,
since it relies upon the theoretical and practical application of these disciplines.
3
Internet protocol address or IP address uniquely identifies every network or host on the
internet. IP address is a 32 bit binary number usually represented as 4 decimal values, each
representing 8 bits. Since each of the 8 positions can have two different states (0 or 1),the total
no of combination per octet is 28 or 256 ( each octet contain value between 0 to 255). IP
address is of 2 types, Network ID and Host ID. Network ID is the ID that identifies the
network to which the computer belongs and host ID is the ID which identifies host in the
network. IP address (IPv4) is a 32 bit identifier which represents the address or logical
address of host in our network. It is in the form of decimal. It is divided into four parts. Each
part is of 8 bit.
Class A : 0 to 126 (0.0.0.0 – 126.255.255.255)
127.0.0.0 to
127.255.255.255
Loop back
address
Class B: 128 to 191 (128.0.0.0 – 191.255.255.255)
Class C: 192 to 223 (192.0.0.0 – 223.255.255.255)
Class D: 224 – 239
Used for multicast
(224.0.0.0 – 239.255.255.255)
And
Class E: 240 – 255
Research purpose
(240.0.0.0 – 255.255.255.255)
A subnet mask is a bitmask that encodes the prefix length in quad-dotted notation: 32 bits,
starting with a number of 1 bits equal to the prefix length, ending with 0 bits, and encoded in
four-part dotted-decimal format. A subnet mask encodes the same information as a prefix
length, but predates the advent of CIDR. However, in CIDR notation, the prefix bits are
always contiguous, whereas subnet masks may specify non-contiguous bits. However, this has
no practical advantage for increasing efficiency.
4
A mask used to determine what subnet an IP address belongs to. An IP address has two
components, the network address and the host address. For example, consider the IP address
150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215)
represent the Class B network address, and the second two numbers (017.009) identify a
particular host on this network.
Subnetting enables the network administrator to further divide the host part of the address into
two or more subnets. In this case, a part of the host address is reserved to identify the
particular subnet. This is easier to see if we show the IP address in binary format. The full
address is:
10010110.11010111.00010001.00001001
The Class B network part is:
10010110.11010111
and the host address is
00010001.00001001
If this network is divided into 14 subnets, however, then the first 4 bits of the host address
(0001) are reserved for identifying the subnet.
The subnet mask is the network address plus the bits reserved for identifying the subnetwork.
(By convention, the bits for the network address are all set to 1, though it would also work if
the bits were set exactly as in the network address.) In this case, therefore, the subnet mask
would be 11111111.11111111.11110000.00000000. It's called a mask because it can be used
to identify the subnet to which an IP address belongs by performing a bitwise AND operation
on the mask and the IP address. The result is the subnetwork address:
Subnet Mask
255.255.240.000
11111111.11111111.11110000.00000000
IP Address
150.215.017.009
10010110.11010111.00010001.00001001
Subnet Address
150.215.016.000
10010110.11010111.00010000.00000000
The subnet address, therefore, is 150.215.016.000.
5
Moreover it is a 32 bit identifier that defines network ID and host ID.
N
H H H
A : 255 . 0 . 0 . 0
N
N H H
N- network
B: 255 . 255 . 0 . 0
N
N
N
H- host
H
C: 255 . 255 . 255 . 0
IP: 192.168.5.50
SM: 255.255.255.0
192.168.1.0
NID
192.168.1.1 - - - - - - - - - - - - - - - - - 192.168.1.255
BID
Figure 1: Sub netting flow chart
CIDR: It is a method for allocating IP addresses and routing Internet Protocol packets. The
Internet Engineering Task Force introduced CIDR in 1993 to replace the previous addressing
architecture of classful network design in the Internet. Their goal was to slow the growth of
routing tables on routers across the Internet, and to help slow the rapid exhaustion of IPv4
addresses.
6
IP addresses are described as consisting of two groups of bits in the address: the more
significant part is the network address, which identifies a whole network or subnet, and the
less significant portion is the host identifier, which specifies a particular interface of a host on
that network. This division is used as the basis of traffic routing between IP networks and for
address allocation policies. Classful network design for IPv4 sized the network address as one
or more 8-bit groups, resulting in the blocks of Class A, B, or C addresses. Classless InterDomain Routing allocates address space to Internet service providers and end users on any
address bit boundary, instead of on 8-bit segments. In IPv6, however, the interface identifier
has a fixed size of 64 bits by convention, and smaller subnets are never allocated to end users.
CIDR notation is a syntax of specifying IP addresses and their associated routing prefix. It
appends to the address a slash character and the decimal number of leading bits of the routing
prefix, e.g., 192.0.2.0/24 for IPv4, and 2001:db8::/32 for IPv6.
VLSM: It is a means of allocating IP addressing resources to subnets according to their
individual need rather than some general network-wide rule. Subnet masks are used by hosts
to determine network gateways and broadcast addresses. The Internet's explosive growth
eventually required the more efficient use of the IP address space available. Variable Length
Subnet Masking is a technique used to allow more efficient assignment of IP addresses.
Originally Internet addresses were carved up into small, medium and large size blocks of
contiguous addresses based on the values of the first four bits in the first octet of the IP
address. These were often referred to as class full addresses. By carving class full address
blocks into smaller classless blocks, you waste fewer addresses. The process of carving out
smaller blocks from the larger blocks was called sub netting.
