You are on page 1of 46

CHAPTER 1

INTRODUCTION TO COLLEGE NETWORK

1.1 Project Overview


Project highlights the interconnectivity of networking devices communicating among themselves
and connecting the hosts among themselves. It describes and shows the real time stimulation of
server-client communication. It manages the hosts by various techniques like sub-netting and
VLAN avoiding network collisions and congestions.

This College Network Scenario (CNS) is about designing a topology of a network that is a LAN
(Local Area Network) for a College in which various computers of different departments are set up
so that they can interact and communicate with each other by interchanging data. To design a
networking scenario for a college which connect various departments to each other’s, it puts
forward communication among different departments. CNS is used to design a systematic and well
planned topology, satisfying all the necessities of the college (i.e. client). CNS come up with a
network with good performance. CNS is also providing security and authentication to forbid
unauthorized logins.

1.2 Project Deliverables


Project deliver the following functionalities:
 Sub-netting
 Network Topologies
 HTTP, FTP, DNS, DHCP, SMTP services.
 LAN Switching
 IPv4 and IPv6 addressing
 Port Security
 IP Routing process
 Switching
 Voice IP

1
CHAPTER 2

TYPES OF COMMUNICATION NETWORKS

Communication Networks can be of following 5 types:

1. Local Area Network (LAN)


2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
4. Wireless
5. Inter Network (Internet)

FIGURE 2.1 : TYPES OF COMMUNICATION NETWORK

2.1 Local Area Network (LAN)

It is also called LAN and designed for small physical areas such as an office, group of
buildings or a factory. LANs are used widely as it is easy to design and to troubleshoot. Personal
computers and workstations are connected to each other through LANs. We can use different types
of topologies through LAN, these are Star, Ring, Bus, Tree etc.
LAN can be a simple network like connecting two computers, to share files and network
among each other while it can also be as complex as interconnecting an entire building.

2
LAN networks are also widely used to share resources like printers, shared hard-drive etc.

FIGURE 2.2 : A LOCAL AREA NETWORK

2.1.1 Characteristics of LAN


 LAN's are private networks, not subject to tariffs or other regulatory controls.
 LAN's operate at relatively high speed when compared to the typical WAN.
 There are different types of Media Access Control methods in a LAN, the prominent ones
are Ethernet, Token ring.
 It connects computers in a single building, block or campus, i.e. they work in a restricted
geographical area.

2.1.2 Advantages of LAN


 Resource Sharing: Computer resources like printers, modems, DVD-ROM drives and hard
disks can be shared with the help of local area networks. This reduces cost and hardware
purchases.
 Software Applications Sharing: It is cheaper to use same software over network instead of
purchasing separate licensed software for each client a network.
 Easy and Cheap Communication: Data and messages can easily be transferred over
networked computers.
 Centralized Data: The data of all network users can be saved on hard disk of the server
computer. This will help users to use any workstation in a network to access their data. Because
data is not stored on workstations locally.
3
 Data Security: Since, data is stored on server computer centrally, it will be easy to manage
data at only one place and the data will be more secure too.
 Internet Sharing: Local Area Network provides the facility to share a single internet
connection among all the LAN users. In Net Cafes, single internet connection sharing system
keeps the internet expenses cheaper.

2.1.3 Disadvantages of LAN


 High Setup Cost: Although the LAN will save cost over time due to shared computer
resources, but the initial setup costs of installing Local Area Networks is high.
 Privacy Violations: The LAN administrator has the rights to check personal data files of
each and every LAN user. Moreover he can check the internet history and computer use history
of the LAN user.
 Data Security Threat: Unauthorised users can access important data of an organization if
centralized data repository is not secured properly by the LAN administrator.
 LAN Maintenance Job: Local Area Network requires a LAN Administrator because, there
are problems of software installations or hardware failures or cable disturbances in Local Area
Network. A LAN Administrator is needed at this full time job.
 Covers Limited Area: Local Area Network covers a small area like one office, one
building or a group of nearby buildings.

2.2 Metropolitan Area Network (MAN)

It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and
uses the similar technology as LAN. It is designed to extend over the entire city. It can be means to
connecting a number of LANs into a larger network or it can be a single cable. It is mainly hold and
operated by single private company or a public company.

4
FIGURE 2.3 : A METROPOLITAN AREA NETWORK

2.2.1 Characteristics of MAN


 It generally covers towns and cities (50 km)
 Communication medium used for MAN are optical fibers, cables etc.
 Data rates adequate for distributed computing applications.

2.2.2 Advantages of MAN


 Extremely efficient and provide fast communication via high-speed carriers, such as fibre
optic cables.
 It provides a good back bone for large network and provides greater access to WANs.
 The dual bus used in MAN helps the transmission of data in both directions simultaneously.
 A MAN usually encompasses several blocks of a city or an entire city.

2.2.3 Disadvantages of MAN


 More cable required for a MAN connection from one place to another.
 It is difficult to make the system secure from hackers and industrial espionage (spying)
graphical regions.

5
2.3 Wide Area Network (WAN)
It is also called WAN. WAN can be private or it can be public leased network. It is used for
the network that covers large distance such as cover states of a country. It is not easy to design and
maintain. Communication medium used by WAN are PSTN or Satellite links. WAN operates on
low data rates.

FIGURE 2.4 : A WIDE AREA NETWORK

2.3.1 Characteristics of WAN


 It generally covers large distances (states, countries, continents).
 Communication medium used are satellite, public telephone networks which are connected
by routers.

2.3.2 Advantages of WAN


 Covers a large geographical area so long distance business can connect on the one network.
 Shares software and resources with connecting workstations.
 Messages can be sent very quickly to anyone else on the network. These messages can have
picture, sounds or data included with them (called attachments).

