A
Project Report
On
“Enterprise Network Design Using ipV4”
Submitted To
RAJIV GANDHI TECHNICAL UNIVERSITY
BHOPAL (M.P.)
In partial fulfillment for the award of the degree of
BACHELOR OF ENGINEERING
IN
INFORMATION TECHNOLOGY
Submitted By:
Student name Krishna RAJ
Enrolment no. 0902IT171023
Under the guidance of
Prof. J.S Pahariya
Department of Information Technology
Rustamji Institute of Technology
Gwalior (MP)
RUSTAM JI INSTITUTE OF TECHNOLOGY
Department of Information Technology
Session 2021
CERTIFICATE
This is to certify tha project “Enterprise Network Design Using ipV4”
Which is being submitted by name of the students in partial fulfillment for the
award of the degree of Bachelor of Engineering (Information Technology), of
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal (M.P), is record of student’s
own work carried by them under my guidance and supervision.
The subject matter embodied in the project report has not been submitted for
the award of any other degree or diploma.
Head Of Department Project Guide
Prof. Anand Jha Prof. J.S Pahariya
Asst. Professor Asst. Professor
Department of IT Department of IT
R.J.I.T. TEKANPUR R.J.I.T. TEKANPUR
RUSTAMJI INSTITUTE OF TECHNOLOGY
Department of Information Technology
Declaration
We hereby declare that the project entitled Enterprise
Network Design Using ipV4 is the actual work carried out by
us in the department of Information Technology, Rustamji
Institute of Technology under the guidance of Prof. J.S
Pahariya , Information Technology, Rustamji Institute of
Technology.
The work presented does not infringe any patented work and has
not been submitted to an University for the award of any degree or
professional diploma.
Name Enrollment number
Signature
Krishna Raj 0902IT171023
ACKNOWLEDGEMENT
Preparing any project requires views of many people but we suspect that technical projects are more
different than others. A great many people are involved in various stages of the project prepration who
shared their knowledge and experience.
Before we get into thick of things we would like to add a few heartfelt words for the people who are
part of this project in numerous ways people who gave unending support right from the stage idea
was concieved.
It is our proud privilege to express a deep sense of gratitude and regard to our PROJECT GUIDE Mr.
Janki Sharan Pahareeya Asst. Professor, Information Technology, for providing opportunity to us
for carrying out the project. This initiative, keen interest, expert guidance at every step provided a
constant source of inspiration and encouragement to us for intense studies in the subject. We are
deeply indebted to him.
My heatly sincear and warmly thanks to our beloved principal, Dr Anjana Goen , for all the
infrastructue and technical facility provided and for always encouraging us and giving time-to-time
moral support for accumplishing the task.
We also express sincere gratitude to all technical and non-technical staff of our college for providing
us the facilities which are at their disposal in the department computer laboratories. We owe our
gratitude to our family and friends without whose co-operation and constant encouragement this
work would not have been successful.
We acknowledge with gratitude the benediction of our institution and Director, RJIT Tekanpur who
extended all facilities and co-operation in the completion of this project.
Our sincere thanks to all those Professors who directly or indirectly helped us in the development
and evolution of thoughts.
Sinceraly Thanks To All
Student Name Krishna Raj
Enrollment NO. 0902IT171023
ABSTRACT
This project is made Using Cisco Packet Tracer
Packet Tracer is a cross-platform visual simulation tool designed
by Cisco Systems that allows users to create network topologies and
imitate modern computer networks. The software allows users to
simulate the configuration of Cisco routers and switches using a
simulated command line interface. Packet Tracer makes use of
a drag and drop user interface, allowing users to add and remove
simulated network devices as they see fit. The software is mainly
focused towards Certified Cisco Network Associate Academy
students as an educational tool for helping them learn fundamental
CCNA concepts.
Contents
Chapter Particulars Page
No No.