Figure 2: CIDR Table
Subnet Mask
CIDR value
Total IP's
Binary Values
255.255.255.255
/32
1
11111111.11111111.11111111.11111111
255.255.255.254
/31
2
11111111.11111111.11111111.11111110
255.255.255.252
/30
4
11111111.11111111.11111111.11111100
255.255.255.248
/29
8
11111111.11111111.11111111.11111000
255.255.255.240
/28
16
11111111.11111111.11111111.11110000
255.255.255.224
/27
32
11111111.11111111.11111111.11100000
7
Subnet Mask
CIDR value
Total IP's
Binary Values
255.255.255.192
/26
64
11111111.11111111.11111111.11000000
255.255.255.128
/25
128
11111111.11111111.11111111.10000000
255.255.255.0
/24
256
11111111.11111111.11111111.00000000
255.255.254.0
/23
512
11111111.11111111.11111110.00000000
255.255.252.0
/22
1024
11111111.11111111.11111100.00000000
255.255.248.0
/21
2048
11111111.11111111.11111000.00000000
255.255.240.0
/20
4096
11111111.11111111.11110000.00000000
255.255.224.0
/19
8192
11111111.11111111.11100000.00000000
255.255.192.0
/18
16,384
11111111.11111111.11000000.00000000
255.255.128.0
/17
32,768
11111111.11111111.10000000.00000000
255.255.0.0
/16
65,536
11111111.11111111.00000000.00000000
255.254.0.0
/15
131,072
11111111.11111110.00000000.00000000
255.252.0.0
/14
262,144
11111111.11111100.00000000.00000000
255.248.0.0
/13
524,288
11111111.11111000.00000000.00000000
255.240.0.0
/12
1,048,576
11111111.11110000.00000000.00000000
255.224.0.0
/11
2,097,152
11111111.11100000.00000000.00000000
255.192.0.0
/10
4,194,304
11111111.11000000.00000000.00000000
255.128.0.0
/9
8,388,608
11111111.10000000.00000000.00000000
255.0.0.0
/8
16,777,216
11111111.00000000.00000000.00000000
254.0.0.0
/7
33,554,432
11111110.00000000.00000000.00000000
252.0.0.0
/6
67,108,864
11111100.00000000.00000000.00000000
248.0.0.0
/5
134,217,728
11111000.00000000.00000000.00000000
240.0.0.0
/4
268,435,456
11110000.00000000.00000000.00000000
224.0.0.0
/3
536,870,912
11100000.00000000.00000000.00000000
192.0.0.0
/2
1,073,741,824
11000000.00000000.00000000.00000000
128.0.0.0
/1
2,147,483,648
10000000.00000000.00000000.00000000
0.0.0.0
/0
4,294,967,296
00000000.00000000.00000000.00000000
8
Figure 3: Cable flow chart
A cable is most often two or more wires running side by side and bonded, twisted or braided
together to form a single assembly, but can also refer to a heavy strong rope. In mechanics
cables, otherwise known as wire ropes, are used for lifting, hauling and towing or conveying
force through tension. In electrical engineering cables are used to carry electric currents. An
optical cable contains one or more optical fibers in a protective jacket that supports the fibers.
Electric cables discussed here are mainly meant for installation in buildings and industrial
sites. For power transmission at distances greater than a few kilometers see high-voltage
cable, power cables and HVDC.
Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some
cases, a network will utilize only one type of cable, other networks will use a variety of cable
types. The type of cable chosen for a network is related to the network's topology, protocol,
and size. Understanding the characteristics of different types of cable and how they relate to
other aspects of a network is necessary for the development of a successful network.
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair
(UTP) is the most popular and is generally the best option for school networks.
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of
twists per inch to help eliminate interference from adjacent pairs and other electrical devices.
9
The tighter the twisting, the higher the supported transmission rate and the greater the cost per
foot.
The
EIA/TIA
(Electronic
Industry
Association/Telecommunication
Industry
Association) has established standards of UTP and rated six categories of wire (additional
categories are emerging).
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector (See fig. 2). A slot allows
the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the
connector follows a standard borrowed from the telephone industry. This standard designates
which wire goes with each pin inside the connector.
Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical
frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If
you must place cable in environments with lots of potential interference, or if you must place
cable in extremely sensitive environments that may be susceptible to the electrical current in
the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend
the maximum distance of the cables.
Shielded twisted pair cable is available in three different configurations:
1. Each pair of wires is individually shielded with foil.
2. There is a foil or braid shield inside the jacket covering all wires (as a group).
3. There is a shield around each individual pair, as well as around the entire group of
wires (referred to as double shield twisted pair).
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation
between the center conductor and a braided metal shield. The metal shield helps to block any
outside interference from fluorescent lights, motors, and other computers.
Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In
addition, it can support greater cable lengths between network devices than twisted pair cable.
The two types of coaxial cabling are thick coaxial and thin coaxial.
Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin
coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment
length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin
coaxial cable has been popular in school networks, especially linear bus networks.
10
Thick coaxial cable is also referred to as thick net. 10Base5 refers to the specifications for
thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length
being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep
moisture away from the centre conductor. This makes thick coaxial a great choice when
running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it
does not bend easily and is difficult to install.