 Expensive things (such as printers or phone lines to the internet) can be shared by all the
computers on the network without having to buy a different peripheral for each computer.
6
 Everyone on the network can use the same data. This avoids problems where some users
may have older information than others.

2.3.3 Disadvantages of WAN


 Need a good firewall to restrict outsiders from entering and disrupting the network.
 Setting up a network can be an expensive, slow and complicated. The bigger the network
the more expensive it is.
 Once set up, maintaining a network is a full-time job which requires network supervisors
and technicians to be employed.
 Security is a real issue when many different people have the ability to use information from
other computers. Protection against hackers and viruses adds more complexity and expense.

2.5 Inter Network


Inter Network or Internet is a combination of two or more networks. Inter network can be
formed by joining two or more individual networks by means of various devices such as routers,
gateways and bridge.

FIGURE 2.6 : A INTERNETWORK

This chapter was about networking takes place, we discussed about advantages and disadvantages
of various kinds of networks. In chapter 3 we are going to discuss about reference models and its
layers.
CHAPTER 3

Reference Models in Communication Networks


7
The most important reference models are :
1. OSI reference model.
2. TCP/IP reference model.

3.1 ISO-OSI Reference Model

There are many users who use computer network and are located all over the world. To ensure
national and worldwide data communication ISO (ISO stands for International Organization of
Standardization.) developed this model. This is called a model for open system interconnection
(OSI) and is normally called as OSI model .OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete communication system. OSI Reference model is
explained in other chapter.

FIGURE 3.1 : OSI REFERENCE MODEL

3.1.1 The OSI Model - Features, Principles and Layers

There are n numbers of users who use computer network and are located over the world. So to
ensure, national and worldwide data communication, systems must be developed which are
8
compatible to communicate with each other ISO has developed a standard. ISO stands
for International organization of Standardization. This is called a model for Open System
Interconnection (OSI) and is commonly known as OSI model.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a complete
communication system. They are:

1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Datalink Layer
7. Physical Layer

Below we have the complete representation of the OSI model, showcasing all the layers and how
they communicate with each other.

FIGURE 3.2 : WORKING STRUCTURE OF OSI MODEL

9
In the table below, we have specified the protocols used and the data unit exchanged by each
layer of the OSI Model.
LAYER NAME OF PROTOCOL NAME OF UNIT EXCHANGED
Application Application protocol APDU-Application Protocol data unit .
Presentation Presentation protocol PPDU-Presentation Protocol data unit .
Session Session protocol SPDU-Session Protocol data unit.
Transport Transport protocol TPDU-Transport Protocol Data Unit.
Network Network layer –host router Packet .
protocol
Data Link Data link layer – host router Frame.
protocol
Physical Physical layer – host router Bit.
protocol

TABLE 3.1 :PROTOCOL USED IN DATA UNIT EXCHANGE

3.1.2 Feature of OSI Model

1. Big picture of communication over network is understandable through this OSI model.
2. We see how hardware and software work together.
3. We can understand new technologies as they are developed.
4. Troubleshooting is easier by separate networks.
5. Can be used to compare basic functional relationships on different networks.

3.1.3 Principles of OSI Reference Model

The OSI reference model has 7 layers. The principles that were applied to arrive at the seven
layers can be briefly summarized as follows:

1. A layer should be created where a different abstraction is needed.


2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye toward defining internationally
standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the
interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that architecture does not become
unwieldly.

10
3.2 Merits of OSI reference model
1. OSI model distinguishes well between the services, interfaces and protocols.
2. Protocols of OSI model are very well hidden.
3. Protocols can be replaced by new protocols as technology changes.
4. Supports connection oriented services as well as connectionless service.

3.3 Demerits of OSI reference model


1. Model was devised before the invention of protocols.
2. Fitting of protocols is tedious task.
3. It is just used as a reference model.

3.4 Physical Layer - OSI Reference Model

Physical layer is the lowest layer of the OSI reference model. It is responsible for sending
bits from one computer to another. This layer is not concerned with the meaning of the bits and
deals with the setup of physical connection to the network and with transmission and reception of
signals.

3.4.1 Functions of Physical Layer


Following are the various functions performed by the Physical layer of the OSI model.

1. Representation of Bits: Data in this layer consists of stream of bits. The bits must be
encoded into signals for transmission. It defines the type of encoding i.e. how 0's and 1's are
changed to signal.
2. Data Rate: This layer defines the rate of transmission which is the number of bits per
second.
3. Synchronization: It deals with the synchronization of the transmitter and receiver. The
sender and receiver are synchronized at bit level.
4. Interface: The physical layer defines the transmission interface between devices and
transmission medium.

11
5. Line Configuration: This layer connects devices with the medium: Point to Point
configuration and Multipoint configuration.
6. Topologies: Devices must be connected using the following topologies: Mesh, Star, Ring
and Bus.
7. Transmission Modes: Physical Layer defines the direction of transmission between two
devices: Simplex, Half Duplex, Full Duplex.
8. Deals with baseband and broadband transmission.

FIGURE 3.3 : PHYSICAL LAYER FUNCTIONING

3.5 Data Link Layer - OSI Model


Data link layer performs the most reliable node to node delivery of data. It forms frames
from the packets that are received from network layer and gives it to physical layer. It also
synchronizes the information which is to be transmitted over the data. Error controlling is easily
done. The encoded data are then passed to physical.
Error detection bits are used by the data link layer. It also corrects the errors. Outgoing
messages are assembled into frames. Then the system waits for the acknowledgements to be
received after the transmission. It is reliable to send message.
The main task of the data link layer is to transform a raw transmission facility into a line
that appears free of undetected transmission errors to the network layer. It accomplishes this task by
having the sender break up the input data into data frames(typically a few hundred or few thousand
bytes) and transmit the frames sequentially. If the service is reliable, the receiver confirms correct
receipt of each frame by send back an acknowledgement frame.

