introduction onwards

Upload: prafulramesh89

Post on 08-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 Introduction onwards

    1/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    INTRODUCTION

    Internet Protocol (IP) is used throughout the public Internet and has become the mostimportant routed protocol to the majority of Internet applications today. Our objective is to

    design and implement an IP based data network that securely support IP Data traffic by

    properly designing the IP address Pool and network mask using the concept of VLSM.

    VLSM increases the efficiency of the network as well as it helps in the optimum

    utilization of IP address resources. VLSM is a process of dividing a single network in to

    different smaller networks as per the requirement of the System Administrator for reducing

    IPV4 address wastage and also helps in the effective routing process.

    This project is intended to design a VLSM based Data Network and through this

    network implementation, an organization, whose branches are located at remotely different

    locations, can view as well as transfer information and data rather than maintaining physical

    documents in a cost effective manner.

    The Internet is composed of many routers that interconnect different networks. Each

    router interface must be on a unique network and must have a unique address. Assigning

    different IP addresses to different networks is required because of the IP addressing scheme

    required by routers. Subnetting and VLSMs are two ways of dividing an assigned network

    address into multiple, smaller networks for use within an organization. In our project we used

    these techniques to save the address space.

    Subnetting creates subnets with equal number of hosts,in a network. The number of

    bits subnetted i.e,the length of subnet mask will be same for all the subnets. A network of

    single subnet mask locked the organization into a fixed number of fixed sized subnets. This

    method of achieving subnetting,with variable length of subnet mask,is known as Variable

    Length Subnet Mask.Subnets of different Subnets of different size can exist within a Class

    Based Network ID. Different Sized Subnets are needed to minimize the wasting of IP

    addresses. The creation and deployment of various sized subnets of a Network ID is known as

    Variable Length Subnetting and uses Variable Length Subnet Masks.

    DATA COMMUNICATION 1 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    2/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    RFC 1009 specified how a subnetted network could use more than one subnet mask.

    When an IP network is assigned more than one subnet mask, it is considered a network with

    "Variable Length Subnet Masks" since the extended-network-prefixes have different lengths.

    VLSM permits more efficient use of an organization's assigned IP address space and permit

    route aggregation which can significantly reduce the amount of routing information at the

    "backbone" level within an organization's routing domain. Modern routing protocols OSPF,I-

    IS-IS,RIP-2 supports VLSM.

    DATA COMMUNICATION 2 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    3/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    SUBNETTING

    IP networks can be divided into smaller networks or subnets. Subnets are under local

    administration. RFC 950 defined a standard procedure to support the subnetting, or

    division, of a single Class A, B, or C network number into smaller pieces

    Subnetting is

    to overcome the limitations of the classful two-level addressing hierarchy

    to create smaller broadcast domains

    for better utilization of the bits in the Host ID

    to reduce the total number of network numbers that are assigned.

    to reduce the size of the Routing table and the performance of the routing

    will be more efficient. Hence Subnetting reduces the routing requirements of the

    Internet

    Subnetting - How?

    Subnetting is done by adding another level of hierarchy to the IP addressing structure.

    Subnetting supports a three-level hierarchy.

    By dividing the standard classful host-ID field into two parts -

    - subnet-ID

    - host-ID on that subnet

    Subnet ID

    A subnet ID is created by borrowing bits from the host field and designating them as

    the subnet field.

    DATA COMMUNICATION 3 RTTC

    TRIVANDRUM

    NETWORK ID HOST ID

    NETWORK ID SUBNETID

    LINK-3

  • 8/7/2019 Introduction onwards

    4/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    The Number of borrowed bits varies and is specified by subnet mask.

    Subnet MASK

    Subnet Mask is defined as a 32-bit value which is used to distinguish the Network ID

    from the Host ID in an arbitrary IP address

    The bits of the subnet mask are defined as

    All bits that correspond to Network ID and subnet ID are set to 1.

    All bits that correspond to Host ID are reset to 0.

    Sample subnet mask for class B address - (8 bit subnetting)

    Subnet mask is required to extract a Network ID and Subnet ID for a subnetted network.

    Types of Subnet Mask

    1. Default Subnet Masks

    It is used when using Class based Network Ids. (that is - when a network is not

    divided into subnets.)

    2. Custom Subnet Masks

    It is used when a network is actually divided into networks.

    Network Prefix length Representation of Subnet Mask.

    A shorthand way of expressing a subnetmask is to denote the number of bits that

    define the network ID and subnet Id as a network prefix using the notation /

    Default Subnet mask using network prefix notation

    Class A 11111111 00000000 00000000 00000000

    DATA COMMUNICATION 4 RTTC

    TRIVANDRUM

    Network Network Subnet Host

    1111111111111111111111111111111

    111111111 00000000

    Binary

    Representation

    Dotted decimal

    Representation

    255 . 255 . 255. 0

  • 8/7/2019 Introduction onwards

    5/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Class B 11111111 11111111 00000000 00000000

    Class C 11111111 11111111 11111111 00000000

    Class A /8

    Class B /16

    Class C /24

    5.4.4 Example

    1. Class B network 138.96.0.0 with subnet mask 255.255.0.0 is expressed as

    138.96.0.0/16

    Extended Network Prefix

    Internet routers use only the network-prefix of the destination address to route traffic to

    a subnetted environment.

    Routers within the subnetted environment use the extended-network- prefix to route

    traffic between the individual subnets.

    The extended-network-prefix is composed of the classful network-prefix and the

    subnet-number.

    Extended-network-prefix-length

    The standards describing modern routing protocols often refer to the extended-

    network-prefix- length rather than the subnet mask.

    The prefix length is equal to the number of contiguous one-bits in the traditional subnet

    mask.

    DATA COMMUNICATION 5 RTTC

    TRIVANDRUM

    NETWORK HOST

    32 bits

    SUBNET

    Extended Network Prefix

  • 8/7/2019 Introduction onwards

    6/75

  • 8/7/2019 Introduction onwards

    7/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    255.255.252.0 yields additional 64 subnets with 1024 hosts per subnet. If you need 1028

    subnets with some as large as 1000 hosts and some as small as 64 hosts you are out of luck.

    Similar to the IP space separation into A,B, and C classes VLSM permits organization to

    use subnets with different number of hosts.

