Industrial Training Report: Wan Design and Management

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 47

INDUSTRIAL TRAINING REPORT

WAN DESIGN AND MANAGEMENT

Submitted in partial fulfillment of the Requirements for the award of

Degree of Bachelor of Technology in Computer Science Engineering

Submitted By BALWINDER SINGH University Roll No.-1286735 SUBMITTED TO:

Department of Computer Science & Engineering RIMT MAHARAJA AGGRASEN ENGINEERING COLLEGE Mandi Gobindgarh (Punjab).

DECLARATION
I hereby certify that the project entitled WAN DESIGN AND MANAGEMENT developed by Balwinder Singh, University Roll No. 1286735 in partial fulfillment of requirements for the award of degree of B.Tech (Computer Science & Engineering) submitted in the Department of Computer Science & Engineering at RIMT MAHARAJA AGGRASEN ENGINEERING COLLEGE Mandi Gobindgarh (Punjab) under PUNJAB TECHNICAL UNIVERSITY, JALANDHAR is an authentic record of our own work carried out under the supervision of Er. RAJINDERPAL SINGH, SLR Infotech Pvt Ltd Sec 34A, Chandigahr . The matter presented has not been submitted in any other University / Institute for the award of B.Tech Degree.

Signature of student BALWINDER SINGH 1286735 Date: ____________________

This is to certify that the above statement made by the candidate is correct to the best of my knowledge. Guides Name Er. Rajinderpal Singh

Head of Department (Signature and Seal)

PROJECT SUMMARY
An MNC company has been setup in India with its headquaters at UAE. It has started through its main offices at Delhi and Mumbai. Mumbai office is futher connected to offices at Banglore and Chandigarh. Delhi office to Jalandhar and Ludhiana main office at UAE is connected to Mumbai office through SERIAL connection which support static routing and is also connected to Delhi office through leased line which supports dynamic routing .Both offices at Delhi and Mumbai have routers acting as child routers so that the user cannot connect directly to main office at UAE for further security reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection .Mumbai branch is also connected to Banglore and Chennai branches by frame relay connection. These branches are to switches which are further connected to users via Ethernet port and users are accessing to various facilities provided to them ACL(Access control list)is also configured to switches for further security.

TABLE OF CONTENTS:
CH-1 INTRODUCTION
1.1BACKGROUND 1.2IMPORTANCE 1.3OBJECTIVE

CH-2 SYSTEM ANALYSIS


2.1 ANALYSIS OF EXISTING NETWORK 2.2 REQUIREMENT SPECIFICATION OF EXISTING NETWORK 2.3 FEASIBILITY STUDY

CH-3 SYSTEM DESIGN


3.1 LAYOUT OF PROPOSED NETWORK 3.2 DESIGN PARAMETERS

CH-4 SYSTEM IMPLEMENTATION


4.1 SOFTWARE AND TECHNOLOGIES USED IN THE PROJECT 4.2 PROJECT CONFIGURATION

CH-5 SYSTEM TESTING AND TROUBLESHOOTING


5.1 PING AND TRACEROUTE

CH-6 CONCLUSION AND FUTURE SCOPE


REFERENCES:

CHAPTER 1 INTRODUCTION

1.1 BACKGROUND 1.2 IMPORTANCE 1.3 OBJECTIVE

1.1 BACKGROUND.
An MNC company has been set up in India with its head quarters at UAE. It has started through its main offices at Delhi and Mumbai. Mumbai office is further connected to offices at Bangalore and Chandigarh . Delhi office to Jalandhar and Ludhiana main office at U.A.E is connected to Mumbai office through SERIAL connection which supports static routing and is also connected to Delhi office through leased lines which supports dynamic routing. Both offices at Delhi and Mumbai have routers acting as child routers so that the user can not connect directly to main office at U.A.E for security reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection. Mumbai branch is also connected to Bangaluru and Chandigarh branches by frame relay connections. These branches to switches which are further connected to users via ETHERNET port and users are accessing to various facilities provided to them. ACL(access control list) is also configured to switches for further security.