3.5.1 Functions of Data Link Layer

12
1. Framing: Frames are the streams of bits received from the network layer into manageable
data units. This division of stream of bits is done by Data Link Layer.
2. Physical Addressing: The Data Link layer adds a header to the frame in order to define
physical address of the sender or receiver of the frame, if the frames are to be distributed to
different systems on the network.
3. Flow Control: A flow control mechanism to avoid a fast transmitter from running a slow
receiver by buffering the extra bit is provided by flow control. This prevents traffic jam at the
receiver side.
4. Error Control: Error control is achieved by adding a trailer at the end of the frame.
Duplication of frames are also prevented by using this mechanism. Data Link Layers adds
mechanism to prevent duplication of frames.
5. Access Control: Protocols of this layer determine which of the devices has control over the
link at any given time, when two or more devices are connected to the same link.

3.6 Network Layer - OSI Model


The network Layer controls the operation of the subnet. The main aim of this layer is to
deliver packets from source to destination across multiple links (networks). If two computers
(system) are connected on the same link, then there is no need for a network layer. It routes the
signal through different channels to the other end and acts as a network controller.
It also divides the outgoing messages into packets and to assemble incoming packets into
messages for higher levels.
In broadcast networks, the routing problem is simple, so the network layer is often thin or
even non-existent.

3.6.1 Functions of Network Layer


1. It translates logical network address into physical address. Concerned with circuit, message
or packet switching.
2. Routers and gateways operate in the network layer. Mechanism is provided by Network
Layer for routing the packets to final destination.
3. Connection services are provided including network layer flow control, network layer error
control and packet sequence control.

13
4. Breaks larger packets into small packets.

FIGURE 3.5: FUNCTIONS OF NETWORK LAYER

3.7 Transport Layer - OSI Model

The basic function of the Transport layer is to accept data from the layer above, split it up
into smaller units, pass these data units to the Network layer, and ensure that all the pieces arrive
correctly at the other end.
Furthermore, all this must be done efficiently and in a way that isolates the upper layers
from the inevitable changes in the hardware technology.
The Transport layer also determines what type of service to provide to the Session layer,
and, ultimately, to the users of the network. The most popular type of transport connection is
an error-free point-to-point channel that delivers messages or bytes in the order in which they were
sent.
The Transport layer is a true end-to-end layer, all the way from the source to the destination.
In other words, a program on the source machine carries on a conversation with a similar program
on the destination machine, using the message headers and control messages.

3.7.1 Functions of Transport Layer


1. Service Point Addressing: Transport Layer header includes service point address which is
port address. This layer gets the message to the correct process on the computer unlike Network
Layer, which gets each packet to the correct computer.

14
2. Segmentation and Reassembling: A message is divided into segments; each segment
contains sequence number, which enables this layer in reassembling the message. Message is
reassembled correctly upon arrival at the destination and replaces packets which were lost in
transmission.
3. Connection Control: It includes 2 types:
 Connectionless Transport Layer : Each segment is considered as an independent
packet and delivered to the transport layer at the destination machine.
 Connection Oriented Transport Layer : Before delivering packets, connection is
made with transport layer at the destination machine.
4. Flow Control: In this layer, flow control is performed end to end.
5. Error Control: Error Control is performed end to end in this layer to ensure that the
complete message arrives at the receiving transport layer without any error. Error Correction is
done through retransmission.

FIGURE 3.6: FUNCTIONS OF TRANSPORT LAYER

3.8 Session Layer - OSI Model


The Session Layer allows users on different machines to establish active communication
sessions between them.
It's main aim is to establish, maintain and synchronize the interaction between
communicating systems. Session layer manages and synchronize the conversation between two
different applications. In Session layer, streams of data are marked and are resynchronized properly,
so that the ends of the messages are not cut prematurely and data loss is avoided.
15
3.8.1 Functions of Session Layer
1. Dialog Control : This layer allows two systems to start communication with each other in
half-duplex or full-duplex.
2. Token Management: This layer prevents two parties from attempting the same critical
operation at the same time.
3. Synchronization : This layer allows a process to add checkpoints which are considered as
synchronization points into stream of data. Example: If a system is sending a file of 800 pages,
adding checkpoints after every 50 pages is recommended. This ensures that 50 page unit is
successfully received and acknowledged. This is beneficial at the time of crash as if a crash
happens at page number 110; there is no need to retransmit 1 to100 pages.

FIGURE 3.7: FUNCTIONS OF SESSION LAYER

3.9 Presentation Layer - OSI Model

The primary goal of this layer is to take care of the syntax and semantics of the information
exchanged between two communicating systems. Presentation layer takes care that the data is sent
in such a way that the receiver will understand the information(data) and will be able to use the
data. Languages(syntax) can be different of the two communicating systems. Under this condition
presentation layer plays a role translator.
In order to make it possible for computers with different data representations to
communicate, the data structures to be exchanged can be defined in an abstract way. The
16
presentation layer manages these abstract data structures and allows higher-level data structures(eg:
banking records), to be defined and exchanged.
3.10.1 Functions of Presentation Layer

1. Translation: Before being transmitted, information in the form of characters and numbers
should be changed to bit streams. The presentation layer is responsible for interoperability
between encoding methods as different computers use different encoding methods. It translates
data between the formats the network requires and the format the computer.
2. Encryption: It carries out encryption at the transmitter and decryption at the receiver.
3. Compression: It carries out data compression to reduce the bandwidth of the data to be
transmitted. The primary role of Data compression is to reduce the number of bits to be
0transmitted. It is important in transmitting multimedia such as audio, video, text etc.