    RFC 950 specified how an IP network could use multiple subnet masks. The key

    idea here is similar to idea of class A,B,and C network recursively applied to host part of

    the address. Variable-Length Subnet Masking (VLSM) is the same concept as CIDR, but

    the term is now obsolite. Because the old class distinctions are ignored, the new system

    was called classless routing. This led to the original system being called, classful routing.

    When an IP network is assigned more than one subnet mask, it is considered a

    network with VLSMs because the extended-network numbers have different lengths at

    each subnet level. To provide the address mask information the ICMP protocol was

    extended by adding a new pair of ICMP message types, "Address Mask Request" and

    "Address Mask Reply", analogous to the "Information Request" and "Information Reply"

    ICMP messages (type 17 and 18 messages).

    In key idea was that netmask becomes the part that is nessesary for the

    interpretation of the address and can be specified by the number of the bit in network part

    of the address, for example 10.10.10.10/24 mean C class network (24-bit network part of

    of the address and 8-bit host part of the address)Two of the main advantages to assign more than one subnet mask to a given IP network

    number are:

    Multiple subnet masks permit more efficient use of an organizations assigned IP address

    space.

    Multiple subnet masks permit route aggregation, which can significantly reduce the amount

    of routing information at the backbone level within an organizations routing domain.

    An example of a VLSM entry is:

    12.0.0.0 255.255.0.0

    12.3.0.0 255.255.255.0

    12.3.254.0 255.255.255.224

    VLSM subnet masks syntax has been recognized since the Solaris 2.6 OE.

    DATA COMMUNICATION 7 RTTC

    TRIVANDRUM

    http://www.faqs.org/rfcs/rfc950.htmlhttp://www.faqs.org/rfcs/rfc950.html
  • 8/7/2019 Introduction onwards

    8/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    CIDR

    VLSM Subnetting, documented in RFC 950, originally referred to the subdivision of a

    class-based network into subnetworks, but it was generalized for the subdivision of the

    whole IP addess space into more flexible CIDR blocks instead of fixed A,B and C

    networks. Classless Inter-Domain Routing (CIDR, pronounced "cider" or "cedar") was

    introduced in 1993 and is the latest refinement to the way IP addresses are interpreted. It

    replaced the previous generation of IP address syntax; classful networks. It allowed

    increased flexibility when dividing ranges of IP addresses into separate networks and

    thereby promoted:

    More efficient use of increasingly scarce IPv4 addresses.

    Greater use of hierarchy in address assignments (prefix aggregation), lowering the

    overhead of the Internet-wide routing (routes aggregation)

    CIDR allows single routing entries to refer either to the larger block or to its individual

    constituents. This permits a single, general routing entry to be used through most of the

    Internet, more specific routes only being required for routers in the subnetted block.

    A subnet mask is a 32-bit number that determines how an IP address is split into

    network and host portions, on a bitwise basis. For example, 255.255.0.0 is a standard class

    B subnet mask, since the first two bytes are all ones (network), and the last two bytes are

    all zeros (host). In a subnetted network, the network portion is extended. For example, a

    subnet mask of 255.255.255.0 would subnet a class B address space using its third byte.

    Using this scheme, the first two bytes of an IP address would identify the class B network,

    the next byte would identify the subnet within that network, and the final byte would select

    an individual host. Since subnet masks are used on a bit-by-bit basis, masks like

    255.255.240.0 (4 bits of subnet; 12 bits of host) are perfectly normal.

    In a traditional subnetted network, several restrictions apply, which have been lifted by

    CIDR. However, if older, non-CIDR routing protocols (such as RIP version 1) are in use,

    these restrictions must still be observed.

    1. Identical subnet masks. Since non-CIDR routing updates do not include subnet masks, a

    router must assume that the subnet mask it has been configured with is valid for all

    DATA COMMUNICATION 8 RTTC

    TRIVANDRUM

    http://www.freesoft.org/CIE/RFC/950/index.htmhttp://www.freesoft.org/CIE/RFC/950/index.htm
  • 8/7/2019 Introduction onwards

    9/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    subnets. Therefore, a single mask must be used for all subnets with a network. Different

    masks can be used for different networks.

    Based on this assumption, a router can exchange subnet routes with other routers

    within the network. Since the subnet masks are identical across the network, the

    routers will interpret these routes in the same manner. However, routers not

    attached to the subnetted network can't interpret these subnet routes, since they lack

    the subnet mask. Therefore, subnet routes are not relayed to routers on other

    networks. This leads to our second restriction.

    2. Contiguous subnets. A subnetted network can't be split into isolated portions. All the

    subnets must be contiguous, since routing information can't be passed to non-members.

    Within a network, all subnets must be able to reach all other subnets without passing traffic

    through other networks.

    The Internet is composed of many routers that interconnect different networks. Each

    router interface must be on a unique network and must have a unique address. Assigning

    different IP addresses to different networks is required because of the IP addressing

    scheme required by routers. Subnetting and VLSMs are two ways of dividing an assigned

    network address into multiple, smaller networks for use within an organization. These

    smaller networks are referred to as subnetworks. VLSM, conceptually a stepping stone

    from subnetting to CIDR, lifted the restrictions of subnetting by relaying subnet

    information through routing protocols

    DATA COMMUNICATION 9 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    10/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    IP Routing and Routing Protocols.

    Routing is the process of sending packets through a network, such as the

    Internet. Routing does the following tasks:

    a. Defining paths for the transmission of packets through an inter network.

    b. Forwarding packets based upon the defined paths.

    Routing is distinguished from switching by operating at the Network Layer of

    the OSI Model. Switching occur on the Data Link Layer.

    Static, Dynamic and Default Routing

    Routing can be accomplished by manually entering the information necessary for

    packets to reach any part of the network into each router. This is called static routing. A

    static route is a route that is created manually by a network administrator. Static routing

    works reasonably well for very small networks, but does not scale well. When using static

    routing, the routing tables (A routing table is a database in which a router stores

    information about the network layer topology of the network) on each router must be

    updated manually, each time when the network topology changes.

    Static routes have advantages and disadvantages as compares to dynamic routes.Advantages of Static Routes:

    Easy to configure

    No routing protocol overhead

    Disadvantages of Static Routes:

    DATA COMMUNICATION 10 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    11/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Network changes require manual reconfiguration

    Creating a Static Route under Cisco IOS

    To add a static route on a Cisco router, use the `ip route` command.