1.2 IMPORTANCE OF PROJECT.


Wide Area Networks are spread over a (very) wide area so that companies and institutes that are located far from each other are directly connected via the network. Wide Area Networks have mostly on more than one location external connections with other big networks. Internet Service Providers (ISPs) and multinationals with many offices frequently own a WAN themselves. Regional education networks and company networks between several establishments are also examples of Wide Area Networks. Two great advantages of WAN are allowing secure and fast data transmission between the different nodes in the network. The data transmission is also reliable and inexpensive. The characteristics of the transmission facilities lead to an emphasis on efficiency of communications techniques in the design of WANs. Controlling the volume of traffic and avoiding excessive delays is important. Since the topologies of WANs are likely to be more complex than those of LANs, routing algorithms also receive more emphasis. Many WANs also implement sophisticated monitoring procedures to account for which users consume the network resources. This is, in some cases, used to generate billing information to charge individual users.

1.3 OBJECTIVE OF PROJECT.


Objective of the project is to connect various offices of the MNC company by using LAN and WAN technologies.

CHAPTER 2 SYSTEM ANALYSIS

2.1 2.2 2.3

ANALYSIS OF EXISTING NETWORK REQUIREMENT SPECIFICATION OF EXISTING NETWORK FEASIBILITY STUDY

2.1 Analysis of Existing Network


The existing network consists of hubs and there are dial up connections in between various offices of the MNC company because of which both LAN and WAN links are very slow and users regularly face problem in transmitting their data over the links. Most of the time there is network conjestion in the network because of which the work is suffering and users are not able to perform up expectation.

2.2 Requirement Specification of proposed Network.


In the proposed design, hubs will be replaced with switches so as to improve the LAN connectivity. Switches would be operating at 100 Mbps as compared to hubs which operate at 10 Mbps. Moreover switches are manageable so VLANS can be created on them so as to decrease broadcast traffic and to enhance security as well. As far as WAN is concerned all the dial up links would be replaced with ISDN, Frame-Relay and Leased Line connection so as to improve WAN connectivity and users dont face network congestion during working hours.
2.3 FEASIBILITY STUDY

Economic feasibility

Economic analysis is the most frequently used method for evaluating the effectiveness of a new system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. An entrepreneur must accurately weigh the cost versus benefits before taking an action Cost Based: No special investment is needed to manage the tool. No specific training is required for employees to use the tool. Investment requires only once at the time of installation. The software used in this project is freeware so the cost of developing the tool is minimal

Legal feasibility

Determines whether the proposed system conflicts with legal requirements e.g. a Data Processing system must comply with the local Data Protection Acts.
Operational feasibility

Is a measure of how well a proposed system solves the problems, and takes advantages of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.
Schedule feasibility

A project will fail if it takes too long to be completed before it is useful. Typically this means estimating how long the system will take to develop, and if it can be completed in a given time period using some methods like payback period. Schedule feasibility is a measure of how reasonable the project timetable is. Given our technical expertise, are the project deadlines reasonable? Some projects are initiated with specific deadlines. You need to determine whether the deadlines are mandatory or desirable.

Market and real estate feasibility

Market Feasibility Study typically involves testing geographic locations for a real estate development project, and usually involves parcels of real estate land. Developers often conduct market studies to determine the best location within a jurisdiction, and to test alternative land uses for a given parcels. Jurisdictions often require developers to complete feasibility studies before they will approve a permit application for retail, commercial, industrial, manufacturing, housing, office or mixed-use project. Market Feasibility takes into account the importance of the business in the selected area.
Resource feasibility

This involves questions such as how much time is available to build the new system, when it can be built, whether it interferes with normal business operations, type and amount of resources required, dependencies, etc. Contingency and mitigation plans should also be stated here.