1. Overview 1
1.1 Introduction of Networking 1
1.2 Server Used In the Project 3
1.3 Devices Used In This Project 9
1.4 13
Introduction of Routing
2. Testing the Servers and 16
Networks
2.1 DNS server 16
2.2 SMTP EMAIL server 17
2.3 HTTP server 19
2.4 FTP server 21
2.5 NTP server 22
2.6 Syslog server 24
2.7 DHCP server 25
INTRODUCTION OF NETWORKING
The foundations of networking: switches, routers, and wireless access
points
Switches, routers, and wireless access points are the essential networking
basics. Through them, devices connected to your network can
communicate with one another and with other networks, like the Internet.
Switches, routers, and wireless access points perform very different
functions in a network.
Switches
Switches are the foundation of most business networks. A switch acts as
a controller, connecting computers, printers, and servers to a network in a
building or a campus.
Switches allow devices on your network to communicate with each other,
as well as with other networks, creating a network of shared resources.
Through information sharing and resource allocation, switches save money
and increase productivity.
There are two basic types of switches to choose from as part of your
networking basics: on-premises and cloud-managed.
A managed on-premises switch lets you configure and monitor your LAN,
giving you tighter control of your network traffic.
Have a small IT team? A cloud-managed switch can simplify your
network management. You get a simple user interface, multisite full-
stack management, and automatic updates delivered directly to the
switch.
Routers
Routers connect multiple networks together. They also connect computers
on those networks to the Internet. Routers enable all networked
computers to share a single Internet connection, which saves money.
A router acts a dispatcher. It analyzes data being sent across a network,
chooses the best route for data to travel, and sends it on its way.
Routers connect your business to the world, protect information from
security threats, and can even decide which computers receive priority
over others.
Beyond those basic networking functions, routers come with additional
features to make networking easier or more secure. Depending on
your security needs, for example, you can choose a router with a firewall,
a virtual private network (VPN), or an Internet Protocol (IP)
communications system.
Access Points
An access point* allows devices to connect to the wireless network
without cables. A wireless network makes it easy to bring new devices
online and provides flexible support to mobile workers.
An access point acts like an amplifier for your network. While a router
provides the bandwidth, an access point extends that bandwidth so that
the network can support many devices, and those devices can access the
network from farther away.
But an access point does more than simply extend Wi-Fi. It can also give
useful data about the devices on the network, provide proactive security,
and serve many other practical purposes
Servers Used in this Project
• FTP Sever TFTP Server
FTP servers are the solutions used to facilitate file transfers
across the internet. If you send files using FTP, files are either
uploaded or downloaded to the FTP server. When you’re uploading
files, the files are transferred from a personal computer to the
server. When you’re downloaded files, the files are transferred
from the server to your personal computer. TCP/IP (Transmission
Control Protocol/Internet Protocol), or the language the internet
uses to execute commands, is used to transfer files via FTP.
Uploading
Files
Personal Computer --------> Server
Downloading
Files
Server --------> Personal Computer
FTP servers can be considered the midpoint between the sender
and the recipient of a file. For FTP servers to work, you need the
server address. Here’s an example of what this address may look
like “ftp.examplecompany.net”. Sometimes, the server address will
be given as a numeric address, like “12.345.678.90”.
TFTP Server is used for simple file transfer (typically for boot-loading
remote devices).
Trivial File Transfer Protocol (TFTP) is a simple protocol
for exchanging files between two TCP/IP machines. TFTP servers allow
connections from a TFTP Client for sending and receiving files. The
TFTP protocol supports only file send and receive operations. File
delete, move, and rename are not supported. Due to its limitations,
TFTP is a complement to the regular FTP and not a replacement. It is
only used when its simplicity is important, and its lack of features is
acceptable. The most common application is bootstrapping, although it
can be used for other purposes as well.
The TFTP Server can also be used to upload HTML pages onto
the HTTP Server or to download log files to a remote PC. In this case,
the File System Component must be used, and the HTTP Server must
be properly configured.