    The syntax to utilize is: ip route .

    The example shows the creation of a static route for a single host:

    Cisco# conf t

    Cisco (config)# ip route 193.252.19.5 255.255.255.255 193.252.19.1

    Default routing: Refers to a last resort outlet traffic to destinations that are

    unknown to the local router. The destinations that are unknown to the local router are sent

    to the default outlet router. Default routing is the easiest form of routing for a domain

    connected to a single exit point. A default route is a path on which a router should forward

    a packet if it does not have specific knowledge about the packets destination.

    Dynamic routing

    In most networks, routing is managed automatically through the use of dynamic

    routing. In dynamic routing, routing protocols create and maintain the routing tables

    automatically. Dynamic routing responds much more quickly to network changes (and

    network failures) than static routing.

    Routing Protocol

    In simple terms, a protocol is an agreed set of rules that determine how something

    will operate. A routing protocol is a set of rules that describes how Layer 3 routing devices

    will send updates between each other about the available networks. If more than one path

    to the remote network exists, the protocol also determines how the best path or route is

    selected.

    The Purpose of a Routing Protocol is

    a. A routing protocol is the mechanism used to update the Layer 3 routing devices.

    b. When they all have the same accurate understanding of the network, they can route

    the data across the best path.

    DATA COMMUNICATION 11 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    12/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    How the Routing Protocol Works

    Participating routers advertise the routes that they know about to their neighbors in

    routing updates. Routes learned from routing updates are held in the routing table.

    Routed and Routing Protocols.

    The routed protocol is the Layer 3 protocol used to transfer data from one end

    device to another across the network. The routed protocol is the Layer 3 datagram that

    carries the application data as well as the upper-layer information. Also the routing

    protocol is the protocol used to send updates between the routers about the networks that

    exist in the organization, thereby allowing the routing process to determine the path of the

    datagram across the network.

    Table 1 provides a list of routed protocols and their corresponding interior routing

    protocols.

    Routed Protocol Corresponding Interior Routing

    ProtocolAppleTalk RTMP, AURP, EIGRP

    IPX RIP, NLSP, EIGRP

    Vines RTP

    IP RIPv1, RIPv2, OSPF, IS-IS, IGRP,

    EIGRP

    Routing Table

    A routing table is a database in which a router stores information about the network

    layer topology of the network. The router will reference the routing table and make a

    decision about forwarding data packets to the end destination identified in the destination

    address of the datagram/packet.

    DATA COMMUNICATION 12 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    13/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Table 2 shows the fields that are present in a typical routing table.

    Network Outgoing Interface Metric Next Logical Hop

    140.100.100.0 /24 E0 6 131.108.13.15

    140.100.110.0 /24 E0 7 131.108.13.15

    140.100.120.0 /24 E0 8 131.108.13.15

    140.100.130.0 /24 E0 8 131.108.13.15

    166.99.0.0 /16 E1 10 131.108.14.11

    166.90.0.0 /16 E1 11 131.108.14.11

    145.0.88.0 /24 S0 3 131.108.10.9

    The functionality of each field in the table is discussed below.

    1. The Network Field

    The Network field contains the networks that the router knows exist in the

    organization. These entries either were entered manually as static routes ordefault routes,

    or were learned via a routing protocol as dynamic routes. The Purpose of the Network

    Field is when a datagram comes into the router, the routing process attempts to forward it

    to the remote network, where it is hoped that it will find the destination host. To achieve

    this, it must know that the remote network exists. It determines this by looking in the

    routing table for the remote network.

    Typically, only the network portion of the address is stored in the table. Using the

    hierarchical strength of the addressing keeps the routing table small and the lookup short.

    The routing process makes a decision based on the longest match. This ensures that if

    VLSM has been deployed, the most specific network is chosen. Cisco IOS code mandates

    that the longest match can be a /32 or 255.255.255.255 mask. This is a match based on the

    full host address and is used in specific situations such as an OSPF environment. It is not

    encouraged as a common configuration because the size of the routing table grows rapidly.

    DATA COMMUNICATION 13 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    14/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    The routes in the table are held in an order that speeds up the lookup process, ensuring that

    the routing decision is streamlined.

    2. The Outgoing Interface Field

    The Outgoing Interface is the interface on the router to which the routing processsends the datagram. This is the first step of its journey, the exit point of the router. This

    field is necessary for the routing process to know which interface queue to use to send the

    outbound datagram. It also informs the administrator of the interface through which the

    network was heard in the routing updateor, more accurately, the interface through which

    the chosen network was heard.

    3. The Metric Field

    The metric is a value that is assigned to each path based on the criteria specified inthe routing protocol. The Metric field is used to determine which path to use if there are

    multiple paths to the remote network. The metric used depends on the routing protocol.

    This value is used to choose between different paths to the same destination network, to

    select the best path. If the values are the same, either the router selects the path that it heard

    first, or it uses both paths, sending the datagrams across each route.It is the responsibility

    of the end device to reassemble the datagrams before sending them to the Application.

    Table 3 shows the metrics used by the different routing protocols.

    Routing Protocol Metric

    RIPv1 Hop count.

    IGRP Bandwidth, delay, load, reliability, MTU.

    EIGRP Bandwidth, delay, load, reliability, MTU.

    OSPF Cost. (The Cisco default states that the cost of an interface is

    inversely proportional to the bandwidth of that interface. A

    higher bandwidth indicates a lower cost.)

    IS - IS Cost

    DATA COMMUNICATION 14 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    15/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    By default, on a Cisco router, if multiple equal cost paths exist in IP, up to six paths are used in a

    round-robin manner to load balance the traffic across the network.

    4. The Next Logical Hop Field

    The next logical hop is the destination address of the next forwarding router. The

    address of the next logical hop will be on the same subnet as the outgoing interface. The

    purpose of identifying the next logical hop is so that the router can create the Layer 2

    frame with the destination address.

    The reason that the logical address is stored instead of the MAC address of the next

    hop is to ensure that the information is accurate. The MAC address may change because of

    changes in the hardware; however, such changes do not affect the logical address. Also, the

    router is dealing at Layer 3 and just examines the source address of the routing update to

    determine the next hop. The simplicity of this action reduces the need for extra

    computation and memory.