Cultural feasibility

In this stage, the project's alternatives are evaluated for their impact on the local and general culture. For example, environmental factors need to be considered and these factors are to be well known. Further an enterprise's own culture can clash with the results of the project

CHAPTER 3

SYSTEM DESIGN
3.1 LAYOUT OF PROPOSED NETWORK 3.2 DESIGN PARAMETERS

3.1. Layout of the proposed Network

3.2 Design Parameters

The various devices that are being used in designing the network of the MNC Company as follows:

ROUTER
A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect, and are the critical device that keeps data flowing between networks and keeps the networks connected to the internet. When data is sent between locations on one network or from one network to a second network the data is always seen and directed to the correct location by the router. The router accomplishes this by using headers and forwarding tables to determine the best path for forwarding the data packets, and they also use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

SWITCH
A switch is an electrical component that can break an electrical circuit, interrupting the current or diverting it from one conductor to another. The most familiar form of switch is a manually operated electromechanical device with one or more sets of electric contacts. Each set of contacts can be in one of two states: either 'closed' meaning the contacts are touching and electricity can flow between them, or 'open', meaning the contacts are separated and non conducting. A switch may be directly manipulated by a human as a control signal to a system, such as a computer keyboard button, or to control power flow in a circuit, such as a light switch. Automatically-operated switches can be used to control the motions of machines, for example, to indicate that a garage door has reached its full open position or that a machine tool is in a position to accept another work piece. Switches may be operated by process variables such as pressure, temperature, flow, current, voltage, and force, acting as sensors in a process and used to automatically control a system. For

example, a thermostat is an automatically-operated switch used to control a heating process. A switch that is operated by another electrical circuit is called a relay. Large switches may be remotely operated by a motor drive mechanism.

The various WAN technologies that are being used in the design of MNC network as as follows:
FRAME-RELAY Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. Frame Relay originally was designed for use across Integrated Services Digital Network (ISDN) interfaces. Today, it is used over a variety of other network interfaces as well. This chapter focuses on Frame Relay's specifications and applications in the context of WAN services. Frame Relay is an example of a packet-switched technology. Packetswitched networks enable end stations to dynamically share the network medium and the available bandwidth. The following two techniques are used in packet-switching technology: Variable-length packets Statistical multiplexing Variable-length packets are used for more efficient and flexible data transfers. These packets are switched between the various segments in the network until the destination is reached. Statistical multiplexing techniques control network access in a packetswitched network. The advantage of this technique is that it accommodates more flexibility and more efficient use of bandwidth. Most of today's popular LANs, such as Ethernet and Token Ring, are packet-switched networks. Frame Relay often is described as a streamlined version of X.25, offering fewer of the robust capabilities, such as windowing and retransmission of last data that are offered in X.25. This is because Frame Relay typically

operates over WAN facilities that offer more reliable connection services and a higher degree of reliability than the facilities available during the late 1970s and early 1980s that served as the common platforms for X.25 WANs. As mentioned earlier, Frame Relay is strictly a Layer 2 protocol suite, whereas X.25 provides services at Layer 3 (the network layer) as well. This enables Frame Relay to offer higher performance and greater transmission efficiency than X.25, and makes Frame Relay suitable for current WAN applications, such as LAN interconnection.

Frame Relay Devices


Devices attached to a Frame Relay WAN fall into the following two general categories: Data terminal equipment (DTE) Data circuit-terminating equipment (DCE) DTEs generally are considered to be terminating equipment for a specific network and typically are located on the premises of a customer. In fact, they may be owned by the customer. Examples of DTE devices are terminals, personal computers, routers, and bridges. DCEs are carrier-owned internetworking devices. The purpose of DCE equipment is to provide clocking and switching services in a network, which are the devices that actually transmit data through the WAN. In most cases, these are packet switches. Figure 10-1 shows the relationship between the two categories of devices. DCEs Generally Reside Within Carrier-Operated WANs The connection between a DTE device and a DCE device consists of both a physical layer component and a link layer component. The physical component defines the mechanical, electrical, functional, and procedural specifications for the connection between the devices. One of the most commonly used physical layer interface specifications is the recommended standard (RS)-232 specification. The link layer component defines the protocol that establishes the connection between the DTE device, such as a router, and the DCE device, such as a switch. This chapter examines a

commonly utilized protocol specification used in WAN networking: the Frame Relay protocol.

