Industrial Training Report: Wan Design and Management
Industrial Training Report: Wan Design and Management
Industrial Training Report: Wan Design and Management
Department of Computer Science & Engineering RIMT MAHARAJA AGGRASEN ENGINEERING COLLEGE Mandi Gobindgarh (Punjab).
DECLARATION
I hereby certify that the project entitled WAN DESIGN AND MANAGEMENT developed by Balwinder Singh, University Roll No. 1286735 in partial fulfillment of requirements for the award of degree of B.Tech (Computer Science & Engineering) submitted in the Department of Computer Science & Engineering at RIMT MAHARAJA AGGRASEN ENGINEERING COLLEGE Mandi Gobindgarh (Punjab) under PUNJAB TECHNICAL UNIVERSITY, JALANDHAR is an authentic record of our own work carried out under the supervision of Er. RAJINDERPAL SINGH, SLR Infotech Pvt Ltd Sec 34A, Chandigahr . The matter presented has not been submitted in any other University / Institute for the award of B.Tech Degree.
This is to certify that the above statement made by the candidate is correct to the best of my knowledge. Guides Name Er. Rajinderpal Singh
PROJECT SUMMARY
An MNC company has been setup in India with its headquaters at UAE. It has started through its main offices at Delhi and Mumbai. Mumbai office is futher connected to offices at Banglore and Chandigarh. Delhi office to Jalandhar and Ludhiana main office at UAE is connected to Mumbai office through SERIAL connection which support static routing and is also connected to Delhi office through leased line which supports dynamic routing .Both offices at Delhi and Mumbai have routers acting as child routers so that the user cannot connect directly to main office at UAE for further security reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection .Mumbai branch is also connected to Banglore and Chennai branches by frame relay connection. These branches are to switches which are further connected to users via Ethernet port and users are accessing to various facilities provided to them ACL(Access control list)is also configured to switches for further security.
TABLE OF CONTENTS:
CH-1 INTRODUCTION
1.1BACKGROUND 1.2IMPORTANCE 1.3OBJECTIVE
CHAPTER 1 INTRODUCTION
1.1 BACKGROUND.
An MNC company has been set up in India with its head quarters at UAE. It has started through its main offices at Delhi and Mumbai. Mumbai office is further connected to offices at Bangalore and Chandigarh . Delhi office to Jalandhar and Ludhiana main office at U.A.E is connected to Mumbai office through SERIAL connection which supports static routing and is also connected to Delhi office through leased lines which supports dynamic routing. Both offices at Delhi and Mumbai have routers acting as child routers so that the user can not connect directly to main office at U.A.E for security reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection. Mumbai branch is also connected to Bangaluru and Chandigarh branches by frame relay connections. These branches to switches which are further connected to users via ETHERNET port and users are accessing to various facilities provided to them. ACL(access control list) is also configured to switches for further security.
Economic feasibility
Economic analysis is the most frequently used method for evaluating the effectiveness of a new system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. An entrepreneur must accurately weigh the cost versus benefits before taking an action Cost Based: No special investment is needed to manage the tool. No specific training is required for employees to use the tool. Investment requires only once at the time of installation. The software used in this project is freeware so the cost of developing the tool is minimal
Legal feasibility
Determines whether the proposed system conflicts with legal requirements e.g. a Data Processing system must comply with the local Data Protection Acts.
Operational feasibility
Is a measure of how well a proposed system solves the problems, and takes advantages of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.
Schedule feasibility
A project will fail if it takes too long to be completed before it is useful. Typically this means estimating how long the system will take to develop, and if it can be completed in a given time period using some methods like payback period. Schedule feasibility is a measure of how reasonable the project timetable is. Given our technical expertise, are the project deadlines reasonable? Some projects are initiated with specific deadlines. You need to determine whether the deadlines are mandatory or desirable.
Market Feasibility Study typically involves testing geographic locations for a real estate development project, and usually involves parcels of real estate land. Developers often conduct market studies to determine the best location within a jurisdiction, and to test alternative land uses for a given parcels. Jurisdictions often require developers to complete feasibility studies before they will approve a permit application for retail, commercial, industrial, manufacturing, housing, office or mixed-use project. Market Feasibility takes into account the importance of the business in the selected area.