    How the Routing Table Is Kept Current and Correct

    The capability to send traffic from one end of the network to the other depends on

    how accurate and current the routing table in every router is within the network. Although

    all routing protocols have this written into their mission statements, the more recent routing

    protocols are more efficient, so their networks scale more easily. For example, RIP will

    send out the entire routing table every 30 seconds, while OSPF updates contain only the

    change and are sent only when that changes occurs. Although OSPF sends the entire table

    every 30 minutes after the last update, this is far less demanding of network resources than

    the older protocol, RIP.

    The accuracy of the table will be affected by how quickly it responds to changes in

    the network.

    These changes include the following:

    Learning new networks

    Learning a better path to an existing network

    Learning that a network is no longer available

    Learning an alternative route to a network

    DATA COMMUNICATION 15 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    16/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    How each of these changes is achieved depends on the routing protocol.

    Types of Routing Protocols

    IP routing protocols use two main technologies: Link-state and Distance vector

    technologies. These are discussed next.

    Distance Vector Routing Protocols

    Distance vector protocols are the earliest protocols, and they include RIP and

    IGRP.Distance vector protocols send periodic updates. These updates are sent to directly

    connected neighbors. The update is periodic because it waits for the timer to expire before

    it sends an update. After receiving a neighbors routing table, the router updates its table

    and sends the modified table in subsequent updates. This is the reason that distance vector

    routing protocols are said to be routing by rumor.

    The Distance Vector Routing Metrics

    The metric used by distance vector protocols is often stated as being distance

    measured in the number of hand-off points or hops (routers) encountered on the way to the

    end device. The path selection is made using the Bellman Ford algorithm based on the

    metric or value of each available path. RFC 1058 discusses this in depth in reference toRIPv1.

    Routing Information Protocol (RIP) is the best known and most widely used of the

    distance vector routing protocols. RIP version 1 (RIP v1), which is now outmoded, was the

    first routing protocol accepted as a standard for TCP/IP. RIP version 2 (RIP v2) provides

    authentication support, multicast announcing, and better support for classless networks.

    Using RIP, the maximum hop count from the first router to the destination is 15.

    Any destination greater than 15 hops away is considered unreachable. This limits the

    diameter of a RIP network to 15. However, if you place your routers in a hierarchical

    structure, 15 hops can cover a large number of destinations.

    DATA COMMUNICATION 16 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    17/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Link State Routing Protocols

    Link state routing protocols address some of the limitations of distance vector

    routing protocols. For example, link state routing protocols provide faster convergence

    than do distance vector routing protocols. Although link state routing protocols are more

    reliable and require less bandwidth than do distance vector routing protocols, they are also

    more complex, more memory-intensive, and place a greater load on the CPU.

    Unlike distance vector routing protocols, which broadcast updates to all routers at

    regularly scheduled intervals, link state routing protocols provide updates only when a

    network link changes state. When such an event occurs, a notification in the form of a link

    state advertisement is sent throughout the network.

    The Open Shortest Path First (OSPF) protocol is the best-known and most widely

    used link state routing protocol. OSPF is an open standard developed by the Internet

    Engineering Task Force (IETF) as an alternative to RIP. OSPF compiles a complete

    topological database of the network. The shortest path first (SPF) algorithm, also known as

    the Djikstra algorithm, is used to compute the least-cost path to each destination. Whereas

    RIP calculates cost on the basis of hop count only, OSPF can calculate cost on the basis of

    metrics such as link speed and reliability in addition to hop count.

    Unlike RIP, OSPF can support an inter network diameter of 65,535 (assuming thateach link is assigned a cost of 1). OSPF transmits multicast frames, reducing CPU usage

    on a LAN. We can hierarchically subdivide OSPF networks into areas, reducing router

    memory overhead and CPU overhead.

    Like RIP v2, OSPF supports variable length subnet masks (VLSM).

    Selecting the Appropriate Routing Protocol

    Select a routing protocol based on the following considerations:

    For a small, simple network that is not expected to grow, use a simpler distance

    vector routing protocol like RIP v2. For a large, complex network, use a newer, more

    sophisticated link state routing protocol like OSPF.

    DATA COMMUNICATION 17 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    18/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Use RIP v2 or OSPF if you need to support variable length subnet masks. Although

    the outdated RIP v1 is still widely used in private networks, it does not support VLSM and

    thus is not well suited for enterprise networks.

    Interior and Exterior Routing Protocols

    Routing protocols that operate within an organization are referred to as interior

    routing

    protocols (for example, RIPv1, IGRP, EIGRP, OSPF, and IS-IS).

    Interior Routing Protocols

    The boundaries of the organization are defined as the autonomous system. The

    unique number assigned to the autonomous system then identifies the organization. The

    autonomous system number may be viewed as another layer of hierarchy in the IP

    addressing scheme because the number can represent a collection of NIC numbers.

    Exterior Routing Protocols

    Routing protocols that exchange routing information between organizations are

    known as exterior routing protocols. Exterior routing protocols are highly complex. The

    complexity arises from the need to determine policies between different organizations.

    Border Gateway Protocol Version 4 (BGP-4) is an example of an exterior gateway

    protocol.

    DATA COMMUNICATION 18 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    19/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    OSPF, IS-IS and RIP are IGPs used within the individual ASs; BGP is the EGP

    used between ASs.

    DATA COMMUNICATION 19 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    20/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    NETWORK ARCHITECTURE

    DATA COMMUNICATION 20 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    21/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    DESCRIPTION OF ARCHITECTURE

    The architecture consists of three networks as shown above having two routerts R1

    and R2.Network 1 consists of three workstations connected via a switch(Intex 10/100 fast

    Ethernet switch). Network2 lies between the routers. Network 3 contains the webserver in

    one of its interfaces. In this network we use CISCO 1840 series (1841) router. The

    webserver is configured in Microsoft Windows 2003 server OS. Whereas the workstations

    are loaded with Microsoft windows 2000 Proffessional OS.