Frame Relay Network Implementation


A common private Frame Relay network implementation is to equip a T1 multiplexer with both Frame Relay and non-Frame Relay interfaces. Frame Relay traffic is forwarded out the Frame Relay interface and onto the data network. Non-Frame Relay traffic is forwarded to the appropriate application or service, such as a private branch exchange (PBX) for telephone service or to a video-teleconferencing application. A typical Frame Relay network consists of a number of DTE devices, such as routers, connected to remote ports on multiplexer equipment via traditional point-to-point services such as T1, fractional T1, or 56-Kb circuits. An example of a simple Frame Relay network is shown in Figure 10-3. A Simple Frame Relay Network Connects Various Devices to Different Services over a WAN The majority of Frame Relay networks deployed today are provisioned by service providers that intend to offer transmission services to customers. This is often referred to as a public Frame Relay service. Frame Relay is implemented in both public carrier-provided networks and in private enterprise networks. The following section examines the two methodologies for deploying Frame Relay.

CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 SOFTWARE AND TECHNOLOGIES USED IN THE


PROJECT 4.2 PROJECT CONFIGURATION 4.1 SOFTWARE:
SIMULATOR

A network simulator is a piece of software or hardware that predicts the behavior of a network, without an actual network being present. Network simulators serve a variety of needs. Compared to the cost and time involved in setting up an entire test bed containing multiple networked computers, routers and data links, network simulators are relatively fast and inexpensive. They allow engineers to test scenarios that might be particularly difficult or expensive to emulate using real hardware- for instance, simulating the effects of a sudden burst in traffic or a DoS attack on a network service. Networking simulators are particularly useful in allowing designers to test new networking protocols or changes to existing protocols in a controlled and reproducible environment. Network simulators, as the name suggests are used by researchers, developers and QA to design various kinds of networks, simulate and then analyze the effect of various parameters on the network performance .A typical network simulator encompasses a wide range of networking technologies and help the users to build complex networks from basic building blocks like variety of nodes and links. With the help of simulators one can design hierarchical networks using various types of nodes like computers, hubs, bridges, routers, optical cross-connects, multicast routers, mobile units, MSAUs etc. The simulator that we have used to create a simulation of the network design of the MNC Company is CISCO PACKET TRACER.

OSPF
Stands for "Open Shortest Path First" OSPF is a method of finding the shortest path from one router to another in a local area network (LAN). As long as a network is IP-based, the OSPF algorithm will calculate the most efficient way for data to be transmitted. If there are several routers on a network, OSPF builds a table (or topography) of the router connections. When data is sent from one location to another, the OSPF algorithm compares the available options and chooses the most efficient way for the data to be sent. This limits unnecessary delays in data transmission and prevents infinite loops. DEFINITION: OSPF (Open Shortest Path First) is a router protocol used within larger autonomous system networks in preference to the Routing Information Protocol (RIP), an older routing protocol that is installed in many of today's corporate networks. Like RIP, OSPF is designated by the Internet Engineering Task Force (IETF) as one of several Interior Gateway Protocols (IGPs).

So that all will have the same routing table information. Unlike the RIP in which the entire routing table is sent, the host using OSPF sends only the part that has Using OSPF, a host that obtains a change to a routing table or detects a change in the network immediately multicasts the information to all other hosts in the network changed. With RIP, the routing table is sent to a neighbor host every 30 seconds. OSPF multicasts the updated information only when a change has taken place. Rather than simply counting the number of hops, OSPF bases its path descriptions on "link states" that take into account additional network information. OSPF also lets the user assign cost metrics to a given host router so that some paths are given preference. OSPF supports a variable network subnet mask so that a network can be subdivided. RIP is supported within OSPF for router-to-end station communication. Since many networks using RIP are already in use, router manufacturers tend to include RIP support within a router designed primarily for OSPF.

ACCESS CONTROL LISTS:

Cisco provides basic traffic filtering capabilities with access control lists (also referred to as access lists). Access lists can be configured for all routed network protocols (IP, AppleTalk, and so on.) to filter those protocols' packets as the packets pass through a router. You can configure access lists at your router to control access to a network: access lists can prevent certain traffic from entering or exiting a network.
About Access Control Lists

This section briefly describes what access lists do; why and when you should configure access lists; and basic vs. advanced access lists. What Access Lists Do Access lists filter network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces. Your router examines each packet to determine whether to forward or drop the packet, based on the criteria you specified within the access lists. Access list criteria could be the source address of the traffic, the destination address of the traffic, the upperlayer protocol, or other information. Note that sophisticated use can

sometimes successfully evade or fool basic access lists because no authentication is required..