Resource feasibility
This involves questions such as how much time is available to build the new system, when it can be built, whether it interferes with normal business operations, type and amount of resources required, dependencies, etc. Contingency and mitigation plans should also be stated here.
Cultural feasibility
In this stage, the project's alternatives are evaluated for their impact on the local and general culture. For example, environmental factors need to be considered and these factors are to be well known. Further an enterprise's own culture can clash with the results of the project
CHAPTER 3
SYSTEM DESIGN
3.1 LAYOUT OF PROPOSED NETWORK 3.2 DESIGN PARAMETERS
The various devices that are being used in designing the network of the MNC Company as follows:
ROUTER
A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect, and are the critical device that keeps data flowing between networks and keeps the networks connected to the internet. When data is sent between locations on one network or from one network to a second network the data is always seen and directed to the correct location by the router. The router accomplishes this by using headers and forwarding tables to determine the best path for forwarding the data packets, and they also use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.
SWITCH
A switch is an electrical component that can break an electrical circuit, interrupting the current or diverting it from one conductor to another. The most familiar form of switch is a manually operated electromechanical device with one or more sets of electric contacts. Each set of contacts can be in one of two states: either 'closed' meaning the contacts are touching and electricity can flow between them, or 'open', meaning the contacts are separated and non conducting. A switch may be directly manipulated by a human as a control signal to a system, such as a computer keyboard button, or to control power flow in a circuit, such as a light switch. Automatically-operated switches can be used to control the motions of machines, for example, to indicate that a garage door has reached its full open position or that a machine tool is in a position to accept another work piece. Switches may be operated by process variables such as pressure, temperature, flow, current, voltage, and force, acting as sensors in a process and used to automatically control a system. For
example, a thermostat is an automatically-operated switch used to control a heating process. A switch that is operated by another electrical circuit is called a relay. Large switches may be remotely operated by a motor drive mechanism.
The various WAN technologies that are being used in the design of MNC network as as follows:
FRAME-RELAY Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. Frame Relay originally was designed for use across Integrated Services Digital Network (ISDN) interfaces. Today, it is used over a variety of other network interfaces as well. This chapter focuses on Frame Relay's specifications and applications in the context of WAN services. Frame Relay is an example of a packet-switched technology. Packetswitched networks enable end stations to dynamically share the network medium and the available bandwidth. The following two techniques are used in packet-switching technology: Variable-length packets Statistical multiplexing Variable-length packets are used for more efficient and flexible data transfers. These packets are switched between the various segments in the network until the destination is reached. Statistical multiplexing techniques control network access in a packetswitched network. The advantage of this technique is that it accommodates more flexibility and more efficient use of bandwidth. Most of today's popular LANs, such as Ethernet and Token Ring, are packet-switched networks. Frame Relay often is described as a streamlined version of X.25, offering fewer of the robust capabilities, such as windowing and retransmission of last data that are offered in X.25. This is because Frame Relay typically
operates over WAN facilities that offer more reliable connection services and a higher degree of reliability than the facilities available during the late 1970s and early 1980s that served as the common platforms for X.25 WANs. As mentioned earlier, Frame Relay is strictly a Layer 2 protocol suite, whereas X.25 provides services at Layer 3 (the network layer) as well. This enables Frame Relay to offer higher performance and greater transmission efficiency than X.25, and makes Frame Relay suitable for current WAN applications, such as LAN interconnection.
commonly utilized protocol specification used in WAN networking: the Frame Relay protocol.
A network simulator is a piece of software or hardware that predicts the behavior of a network, without an actual network being present. Network simulators serve a variety of needs. Compared to the cost and time involved in setting up an entire test bed containing multiple networked computers, routers and data links, network simulators are relatively fast and inexpensive. They allow engineers to test scenarios that might be particularly difficult or expensive to emulate using real hardware- for instance, simulating the effects of a sudden burst in traffic or a DoS attack on a network service. Networking simulators are particularly useful in allowing designers to test new networking protocols or changes to existing protocols in a controlled and reproducible environment. Network simulators, as the name suggests are used by researchers, developers and QA to design various kinds of networks, simulate and then analyze the effect of various parameters on the network performance .A typical network simulator encompasses a wide range of networking technologies and help the users to build complex networks from basic building blocks like variety of nodes and links. With the help of simulators one can design hierarchical networks using various types of nodes like computers, hubs, bridges, routers, optical cross-connects, multicast routers, mobile units, MSAUs etc. The simulator that we have used to create a simulation of the network design of the MNC Company is CISCO PACKET TRACER.
