Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

ENTERPRISE NETWORK USING CISCO

PACKET TRACER

MINI PROJECT REPORT

Submitted by

J. VISHNU SANKAR (202009046)


A.AJITHAR (20200950)

in

19AD501 – COMPUTER NETWORKING PRINCIPLE

DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE


MEPCO SCHLENK ENGINEERING COLLEGE
SIVAKASI

NOVEMEBER 2022
MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI
AUTONOMOUS

DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE

BONAFIDE CERTIFICATE

This is to certify that it is the bonafide work of “J. VISHNU SANKAR


(202009046),A.AJITHAR (20200950)” for the mini project titled “ENTERPRISE
NETWORK USING CISCO PACKET TRACER” in 19AD552 Computer network
principles Laboratory during the Fifth semester jULY 2022 – November 2022 under my
supervision.

SIGNATURE SIGNATURE
Mrs.P.Swathika Dr. J. Angela Jennifa Sujana,

Asst. Professor (Senior Grade), Asso. Professor (Senior Grade) Head,

AI&DS Department, AI&DS Department

Mepco Schlenk Engg. College, Sivakasi Mepco Schlenk Engg. College, Sivakasi
TABLE OF CONTENT

1 Introduction 4

1.1 Abstract……………………………………………………… 4

1.2 Objective of the project……………………………………… 4

1.3 Network Requirements……………………………………… 4

2 Implementation 5

2.1 Technology…………………………………………………. 5

2.2 Modules……………………………………………………… 5

2.3 Protocols Used………………………………………………. 7

2.4 Ip Addressing Plan…………………………………………... 12

3 Design and Diagrams 15

3.1 Components…………………………………………………. 15

3.2 Design………………………………………………………. 16

3.3 Output………………………………………………………. 18

4 Conclusion 20

5 References 20
ACKNOWLEDGEMENT

I sincerely thank our respected principal Dr. S. ARIVAZHAGAN, for providing


necessary facilities to carry out this work successfully.

I wish to express my sincere gratitude to Dr.J. Angela Jennifa Sujana. Associate


Professor (Sr.Grade) and Head of the Artificial Intelligence & Data Science department for
his stimulating support and encouragement for the completion of this project work.

I am graceful to our Project guides Mrs.P. Swathika Assistant Professor (Sr.


Grade) Dr.P. Thendral Assistant Professor (Sr. Grade) And Dr.A. Shenbagarajan
Assistant Professor (Sr. Grade) Mrs.A.Muthulakshmi Assistant Professor (Sr. Grade)
And Mrs.L.Prasika Assistant Professor (Sr. Grade).

Head of the Artificial Intelligence & Data Science department for their insightful
comments and valuable suggestions helped me to complete this project work successfully.

My sincere thanks go to our revered faculty members and lab technicians for their
help over this project work.

Last but not the least, I extend my indebtedness towards my beloved family and my
friends for their support which made this project a successful one.
1.1 Introduction:
This Enterprise Network Scenario is about designing a topology of a network that is a LAN
(Local Area Network) for a office in which various computers of different departments are set up so
that they can interact and communicate with each other by interchanging data. To design a
networking scenario for a office which connect various departments to each other’s, it puts forward
communication among different departments. CNS is used to design a systematic and well-planned
topology, satisfying all thenecessities of the college (i.e., client). CNS come up with a network with
good performance.

1.2 ABSTRACT:

Campus Network Management (CNM) is most needed in recent times like many
corporate universities opened many branches across the various places. The administrative
process and the main server are splitted into the various branches to access the network
under the same network. In this management, the computers can connect both via intra and
inter connectivity with other computers under the same organization main server, So CNM
using Cisco Packet Tracer emphasizes that the network connectivity through servers and
routers and switches and other computers in same location and in different location .

1.3 OBJECTIVE OF THE PROJECT:

The main objective of the proposed network is

 To update the existing network

 To enhance its capabilities

 To increase the flexibility of the network which will eventually provide


good security.

Packet Tracer offers an effective, interactive environment for learning networking concepts
and protocols. Most importantly, Packet Tracer helps students and instructors create their
own virtual “network worlds” for exploration, experimentation, and explanation of
networking concepts and technologies.
2.IMPLEMENTATION:

In this chapter, the knowledge gathered is applied into the commands and
configuration of various devices.

2.1 TECHNOLOGY:

STAR TOPOLOGY

Alternatively referred to as a star network, star topology is one of the most


common network setups. Every node connects to a central network device in this
configuration, like a hub, switch, or computer. The central network device acts as a server,
and the peripheral devices act as clients. In a star topology setup, either a coaxial or RJ-
45 network cable is used, depending on each computer's type of network card. The image
shows how this network setup gets its name, as it is shaped like a star.

There technically is no limit to how many computers can connect in a star topology.
However, network performance can decrease as more computers are connected, resulting
in slower network speeds.