VLSM A Variable Length Subnet Mask (VLSM) is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule. Of the IP routing protocols supported by CISCO, OSPF, Dual IS-IS, BGP-4, and EIGRP support "classless" or VLSM routes. Historically, EGP depended on the IP address class definitions, and actually exchanged network numbers (8, 16, or 24 bit fields) rather than IP addresses (32 bit numbers); RIP and IGRP exchanged network and subnet numbers in 32 bit fields, the distinction between network number, subnet number, and host number being a matter of convention and not exchanged in the routing protocols. More recent protocols (see VLSM) carry either a prefix length (number of contiguous bits in the address) or subnet mask with each address, indicating what portion of the 32 bit field is the address being routed on. A simple example of a network using variable length subnet masks is found in Cisco engineering. There are several switches in the engineering buildings, configured with FDDI and Ethernet interfaces and numbered in order to support 62 hosts on each switched subnet; in actuality, perhaps 15-30 hosts (printers, workstations, disk servers) are physically attached to each. However, many engineers also have ISDN or Frame Relay links to home, and a small subnet there. These home offices typically have a router or two and an X terminal or workstation; they may have a PC or Macintosh as well. As such, they are usually configured to support 6 hosts, and a few are configured for 14. The point to point links are generally unnumbered. Using "one size fits all" addressing schemes, such as are found in RIP or IGRP, the home offices would have to be configured to support 62 hosts each; using numbers on the point to point links would further compound the address bloat. One configures the router for Variable Length Subnet Masking by configuring the router to use a protocol (such as OSPF or EIGRP) that supports this, and configuring the subnet masks of the various

interfaces in the IP address interface sub-command. To use super nets, one must further configure the use of 'IP classless' routes.

4.2 PROJECT CONFIGURATION


MAIN OFFICE (U.A.E) CONFIGURATION

MAIN OFFICE IN U.A.E

Router>Enable Router# Configure Terminal Router(config)#interface serial 1/0 Router(config-if)#ip address 11.0.0.1 255.0.0.0 Router(Config-If)#Clock Rate 64000

Router(Config-If)#no shutdown Router(config)#exit Router(config)#interface serial 1/1 Router(config-if)#ip address 10.0.0.1 255.0.0.0 Router(config-if)#Clock Rate 64000 Router(config)# no shutdown Router(config)#exit Router(config)#interface fast Ethernet 0/0 Router(config-if)#ip address 192.168.1.1 255.255.255.0 Router(config-if)#no shutdown Router(config)#exit Router(config)#router ospf 90 Router(config-router)#network 10.0.0.0 0.255.255.255 area 50 Router(config-router)#network 11.0.0.0 0.255.255.255 area 50 Router(config-router)#network 192.168.1.0 0.0.0.255 area 50 Router(config-router)#exit Router(config)#access-list 120 deny tcp 1.0.0.2 0.0.0.0 192.168.1.2 0.0.0.0 Router(config)#access-list 120 permit ip any any Router(config)#interface serial 1/1 Router(config-if)#ip access-group 120 in Router(config-if)#exit

SERVER CONFIGURATION

MUMBAI BRANCH CONFIGURATION:

MAIN BRANCH IN MUMBAI

Router >Enable Router#configure terminal Router(config)#interface serial 1/0 Router(Config-if)#Ip address 10.0.0.2 255.0.0.0

Router(Config-if)#No Shut Router(Config-if)#exit Router(Config)#interface serial 1/1 Router(Config-if)#ip address 14.0.0.1 255.0.0.0 Router(Config-if)#no shutdown Router(Config-if)#exit Router(Config)# interface serial 1/2 Router(Config-if)#ip address 15.0.0.1 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 92 Router(config-router)#network 10.0.0.0 0.255.255.255 area 50 Router(config-router)#network 14.0.0 0.255.255.255 area 50 Router(config-router)#network 15.0.0.0 0.255.255.255 area 50 Router(config-router)#exit Router(config)#interface serial 1/1 Router(config-if)#encapsulation frame-relay Router(config-if)#ip ospf network broadcast Router(config-if)#frame-relay map ip 14.0.0.2 104 broadcast Router(config-if)#frame-relay lmi-type ansi Router(config-if)#exit Router(config)#interface serial 1/2 Router(config-if)#encapsulation frame-relay Router(config-if)#ip ospf network broadcast Router(config-if)#frame-relay map ip 15.0.0.2 105 broadcast Router(config-if)#frame-relay lmi-type ansi Router(config-if)#exit