OSPF
Stands for "Open Shortest Path First" OSPF is a method of finding the shortest path from one router to another in a local area network (LAN). As long as a network is IP-based, the OSPF algorithm will calculate the most efficient way for data to be transmitted. If there are several routers on a network, OSPF builds a table (or topography) of the router connections. When data is sent from one location to another, the OSPF algorithm compares the available options and chooses the most efficient way for the data to be sent. This limits unnecessary delays in data transmission and prevents infinite loops. DEFINITION: OSPF (Open Shortest Path First) is a router protocol used within larger autonomous system networks in preference to the Routing Information Protocol (RIP), an older routing protocol that is installed in many of today's corporate networks. Like RIP, OSPF is designated by the Internet Engineering Task Force (IETF) as one of several Interior Gateway Protocols (IGPs).
So that all will have the same routing table information. Unlike the RIP in which the entire routing table is sent, the host using OSPF sends only the part that has Using OSPF, a host that obtains a change to a routing table or detects a change in the network immediately multicasts the information to all other hosts in the network changed. With RIP, the routing table is sent to a neighbor host every 30 seconds. OSPF multicasts the updated information only when a change has taken place. Rather than simply counting the number of hops, OSPF bases its path descriptions on "link states" that take into account additional network information. OSPF also lets the user assign cost metrics to a given host router so that some paths are given preference. OSPF supports a variable network subnet mask so that a network can be subdivided. RIP is supported within OSPF for router-to-end station communication. Since many networks using RIP are already in use, router manufacturers tend to include RIP support within a router designed primarily for OSPF.
Cisco provides basic traffic filtering capabilities with access control lists (also referred to as access lists). Access lists can be configured for all routed network protocols (IP, AppleTalk, and so on.) to filter those protocols' packets as the packets pass through a router. You can configure access lists at your router to control access to a network: access lists can prevent certain traffic from entering or exiting a network.
About Access Control Lists
This section briefly describes what access lists do; why and when you should configure access lists; and basic vs. advanced access lists. What Access Lists Do Access lists filter network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces. Your router examines each packet to determine whether to forward or drop the packet, based on the criteria you specified within the access lists. Access list criteria could be the source address of the traffic, the destination address of the traffic, the upperlayer protocol, or other information. Note that sophisticated use can
sometimes successfully evade or fool basic access lists because no authentication is required..
VLSM A Variable Length Subnet Mask (VLSM) is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule. Of the IP routing protocols supported by CISCO, OSPF, Dual IS-IS, BGP-4, and EIGRP support "classless" or VLSM routes. Historically, EGP depended on the IP address class definitions, and actually exchanged network numbers (8, 16, or 24 bit fields) rather than IP addresses (32 bit numbers); RIP and IGRP exchanged network and subnet numbers in 32 bit fields, the distinction between network number, subnet number, and host number being a matter of convention and not exchanged in the routing protocols. More recent protocols (see VLSM) carry either a prefix length (number of contiguous bits in the address) or subnet mask with each address, indicating what portion of the 32 bit field is the address being routed on. A simple example of a network using variable length subnet masks is found in Cisco engineering. There are several switches in the engineering buildings, configured with FDDI and Ethernet interfaces and numbered in order to support 62 hosts on each switched subnet; in actuality, perhaps 15-30 hosts (printers, workstations, disk servers) are physically attached to each. However, many engineers also have ISDN or Frame Relay links to home, and a small subnet there. These home offices typically have a router or two and an X terminal or workstation; they may have a PC or Macintosh as well. As such, they are usually configured to support 6 hosts, and a few are configured for 14. The point to point links are generally unnumbered. Using "one size fits all" addressing schemes, such as are found in RIP or IGRP, the home offices would have to be configured to support 62 hosts each; using numbers on the point to point links would further compound the address bloat. One configures the router for Variable Length Subnet Masking by configuring the router to use a protocol (such as OSPF or EIGRP) that supports this, and configuring the subnet masks of the various
interfaces in the IP address interface sub-command. To use super nets, one must further configure the use of 'IP classless' routes.