    1. Server Windows 2003 Operating System

    2. Work Stations 3 nos

    3. Switch Layer 2 unmanaged

    4. Router Cisco 1841 (2 nos)

    5. IP Address 192.168.100.0/27

    Network No: of Host

    Network 1 4

    Network 2 2

    Network 3 2

    Given IP = 192.168.100.0/27

    No of IP available = 2^5 = 32

    Ip requirement for each network

    Network 1

    Total number of Host= 4

    Network address= 1

    DATA COMMUNICATION 21 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    22/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Broadcast address= 1

    Total requirement= 6

    Network 2

    Total number of Host= 2

    Network address= 1

    Broadcast address= 1

    Total requirement= 4

    Network 3

    Total number of Host= 2

    Network address= 1

    Broadcast address= 1

    Total requirement= 4

    Number of IP address required for all networks= 6+4+4= 14

    Given IP block= 192.168.100.0/27 which is a private ip.

    We now got a single network consists of 32 hosts(2^5= 32), but we require three

    different networks having different number of ip pools, ie 6,4 and 4 respectively. So we are

    going to split this single IP pool using subnetting.

    One bit Subnetting

    In this step we will take one bit from host and will give it to the network portion. So the

    network mask now becomes 28 and getting splitted into two equal networks having

    number of ip addresses 16 each.

    Subnet 1: 192.168.100.0/28 to 192.168.100.15/28DATA COMMUNICATION 22 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    23/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Subnet 2: 192.168.100.16/28 to 192.168.100.31/28

    Subnet mask: 255.255.255.240

    Since we only require 14 IP address we only select subnet block 192.168.100.0/28 and

    discard subnet block 192.168.100.16/28 as spare block.

    Two bit subnetting

    In this step we will take one more bit from host and will give it to the network

    portion. So the network mask now becomes 29 and getting splitted into two equal

    networks having number of ip addresses 8 each.

    Subnet 1.1: 192.168.100.0/29 to 192.168.100.7/29

    Subnet 2.1: 192.168.100.8/29 to 192.168.100.15/29

    Subnet mask: 255.255.255.248

    First network need 6 number of IP addresses. So we will allocate the entire subnet 1.1 to

    network 1.

    Network 1

    Network address: 192.168.100.0/29

    Broadcast address: 192.168.100.5/29

    Host Name Host IP address Subnet Mask

    PC1 192.168.100.1 255.255.255.248

    PC2 192.168.100.2 255.255.255.248

    PC3 192.168.100.3 255.255.255.248

    FE 0/0 192.168.100.4 255.255.255.248

    Spare 1 192.168.100.6 255.255.255.248

    Spare 2 192.168.100.7 255.255.255.248

    We will again split subnet 2.1 by taking one more bit to the network portion. This is

    three bit subnetting.

    Three bit Subnetting

    In this step we will take one more bit from host and will give it to the network

    portion. So the network mask now becomes 30 and getting splitted into two equal

    networks having number of ip addresses 4 each.

    DATA COMMUNICATION 23 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    24/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Subnet 2.1.1: 192.168.100.8/30 to 192.168.100.11/30

    Subnet 2.1.2: 192.168.100.12/30 to 192.168.100.15/30

    Subnet mask: 255.255.255.252

    We will allocate the entire subnet 2.1.1 to the network 2 and subnet 2.1.2 to the network 3.

    Network 2

    Network address: 192.168.100.8/30

    Broadcast address: 192.168.100.11/30

    Host name Host IP address Subnet mask

    R1 FE 0/1 192.168.100.9 255.255.255.252

    R2 FE 0/1 192.168.100.10 255.255.255.252

    Network 3

    Network address: 192.168.100.12/30

    Broadcast address: 192.168.100.15/30

    Host name Host IP address Subnet mask

    R1 FE 0/1 192.168.100.13 255.255.255.252

    R2 FE 0/1 192.168.100.14 255.255.255.252

    Details of Allocation of Subnets to the Networks.

    Network

    No :of

    Host

    s

    N/W Adderss Host AddressRange

    BroadcasteAddress

    SubnetMask

    1

    192.168.100.1

    to 255.255.255.DATA COMMUNICATION 24 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    25/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    4 192.168.100.0 192.168.100.4 192.168.100.5 248

    2 2 192.168.100.8

    192.168.100.9

    to

    192.168.100.10

    192.168.100.11 255.255.255.

    252

    3 2 192.168.100.12

    192.168.100.13

    to

    192.168.100.14

    192.168.100.15 255.255.255.

    252

    Network Details

    Network 1

    Subnet Address : 192.168.100.224/29

    Host Range : 192.168.100.225/29 to

    192.168.100.230/29

    Device IP Address Subnet Mask

    R1 FE 0/0 192.168.100.225 255.255.255.248

    PC 1 192.168.100.226 255.255.255.248

    PC 2 192.168.100.227 255.255.255.248

    PC 3 192.168.100.228 255.255.255.248

    PC 4 192.168.100.229 255.255.255.248Network 1

    DATA COMMUNICATION 25 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    26/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    WINDOWS SERVER 2003 INSTALLATION &

    CONFIGURATION

    System Hardware requirements

    CPU: It is recommended for a machine with 1GHz, of course 2 GHz is better.

    RAM: Recommended memory is 256 MB, More memory for more applications.

    Storage: 1.5 GB is recommended, but 4GB space is to be preferred.

    Procedure for installing Windows 2003 Server .

    Note the partition in which the existing OS is loaded

    Insert the Windows 2003 Server CD into the CD Drive

    If the Windows 2003 Server CD is with auto run option it gives the first window

    with the following menu.

    a) Install Windows Server 2003, Standard Edition.

    b) Perform additional tasks.

    c) Check system compatibility.

    (If the CD is not having auto run option, click on SETUP icon inside the CD, to get

    the above window.)

    Click the first option (Install Windows Server 2003, Standard

    Edition.)

    The new window will give a message Windows setup does not

    support upgrading from Microsoft windows 2000 professional to Microsoft

    DATA COMMUNICATION 26 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    27/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    windows 2003,Standard edition, if we are installing from windows 2000

    professional.

    Click on OK

    From the new window, select Installation type as New Installation and click on

    Next.

    Accept the license agreement by clicking on the accept this agreement and click

    Next.

    Enter the 25-digit product key and click Next.

    Click Next for Set up option window.

    Click No, Skip this step and continue installing windows for Get Updated SetupFiles window and click Next.