BANGALORE OFFICE CONFIGURATION:

MAIN OFFICE BANGALORE


Router>Enable

Router #configure terminal Router(config)#interface serial 1/0 Router(Config-if)#Ip address 14.0.0.2 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(config)#interface fastethernet0/0 Router(Config-if)#Ip address 3.0.0.1 255.0.0.0

Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 95 Router(config-router)#network 14.0.0.0 0.255.255.255 area 50 Router(config-router)#network 3.0.0.0 0.255.255.255 area 50 Router(config-router)#exit Router(config)#interface serial 1/0 Router(config-if)#encapsulation frame-relay Router(config-if)#ip ospf network broadcast Router(config-if)#frame-relay map ip 14.0.0.1 401 broadcast Router(config-if)#frame-relay lmi-type ansi Router(config-if)#exit Router(config)#hostname Bangalore Bangalore(config)#enable password CISCO Bangalore(config)#username MUMBAI password CCNA Bangalore(config)#interface serial 1/0 Bangalore(Config-if)#encapsulation ppp Bangalore(config-if)#ppp authentication pap Bangalore(config-if)#ppp pap sent username-bangalore password CISCO Bangalore(config-if)#exit Bangalore(config)#exit Bangalore#show interface serial 1/0

USER CONFIGURATION

USER CONFIGURATION

CHANDIGARH OFFICE CONFIGURATION

MAIN OFFICE CHANDIGARH


Router>enable Router#Configure terminal

Router(config)#interface serial 1/0 Router(config-if)#ip address 15.0.0.2 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(Config)#interface fastethernet0/0 Router(Config-if)#ip address 4.0.0.1 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 96 Router(config-router)#network 15.0.0.0 0.255.255.255 area 50 Router(config-router)#network 4.0.0.0 0.255.255.255 area 50 Router(config-router)#exit

Router(config)#interface serial 1/0 Router(config-if)#encapsulation frame-relay Router(config-if)#ip ospf network broadcast Router(Config-if)#frame-relay map ip 15.0.0.1 501 broadcast Router(config-if)#frame-relay lmi-type ansi Router(config-if)#exit

CHANDIGARH OFFICE SWITCH CONFIGURATION

CHANDIGARH OFFICE LAN CONFIGURATION


Switch>enable Switch# configure terminal Switch (config)#vlan 2 Switch (config-vlan)# name Sales Switch (config-vlan)#vlan 3 Accounts Switch (config-vlan)#exit Switch(config)#interface fastethernet 0/2 Switch(config-if)#switchport access vlan 2 Switch(config-if)#interface fastethernet 0/3 Switch(config-if)#switchport access vlan 2 Switch(config-if)#interface fastethernet 0/4 Switch(config-if)#switchport access vlan 3 Switch(config-if)#interface fastethernet 0/5 Switch(config-if)#switchport access vlan 3 Switch(config-if)#exit

USER CONFIGURATION

DELHI OFFICE CONFIGURATION

MAIN OFICE DELHI


Router > enable Router#configure terminal Router(config)#interface serial 1/0 Router(config-if)#Ip address 11.0.0.2 255.0.0.0 Router(config-if)#No shutdown Router(config-if)#Exit Router(config)#interface serial1/1 Router(config-if)#Ip address 12.0.0.1 255.0.0.0 Router(config-if)#No shutdown Router(config-if)#exit Router(config)#Interface serial 1/2 Router(config-if)#Ip address 13.0.0.1 255.0.0.0 Router(config-if)#No shutdown Router(config-if)#exit Router(config)#router ospf 91 Router(config-router)#network 11.0.0.0 0.255.255.255 area 50 Router(config-router)#network 12.0.0.0 0.255.255.255 area 50 Router(config-router)#network 13.0.0.0 0.255.255.255 area 50 Router(config-router)#exit