• NTP Server
The Network Time Protocol (NTP) is a networking
protocol for clock synchronization between computer systems
over packet-switched, variable-latency data networks. In operation
since before 1985, NTP is one of the oldest Internet protocols in
current use. NTP was designed by David L. Mills of the University of
Delaware.
NTP is intended to synchronize all participating computers to within
a few milliseconds of Coordinated Universal Time (UTC). It uses
the intersection algorithm, a modified version of Marzullo's
algorithm, to select accurate time servers and is designed to
mitigate the effects of variable network latency. NTP can usually
maintain time to within tens of milliseconds over the
public Internet, and can achieve better than one millisecond
accuracy in local area networks under ideal conditions.
Asymmetric routes and network congestion can cause errors of
100 ms or more.
• Syslog Server
System Logging Protocol (Syslog) is a way network devices can use a
standard message format to communicate with a logging server. It
was designed specifically to make it easy to monitor network
devices. Devices can use a Syslog agent to send out notification
messages under a wide range of specific conditions.
These log messages include a timestamp, a severity rating, a device
ID (including IP address), and information specific to the event.
Though it does have shortcomings, the Syslog protocol is widely
applied because it is simple to implement, and is fairly open-ended,
allowing for a lot of different proprietary implementations, and thus
the ability to monitor almost any connected device.
Syslog works on all flavors of Unix, Linux, and other *nix, as well as
Mac OS. Windows-based servers don’t support Syslog natively, but
many third-party tools are available to allow Windows devices to
communicate with a Syslog server.
• HTTP/HTTPS
HTTP is Hypertext transfer protocol. Simply put - Rules to sending
and receiving text-based messages. As we all know, computers work
in a language of 1's and 0's i.e. Binary language. Therefore,
potentially every set of 1's and 0's construct something, it could be
a word.
Let's say I want to write 'a'. Now, if 0 stands for 'a', 1 stands for
'b', and 01 stands for 'c', I can infer that a combination of 0's and
1's can construct a word as well. In this case, the text is already
constructed and is being sent on the wire. The computer works on
many languages - pure binary, text and some other formats like byte
codes. Here, what is being transferred is text. I am emphasizing on
'text' because this text is interpreted by the browser and the
moment browser interprets it, it becomes hypertext, and the
protocol that transfers the text is referred to as hypertext
transfer protocol - HTTP.
Using HTTP, you can definitely transfer images and text and even
sound, but not videos.
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version
of HTTP, the protocol over which data is sent between your browser
and the website that you are connected to. The 'S' at the end of
HTTPS stands for 'Secure'. It means all communications between
your browser and the website are encrypted. HTTPS is often used
to protect highly confidential online transactions like online banking
and online shopping order forms.
• SMTP
SMTP Fundamentals
SMTP is an application layer protocol. The client who wants to send
the mail opens a TCP connection to the SMTP server and then sends
the mail across the connection. The SMTP server is always on listening
mode. As soon as it listens for a TCP connection from any client, the
SMTP process initiates a connection on that port (25). After
successfully establishing the TCP connection the client process sends
the mail instantly.
SMTP Protocol
The SMTP model is of two type:
1. End-to- end method
2. Store-and- forward method
The end to end model is used to communicate between different
organizations whereas the store and forward method are used within
an organization. A SMTP client who wants to send the mail will contact
the destination’s host SMTP directly in order to send the mail to the
destination. The SMTP server will keep the mail to itself until it is
successfully copied to the receiver’s SMTP.
The client SMTP is the one which initiates the session let us call it as
the client- SMTP and the server SMTP is the one which responds to
the session request and let us call it as receiver-SMTP. The client-
SMTP will start the session and the receiver-SMTP will respond to
the request.
• DNS Server
The Domain Name System (DNS) is the phonebook of the Internet.