FIGURE 3.8: FUNCTIONS OF PRESENTATION LAYER

3.10 Application Layer - OSI Model


It is the top most layer of OSI Model. Manipulation of data(information) in various ways is
done in this layer which enables user or software to get access to the network. Some services
provided by this layer includes: E-Mail, transferring files, distributing the results to user, directory
services, network resources, etc.
The Application Layer contains a variety of protocols that are commonly needed by users.
One widely-used application protocol is HTTP (Hyper Text Transfer Protocol), which is the basis
for the World Wide Web. When a browser wants a web page, it sends the name of the page it wants
to the server using HTTP. The server then sends the page back.
3.10.1 Functions of Application Layer

1. Mail Services: This layer provides the basis for E-mail forwarding and storage.
2. Network Virtual Terminal: It allows a user to log on to a remote host. The application
creates software emulation of a terminal at the remote host. User's computer talks to the
software terminal which in turn talks to the host and vice versa. Then the remote host believes it
is communicating with one of its own terminals and allows user to log on.

17
3. Directory Services: This layer provides access for global information about various
services.
4. File Transfer, Access and Management (FTAM): It is a standard mechanism to access
files and manages it. Users can access files in a remote computer and manage it. They can also
retrieve files from a remote computer.

FIGURE 3.9: FUNCTIONS OF APPLICATION LAYER

In this chapter we have studied about various layers of OSI model. In next chapter we are going to
discuss about TCP/IP reference model.

CHAPTER 4

TCP/IP Reference Model


TCP/IP is transmission control protocol and internet protocol. Protocols are set of rules which
govern every possible communication over the internet. These protocols describe the movement of
data between the host computers or internet and offers simple naming and addressing schemes.

18
FIGURE 4.1 : TCP/IP REFERENCE MODEL

FIGURE 4.2 : PROTOCOLS AND NETWORKS IN TCP/IP MODEL

4.1 Overview of TCP/IP reference model


TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by
Department of Defense’s Project Research Agency (ARPA, later DARPA) as a part of a research
project of network interconnection to connect remote machines.
The features that stood out during the research, which led to making the TCP/IP reference
model were:

 Support for a flexible architecture. Adding more machines to a network was easy.
 The network was robust, and connections remained intact untill the source and destination
machines were functioning.

19
The overall idea was to allow one application on one computer to talk to(send data
packets) another application running on different computer.

4.2 Different Layers of TCP/IP Reference Model


Below we have discussed the 4 layers that form the TCP/IP reference model:

4.2.1 Layer 1: Host-to-network Layer


1. Lowest layer of the all.
2. Protocol is used to connect to the host, so that the packets can be sent over it.
3. Varies from host to host and network to network.

4.2.2 Layer 2: Internet layer


1. Selection of a packet switching network which is based on a connectionless internetwork
layer is called a internet layer.
2. It is the layer which holds the whole architecture together.
3. It helps the packet to travel independently to the destination.
4. Order in which packets are received is different from the way they are sent.
5. IP (Internet Protocol) is used in this layer.
6. The various functions performed by the Internet Layer are:
o Delivering IP packets
o Performing routing
o Avoiding congestion

4.2.3 Layer 3: Transport Layer


1. It decides if data transmission should be on parallel path or single path.
2. Functions such as multiplexing, segmenting or splitting on the data is done by transport
layer.
3. The applications can read and write to the transport layer.
4. Transport layer adds header information to the data.
5. Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
6. Transport layer also arrange the packets to be sent, in sequence.
20
4.2.4 Layer 4: Application Layer
The TCP/IP specifications described a lot of applications that were at the top of the protocol stack.
Some of them were TELNET, FTP, SMTP, DNS etc.

1. TELNET is a two-way communication protocol which allows connecting to a remote


machine and run applications on it.
2. FTP (File Transfer Protocol) is a protocol, that allows File transfer amongst computer users
connected over a network. It is reliable, simple and efficient.
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to transport electronic
mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for Hosts
connected over a network.
5. It allows peer entities to carry conversation.
6. It defines two end-to-end protocols: TCP and UDP

 TCP (Transmission Control Protocol): It is a reliable connection-oriented protocol


which handles byte-stream from source to destination without error and flow control.
 UDP (User-Datagram Protocol): It is an unreliable connection-less protocol that do
not want TCPs, sequencing and flow control. Eg: One-shot request-reply kind of
service.

4.3 Merits of TCP/IP model


1. It operated independently.
2. It is scalable.
3. Client/server architecture.
4. Supports a number of routing protocols.
5. Can be used to establish a connection between two computers.

4.4 Demerits of TCP/IP


1. In this, the transport layer does not guarantee delivery of packets.
2. The model cannot be used in any other application.

21
3. Replacing protocol is not easy.
4. It has not clearly separated its services, interfaces and protocols.

In next chapter we are going to discuss about the hardware used in an enterprise network like
Routers, Hub, Switches, Cables VoIP.

This chapter make us aware about TCP/IP model and further we in next chapter all the
hardwares used in our project has been used.

CHAPTER 5

HARDWARE DESCRIPTION

5.1 ROUTER

Router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. A data packet is
typically forwarded from one router to another router through the networks that constitute
an internetwork until it reaches its destination node.
22
A router is connected to two or more data lines from different networks. When a data packet
comes in on one of the lines, the router reads the network address information in the packet to
determine the ultimate destination. Then, using information in its routing table or routing policy,
it directs the packet to the next network on its journey.
The most familiar type of routers are home and small office routers that simply forward IP
packets between the home computers and the Internet. An example of a router would be the
owner's cable or DSL router, which connects to the Internet through an Internet service
provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or
ISP networks up to the powerful core routers that forward data at high speed along the optical
fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices,
software-based routers also exist.