Fiber optic cabling consists of a center glass core surrounded by several layers of protective
materials. It transmits light rather than electronic signals eliminating the problem of electrical
interference. This makes it ideal for certain environments that contain a large amount of
electrical interference. It has also made it the standard for connecting networks between
buildings, due to its immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial
and twisted pair. It also has the capability to carry information at vastly greater speeds. This
capacity broadens communication possibilities to include services such as video conferencing
and interactive services. The cost of fiber optic cabling is comparable to copper cabling;
however, it is more difficult to install and modify. 10BaseF refers to the specifications for
fiber optic cable carrying Ethernet signals.
The center core of fiber cables is made from glass or plastic fibers. A plastic coating then
cushions the fiber center, and Kevlar fibers help to strengthen the cables and prevent
breakage. The outer insulating jacket made of Teflon or PVC.
Straight through:
1.
.GREEN WHITE
.GREEN WHITE
2.
GREEN
GREEN
3.
ORANGE WHITE ORANGE WHITE
4.
BLUE
BLUE
5.
BLUE WHITE
BLUE WHITE
6.
ORANGE
ORANGE
7.
BROWN WHITE
BROWN WHITE
8.
BROWN
BROWN
568 A
568 B
11
Followed during connections of:
1. HUB
SWITCH
2. HUB
PC
3. SWITCH ROUTER
Cross Over:
12 - 36
1
3
2
6
1.
GREEN WHITE
ORANGE WHITE
2.
GREEN
ORANGE
3.
ORANGE WHITE GREEN WHITE
4.
BLUE
BLUE
5.
BLUE WHITE
BLUE WHITE
6.
ORANGE
GREEN
7.
BROWN WHITE
BROWN WHITE
8.
BROWN
BROWN
568 A
568 B
Followed during the connections of:
1.
LAPTOP
LAPTOP
2.
PC
PC
3.
HUB
HUB
4.
SWITCH
SWITCH
5.
PC
ROUTER
Rolled Over:

It is used for interface not for communication.
1.
GREEN WHITE
BROWN
2.
GREEN
BROWN WHITE
12
3.
ORANGE WHITE
ORANGE
4.
BLUE
BLUE WHITE
5.
BLUE WHITE
BLUE
6.
ORANGE
ORANGE WHITE
7.
BROWN WHITE
GREEN
8.
BROWN
GEEN WHITE
Used during the connection of:
1. PC
ROUTER/SWITCH
A wide area network (WAN) is a computer network that covers a large geographic area such
as a city, country, or spans even intercontinental distances, using a communications channel
that combines many types of media such as telephone lines, cables, and air waves. A WAN
often uses transmission facilities provided by common carriers, such as telephone companies.
WAN technologies generally function at the lower three layers of the OSI reference model:
the physical layer, the data link layer, and the network layer.
In computer networking, a single layer-2 network may be partitioned to create multiple
distinct broadcast domains, which are mutually isolated so that packets can only pass between
them via one or more routers; such a domain is referred to as a virtual local area
network, virtual LAN or VLAN.
This is usually achieved on switch or router devices. Simpler devices only support
partitioning on a port level (if at all), so sharing VLANs across devices requires running
dedicated cabling for each VLAN. More sophisticated devices can mark packets
through tagging, so that a single interconnect (trunk) may be used to transport data for
multiple VLANs.
Grouping hosts with a common set of requirements regardless of their physical location by
VLAN can greatly simplify network design. A VLAN has the same attributes as a
physical local area network (LAN), but it allows for end stations to be grouped together more
easily even if they are not on the same network switch. VLAN membership can be configured
through software instead of physically relocating devices or connections. Most enterpriselevel networks today use the concept of virtual LANs. Without VLANs, a switch considers all
interfaces on the switch to be in the same broadcast domain.
13
To physically replicate the functions of a VLAN would require a separate, parallel collection
of network cables and equipment separate from the primary network. However, unlike
physically separate networks, VLANs share bandwidth, so VLAN trunks may
require aggregated links and/or quality of service prioritization.
RIP: Routing information protocol (RIP) is a true distance vector routing protocol. Rip sends
the complete routing table out to all active interfaces every 30 seconds. Rip only uses hop
count to determine the best way to a remote network. But it has a maximum allowable hop
count of 15 by default, meaning that 16 is deemed unreachable. RIP works well in small
networks, but it’s inefficient on large network with slow WAN links or on networks with a
large number of router installed. RIPv1 (RFC 1058) uses only classfull routing, which mean
that all devices in the network must use the same subnet mask. This is because RIP version 1
doesn’t send update with subnet mask information. RIPv2 (RFC 2543) is classless, provide
something called prefix routing and thus send subnet mask information with the route
updates. This is called classless routing. RIP adheres to the following Distance Vector
characteristics:
• RIP sends out periodic routing updates (every 30 seconds)
• RIP sends out the full routing table every periodic update
• RIP uses a form of distance as its metric (in this case, hopcount)
• RIP uses the Bellman-Ford Distance Vector algorithm to determine the best “path” to a
particular destination
Other characteristics of RIP include:
• RIP supports IP and IPX routing.
• RIP utilizes UDP port 520
• RIP routes have an administrative distance of 120.
• RIP has a maximum hopcount of 15 hops.
• RIP can perform load balancing for up to six equal. Cost links by default four routes.
• RIPv1 sends updates as broadcasts to address 255.255.255.255.