When users type domain names such as ‘google.com’ or ‘nytimes.com’
into web browsers, DNS is responsible for finding the correct IP
address for those sites. Browsers then use those addresses to
communicate with origin servers or CDN edge servers to access
website information. This all happens thanks to DNS servers: machines
dedicated to answering DNS queries.
• DHCP Server
• A DHCP Server is a network server that automatically provides
and assigns IP addresses, default gateways and other network
parameters to client devices. It relies on the standard protocol
known as Dynamic Host Configuration Protocol or DHCP to
respond to broadcast queries by clients.
• A DHCP server automatically sends the required network
parameters for clients to properly communicate on the network.
Without it, the network administrator has to manually set up
every client that joins the network, which can be cumbersome,
especially in large networks. DHCP servers usually assign each
client with a unique dynamic IP address, which changes when the
client’s lease for that IP address has expired.
• There are many enterprise companies who are still using DHCP
for IPv4 on their routers/switches. This is typically done by the
network administrator who needs to get a DHCP capability up and
running quickly but does not have access to a DHCP server. Most
routers/switches have the ability to provide the following DHCP
server support:
Devices Used In This Project
• Router
A router is a networking device that forwards data
packets between computer networks. Routers perform the traffic
directing functions on the Internet. Data sent through the internet,
such as a web page or email, is in the form of data packets. A packet
is typically forwarded from one router to another router through
the networks that constitute an internetwork (e.g. the Internet)
until it reaches its destination node.
A router is connected to two or more data lines from different IP
networks.[b] When a data packet comes in on one of the lines, the
router reads the network address information in the packet header
to determine the ultimate destination. Then, using information in
its routing table or routing policy, it directs the packet to the next
network on its journey.
The most familiar type of IP routers are home and small office
routers that simply forward IP packets between the home
computers and the Internet. More sophisticated routers, such as
enterprise routers, connect large business or ISP networks up to
the powerful core routers that forward data at high speed along
the optical fiber lines of the Internet backbone.
• Switches
A switch is a device in a computer network that connects other
devices together. Multiple data cables are plugged into a switch to
enable communication between different networked devices.
Switches manage the flow of data across a network by transmitting
a received network packet only to the one or more devices for which
the packet is intended. Each networked device connected to a
switch can be identified by its network address, allowing the switch
to direct the flow of traffic maximizing the security and efficiency
of the network.
A switch is more intelligent than an Ethernet hub, which simply
retransmits packets out of every port of the hub except the port on
which the packet was received, unable to distinguish different
recipients, and achieving an overall lower network efficiency.
An Ethernet switch operates at the data link layer (layer 2) of the
OSI model to create a separate collision domain for each switch
port. Each device connected to a switch port can transfer data to
any of the other ports at any time and the transmissions will not
interfere. Because broadcasts are still being forwarded to all
connected devices by the switch, the newly formed network
segment continues to be a broadcast domain. Switches may also
operate at higher layers of the OSI model, including the network
layer and above. A device that also operates at these higher layers
is known as a multilayer switch.
• Cables
Twisted Pair Cables
It has two or more insulated copper wires which are twisted with
each other and are color-coded. These types of wires are usually
used in telephone cables and the resistance to external
interference can be measured by the number of wires.
Coaxial Cables
This consists of solid copper or steel conductor plated with
copper which is enclosed in the metallic braid and metallic tape.
This is entirely covered with an insulated protective outer jacket.
These type of cables are used for computer networking and
audio-video networking.
• Servers
A server is a piece of computer hardware or software (computer
program) that provides functionality for other programs or devices,
called "clients". This architecture is called the client–server model.
Servers can provide various functionalities, often called "services",
such as sharing data or resources among multiple clients, or
performing computation for a client. A single server can serve
multiple clients, and a single client can use multiple servers. A client
process may run on the same device or may connect over a network
to a server on a different device.[1] Typical servers are database
servers, file servers, mail servers, print servers, web servers, game
servers, and application servers.[2]
Client–server systems are today most frequently implemented by
(and often identified with) the request–response model: a client
sends a request to the server, which performs some action and
sends a response back to the client, typically with a result or
acknowledgment. Designating a computer as "server-class hardware"
implies that it is specialized for running servers on it. This often
implies that it is more powerful and reliable than standard personal
computers, but alternatively, large computing clusters may be
composed of many relatively simple, replaceable server components.