    Windows start to load installation files

    Setup will Restart (Dont enter for boot from CD, while booting)

    Welcome to setup window appears as follows

    o To set up Windows now, press ENTER.

    o To repair a windows installation using Recovery console, press R.

    o To quit setup without installing windows, press F3.

    Press Enter (First Option)

    Now the setup will sense all the hard disk part ions and we

    should select one partition for installation.

    Select the needed partition (Never Select the existing OS

    partition) and press ENTER.

    Setup will ask to continue Setup using this partition, press C.

    Press C.

    Setup will ask to select the Format pattern. Highlight Format the

    partition using the NTFS file system. And press ENTER.

    For confirmation press F to the next window.

    Setup will format the partition and will copy the windows file system to the hard disk

    o Setup will restart the system and gives the first GUI window.

    DATA COMMUNICATION 27 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    28/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    o The computer screen will blink ones or twice to adjust the display setting.

    For region and Language setting Click Next after selecting the Regional location as

    India.

    Enter the Name: Network Lab PCn and Organization : RTTC .

    For licensing Modes, Simply Click NEXT.

    Enter Computer Name: PCn , Administrator Password: NTlabPCn

    Setup will restart the system again for final setup and will get the Ctrl+Alt+del

    window.

    Enter password: NtlabPCn and click Enter for the Windows 2003 Desktop.

    Note down the logical disk of Windows 2003

    (If the software is an OEM version it is to be registered with Microsoft within 30 days,

    otherwise your desktop will be locked after 30 days)

    Restoring your Desktop icons and start menu

    To restore My Computer and My Network places icons to your desktop,

    Right Click the desktop and choose the properties.

    Go to the desktop tab, Click on Customize desktop tab and check the needed items

    and Click on the change icon tab to change the default icons and click OK.

    To change the start menu view to the Classical style

    Right Click the task bar and choose the properties

    Click the Start Menu tab, choose the radio button for classical start menu and click

    OK.

    Include the Log Off & Admin Tools also.

    Note down the hardware not installed

    Right Click My Computer

    Select Properties

    Click the Hardware Tab

    Select the Device manager

    DATA COMMUNICATION 28 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    29/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    If a hardware item is marked with a question mark in yellow background, then it means

    that the Device Driver for it is not installed properly.

    Procedure to install the driver for a hardware

    Insert the mother board CD into the CD drive (CD may automatically run, then stop

    it)

    R. Click the hardware you want to install (Say Ethernet controller)

    Click on Update Driver

    Select Install the software Automatically and Click Next

    The setup will install the driver for the selected hardware from the CD

    Click Finish

    Using Device manager verify that the hardware is properly installed.

    Assigning IP address, Default Gateway, Subnet mask & DNS

    setting for the NIC

    Right Click My Network places

    Take Properties

    Right Click Local Area Connection and take Properties

    (Check the Show icon in the notification area when connected)

    Under General tab Select Internet Protocol (TCP/IP)

    Take properties and click Use the following IP address

    (Give the needed IP address & Mask)

    DNS and Default gateway can also be given

    Microsoft Management Console (MMC)

    To get the MMC three ways are there

    1. Right Click My Computer and Click Manage

    DATA COMMUNICATION 29 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    30/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    2. Start/Programs/Administrative tools/Computer management

    3. Start/Run/compmgmt.msc

    The window will looks like in figure below.

    Computer Management window is having three main Menus:

    1. System Tools

    2. Storage

    3. Services and Applications.

    Stop the avoidable services and thus increase the speed of

    your server

    Take the Computer management window

    Expand services and applications

    Select services

    Select the standard tab and note the unwanted services started

    Select the service Right click and take properties

    Click Stop for the service status (Now the Service will stop and it will restart when

    the server is switch on again)

    To stop the services forever select Automatic against Startup Type.

    At any time you can restart the service.

    DATA COMMUNICATION 30 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    31/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Disk management

    With disk management tool, we can do the following

    Create and delete partitions on a hard disk and make logical drives

    Get the status of the disk, disk partition sizes, free space on a partition, volume

    labels, drive-letter assigned, file system type ,size and disk health.

    Alter drive letter and volume

    Format any volume etc

    Disk Formatting and Partition

    Take the MMC

    Now you can see the details of partitions available, what partition is having the OS, File

    System, Healthy or Not etc.

    Select the Disk Management under the Storage menu.

    Right Click the Hard disk section to be Partitioned or Formatted and proceed.

    Change the Drive Letters

    Right Click the partition and select Change drive letter and path

    Click on change

    Select the needed alphabet against Assign Drive Letters.

    Click OK and respond YES for confirm.

    Verify that the drive letter has changed.

    Rename the disk Volume

    R Click the partition and select Change drive letter and path

    Take properties

    Under General tab Enter the needed Name for the Partition.

    User Management

    DATA COMMUNICATION 31 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    32/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    By default the OS will create only two users 1) Administrator and 2) Guest

    Normally the Guest account will disabled, since it is not having a Password.

    Take the MMC

    Expand System Tools

    Expand Local Users and Group

    Click Users

    Now two users can be seen with names Administrator and Guest. Guest will be

    deactivated since you are logged on as the administrator, let us activate the Guest

    account and logon as the guest.

    Activate the Guest

    R Click the Guest

    Take properties

    Under General tab Uncheck the Account is Disabled menu

    Click OK

    Log on as Guest

    To log on as Guest, first logoff the administrator & then try for Guest

    Start / Log Off administrator (Wait for saving the settings)

    Press Ctrl+Alt+Delete to logon.

    Type User Name: Guest and Click OK (Since the Guest has no Password)

    Verify that the Guest is not having any Administrative rights

    Then logoff the Guest and logon as Administrator with the password: NtlabPCn

    Users & Groups

    For User management two folders are created as Users & Groups.

    These can be seen under Local Users and groups in MMC.

    Users folder has all the list of users created and the Groups folder has the Powers of the

    users.

    DATA COMMUNICATION 32 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    33/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Create a User:

    Click the Action tab and then select the New User. OR

    R. Click the empty space and select the new user.

    Enter the Username and Password (twice)

    Uncheck the User must change the password at nest logon

    Check the User Cannot change the password & Password never expires.

    Click Create

    Click Close

    Now the user is having only user level privileges. Verify the privileges of the newly crated

    user by logging on.