14
FORMULATION OF PROBLEM
The problem in networking is the connection of same devices (interfacing) for the purpose of
forming a larger network like WAN, MAN. Moreover also the security in the devices also has
to be updated and configured by us.
The most common and well known device Router in networking is mainly and extensively
used for the interconnection of one or more network. Even when creating a WAN using
different MAN the router is used. In this process we connect all the routers to one router
responsible for creating the WAN which takes a long time especially in the configuration
process also when the connection is done and the link is made up, when the packet is being
transmitted or shared then many of the time it shows that the packet sending has failed.
It is one of the major problems because the users in the network face many problems in the
sharing of data as the desired data are not received at the time we want and also it is
sometimes lost because of which the packets have to be resend and thus the whole process of
sharing and transmission of packets takes lots of time because of the inefficiency of the
internetworking devices to boost the packets and send them to the destination.
The way of solution towards this problem can be done by creating a network using some other
internetworking device that is better than the router for the transmission of the packets and
also is easy to interface with routers and also is easy to configure and has a good security
system.
LITERATURE REVIEW
There have been very less projects being carried on in this particular problem, whatever
project that has been created is done by just improving the clock rate of the DCE and
minimizing the size of network as much as possible or by improving the performance of the
communication devices like IP phone, PC etc. But certainly there have been not much
improvement seen by doing all these sorts of things. Some projects also have tried to improve
the same by configuring the switches but that has also not given a satisfying result as per the
requirement. But certainly CISCO has create a device called FRAME RELAY CLOUD that
can give a concrete solution for the problem which we have used for the problem rectification.
15
APPROACH TO SOLUTION
The solution that we have found is to use the Frame Relay Cloud which is one of the
internetworking devices present other that router so as to connect different networks with
each other and create a WAN does not matter how big the network is.
We have tried to resolve this problem by this method as it has proven to be the robust method
and the less approached method by others. Also, it is easy to configure and easier to maintain
as compared to the router and also the packets can be shared without any discrepancy. Also it
has good level of security which makes it easier for those in the network to share the packets
without any kind hesitation or worry.
Moreover it also makes the fetching and storing of data from the and in the server respectively
easier and faster irrespective of the fact that to which network or VLAN does the
communication device belongs to.
HARDWARE DESCRIPTION
IP PHONE: A VoIP phone or IP Phone uses Voice over IP (Voice over Internet Protocol VoIP) technologies for placing and transmitting telephone calls over an IP network, such as
the Internet, instead of the traditional public switched telephone network (PSTN).
Digital IP-based telephone service uses control protocols such as the Session Initiation
Protocol (SIP), Skinny Client Control Protocol (SCCP) or various other proprietary protocols.
Figure 4: IP Phone
16
PERSONAL COMPUTER: A personal computer (PC) is a general-purpose computer, whose
size, capabilities and original sale price makes it useful for individuals, and is intended to be
operated directly by an end-user with no intervening computer operator.
This contrasted with the batch processing or time-sharing models which allowed larger, more
expensive minicomputer and mainframe systems to be used by many people, usually at the
same time. Large data processing systems require a full-time staff to operate efficiently.
Figure 5-a: Personal Computer
LAPTOP: A laptop computer or simply laptop, also called a notebook computer, is a small
personal computer designed for portability. Usually all of the interface hardware needed to
operate the laptop, such as USB ports (previously parallel and serial ports), graphics card,
sound channel, etc., are built into a single unit. Laptops contain high capacity batteries that
can power the device for extensive periods of time, enhancing portability. Once the battery
charge is depleted, it will have to be recharged through a power outlet. In the interest of
saving power, weight and space, they usually share RAM with the video channel, slowing
their performance compared to an equivalent desktop machine. For this reason, desktop or
gaming computers are generally preferred to laptop PCs for gaming purposes.
Figure 5-b: Laptop
ACCESS POINTS: In computer networking, a wireless Access Point (AP) is a device that
allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The
17
AP usually connects to a router (via a wired network) as a standalone device, but it can also
be an integral component of the router itself. Prior to wireless networks, setting up a computer
network in a business, home or school often required running many cables through walls and
ceilings in order to deliver network access to all of the network-enabled devices in the
building. With the creation of the wireless Access Point (AP), network users are now able to
add devices that access the network with few or no cables. An AP normally connects directly
to a wired Ethernet connection and the AP then provides wireless connections using radio
frequency links for other devices to utilize that wired connection. Most APs support the
connection of multiple wireless devices to one wired connection. Modern APs are built to
support a standard for sending and receiving data using, these radio frequencies. Those
standards and the frequencies they use are defined by the IEEE. Most APs use IEEE
802.11 standards.
Figure 6: Access Point
MULTILAYER SWITCH: A multilayer switch (MLS) is a computer networking device that
switches on OSI layer 2 like an ordinary network switch and provides extra functions on
higher OSI layers. The major difference between the packet switching operation of
a router and that of a Layer 3 switch is the physical implementation. In general-purpose
routers, packet switching takes place using software that runs on a microprocessor, whereas a
Layer 3 switch performs this using dedicated application-specific integrated circuit (ASIC)
hardware. A multilayer switch (MLS) can prioritize packets by the 6 bits in IP DSCP
(differentiated services Code Point). These 6 bits were used in the "old days" for Type of
Service (ToS).
The following 4 mappings are normally available in an MLS:

From OSI layer 2, 3 or 4 to IP DSCP (if IP packet) and/or VLAN IEEE 802.1p.