LUDHIANA OFFICE CONFIGURATION

MAIN OFFICE LUDHIANA

Router>Enable Router#Configure terminal Router(Config)#Interface serial1/0 Router(Config-if)#Ip address 13.0.0.2 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(Config)#interface fastethernet0/0 Router(Config-if)#Ip address 2.0.0.1 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 94 Router(config-router)#network 13.0.0.0 0.255.255.255 area 50 Router(config-router)#network 2.0.0.0 0.255.255.255 area 50 Router(config-router)#exit
Router(

LUDHIANA OFFICE SWITCH CONFIGURATION

USER CONFIGURATION

JALANDHAR OFFICE CONFIGURATION

MAIN OFFICE JALANDHAR


Router>Enable

Router#configure terminal Router(Config)#Interface serial 1/0 Router(Config-if)#Ip address 12.0.0.2 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(Config)#Interface fastethernet 0/0 Router(Config-if)#Ip address 1.0.0.1 255.255.255.252 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 93 Router(config-router)#network 12.0.0.0 0.255.255.255 area 50 Router(config-router)#network 1.0.0.0 0.255.255.255 area 50 Router(config-router)#exit Router(config)#exit Router>enable Router#configure terminal Router(config)#hostname jalandhar Jalandhar(config)#enable password CISCO Jalandhar(config)#username Delhi password CISCO Jalandhar(config)#interface serial 1/0 Jalandhar(config-if)#encapsulation ppp Jalandhar(config-if)#ppp authentication chap Jalandhar(config-if)#exit Jalanhar(Config)#exit Jalandhar#show interface serial 1/0 Jalandhar#exit

JALANDHAR OFFICE-SWITCH CONFIGURATION

USER CONFIGURATION

CHAPTER 5 SYSTEM TESTING &TROUBLESHOOTING


51 PING AND TRACEROUTE

5.1 PING AND TRACEROUTE:

PING Ping can test the speed of your connection, "distance" to target, and whether or not your connection is even up and running. It tells you how long a packet of data takes to travel from your computer to a specified host, and back again(in this case, the packet is 32 bytes in size). Ping Tests Once you have your command prompt (or WhatRoute) open, enter ping 127.0.0.1 and press Enter. You should receive 4 responses similar to the lines below. This ping test verifies the operation of the base TCP/IP stack. If TCP/IP is working correctly, there will be no problems with the ping. If you receive a timeout or error message, there is a problem with TCP/IP in which case you may have to uninstall and reinstall TCP/IP.
C:\WINDOWS>ping Pinging Reply Reply Reply Reply Ping 127.0.0.1 with 32 bytes 127.0.0.1 of data: TTL=128 TTL=128 TTL=128 TTL=128

from from from from

127.0.0.1: 127.0.0.1: 127.0.0.1: 127.0.0.1:

bytes=32 bytes=32 bytes=32 bytes=32

time<1ms time<1ms time<1ms time<1ms

statistics for 127.0.0.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

Ping your IP* and press Enter. The "XXX" indicates your IP address and can be found by using the ipconfig /all command. Pinging your IP verifies that the physical network device can be addressed. If you cannot ping your own IP address, make sure the IP is correctly entered in the Network Control Panel (NCP). If it is correct, replace TCP/IP. If this does not work, the network card may not be properly installed or 'bad' in which case you may need to reinstall the NIC.

C:\WINDOWS>ping 209.166.xxx.xxx Pinging 209.166.xxx.xxx with 32 bytes of data: Reply Reply Reply Reply from from from from 209.166.xxx.xxx: 209.166.xxx.xxx: 209.166.xxx.xxx: 209.166.xxx.xxx: bytes=32 bytes=32 bytes=32 bytes=32 time<1ms time=1ms time=2ms time<1ms TTL=44 TTL=44 TTL=44 TTL=44

Ping statistics for 209.166.xxx.xxx: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 2ms, Average = 1ms

Enter ping 209.166.161.121 and press Enter. This test checks that your connection to the Internet is active and that the network can be accessed. You should receive 4 responses similar to the lines below.
C:\WINDOWS>ping 209.166.161.121 Pinging 209.166.161.121 with 32 bytes of data: Reply from TTL=44 Reply from TTL=44 Reply from TTL=44 Reply from TTL=44 209.166.161.121: bytes=32 time<1ms 209.166.161.121: bytes=32 time=1ms 209.166.161.121: bytes=32 time=2ms 209.166.161.121: bytes=32 time<1ms

Ping statistics for 209.166.161.121: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 2ms, Average = 1ms

Now enter ping www.expedient.net or another server name (e.g., www.yahoo.com) and press Enter. This test checks that your computer is able to translate name addresses (like www.expedient.net or www.yahoo.com) to numbers (like 209.166.165.174 or 64.58.76.224) - DNS resolution. You should receive 4 responses similar to the lines below. If you do not receive responses, check your DNS configuration settings.