• End Devices ( Laptops / PCs )
All computers connected to a network that participate directly in
network communication are classified as hosts. These devices form
the interface between users and the underlying communication
network.
End devices are either the source or destination of data
transmitted over the network. In order to distinguish one end
device from another, each end device on a network is identified by
an address. When an end device initiates communication, it uses the
address of the destination end device to specify where the message
should be sent.
A server is an end device that has software installed that enables it
to provide information, like email or web pages, to other end devices
on the network. For example, a server requires web server software
to provide web services to the network.
Introduction of Routing
Routing is the process of selecting a path for traffic in a network or
between or across multiple networks. Broadly, routing is performed in
many types of networks, including circuit-switched networks, such as
the public switched telephone network (PSTN), and computer networks,
such as the Internet.
In packet switching networks, routing is the higher-level decision
making that directs network packets from their source toward their
destination through intermediate network nodes by specific packet
forwarding mechanisms. Packet forwarding is the transit of network
packets from one network interface to another. Intermediate nodes
are typically network hardware devices such
as routers, gateways, firewalls, or switches. General-
purpose computers also forward packets and perform routing, although
they have no specially optimized hardware for the task.
The routing process usually directs forwarding on the basis of routing
tables. Routing tables maintain a record of the routes to various
network destinations. Routing tables may be specified by an
administrator, learned by observing network traffic or built with the
assistance of routing protocols.
Routing, in a narrower sense of the term, often refers to IP
routing and is contrasted with bridging. IP routing assumes
that network addresses are structured and that similar addresses
imply proximity within the network. Structured addresses allow a single
routing table entry to represent the route to a group of devices. In
large networks, structured addressing (routing, in the narrow sense)
outperforms unstructured addressing (bridging). Routing has become
the dominant form of addressing on the Internet. Bridging is still
widely used within local area networks.
Routing Used in this project
Static Routing
Static routing is a form of routing that occurs when a router uses a
manually-configured routing entry, rather than information from
dynamic routing traffic.[1] In many cases, static routes are manually
configured by a network administrator by adding in entries into
a routing table, though this may not always be the case.
[2]
Unlike dynamic routing, static routes are fixed and do not change
if the network is changed or reconfigured. Static routing
and dynamic routing are not mutually exclusive. Both dynamic routing
and static routing are usually used on a router to maximise routing
efficiency and to provide backups in the event that dynamic routing
information fails to be exchanged. Static routing can also be used
in stub networks, or to provide a gateway of last resort.
Uses
Static routing may have the following uses:
Static routing can be used to define an exit point from a router
when no other routes are available or necessary. This is called
a default route.
Static routing can be used for small networks that require only one
or two routes. This is often more efficient since a link is not being
wasted by exchanging dynamic routing information.
Static routing is often used as a complement to dynamic routing to
provide a failsafe backup in the event that a dynamic route is
unavailable.
Static routing is often used to help transfer routing information
from one routing protocol to another (routing redistribution).
Advantages
Static routing, if used without dynamic routing, has the following
advantages:[citation needed]
Static routing causes very little load on the CPU of the router, and
produces no traffic to other routers.
Static routing leaves the network administrator with full control
over the routing behaviour of the network.
Static Routing Is very easy to configure on small networks.
Disadvantages
Static routing can have some potential disadvantages:
Human error: In many cases, static routes are manually configured.
This increases the potential for input mistakes. Administrators can
make mistakes and mistype in network information, or configure
incorrect routing paths by mistake.