From VLAN IEEE 802.1p to IP DSCP.
18

From IP DSCP to VLAN IEEE 802.1p.

From VLAN IEEE 802.1p to port queue.
Many MLSs implement QoS differentiated services and/or integrated services in hardware.
Some MLSs are also able to route between VLANs and/or ports like a common router. The
routing is normally as quick as switching (at wire speed). According to Cisco, Layer 3
switches are basically routers that switch based on Layer 3 information, the basic difference
being processing speed and/or the way they do the switching; Layer 3 switches use
ASICs/hardware instead of the CPU/software that a router would.
Figure 7: Multilayer Switch
ROUTER: Routers are physical devices that join multiple wired or wireless networks
together. Technically, a wired or wireless router is a Layer 3 gateway, meaning that the
wired/wireless router connects networks (as gateways do), and that the router operates at the
network layer of the OSI model.
Home networkers often use an Internet Protocol (IP) wired or wireless router, IP being the
most common OSI network layer protocol. An IP router such as a DSL or cable modem
broadband router joins the home's local area network (LAN) to the wide-area network (WAN)
of the Internet.
By maintaining configuration information in a piece of storage called the routing table, wired
or wireless routers also have the ability to filter traffic, either incoming or outgoing, based on
the IP addresses of senders and receivers. Some routers allow the home networker to update
the routing table from a Web browser interface. Broadband routers combine the functions of a
router with those of a network switch and a firewall in a single unit.
Bellman–Ford algorithm computes single-source shortest paths in a weighted digraph. For
graphs with only non-negative edge weights, the faster Dijkstra's algorithm also solves the
19
problem. Thus, Bellman–Ford is used primarily for graphs with negative edge weights. The
algorithm is named after its developers, Richard Bellman and Lester Ford, Jr.
If a graph contains a "negative cycle", i.e., a cycle whose edges sum to a negative value, then
walks of arbitrarily low weight can be constructed by repeatedly following the cycle, so there
may not be a shortest path. Bellman-Ford can detect negative cycles and report their
existence, but it cannot produce a correct answer if a negative cycle is reachable from the
source.
According to Robert Sedgewick, "Negative weights are not merely a mathematical curiosity;
arise in a natural way when we reduce other problems to shortest-paths problems". Let G be a
graph containing a negative cycle. One NP-Complete variant of the shortest-path problem
asks for the shortest path in G (containing a negative cycle) such that no edge is repeated.
Sedgewick gives a reduction from the Hamiltonian path problem to this variant of the
problem.
Dijkstra's algorithm, conceived by Dutch computer scientist Edsger Dijkstra in 1956 and
published in 1959, is a graph search algorithm that solves the single-source shortest path
problem for a graph with nonnegative edge path costs, producing a shortest path tree. This
algorithm is often used in routing and as a subroutine in other graph algorithms.
For a given source vertex (node) in the graph, the algorithm finds the path with lowest cost
(i.e. the shortest path) between that vertex and every other vertex. It can also be used for
finding costs of shortest paths from a single vertex to a single destination vertex by stopping
the algorithm once the shortest path to the destination vertex has been determined. For
example, if the vertices of the graph represent cities and edge path costs represent driving
distances between pairs of cities connected by a direct road, Dijkstra's algorithm can be used
to find the shortest route between one city and all other cities. As a result, the shortest path
first is widely used in network routing protocols, most notably IS-IS and OSPF (Open
Shortest Path First).
Dijkstra's original algorithm does not use a min-priority queue and runs in O(|V|2). The idea
of this algorithm is also given in (Leyzorek et al. 1957). The implementation based on a minpriority queue implemented by a Fibonacci heap and running in O(|E| + |V| log |V|) is due to
(Fredman & Tarjan 1984). This is asymptotically the fastest known single-source shortestpath algorithm for arbitrary directed graphs with unbounded nonnegative weights. (For an
20
overview of earlier shortest path algorithms and later improvements and adaptations, see:
Single-source shortest-paths algorithms for directed graphs with nonnegative weights.)
Figure 8: Router
FRAME RELAY CLOUD: Frame relay is a standardized wide area network technology that
specifies the physical and logical link layers of digital telecommunications channels using
a packet switching methodology. Originally designed for transport across Integrated Services
Digital Network (ISDN) infrastructure, it may be used today in the context of many other
network interfaces.
Network providers commonly implement frame relay for voice (VoFR) and data as
an encapsulation technique, used between local area networks (LANs) over a wide area
network (WAN). Each end-user gets a private line (or leased line) to a frame relay node. The
frame relay network handles the transmission over a frequently changing path transparent to
all end-user extensively used WAN protocols. It is less expensive than leased lines and that is
one reason for its popularity. The extreme simplicity of configuring user equipment in a frame
relay network offers another reason for frame relay's popularity.
With the advent of Ethernet over fiber optics, MPLS, VPN and dedicated broadband services
such as cable modem and DSL, the end may loom for the frame relay protocol and
encapsulation. However many rural areas remain lacking DSL and cable modem services. In
such cases, the least expensive type of non-dial-up connection remains a 64-kbit/s frame relay
line. Thus a retail chain, for instance, may use frame relay for connecting rural stores into
their corporate WAN.
a) It is a standard for packet switching WAN communication over high quality digital
lines.
b) Frame relay networks can provide data transfer upto 1.54 mbps.
c) It can be implemented over a variety of connection lines (56k, T-1, T-2).