C:\WINDOWS>ping www.expedient.net Pinging corp01.web.pitdc1.expedient.net [208.40.175.241] with 32 bytes of data: Reply Reply Reply Reply from from from from 208.40.175.241: 208.40.175.241: 208.40.175.241: 208.40.175.241: bytes=32 bytes=32 bytes=32 bytes=32 time<1ms time=1ms time=2ms time<1ms TTL=44 TTL=44 TTL=44 TTL=44

Ping statistics for 208.40.175.241: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 2ms, Average = 1ms

TRACEROUTE Traceroute tracks the path that a packet takes from your computer to a destination address. A traceroute also shows how many times your packets are being rebroadcast by other servers until it gets to the final destination. For windows users, the command is tracert. For Macintosh OS X users, its traceroute. In this example we will trace the hops from a computer to yahoo.com:
C:\WINDOWS>tracert yahoo.com Tracing route to yahoo.com [66.218.71.198] over a maximum of 30 hops: 1 <1 ms <1 ms <1 2 44 ms 14 ms 18 3 31 ms 25 ms 13 4 21 ms 17 ms 17 5 15 ms 17 ms 19 [209.244.219.169] 6 16 ms 17 ms 15 7 82 ms 82 ms 82 8 87 ms 87 ms 83 9 87 ms 84 ms 93 10 90 ms 88 ms 92 Trace complete. ms ms ms ms ms ms ms ms ms ms 208.170.243.1 sl-gw15-rly-6-0-1.sprintlink.net [144.232.246.165] sl-bb22-rly-1-0.sprintlink.net [144.232.25.232] sl-st20-ash-15-1.sprintlink.net [144.232.20.106] so-0-0-0.edge1.Washington1.Level3.net so-5-0-0.gar1.Washington1.Level3.net [209.244.11.9] so-3-0-0.mp2.SanJose1.Level3.net [64.159.1.130] gige10-0.ipcolo3.SanJose1.Level3.net [64.159.2.41] unknown.Level3.net [64.152.69.30] w1.rc.vip.scd.yahoo.com [66.218.71.198]

UNDERSTANDING THE OUTPUT The first line is the command we typed: tracert yahoo.com. Note the space between the command "ping" and the host computer "yahoo.com." The next line shows the traceroute program acquiring the ip address from the domain. "Maximum of 30 hops" is how many routers the packet will go through before giving up trying to find the host. The next lines show each server the packets traveled through to get to the destination yahoo.com. These show both the IP address and domain name of the actual servers that the packets passed through.

CHAPTER 6 CONCLUSION AND FUTURE SCOPE

CONCLUSION: It was a great learning experience while working on the project as we experienced the real taste of networking. The MNC companys network performance was not up to the mark because of the slow WAN links and hub connectivity in the LANs. The MNC company wanted to actually feel the improvement in network performance by replacing the existing WAN technologies and networking hardware devices. They wanted a simulation of the actual network before they decide to actually upgrade their hardware infrastructure.

We prepared a network design according to their specifications and implement the new WAN technologies. We replaced the WAN links with more faster and efficient WAN technologies. When we started the project for the MNC company, we had decided to implement Leased Line technology on all the WAN links but because of financial constraint and limited budget for the project, we were not able to do so however we did implement Leased Line technology on the WAN link between UAE office and Delhi office. On another WAN link between UAE office and Mumbai office we implemented ISDN. All of the other locations were connected through Frame Relay.

What we feel is that there is still scope for betterment and network performance could be improved further by implementing leased lines on all WAN links.

REFERENCE:
WWW.CISCOPRESS.COM CCNA BOOK CISCO DESIGNING SECURITY

You might also like