ADVANTAGES:

 Centralized management of the network through the use of the central computer,
hub, or switch.
 Easy to add another computer to the network.
 If one computer on the network fails, the rest of the network continues to function
normally.
Fig 2.2.1-STAR Protocol

2.2.1 ADDRESSING MODE:

IP ADDRESSING

IP address is an address having information about how to reach a specific host, especially outside
the LAN. An IP address is a 32 bit unique address having an address space of 232.

Generally, there are two notations in which IP address is written, dotted decimal notation and
hexadecimal notation.

Classful Addressing

The 32 bit IP address is divided into five sub-classes. These are:

 Class A
 Class B
 Class C
 Class D
 Class E

Each of these classes has a valid range of IP addresses. Classes D and E are reserved for multicast
and experimental purposes respectively. The order of bits in the first octet determine the classes of
IP address.

IPv4 address is divided into two parts:

 Network ID
 Host ID
The class of IP address is used to determine the bits used for network ID and host ID and the
number of total networks and hosts possible in that particular class. Each ISP or network
administrator assigns IP address to each device that is connected to its network.

Range of special IP addresses:

169.254.0.0 – 169.254.0.16 : Link local addresses

127.0.0.0 – 127.0.0.8 : Loop-back addresses

0.0.0.0 – 0.0.0.8 : used to communicate within the current network.

Classless Addressing

To reduce the wastage of IP addresses in a block, we use sub-netting. What we do is that


we use host id bits as net id bits of a classful IP address. We give the IP address and define
the number of bits for mask along with it (usually followed by a ‘/’ symbol), like,
192.168.1.1/28. Here, subnet mask is found by putting the given number of bits out of 32
as 1, like, in the given address, we need to put 28 out of 32 bits as 1 and the rest as 0, and
so, the subnet mask would be 255.255.255.240.

2.3 PROTOCOLS USED:

ICMP PROTOCOL:
The Internet Control Message Protocol (ICMP) is a network layer protocol used by
network devices to diagnose network communication issues. ICMP is mainly used to
determine whether or not data is reaching its intended destination in a timely manner.
Commonly, the ICMP protocol is used on network devices, such as routers. ICMP is
crucial for error reporting and testing, but it can also be used in distributed denial-of-
service (DDoS) attacks.

USES OF ICMP:

The primary purpose of ICMP is for error reporting. When two devices connect
over the Internet, the ICMP generates errors to share with the sending device in the event
that any of the data did not get to its intended destination. For example, if a packet of data
is too large for a router, the router will drop the packet and send an ICMP message back to
the original source for the data.
A secondary use of ICMP protocol is to perform network diagnostics; the
commonly used terminal utilities traceroute and ping both operate using ICMP. The
traceroute utility is used to display the routing path between two Internet devices. The
routing path is the actual physical path of connected routers that a request must pass
through before it reaches its destination. The journey between one router and another is
known as a ‘hop,’ and a traceroute also reports the time required for each hop along the
way. This can be useful for determining sources of network delay.

The ping utility is a simplified version of traceroute. A ping will test the speed of
the connection between two devices and report exactly how long it takes a packet of data to
reach its destination and come back to the sender’s device. Although ping does not provide
data about routing or hops, it is still a very useful metric for gauging the latency between
two devices. The ICMP echo-request and echo-reply messages are commonly used for the
purpose of performing a ping.

Unfortunately network attacks can exploit this process, creating means of


disruption such as the ICMP flood attack and the ping of death attack.

HOW DOES ICMP WORK?

Unlike the Internet Protocol (IP), ICMP is not associated with a transport layer
protocol such as TCP or UDP. This makes ICMP a connectionless protocol: one device
does not need to open a connection with another device before sending an ICMP message.
Normal IP traffic is sent using TCP, which means any two devices that exchange data will
first carry out a TCP handshake to ensure both devices are ready to receive data. ICMP
does not open a connection in this way. The ICMP protocol also does not allow for
targeting a specific port on a device.
Fig 2.1- ICMP PROTOCOL

2.4 IP Addressing Plan:

IT DEPARTMENT (192.168.1.0)

OFFICE CABIN 192.168.1.2

IT LAB 1 192.168.1.3

IT LAB 2 192.168.1.4

IT LAB 3 192.168.1.5

IT LAB 4 192.168.1.6

Printer 0 192.168.1.7
COMPUTER DEPARTMENT (192.168.2.0)

CS HOD CABIN 192.168.2.2

CS LAB 1 192.168.2.3

CS LAB 2 192.168.2.4

CS LAB 3 192.168.2.5

CS LAB 4 192.168.2.6

Printer 7 192.168.2.7

OTHERS (192.168.3.0)