    Assign Administrative Power to the User

    R. Click the user in MMC

    Take Properties

    Click Member Of tab (Note that the user is having Membership only with Users

    privilege)

    Click Add

    Click Advanced

    Click Find Now (Now all the Group powers/Membership will be displayed and

    select the Administrators)

    Click OK

    Click OK (Note that the user is now having Administrative membership also)

    Log on with the new user and verify that the user is having all the Administrative

    privileges.

    Dynamic Host Configuration Protocol (DHCP) /P 304

    DHCP (Dynamic Host Configuration Protocol) is a communications protocol that

    lets network administrators centrally manage and automate the assignment of IP addresses

    in an organization's network. Using the Internet Protocol, each machine that can connect to

    the Internet needs a unique IP address. Without DHCP, the IP address must be entered

    manually at each computer and a new IP address must be entered each time a computer

    DATA COMMUNICATION 33 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    34/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    moves to a new location on the network. DHCP lets a network administrator supervise and

    distribute IP addresses from a central point and automatically sends a new IP address when

    a computer is plugged into a network.

    DHCP uses the concept of a "lease" or amount of time that a given IP address

    will be valid for a computer. The lease time can vary depending on how long a user is

    likely to require the Internet connection at a particular location. It's especially useful in

    education and other environments where users change frequently. Using very short leases,

    DHCP can dynamically reconfigure networks in which there are more computers than

    there are available IP addresses. The protocol also supports static addresses for computers

    that need a permanent IP address, such as Web servers.

    DHCP assigns a TCP/IP address when a system is started. Typically, it works

    like this:

    a. A user turns on a computer with a DHCP client.

    b. The client computer sends a broadcast request (called a DISCOVER or

    DHCPDISCOVER), looking for a DHCP server to answer.

    c. The router directs the DISCOVER packet to the correct DHCP server.

    d. The server receives the DISCOVER packet.

    e. Based on availability and usage policies set on the server, the server

    determines an appropriate address (if any) to give to the client.

    f. The server then temporarily reserves that address for the client and sends

    back to the client an OFFER (or DHCPOFFER) packet, with that address

    information.

    g. The server also configures the client's DNS servers, WINS servers, NTP

    servers, and sometimes other services as well.

    h. The client sends a REQUEST (or DHCPREQUEST) packet, letting the

    server know that it intends to use the address.

    i. The server sends an ACK (or DHCPACK) packet, confirming that the

    client has a been given a lease on the address for a server-specified period of time.

    DATA COMMUNICATION 34 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    35/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Installing and Configuring DHCP server

    DHCP is not installed by default while loading the OS; we should install the DHCP

    separate.

    Insert the windows 2003 CD into the CD drive

    Start/Setting/Control Panel/Add Remove Programs

    Click Add Remove Windows Component

    Select Network services and then click on the Details

    Check the DHCP & next (Wait while loading the DHCP)

    Click Finish & Close Add Remove Programs

    Better Reboot the PC

    Note that now in Services the DHCP server is also available.

    Also in Start/Programs/Administrative Tools/DHCP

    Creating a range of IP Address.

    Microsoft calls the range of IP address and the descriptive information associated with

    them as a SCOPE. To create a scope

    Right click the servers icon and choose new scope & Click Next

    Give the descriptive information for the Scope (NW Lab) & Click Next

    Enter the start IP address and the End IP address

    For mask either select the Length or Enter the subnet mask

    Click Next

    Add the IP exclusions & Click next

    Click Next for Lease Duration (for these days the client IP will not change and

    after the default 8 days the client will get the new IP. But once in 4 days the Client

    will sent new broadcast for new IP for DHCP and will get the fresh IP)

    Next for Configure DHCP Options

    Next for Gateway

    Next for Domain

    Next for WINS servers

    DATA COMMUNICATION 35 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    36/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Next for Activate the Scope

    Click Finish to end the setup.

    Note that the Status is Active

    DHCP Server is now ready for send IP to clients

    Work Sheet for Windows 2003 Server Installation and

    Configuration

    1) Install Windows 2003 Server.

    2) Customize the Desktop and Start Menu

    3) Install or Reinstall the NIC card

    4) Assign IP & Mask

    5) Stop IIS Admin Service (Startup type- Manual) and Restart the service

    6) Change Drive letter of CD drive to D

    7) Change the volume name of the partition with Windows 2003 Server as

    Win2003Server.

    8) Activate Guest account and login as Guest and verify that the Guest has no

    administrative powers.

    9) Create a user and assign Administrative powers. Log on with the new

    administrator and verify the administrative powers.

    10) Install & configure DHCP server.

    11) Activate the DHCP server by giving IP range (192.168.1.25 to 30) and

    Mask (255.255.255.0) and verify the DHCP is activated.

    12) Using a switch interconnect 2computers and the DHCP server as a

    LAN

    13) Load NIC software on the 2 computers and configure for getting IP

    automatically and verify that the LAN is working properly with the IPsupplied centrally.

    DATA COMMUNICATION 36 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    37/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Set Up of NetworkRouters1. Choose a convenient location to begin installing your router such as an open floor

    space or table. This does not need to be the permanent location of the device.

    Particularly for wireless routers, you may find it necessary to re-position the unit

    after installing it as the cables / signals may not reach all areas needed. At the

    DATA COMMUNICATION 37 RTTC

    TRIVANDRUM

    http://compnetworking.about.com/cs/wirelessproducts/qt/locate_aprouter.htmhttp://compnetworking.about.com/cs/wirelessproducts/qt/locate_aprouter.htmhttp://compnetworking.about.com/cs/wirelessproducts/qt/locate_aprouter.htmhttp://compnetworking.about.com/cs/wirelessproducts/qt/locate_aprouter.htm
  • 8/7/2019 Introduction onwards

    38/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    beginning, its better to choose a location where it's easiest to work with the router

    and worry about final placement later.

    2. Plug in the router's electrical power source, then turn on the router by pushing the

    power button.

    3. (Optional) Connect your Internet modem to the router. Most networkmodems

    connect via an Ethernet cable but USB connections are becoming increasingly

    common. The cable plugs into the router jack named "WAN" or "uplink" or

    "Internet." After connecting the cable, be sure to power cycle (turn off and turn

    back on) the modem to ensure the router recognizes it.