21
d) It operates at the physical and data link layers of OSI model.
e) When we sign up for frame relay service we are assigned a level of service called a
committed information rate (CIR).
>> [NOTE: The CIR is the maximum guaranteed data transmission rate we will
receive on frame relay network]
CONCEPTS:1. Routers connect to frame relay switch either directly or through a CSU/DSU.
2. Frame relay networks stimulate an ‘always on’ connection with PVCs
(permanent virtual circuits).
3. Sending routers send data immediately without establishing a session.
4. Frame relay switches perform error checking but not correction.
5. Corrupted packets are simply dropped without notification.
6. Packets travel through the frame relay cloud without acknowledgements.
7. Congestion is the most common cause of packet loss on a frame relay network.
8. Frame relay switches send backward explicit congestions notification (BECN)
messages to slow data transfer rate.
FRAME RELAY PROTOCOL:

a)
b)
c)
d)
e)
i. Data link connection identifiers (DLCIs)
ii. Local management interface (LMI)
DLCIs:
It identifies each virtual circuit.
It ranges between 16 and 1007.
The DLCI represents the connection between two frame relay devices.
The frame relay service provider assigns the DLCI when the virtual circuit is set up.
Each DLCI is unique for the local network, bu not for the entire WAN.
 LMI:
a) It is a set of management protocol extensions that automates many frame relay
management task.
b) It is responsible for managing the connection an d reporting connection status.
c) It maintains the link between the router and the switch.
d) It gathers status information about other routers and connections on the network.
e) Cisco routers support 3 LMI types: Cisco, ANSI and Q933a
FRAME REALY CONNECTIONS AND CIRCUITS:
I.
II.
Point-to-point: This link stimulates a direct connection with destination device.
Multipoint: A multipoint link configures each circuit to communicate with more than
one destination devices.
A CSU/DSU (channel service unit/data service unit) is a digital interface device used to
connect a data terminal equipment device or DTE, such as a router, to a digital circuit(eg.a T1
or T3 line).
22
DUAL DHCP-DNS SERVER: DHCP Server allots the IP addresses to computers, while DNS
server resolves them.
We need DHCP Server if you do not want to manually maintain IP Addresses or you have
less IP Addresses than number of machines you have, as dynamic DHCP Server will recycle
IP Addresses on machines.
DNS Server is needed for resolving hostnames to their IP addresses. Normally your ISP will
provide you with DNS Service. You may have your own DNS Server, which will resolve
hostnames by forwarding them to ISP's DNS Server and cache the addresses also.
If we have home/small office network with Unix/Linux machines, these machines will not be
resolved from each other, as Unix/Linux machines do not support NBNS protocol and we
need our own DNS Server. But how about resolving our local machines? Your ISP's DNS
Server will not have this list and our own DNS Server won’t have them either. Most DNS
Servers cannot do this.(unless you configure dynamic updates, or use static IP addresses and
manually enter them).
This server resolves dhcp allotted local machines automatically in addition to external hosts,
with the added advantage being both dhcp and dns server are always in sync. Also there is no
need to create and maintain cumbersome zone files. Dual DHCP DNS Server is an Open
Source Freeware. In addition, this server is designed for Load Sharing Replicated Operation
DNS Features include Forward and Reverse Lookup, Zone Transfer, Primary/Secondary
Mode of Operation, MX Records, Wildcard Records, Conditional and Default forwarding.
DHCP Fearures support Static and Dynamic 125 DHCP Ranges, Range Filters, Relay Agents
and BOOT, Options can be specified for DHCP Ranges, Global or for Static Hosts.
Either DHCP or DNS Service can be used. If both services are used, DHCP allotted hosts are
automatically added in DNS zones.
23
Figure 10: Dual DHCP-DNS Server
TFTP SERVER: A Trivial File Transfer Protocol (TFTP) server is based on a simple Fire
Transfer Protocol (FTP) that was first defined in 1980. TFTP books routers and other
computers that do not have storage devices. It also transfers small files between two or more
computer network hosts such as a transfer initiated on a remote X Window System terminal.
TFTP servers are also based on the traditional EFTP protocol that was part of the PUP
protocol tool suite and is normally one of the first protocols used on a new host type. TFTP
servers use UDP vice TCP datagram packets for network communications.
TFTP servers use UDP port 69 for their transport protocol, which helps to avoid conflicts with
the FTP protocol that uses TCP port 21. The service is incapable of authentication on its own,
encryption, and listing directory contents. The TFTP protocol’s primary purpose is to read or
write files to a remote server and support the octet, netascii, and mail transfer modes, although
mail transfer modes are rarely used in today’s network environment. The original TFTP
protocol definition had a limit of 32 MB for file transfers. This was changed in 1988 to permit
a maximum file size of 4 GB, which is rarely used. Due to the lack of inherent security within
the TFTP protocol, TFTP servers are rarely used over the open Internet, and are instead used
on local or private networks.