Router>Enable Router# Configure Terminal Router(config)#interface serial 1/0 Router(config-if)#ip address 11.0.0.1 255.0.0.0 Router(Config-If)#Clock Rate 64000
Router(Config-If)#no shutdown Router(config)#exit Router(config)#interface serial 1/1 Router(config-if)#ip address 10.0.0.1 255.0.0.0 Router(config-if)#Clock Rate 64000 Router(config)# no shutdown Router(config)#exit Router(config)#interface fast Ethernet 0/0 Router(config-if)#ip address 192.168.1.1 255.255.255.0 Router(config-if)#no shutdown Router(config)#exit Router(config)#router ospf 90 Router(config-router)#network 10.0.0.0 0.255.255.255 area 50 Router(config-router)#network 11.0.0.0 0.255.255.255 area 50 Router(config-router)#network 192.168.1.0 0.0.0.255 area 50 Router(config-router)#exit Router(config)#access-list 120 deny tcp 1.0.0.2 0.0.0.0 192.168.1.2 0.0.0.0 Router(config)#access-list 120 permit ip any any Router(config)#interface serial 1/1 Router(config-if)#ip access-group 120 in Router(config-if)#exit
SERVER CONFIGURATION
Router >Enable Router#configure terminal Router(config)#interface serial 1/0 Router(Config-if)#Ip address 10.0.0.2 255.0.0.0
Router(Config-if)#No Shut Router(Config-if)#exit Router(Config)#interface serial 1/1 Router(Config-if)#ip address 14.0.0.1 255.0.0.0 Router(Config-if)#no shutdown Router(Config-if)#exit Router(Config)# interface serial 1/2 Router(Config-if)#ip address 15.0.0.1 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 92 Router(config-router)#network 10.0.0.0 0.255.255.255 area 50 Router(config-router)#network 14.0.0 0.255.255.255 area 50 Router(config-router)#network 15.0.0.0 0.255.255.255 area 50 Router(config-router)#exit Router(config)#interface serial 1/1 Router(config-if)#encapsulation frame-relay Router(config-if)#ip ospf network broadcast Router(config-if)#frame-relay map ip 14.0.0.2 104 broadcast Router(config-if)#frame-relay lmi-type ansi Router(config-if)#exit Router(config)#interface serial 1/2 Router(config-if)#encapsulation frame-relay Router(config-if)#ip ospf network broadcast Router(config-if)#frame-relay map ip 15.0.0.2 105 broadcast Router(config-if)#frame-relay lmi-type ansi Router(config-if)#exit
Router #configure terminal Router(config)#interface serial 1/0 Router(Config-if)#Ip address 14.0.0.2 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(config)#interface fastethernet0/0 Router(Config-if)#Ip address 3.0.0.1 255.0.0.0
Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 95 Router(config-router)#network 14.0.0.0 0.255.255.255 area 50 Router(config-router)#network 3.0.0.0 0.255.255.255 area 50 Router(config-router)#exit Router(config)#interface serial 1/0 Router(config-if)#encapsulation frame-relay Router(config-if)#ip ospf network broadcast Router(config-if)#frame-relay map ip 14.0.0.1 401 broadcast Router(config-if)#frame-relay lmi-type ansi Router(config-if)#exit Router(config)#hostname Bangalore Bangalore(config)#enable password CISCO Bangalore(config)#username MUMBAI password CCNA Bangalore(config)#interface serial 1/0 Bangalore(Config-if)#encapsulation ppp Bangalore(config-if)#ppp authentication pap Bangalore(config-if)#ppp pap sent username-bangalore password CISCO Bangalore(config-if)#exit Bangalore(config)#exit Bangalore#show interface serial 1/0
USER CONFIGURATION
USER CONFIGURATION
Router(config)#interface serial 1/0 Router(config-if)#ip address 15.0.0.2 255.0.0.0 Router(config-if)#no shutdown Router(config-if)#exit Router(Config)#interface fastethernet0/0 Router(Config-if)#ip address 4.0.0.1 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 96 Router(config-router)#network 15.0.0.0 0.255.255.255 area 50 Router(config-router)#network 4.0.0.0 0.255.255.255 area 50 Router(config-router)#exit