Fault tolerance: Static routing is not fault tolerant. This means
that when there is a change in the network or a failure occurs
between two statically defined devices, traffic will not be re-
routed. As a result, the network is unusable until the failure is
repaired or the static route is manually reconfigured by an
administrator.
Administrative distance: Static routes typically take precedence
over routes configured with a dynamic routing protocol. This means
that static routes may prevent routing protocols from working as
intended. A solution is to manually modify the administrative
distance.
Administrative overhead: Static routes must be configured on
each router in the network(s). This configuration can take a long
time if there are many routers. It also means that reconfiguration
can be slow and inefficient. Dynamic routing on the other hand
automatically propagates routing changes, reducing the need for
manual reconfiguration.
Testing the Servers and Networks
1. DNS server
In this server two domain names are added along with their
IP addresses. Now with the help of dns we can just search the domain
names with their ip address.
Rjit.erp domain name is added for testing the Http/Https server
Gmail domain name is used for showing SMTP simple mail transfer
protocol
2. SMTP
SMTP stands for simple mail transfer protocol
In this server smtp is used before that two used has to be added so
that two user can communicate using emails.
Now user1 and user2 is added
User 1 being the sender and user 2 being the receiver both have their
own passwords and can log in through different devices assuming that
their network is properly designed and the pc can communicate with
servers each.
For testing this we can use ping command in the pcs of both the users
There may be delay if we try pinging for the first time in command
prompt but the second time there won’t be any losses in packets
Below this a screenshot is attached which shows that the pc1 is
communicating with the Gmail server successfully.
Now an email has to be composed from pc1 of user 1 to pc 0 to user2
which is in a different network
Now the receiver in pc 0 which is user 2 should receive the email
3. HTTP
This protocol is used whenever we browse on the internet
For this project I have created a page for showing the html protocol
RJIT.erp domain name is also created and added to the DNS server
along with its IP address.
In HTTP server we have to add a file with HTML code so that we can
design the web page
A screenshot is attached below this which show the HTML code for
RJIT.erp web page
Now we can access this page with any devices connected to this
network we can search in browser in any of the pcs in network
4. FTP
For FTP Server (File Transfer Protocol) we need to add users to
access the FTP server along with password and respective permissions
like read right delete etc.
In this Project I have created a user named kj and password cisco
Along with all the permissions.
We can use this Server to store various files. For the sake of example
I have stored the backup file of RAM of Router in India in the FTP
server.
Below this a Screenshot is attached which shows the FTP server and
the files saved in this server Backup file of Ram of Indian router is
save with the name of INDIA-confg. We can also change the name of
file if we have or to be precise if the user a have access to do that.
5. NTP server
NTP (Network Time Protocol) is a protocol used in routers if there are
multiple routers in a network NTP is used to synchronise the time and
date of those Routers.
In this project I have placed the NTP server in the USA routers
Network and adjusted the respective time
Before running the command we can check the time of the router
There is a screen shot attached below which shows the time and date
of the UK router
After Configuring the NTP server placed in USA we can sync the time
and date with the NTP server
Below screenshot is attached show the time after configuring NTP
server
6. SYSLOG server
Syslog server is to keep the logging information into the server
If there are lots of routers and network devices in the network and an
issue arises with the connection we can’t go to each network device and
check their ports i.e. syslog server is used to keep logs of anything
when the port is up or it is down which protocol is currently active etc
Below screen shot is attached which shows various logs with time
stamps in INDIAN router
7. DHCP
Dynamic host configuration protocol is used when there are multiple
pools in a network when there are multiple end devices we can’t go to
each device and assign IP manually. Hence DHCP is used in the router
of that network which automatically assigns Ip series to the pool in the
same network.
In this Project DHCP is used in UK router which is in 50.0.0.0
Network here we can only assign ip in this series
After configuring the DHCP protocol the end devices in that network
will automatically take the ip in that network
In the below Screen shot we can see that Pc3 in the UK network DHCP
is configured successfully