Fig : Router

5.2 Switch

A network switch (also called switching hub, bridging hub, officially MAC bridge) is
a computer networking device that connects devices together on a computer network by
using packet switching to receive, process, and forward data to the destination device.
A network switch is a multiport network bridge that uses hardware addresses to process and
forward data at the data link layer (layer 2) of the OSI model. Some switches can also process data
at the network layer (layer 3) by additionally incorporating routing functionality. Such switches are
commonly known as layer-3 switches or multilayer switches.
Switches for Ethernet are the most common form of network switch. The first Ethernet
switch was introduced by Kalpana in 1990. Switches also exist for other types of networks
including Fibre Channel, Asynchronous Transfer Mode, and Infini Band.
Unlike less advanced repeater hubs, which broadcast the same data out of each of its ports
and let the devices decide what
data they need, a network switch
forwards data only to the devices
that need to receive it.

23
FIGURE 5.3 : SWITCH

A switch is a device in a computer network that connects together other devices. Multiple
data cables are plugged into a switch to enable communication between different networked
devices. Switches manage the flow of data across a network by transmitting a received network
packet only to the one or more devices for which the packet is intended. Each networked device
connected to a switch can be identified by its network address, allowing the switch to direct the
flow of traffic maximizing the security and efficiency of the network.
A switch is more intelligent than an Ethernet hub, which simply retransmits packets out of
every port of the hub except the port on which the packet was received, unable to distinguish
different recipients, and achieving an overall lower network efficiency.
An Ethernet switch operates at the data link layer (layer 2) of the OSI model to create a
separate collision domain for each switch port. Each device connected to a switch port can transfer
data to any of the other ports at any time and the transmissions will not
interfere. Because broadcasts are still being forwarded to all connected devices by the switch, the
newly formed network segment continues to be a broadcast domain. Switches may also operate at
higher layers of the OSI model, including the network layer and above. A device that also operates
at these higher layers is known as a multilayer switch.
Segmentation involves the use of a switch to split a larger collision domain into smaller
ones in order to reduce collision probability, and to improve overall network throughput. In the
extreme case (i.e. micro-segmentation), each device is located on a dedicated switch port. In
contrast to an Ethernet hub, there is a separate collision domain on each of the switch ports. This
allows computers to have dedicated bandwidth on point-to-point connections to the network and
also to run in full-duplex mode. Full-duplex mode has only one transmitter and one receiver per
collision domain, making collisions impossible.
The network switch plays an integral role in most modern Ethernet local area
networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small
office/home office (SOHO) applications typically use a single switch, or an all-purpose device such
as a residential gateway to access small office/home broadband services such as DSL or cable
Internet. In most of these cases, the end-user device contains a router and components that interface
to the particular physical broadband technology. User devices may also include a telephone
interface for Voice over IP (VoIP).
5.2.1 Role of switches in networking
Switches are most commonly used as the network connection point for hosts at the edge of a
network. In the hierarchical internetworking model and similar network architectures, switches are
also used deeper in the network to provide connections between the switches at the edge.
24
In switches intended for commercial use, built-in or modular interfaces make it possible to
connect different types of networks, including Ethernet, Fibre Channel, RapidIO, ATM, ITU-
T G.hn and 802.11. This connectivity can be at any of the layers mentioned. While the layer-2
functionality is adequate for bandwidth-shifting within one technology, interconnecting
technologies such as Ethernet and token ring is performed more easily at layer 3 or via routing.
[6]
Devices that interconnect at the layer 3 are traditionally called routers, so layer 3 switches can
also be regarded as relatively primitive and specialized routers.[7]
Where there is a need for a great deal of analysis of network performance and security,
switches may be connected between WAN routers as places for analytic modules. Some vendors
provide firewall, network intrusion detection, and performance analysis modules that can plug into
switch ports. Some of these functions may be on combined modules.
Through port mirroring, a switch can create a mirror image of data that can go to an external
device such as intrusion detection systems and packet sniffers.
A modern switch may implement power over Ethernet (PoE), which avoids the need for
attached devices, such as a VoIP phone or wireless access point, to have a separate power supply.
Since switches can have redundant power circuits connected to uninterruptible power supplies, the
connected device can continue operating even when regular office power fails.
5.2.2 Layers

Modern commercial switches use primarily Ethernet interfaces. The core function of an
Ethernet switch is to provide a multiport layer 2 bridging function. Many switches also perform
operations at other layers. A device capable of more than bridging is known as a multilayer switch.
Switches may learn about topologies at many layers and forward at one or more layers.
5.2.2.1 Layer 1
In contrast to a switch that operates at layer 2, an Ethernet hub is a simple layer 1 network
device that does not manage any of the traffic coming through it. Any packet entering a port is
repeated to the output of every other port except for the port of entry. Specifically, each bit or
symbol is repeated as it flows in. A repeater hub can therefore only receive and forward at a single
speed.[] Since every packet is repeated on every other port, packet collisions affect the entire
network, limiting its overall capacity.
By the early 2000s, there was little price difference between a hub and a low-end
switch. Hubs remained useful for a time for specialized applications, such supplying a copy of
network traffic to a packet analyzer. A network tap may also be used for this purpose and many
network switches now have a port mirroring feature that provides the same functionality.