TFTP starts when an initiating host sends a read or write request data packet to the TFTP host
over port 69 that contains a transfer mode and file name. The server then sends an
acknowledgment packet and then a data packet to the RRQ. The packet is sent from a freshly
allocated port that is then used for the remainder of the session. The source host then sends
numbered data packets that all contain full blocks of 512 bytes to the destination. The
destination host then replies with acknowledgment packets for all of the data packets that
were sent. The final data packet will contain less than the full 512 bytes, signaling that it is the
end of the transmission. If the file’s size happens to be equal to a multiple of 512, the final
data packet will be sent with 0 bytes. If an acknowledgment is not received for each data
packet transmitted, then the information will be retransmitted.
24
Figure 11-a: TFTP Server
DATABASE SERVER:
A database server is a computer program that provides database services to other computer
programs or computers, as defined by the client–server model. The term may also refer to a
computer dedicated to running such a program. Database management systems frequently
provide database server functionality, and some DBMSs (e.g., MySQL) rely exclusively on
the client–server model for database access.
Such a server is accessed either through a "front end" running on the user’s computer which
displays requested data or the "back end" which runs on the server and handles tasks such as
data analysis and storage.
In a master-slave model, database master servers are central and primary locations of data
while database slave servers are synchronized backups of the master acting asproxies.
Most of the Database servers works with the base of Query language. Each Database
understands its query language and converts it to Server readable form and executes it to
retrieve the results.
Some examples of proprietary database servers are Oracle, DB2, Informix, and Microsoft
SQL Server. Examples of GNU General Public Licence database servers
are Ingres andMySQL. Every server uses its own query logic and structure. The SQL query
language is more or less the same in all relational database servers. DB-Engines lists over 200
DBMSs in its ranking.
Figure 11-b: DATABASE Server
25
FILE SERVER: In computing, a file server is a computer attached to a network that has the
primary purpose of providing a location for shared disk access, i.e. shared storage of
computer files (such as documents, sound files, photographs, movies, images, databases, etc.)
that can be accessed by the workstations that are attached to the same computer network. The
term server highlights the role of the machine in the client–server scheme, where
the clients are the workstations using the storage. A file server is not intended to perform
computational tasks, and does not run programs on behalf of its clients. It is designed
primarily to enable the storage and retrieval of data while the computation is carried out by
the workstations.
File servers are commonly found in schools and offices, where users use a LAN to connect
their client computers.
A file server may be dedicated or non-dedicated. A dedicated server is designed specifically
for use as a file server, with workstations attached for reading and writing files and databases.
File servers may also be categorized by the method of access: Internet file servers are
frequently accessed by File Transfer Protocol (FTP) or by HTTP (but are different from web
servers, that often provide dynamic web content in addition to static files). Servers on a LAN
are usually accessed by SMB/CIFS protocol (Windows and Unix-like) or NFS protocol
(Unix-like systems).
Database servers, that provide access to a shared database via a database device driver,
are not regarded as file servers as they may require Record locking.
Figure 12: FILE Server
26
PROJECT REPORT
Figure 13: WAN Network
VLAN Access Port Configuration:
>> [Syntax: Switch(config)#interface fastethernet port
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan vlan_no.]
VLAN trunk Port Configuration:
>> [Syntax: switch(config)#interface fastethernet port
Switch(config-if)#switchport mode trunk]
To create VLAN through data base:
>>switch#vlan database
switch(vlan)#vlan 20 name marketing
switch#show vlan brief
27
To assign port to dedicated VLAN:
>>switch(config)#interface f0/1
switch(config-if)#switchport mode access
switch(config-if)#switchport access vlan 10
switch#show vlan brief
switch(config)#interface f0/2
switch(config-if)#switchport mode access
switch(config-if)#switchport access vlan 20
switch#show vlan brief
To assign port to dedicated vlan through range:
>>switch(config)#interface range f0/5-6
switch(config-if-range)#switchport mode access
switch(config-if-range)#switchport access vlan 20
switch#show vlan brief
Switch to switch configuration:
>> switch(config)#interface fastethernet port
switch(config-if)#switchport mode trunk
RIPv2 configuration:
>> [Syntax: Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network source NID]
28
Router configurations:
>>To set secret password to router:
Router(config)#enable secret <password>
>>To set service password:
Router(config)#enable password hcl
>> To encrypt service password:
Router(config)#service password-encryption
>>To set the console password:
Router(config)#line console 0
Router(config-line)#password 123
>>To set banner to the router:
Router(config)#banner motd*banner title*
>>To enable fastethernet of router:
Router(config)#interface fastethernet <port>
Router(config)#no shutdown
>>To assign ip address to fastethernet:
Router(config)#interface fastethernet <port>
Router(config)#ip address <ip address> <subnet mask>
>>To enable serial port of the router: (DCE)
Router(config)#interface serial <port>
Router(config)#ip address <ip address> <subnet mask>
29
Router(config-if)#no shutdown
Router(config-if)#clock rate 64000
>>To enable serial port of the router: (DTE)
Router(config)#interface serial <port>
Router(config)#ip address <ip address> <subnet mask>
Router(config-if)#no shutdown
>>Frame relay cloud configuration:
R1>enable
R1#configure terminal