Router(config)#interface serial 1/0 Router(config-if)#encapsulation frame-relay Router(config-if)#ip ospf network broadcast Router(Config-if)#frame-relay map ip 15.0.0.1 501 broadcast Router(config-if)#frame-relay lmi-type ansi Router(config-if)#exit
USER CONFIGURATION
Router>Enable Router#Configure terminal Router(Config)#Interface serial1/0 Router(Config-if)#Ip address 13.0.0.2 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(Config)#interface fastethernet0/0 Router(Config-if)#Ip address 2.0.0.1 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 94 Router(config-router)#network 13.0.0.0 0.255.255.255 area 50 Router(config-router)#network 2.0.0.0 0.255.255.255 area 50 Router(config-router)#exit
Router(
USER CONFIGURATION
Router#configure terminal Router(Config)#Interface serial 1/0 Router(Config-if)#Ip address 12.0.0.2 255.0.0.0 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(Config)#Interface fastethernet 0/0 Router(Config-if)#Ip address 1.0.0.1 255.255.255.252 Router(Config-if)#No Shutdown Router(Config-if)#exit Router(config)#router ospf 93 Router(config-router)#network 12.0.0.0 0.255.255.255 area 50 Router(config-router)#network 1.0.0.0 0.255.255.255 area 50 Router(config-router)#exit Router(config)#exit Router>enable Router#configure terminal Router(config)#hostname jalandhar Jalandhar(config)#enable password CISCO Jalandhar(config)#username Delhi password CISCO Jalandhar(config)#interface serial 1/0 Jalandhar(config-if)#encapsulation ppp Jalandhar(config-if)#ppp authentication chap Jalandhar(config-if)#exit Jalanhar(Config)#exit Jalandhar#show interface serial 1/0 Jalandhar#exit
USER CONFIGURATION
PING Ping can test the speed of your connection, "distance" to target, and whether or not your connection is even up and running. It tells you how long a packet of data takes to travel from your computer to a specified host, and back again(in this case, the packet is 32 bytes in size). Ping Tests Once you have your command prompt (or WhatRoute) open, enter ping 127.0.0.1 and press Enter. You should receive 4 responses similar to the lines below. This ping test verifies the operation of the base TCP/IP stack. If TCP/IP is working correctly, there will be no problems with the ping. If you receive a timeout or error message, there is a problem with TCP/IP in which case you may have to uninstall and reinstall TCP/IP.
C:\WINDOWS>ping Pinging Reply Reply Reply Reply Ping 127.0.0.1 with 32 bytes 127.0.0.1 of data: TTL=128 TTL=128 TTL=128 TTL=128
statistics for 127.0.0.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms
Ping your IP* and press Enter. The "XXX" indicates your IP address and can be found by using the ipconfig /all command. Pinging your IP verifies that the physical network device can be addressed. If you cannot ping your own IP address, make sure the IP is correctly entered in the Network Control Panel (NCP). If it is correct, replace TCP/IP. If this does not work, the network card may not be properly installed or 'bad' in which case you may need to reinstall the NIC.
C:\WINDOWS>ping 209.166.xxx.xxx Pinging 209.166.xxx.xxx with 32 bytes of data: Reply Reply Reply Reply from from from from 209.166.xxx.xxx: 209.166.xxx.xxx: 209.166.xxx.xxx: 209.166.xxx.xxx: bytes=32 bytes=32 bytes=32 bytes=32 time<1ms time=1ms time=2ms time<1ms TTL=44 TTL=44 TTL=44 TTL=44
Ping statistics for 209.166.xxx.xxx: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 2ms, Average = 1ms
Enter ping 209.166.161.121 and press Enter. This test checks that your connection to the Internet is active and that the network can be accessed. You should receive 4 responses similar to the lines below.