5.2.2.2 Layer 2
A switch operating as a network bridge may interconnect devices in a home or office. The
bridge learns the MAC address of each connected device. Bridges also buffer an incoming packet
and adapt the transmission speed to that of the outgoing port. While there are specialized
applications, such as storage area networks, where the input and output interfaces are the same
bandwidth, this is not always the case in general LAN applications. In LANs, a switch used for end
user access typically concentrates lower bandwidth and uplinks into a higher bandwidth.
Interconnect between switches may be regulated using spanning tree protocol (STP) that
disables links so that the resulting local area network is a tree without loops. In contrast to routers,
25
spanning tree bridges must have topologies with only one active path between two points. Shortest
path bridging is a layer 2 alternative to STP allows all paths to be active with multiple equal cost
paths.
5.2.2.3 Layer 3
A layer-3 switch can perform some or all of the functions normally performed by a router.
Most network switches, however, are limited to supporting a single type of physical network,
typically Ethernet, whereas a router may support different kinds of physical networks on different
ports.
A common layer-3 capability is awareness of IP multicast through IGMP snooping. With
this awareness, a layer-3 switch can increase efficiency by delivering the traffic of a multicast
group only to ports where the attached device has signalled that it wants to listen to that group.
Layer-3 switches typically support IP routing between VLANs configured on the switch.
Some layer-3 switches support the routing protocols that routers use to exchange information about
routes between networks.
5.2.2.4 Layer 4
While the exact meaning of the term layer-4 switch is vendor-dependent, it almost always
starts with a capability for network address translation, but then adds some type of load
distribution based on TCP sessions.
The device may include a stateful firewall, a VPN concentrator, or be an IPSec security gateway.

5.2.2.5 Layer 7
Layer-7 switches may distribute the load based on uniform resource locators (URLs), or by
using some installation-specific technique to recognize application-level transactions. A layer-7
switch may include a web cache and participate in a content delivery network (CDN).

5.3 CABLES

Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some cases, a
network will utilize only one type of cable, other networks will use a variety of cable types. The
type of cable chosen for a network is related to the network's topology, protocol, and size.
Understanding the characteristics of different types of cable and how they relate to other aspects of
a network is necessary for the development of a successful network.

The following sections discuss the types of cables used in networks and other related topics.

 Unshielded Twisted Pair (UTP) Cable


 Shielded Twisted Pair (STP) Cable
 Coaxial Cable
 Fiber Optic Cable
 Cable Installation Guides
 Wireless LANs
 Unshielded Twisted Pair (UTP) Cable
26
5.3.1 Unshielded Twisted Pair (UTP) Cable : Twisted pair cabling comes in two
varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is
generally the best option for school networks.

FIGURE 5.5 : UTP CABLE

The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists
per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter
the twisting, the higher the supported transmission rate and the greater the cost per foot . The
EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has
established standards of UTP and rated six categories of wire (additional categories are emerging).

5.3.1.1 Categories of Unshielded Twisted Pair

Category Speed Use

1 1 Mbps Voice Only (Telephone Wire)

2 4 Mbps Local Talk & Telephone (Rarely used)

3 16 Mbps 10BaseT Ethernet

4 20 Mbps Token Ring (Rarely used)

100 Mbps (2 pair) 100BaseT Ethernet


5
1000 Mbps (4 pair) Gigabit Ethernet

5e 1,000 Mbps Gigabit Ethernet

6 10,000 Mbps Gigabit Ethernet

TABLE 5.1 : Categories of Unshielded Twisted Pair

5.3.1.2 Unshielded Twisted Pair Connector

The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be
27
inserted only one way. RJ stands for Registered Jack, implying that the connector follows a
standard borrowed from the telephone industry. This standard designates which wire goes with each
pin inside the connector.

FIGURE 5.6 : A RJ-45 CONNECTOR

5.3.2 Shielded Twisted Pair (STP) Cable

Although UTP cable is the least expensive cable, it may be susceptible to radio and
electrical frequency interference (it should not be too close to electric motors, fluorescent lights,
etc.). If you must place cable in environments with lots of potential interference, or if you must
place cable in extremely sensitive environments that may be susceptible to the electrical current in
the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the
maximum distance of the cables.

Shielded twisted pair cable is available in three different configurations:

1. Each pair of wires is individually shielded with foil.


2. There is a foil or braid shield inside the jacket covering all wires (as a group).
3. There is a shield around each individual pair, as well as around the entire group of wires
(referred to as double shield twisted pair).

5.3.3 Coaxial Cable

Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield. The metal shield helps to block
any outside interference from fluorescent lights, motors, and other computers.

FIGURE 5.7: A COAXIAL CABLE

28
Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In
addition, it can support greater cable lengths between network devices than twisted pair cable. The
two types of coaxial cabling are thick coaxial and thin coaxial.

Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin
coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length
being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable has
been popular in school networks, especially linear bus networks.

Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for
thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being
500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away
from the center conductor. This makes thick coaxial a great choice when running longer lengths in a
linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult
to install.

5.3.3.1 Coaxial Cable Connectors

The most common type of connector used with coaxial cables is the Bayone-Neill-
Concelman (BNC) connector . Different types of adapters are available for BNC connectors,
including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest
points in any network. To help avoid problems with your network, always use the BNC connectors
that crimp, rather screw, onto the cable.

FIGURE 5.8 : A BNC CONNECTOR

5.3.4 Fiber Optic Cable

Fiber optic cabling consists of a center glass core surrounded by several layers of protective
materials. it transmits light rather than electronic signals eliminating the problem of electrical
interference. This makes it ideal for certain environments that contain a large amount of electrical
interference. It has also made it the standard for connecting networks between buildings, due to its
immunity to the effects of moisture and lighting.

Fiber optic cable has the ability to transmit signals over much longer distances than coaxial
and twisted pair. It also has the capability to carry information at vastly greater speeds. This
capacity broadens communication possibilities to include services such as video conferencing and
interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is
more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable
carrying Ethernet signals.