R1(config)#interface serial 0/0/0
R1(config-if)#encapsulation frame-relay
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config-subif)#interface serial 0/0/0.102 point-to-point
R1(config-subif)#ip address 192.168.1.245 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 102
R1(config-subif)#exit
R1(config)#interface serial 0/0/0.103 point-to-point
R1(config-subif)#ip address 192.168.1.249 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 103
R1(config-subif)#exit
R1(config)#interface serial 0/0/0.104 point-to-point
R1(config-subif)#ip address 192.168.1.253 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 104
R1(config-subif)#exit
R1(config)#ip route 192.168.1.64 255.255.255.224 192.168.1.246
R1(config)#ip route 192.168.1.96 255.255.255.224 192.168.1.250
R1(config)#ip route 192.168.1.128 255.255.255.224 192.168.1.254
R1(config)#exit
30
R2>enable
R2#configure terminal
R2(config)#interface serial 0/0/0
R2(config-if)#encapsulation frame-relay
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface serial 0/0/0.101 point-to-point
R2(config-subif)#ip address 192.168.1.246 255.255.255.252
R2(config-subif)#frame-relay interface-dlci 101
R2(config-subif)#exit
R2(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.245
R3>enable
R3#configure terminal
R3(config)#interface serial 0/0/0
R3(config-if)#encapsulation frame-relay
R3(config-if)#no shutdown
R3(config-if)#exit
R3(config)#interface serial 0/0/0.101 point-to-point
R3(config-subif)#ip address 192.168.1.250 255.255.255.252
R3(config-subif)#frame-relay interface-dlci 101
R3(config-subif)#exit
R3(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.249
R4>enable
R4#configure terminal
R4(config)#interface serial 0/0/0
R4(config-if)#encapsulation frame-relay
R4(config-if)#no shutdown
R4(config-if)#exit
R4(config)#interface serial 0/0/0.101 point-to-point
R4(config-subif)#ip address 192.168.1.254 255.255.255.252
R4(config-subif)#frame-relay interface-dlci 101
R4(config-subif)#exit R4(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.253
31
SOFTWARE
Figure 14: Software Window
Developer(s) >>
Cisco Systems
Stable release >>
6.1.1
Preview release >>
6.1 builds 87
Development status >>
Active
Operating system >>
Linux, Android 4.1+ and Microsoft Windows
Available in >>
English, Russian, German, Portuguese, Spanish and French
License >>
Proprietary
Website >>
www.cisco.com/web/learning/netacad/course_catalog/PacketTracer.html
We have used one of the best software for the Networking technology i.e. Cisco Packet
Tracer. Cisco Packet Tracer is a network simulation program that allows students to
experiment with network behaviour and ask “what if” questions. As an integral part of the
Networking Academy comprehensive learning experience, Packet Tracer provides simulation,
visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching
and learning of complex technology concepts.
The current version of Packet Tracer supports an array of simulated Application Layer
protocols, as well as basic routing with RIP, OSPF, and EIGRP, to the extents required by the
current CCNA curriculum. While Packet Tracer aims to provide a realistic simulation of
32
functional networks, the application itself utilizes only a small number of features found
within the actual hardware running a current Cisco IOS version. Thus, Packet Tracer is
unsuitable for modelling production networks. With the introduction of version 5.3, several
new features were added, including BGP. BGP is not part of the CCNA curriculum, but part
of the CCNP curriculum.
ESTIMATION
The tentative time required for the completion of the project was almost one month. The
tentative cost is zero because it was the complete work on software which is easily available
but yes if it is practically implemented then it will cost around 15-20 lakhs in INR. The skills
required for the project is the good concepts on networking and CISCO packet tracer. The
manpower that the project required was only two.
RESULT
Thus, the objective of minimizing the loss of data or packets during their transmission to the
respective destination and also minimizing the rate of failures in the packet or data
transmission and also have successfully implemented and interfaced the frame relay cloud.
We have successfully implemented the WAN (wide area network) using the frame relay
cloud, made all the communication devices of all the network interact with servers connected
via one network and also created a good security that can keep the network secured. Hence it
has been proved that the WAN can be implemented using Frame Relay cloud of higher
efficiency as compared to the WAN being created by Router configuration.
CONCLUSION
The greatest advantage is that this particular work can also be done in other networking
software but the disadvantage of this project is that it cannot be assured that how much
successfully the model of the network can be implemented and the simulated results can be
achieved.
33
DISCUSSION
The major short coming of the project is the lengthy commands for the configuration of
networking devices and configuration of networks. Second major issue is the security of
different access points through which one can directly connect the device wirelessly and be
the part of the network. The third major problem is the practical implementation of the
simulated work accurately as it has shown in the software.
All the short comings discussed above can only be done by thorough experimentation and
also practical implementation and experimentation of the same.
REFERENCES

ipedia.org/wiki/Router_(computing)

http://dhcp-dns-server.sourceforge.net/

http://publib.boulder.ibm.com/infocenter/ts3500tl/v1r0/index.jsp?topi
c=%2Fcom.ibm.storage.ts3500.doc%2Fopg_3584_IPv4_IPv6_prefix_
subnet_mask.html 2.

https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&
cd=1&cad=rja&uact=8&ved=0CBwQFjAA&url=http%3A%2F%2Fwww.atlantispress.com%2Fphp%2Fdownload_paper.php%3Fid%3D4781&ei=0BgXVL7cIdDi8A
XRp4DYBA&usg=AFQjCNHoothAaAxO_PaE8721Ne6wQxZVhQ

Data Communication, 3rd Edition, Pearson Publication,Foruzan

Data Communication,4th Edition, Oxford University Press,Tanenbaun

CISCO Certified Network Associate,Ceanage Publication,Todd Lamle
34
Download