C:\WINDOWS>ping 209.166.161.121 Pinging 209.166.161.121 with 32 bytes of data: Reply from TTL=44 Reply from TTL=44 Reply from TTL=44 Reply from TTL=44 209.166.161.121: bytes=32 time<1ms 209.166.161.121: bytes=32 time=1ms 209.166.161.121: bytes=32 time=2ms 209.166.161.121: bytes=32 time<1ms
Ping statistics for 209.166.161.121: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 2ms, Average = 1ms
Now enter ping www.expedient.net or another server name (e.g., www.yahoo.com) and press Enter. This test checks that your computer is able to translate name addresses (like www.expedient.net or www.yahoo.com) to numbers (like 209.166.165.174 or 64.58.76.224) - DNS resolution. You should receive 4 responses similar to the lines below. If you do not receive responses, check your DNS configuration settings.
C:\WINDOWS>ping www.expedient.net Pinging corp01.web.pitdc1.expedient.net [208.40.175.241] with 32 bytes of data: Reply Reply Reply Reply from from from from 208.40.175.241: 208.40.175.241: 208.40.175.241: 208.40.175.241: bytes=32 bytes=32 bytes=32 bytes=32 time<1ms time=1ms time=2ms time<1ms TTL=44 TTL=44 TTL=44 TTL=44
Ping statistics for 208.40.175.241: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 2ms, Average = 1ms
TRACEROUTE Traceroute tracks the path that a packet takes from your computer to a destination address. A traceroute also shows how many times your packets are being rebroadcast by other servers until it gets to the final destination. For windows users, the command is tracert. For Macintosh OS X users, its traceroute. In this example we will trace the hops from a computer to yahoo.com:
C:\WINDOWS>tracert yahoo.com Tracing route to yahoo.com [66.218.71.198] over a maximum of 30 hops: 1 <1 ms <1 ms <1 2 44 ms 14 ms 18 3 31 ms 25 ms 13 4 21 ms 17 ms 17 5 15 ms 17 ms 19 [209.244.219.169] 6 16 ms 17 ms 15 7 82 ms 82 ms 82 8 87 ms 87 ms 83 9 87 ms 84 ms 93 10 90 ms 88 ms 92 Trace complete. ms ms ms ms ms ms ms ms ms ms 208.170.243.1 sl-gw15-rly-6-0-1.sprintlink.net [144.232.246.165] sl-bb22-rly-1-0.sprintlink.net [144.232.25.232] sl-st20-ash-15-1.sprintlink.net [144.232.20.106] so-0-0-0.edge1.Washington1.Level3.net so-5-0-0.gar1.Washington1.Level3.net [209.244.11.9] so-3-0-0.mp2.SanJose1.Level3.net [64.159.1.130] gige10-0.ipcolo3.SanJose1.Level3.net [64.159.2.41] unknown.Level3.net [64.152.69.30] w1.rc.vip.scd.yahoo.com [66.218.71.198]
UNDERSTANDING THE OUTPUT The first line is the command we typed: tracert yahoo.com. Note the space between the command "ping" and the host computer "yahoo.com." The next line shows the traceroute program acquiring the ip address from the domain. "Maximum of 30 hops" is how many routers the packet will go through before giving up trying to find the host. The next lines show each server the packets traveled through to get to the destination yahoo.com. These show both the IP address and domain name of the actual servers that the packets passed through.
CONCLUSION: It was a great learning experience while working on the project as we experienced the real taste of networking. The MNC companys network performance was not up to the mark because of the slow WAN links and hub connectivity in the LANs. The MNC company wanted to actually feel the improvement in network performance by replacing the existing WAN technologies and networking hardware devices. They wanted a simulation of the actual network before they decide to actually upgrade their hardware infrastructure.
We prepared a network design according to their specifications and implement the new WAN technologies. We replaced the WAN links with more faster and efficient WAN technologies. When we started the project for the MNC company, we had decided to implement Leased Line technology on all the WAN links but because of financial constraint and limited budget for the project, we were not able to do so however we did implement Leased Line technology on the WAN link between UAE office and Delhi office. On another WAN link between UAE office and Mumbai office we implemented ISDN. All of the other locations were connected through Frame Relay.
What we feel is that there is still scope for betterment and network performance could be improved further by implementing leased lines on all WAN links.
REFERENCE:
WWW.CISCOPRESS.COM CCNA BOOK CISCO DESIGNING SECURITY