29
The center core of fiber cables is made from glass or plastic fibers .A plastic coating then
cushions the fiber center, and kevlar fibers help to strengthen the cables and prevent breakage. The
outer insulating jacket made of teflon or PVC.

FIGURE 5.9 : A FIBRE OPTIC CABLE

There are two common types of fiber cables -- single mode and multimode. Multimode cable has a
larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can
provide more distance, but it is more expensive.

Specification Cable Type

10BaseT Unshielded Twisted Pair

10Base2 Thin Coaxial

10Base5 Thick Coaxial

100BaseT Unshielded Twisted Pair

100BaseFX Fiber Optic

100BaseBX Single mode Fiber

100BaseSX Multimode Fiber

1000BaseT Unshielded Twisted Pair

1000BaseFX Fiber Optic

1000BaseBX Single mode Fiber

1000BaseSX Multimode Fiber


TABLE 5.2 : CABLE SPECIFICATION BY ITS TYPE

5.4 VoIP (Voice Over Internet Protocol)


Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and
group of technologies for the delivery of voice communications and multimedia sessions
over Internet Protocol (IP) networks, such as the Internet. The terms Internet
telephony, broadband telephony, and broadband phone service specifically refer to the
provisioning of communications services (voice, fax, SMS, voice-messaging) over the public
Internet, rather than via the public switched telephone network (PSTN).

30
The steps and principles involved in originating VoIP telephone calls are similar to
traditional digital telephony and involve signalling , channel setup, digitization of the analog voice
signals, and encoding. Instead of being transmitted over a circuit-switched network, the digital
information is packetized, and transmission occurs as IP packets over a packet-switched network.
They transport media streams using special media delivery protocols that encode audio and video
with audio codecs, and video codecs. Various codecs exist that optimize the media stream based on
application requirements and network bandwidth; some implementations rely
on narrowband and compressed speech, while others support high-fidelity stereo codecs.
Early providers of voice-over-IP services offered business models and technical solutions
that mirrored the architecture of the legacy telephone network. Second-generation providers, such
as Skype, built closed networks for private user bases, offering the benefit of free calls and
convenience while potentially charging for access to other communication networks, such as the
PSTN. This limited the freedom of users to mix-and-match third-party hardware and software.
Third-generation providers, such as Google Talk, adopted the concept of federated VoIP—which is
a departure from the architecture of the legacy networks. [1] These solutions typically allow dynamic
interconnection between users on any two domains on the Internet when a user wishes to place a
call.

FIGURE 5.10 An IP PHONE

This chapter was describing about hardware and in upcoming chapter we are going to have
knowledge about Ethernet.

31
CHAPTER 6

ETHERNET
Ethernet is a family of computer networking technologies commonly used in local area
networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was
commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3and has since been
refined to support higher bit rates and longer link distances. Over time, Ethernet has largely
replaced competing wired LAN technologies such as Token Ring, FDDI and ARCNET.
The original 10BASE5 Ethernet uses coaxial cable as a shared medium, while the newer
Ethernet variants use twisted pair and fiber optic links in conjunction with hubs or switches. Over
the course of its history, Ethernet data transfer rates have been increased from the original
2.94 megabits per second (Mbit/s) to the latest 400 gigabits per second (bit/s). The Ethernet
standards comprise several wiring and signalling variants of the OSI physical layer in use with
Ethernet.

Next we are going to discuss about the Packet Tracer over which one works to implement
this project.

CHAPTER 7

PACKET TRACER

32
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that
allows users to create network topologies and imitate modern computer networks. The software
allows users to simulate the configuration of Cisco routers and switches using a simulated
command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users
to add and remove simulated network devices as they see fit. The software is mainly focused
towards Certified Cisco Network Associate Academy students as an educational tool for helping
them learn fundamental CCNA concepts. Previously students enrolled in a CCNA Academy
program could freely download and use the tool free of charge for educational use. Since August
2017 with version 7.1 is free to everyone.
Packet Tracer can be run on iOS, Linux and Microsoft Windows. A
similar Android and iOS apps are also available. Packet Tracer allows users to create simulated
network topologies by dragging and dropping routers, switches and various other types of network
devices. A physical connection between devices is represented by a "cable" item. Packet Tracer
supports an array of simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP, BGP, to the extents required by the current CCNA curriculum. As of
version 5.3, Packet Tracer also supports the Border Gateway Protocol.
In addition to simulating certain aspects of computer networks, Packet Tracer can also be
used for collaboration. As of Packet Tracer 5.0, Packet Tracer supports a multi-user system that
enables multiple users to connect multiple topologies together over a computer network. Packet
Tracer also allows instructors to create activities that students have to complete. Packet Tracer is
often used in educational settings as a learning aid. Cisco Systems claims that Packet Tracer is
useful for network experimentation.

FIGURE 7.1 : CISCO PACKET TRACER STUDENT VERSION

Further in chapter 8 ,Design and Simulation has been discussed that is how the projects work upon
the Cisco Packet Tracer.
CHAPTER 8

PROJECT MODULES
The project is to design a proposal for setting up in an airport There are 3 department .
1. Airport authority
2. Flight service provider
33
3. Guest department

8.1 Airport authority


The airport authority maintains a server which handles the flight management control.This is main
module of our project which is maintain all the activities of airport network. This module can b e
communicate with other module by SMTP,DHCP ,DNS protocols of project except guest
department.

FIGURE 8.1.1

8.2 Flight service provider

FIGURE 8.2.1
8.3 Departments and Labs

34
There are various department are present in the CNS like Computer science department,
Mechanical Department, Civil Department, Electrical Department etc. In this module Head of
department and professors are connected with each other and maintain the activities of department
and labs only.Labs module is used to maintain the all pc’s to ping with each other and provide all
facilities to student.