OFFICE 192.168.3.2

Printer 2 192.168.3.6

EXAM CELL 192.168.3.3

Printer 3 192.168.3.7

ENQUIRY 192.168.3.4

TPO 192.168.3.5

Printer 4 192.168.3.8
SERVER ROOM (1.0.0.0)
FTP SERVER 1.0.0.4
PC1 1.0.0.5
DNS SERVER 1.0.0.2
WEB SERVER 1.0.0.3

INTERNET LAB (128.168.0.0)

PC2 128.168.0.2

PC3 128.168.0.3

PC4 128.168.0.4

PC5 128.168.0.5

Printer 5 128.168.0.6

PRINCIPLE ROOM (192.168.4.0)

PC 0 192.168.4.2

LAPTOP 0 192.168.4.3
3.DESIGN AND DIAGRAMS:

3.1 COMPONENTS:
 Router
 Switches
 PCs
 Printers
 Servers
 Connectivity Lines
ROUTER:

 A router is a device that connects two or more packet-switched networks or


subnetworks.
 It serves two primary functions: managing traffic between these networks by
forwarding data packets to their intended IP addresses, and allowing multiple devices to
use the same Internet connection.
 There are several types of routers, but most routers pass data between LANs (local
area networks) and WANs (wide area networks).
 A LAN is a group of connected devices restricted to a specific geographic area. A
LAN usually requires a single router.
 A WAN, by contrast, is a large network spread out over a vast geographic area.
 Large organizations and companies that operate in multiple locations across the
country, for instance, will need separate LANs for each location, which then connect to the
other LANs to form a WAN.
 Because a WAN is distributed over a large area, it often necessitates multiple
routers and switches
 Router 2911

1. Setup GE 0/0 for WAN

2. Setup GE 0/1 for LAN

3. Routing to allow LAN for Internet Access

4. DHCP DNS

5. Enable HTTP access


Fig 3.1- Router 2911

Switches:

 Switches are networking devices operating at layer 2 or a data link layer


of the OSI model.
 A switch has many ports, to which computers are plugged in.
 When a data frame arrives at any port of a network switch, it examines the
destination address, performs necessary checks and sends the frame to the corresponding
device(s).It supports unicast, multicast as well as broadcast communications.
 Cisco Catalyst WS-C3650-24PS-E is the next generation of enterprise-level
standalone switch with stacking option for access-layer and distribution-layer design. WS-
C3650-24PS-E integrates 24 Gigabit Ethernet POE+ ports and 4 fixed 1G SFP uplink ports
in IP service feature set which enables advanced layer 3 routing performance with superior
QoS capabilities.
 Switches are active devices, equipped with network software and network
management capabilities.
 Switches can perform some error checking before forwarding data to the destined
port.
 The number of ports is higher – 24/48.
 It is an intelligent network device that can be conceived as a multiport network
bridge.
 They connect devices in a network and use packet switching to send, receive
or forward data packets or data frames over the network.
 It uses MAC addresses (addresses of medium access control sublayer) to send
data packets to selected destination ports.
 It uses packet switching technique to receive and forward data packets from
the source to the destination device.
 It is supports unicast (one-to-one), multicast (one-to-many) and broadcast
(one-to-all) communications.
 Transmission mode is full duplex, i.e. communication in the channel occurs in
both the directions at the same time. Due to this, collisions do not occur.

Fig 3.2-Switches

SERVERS:

 A server is a computer program or a device that provides functionality for


called clients which are other programs or devices. This architecture is called the
client–server model. A single overall computation is distributed across multiple
processes or devices.
 Servers can provide various functionalities called services. These services
include sharing data or resources among multiple clients, or performing computation
for a client. Multiple clients can be served by a single server, and a single client can
use multiple servers.
 A client process may run on the same device. It can also connect over a
network to a server to run on a different device. Example of servers may include
database servers, mail servers, print servers, file servers, web servers, application
servers, and game servers.
 Most frequently client–server systems are implemented by the request–
response model., i.e., a client sends a request to the server. In this model server
performs some action and sends a response back to the client, typically with a result or
acknowledgement.

Fig 3.3-Servers
4. OUTPUT:

Fig No 4.1. The prototype of the proposed network is implemented on cisco packet tracer

Fig No 4.2 Testing Web Hosting


Fig No 4.3

Fig No 4.4
Fig No 4.5

Fig No 4.6
Fig No 4.7

Fig No 4.8
Fig No 4.9

Fig No 4.10
5.CONCLUSION:
Thus the campus network management is successfully configured with the Cisco
Packet Tracer and routers will successfully connected to the main server and through
switches the IP address is assigned by the DHCP and uses RIP protocol to contact with the
systems in the other location from the main server. So the administrative process and
management process can be done easily and proper network management is done using
DNS,DHCP and RIP protocol.

REFERENCES:
https://www.tutorialspoint.com/what-are-switches-in-computer-network

https://www.geeksforgeeks.org/what-is-cisco-packet-tracer/

https://en.wikipedia.org/wiki/Packet_Tracer

You might also like