FIGURE 8.3.1

8.4 Voice Internet Protocol room

This room is maintain all the calls of IP phones only three modules are connected with them i.e;
Network administration , Reception and Director’s office.

FIGURE 8.4.1

35
FIGURE- Main Structure of CNS

CHAPTER 9

PROJECT DESCRIPTION

9.1 DHCP (Dynamic host control protocol)


In networks with a large numbers of hosts, statically assigning IP address and other IP information
quickly becomes impractical. DHCP provides administrators with a mechanism to dynamically
allocate IP address, rather than manually setting the address on each device. DHCP servers lease
out IP address to DHCP clients, for a specific period of time. DHCP provide default gateway, DNS
server and domain name.

9.1.1 Configuring a Cisco Router as a DHCP server

36
Cisco routers can be configured to function as DHCP servers. The first step is to create a DHCP
pool
Router(config)# ip dhcp pool mypool
Router(dhcp-config)# network 192.168.1.0 255.0.0.0

The first command creates a dhcp pool named mypool. The second command can create our DHCP
scope, indicating the range of address to be leased. The above command indicates any address
between 192.168.1.1-192.168.1.255 can be leased.

9.1.2 Project Snapshot


In our project all pc’s are connected with DHCP server

FIGURE 9.1.1

37
FIGURE 9.1.2 FIGURE 9.1.3

9.2 SMTP Protocol (Simple mail transfer protocol)


SMTP is part of the application layer of the TCP/IP protocol. Using a process called "store and
forward," SMTP moves your email on and across networks. It works closely with something called
the Mail Transfer Agent (MTA) to send your communication to the right computer and email
inbox SMTP is part of the application layer of the TCP/IP protocol. Using a process called "store
and forward," SMTP moves your email on and across networks. It works closely with something
called the Mail Transfer Agent (MTA) to send your communication to the right computer and
email inbox SMTP is part of the application layer of the TCP/IP protocol. Using a process called
"store and forward," SMTP moves your email on and across networks. It works closely with
something called the Mail Transfer Agent (MTA) to send your communication to the right
computer and email inbox.

FIGURE 9.2.1
38
9.2.1 Snapshot of our project
we connect the Network administration, Reception, Director office, Head of Department and
Professor by SMTP server for sending mail.

FIGURE 9.2.2

FIGURE 9.2.3

FIGURE 9.2.4

39
FIGURE 9.2.5
In fig 8.2.2 show how to given IP address to all pc’s in CNS for apply SMTP server and fig 8.2.3,
fig 8.2.4 and fig 8.2.5 show the sending and receiving of the mail from one PC to another PC by
using username and password of individual PC’s.

9.3 VoIP (Voice Over Internet Protocol)


Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group
of technologies for the delivery of voice communications and multimedia sessions over Internet
Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony,
and broadband phone service specifically refer to the provisioning of communications services
(voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched
telephone network (PSTN)

FIGURE 9.3.1

40
9.3.1 Snapshot of VoIP

FIGURE 9.3.1

FIGURE 9.3.2 FIGURE 9.3.3

Fig 9.3.2 and Fig 9.3.3 show the configuration of VoIP on router in this we add the IP address,
make DHCP pool for IP phones and enable the telephony service for phones and assign the number
to IP-phone.

41
FIGURE 9.3.4 FIGURE 9.3.5

FIGURE 9.3.6

FIGURE 9.3.7

42
In Fig 9.3.4 show configuration of switch which enable the Switchport access and Vlan. In fig 9.3.5
show how the cable is connected physically with IP phone. In fig 9.3.6 show the connection of two
different IP phone with each other after dialing a number of another phone and receiving. In fig
9.3.7 both IP phones are connected with each other.

9.4 Security on device


Using passwords and assigning privilege levels is a simple way of providing terminal access
control in your network.
Apply password on router and switch (User access password)
Line console 0
R1(config-line)# password abhi123
R1(config-line)# login
To protect this mode we can apply two types of password plaintext password and encrypted
password ( User privilege password)
Router(config)# enable secret password ash123

9.4.1 Snapshot of project

FIGURE 9.4.1 FIGURE 9.4.2

FIG 9.4.3
In above figures we show the configuration of password on router and rest all routers have same
configuration but different IP address
43
9.5 Configured IP address on routers interface for PC’s

R# config t
R(config)# int f0/0
R(config-if)# add 10.0.0.1 255.255.255.0
R(config-if)# no shut

FIGURE 9.5.1
9.6 PING
Ping is perhaps the most commonly used tool to troubleshoot a network. Ping (Packet Internet
Groper) is included with most operating systems. It is invoked using a ping command and
uses ICMP (Internet Control Message Protocol) to reports errors and provides information related
to IP packet processing. Ping works by sending an ICMP echo request message to the specified IP
address. If the computer with the destination IP address is reachable, it responds with an ICMP
echo reply message.

A ping command usually outputs some other information about a network performance, e.g. a
round-trip time, a time to send an ICMP request packet and receive an ICMP reply packet.

44
FIGURE 9.5.1

FIGURE 9.5.2
In the example above we have pinged the IP address 10.10.100.1. By default, ping on Windows
sends four ICMP request packets. As you can see from the output above, the host with the IP
address of 10.10.100.1 is reachable and has replied with four ICMP reply packets. You can also see
that the remote host has replied within 1 ms (time<1ms), which indicates that the network is not
congested.

45
CONCLUSION

The process of designing a good network requires concerted efforts by network designers and
technicians, who identify network requirements and select the best solutions to meet the needs of a
business. The four fundamental technical requirements of network design are scalability,
availability, security, and Manageability. Our Purpose is to just design an College network only for
software based not practically. The main Purpose of this paper is:

 College network design overview.


 The benefits of College network.

46

You might also like