    4. Connect one computer to the router. Even if the router is a wireless model, connect

    this first computer to the router via a network cable. Using a cable during router

    installation ensures the maximum reliability of the equipment. Once a wireless

    router installation is complete, the computer can be changed over to a wireless

    connection if desired.

    5. Open the router's administration tool. From the computer connected to the router,

    first open your Web browser. Then enter the router's address for network

    administration in the Web address field and hit return to reach the router's home

    page.

    Many routers are reached by either the Web address "http://192.168.1.1" or"http://192.168.0.1" Consult your router's documentation to determine the exact

    address for your model. Note that you do not need a working Internet connection

    for this step.

    6. Log in to the router. The router's home page will ask you for a username and

    password. Both are provided in the router's documentation. You should change the

    router's password for security reasons, but do this after the installation is complete

    to avoid unnecessary complications during the basic setup.

    7. If you want your router to connect to the Internet, you must enter Internet

    connection information into that section of the router's configuration (exact location

    varies). If using DSL Internet, you may need to enter the PPPoE username and

    password. Likewise, if you have been issued a static IP address by your provider

    DATA COMMUNICATION 38 RTTC

    TRIVANDRUM

    http://compnetworking.about.com/od/modems/g/bldef_modem.htmhttp://compnetworking.about.com/cs/ethernet1/g/bldef_ethernet.htmhttp://compnetworking.about.com/cs/cabling/g/bldef_usb.htmhttp://compnetworking.about.com/od/dsldigitalsubscriberline/g/bldef_dsl.htmhttp://compnetworking.about.com/library/glossary/bldef-pppoe.htmhttp://compnetworking.about.com/library/glossary/bldef-ipaddress.htmhttp://compnetworking.about.com/od/modems/g/bldef_modem.htmhttp://compnetworking.about.com/cs/ethernet1/g/bldef_ethernet.htmhttp://compnetworking.about.com/cs/cabling/g/bldef_usb.htmhttp://compnetworking.about.com/od/dsldigitalsubscriberline/g/bldef_dsl.htmhttp://compnetworking.about.com/library/glossary/bldef-pppoe.htmhttp://compnetworking.about.com/library/glossary/bldef-ipaddress.htm
  • 8/7/2019 Introduction onwards

    39/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    (you would need to have requested it), the static IP fields (including network mask

    and gateway) given to you by the provider must also must be set in the router.

    8. If you were using a primary computer or an older network router to connect to the

    Internet, your provider may require you to update the MAC address of the router

    with the MAC address of the device you were using previously. Read How to

    Change a MAC Address for a detailed description of this process.

    9. If this is a wireless router, change the network name (often called SSID). While the

    router comes to you with a network name set at the factory, you will never want to

    use this name on your network. Read How to Change the Router SSID for detailed

    instructions.

    10.Verify the network connection is working between your one computer and the

    router. To do this, you must confirmed that the computer has received IP address

    information from the router. See How to Find IP Addresses for a description of this

    process.

    11.(If applicable) Verify your one computer can connect to the Internet properly. Open

    your Web browser and visit a few Internet sites such as http://www.google.com/.

    12.Connect additional computers to the router as needed. If connecting wirelessly,

    ensure the network name (SSID) of each is computer matches that of the router.

    13.Finally, configure additional network security features as desired to guard yoursystems against Internet attackers. These WiFi Home Network Security Tips offer a

    good checklist to follow.

    Tips:

    1. When connecting devices with network cables, be sure each end of the cable

    connects tightly. Loose cables are one of the most common sources of network

    setup problems.

    Items Needed:

    A network router (wireless or wired)

    Network adapters installed on all devices to be connected to the router

    A working Internet modem (optional)

    A Web browser installed at least one computer in the networkDATA COMMUNICATION 39 RTTC

    TRIVANDRUM

    http://compnetworking.about.com/od/networkprotocolsip/g/bldef_mac.htmhttp://compnetworking.about.com/od/networkprotocolsip/a/macaddressing_2.htmhttp://compnetworking.about.com/od/networkprotocolsip/a/macaddressing_2.htmhttp://compnetworking.about.com/cs/wireless/g/bldef_ssid.htmhttp://compnetworking.about.com/cs/wirelessproducts/qt/changessid.htmhttp://compnetworking.about.com/od/findingipaddresses/index.htmhttp://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htmhttp://compnetworking.about.com/od/networkprotocolsip/g/bldef_mac.htmhttp://compnetworking.about.com/od/networkprotocolsip/a/macaddressing_2.htmhttp://compnetworking.about.com/od/networkprotocolsip/a/macaddressing_2.htmhttp://compnetworking.about.com/cs/wireless/g/bldef_ssid.htmhttp://compnetworking.about.com/cs/wirelessproducts/qt/changessid.htmhttp://compnetworking.about.com/od/findingipaddresses/index.htmhttp://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm
  • 8/7/2019 Introduction onwards

    40/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Router R2 configuration

    CISCO Router 1841 is configured using hyper terminal application software.

    Hyper Terminal Commands and Responses

    R2#erase stErasing the nvram filesystem will remove all configuration files! Continue? [con

    firm]y[OK]

    Erase of nvram: complete

    R2#

    *Jan 3 05:45:11.351: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram

    R2#reload

    System configuration has been modified. Save? [yes/no]: y

    Building configuration...

    [OK]

    Proceed with reload? [confirm]y

    *Jan 3 05:47:03.879: %SYS-5-RELOAD: Reload requested by console. Reload Reason:

    Reload command.

    System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)

    Technical Support: http://www.cisco.com/techsupport

    DATA COMMUNICATION 40 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    41/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Copyright (c) 2006 by cisco Systems, Inc.

    PLD version 0x10

    GIO ASIC version 0x127

    c1841 platform with 262144 Kbytes of main memory

    Main memory is configured to 64 bit mode with parity disabled

    Readonly ROMMON initialized

    program load complete, entry point: 0x8000f000, size: 0xcb80

    program load complete, entry point: 0x8000f000, size: 0xcb80

    program load complete, entry point: 0x8000f000, size: 0x11d96ac

    Self decompressing the image :

    #################################################

    ################################################################################

    ################################################# [OK]

    Smart Init is enabled

    smart init is sizing iomem

    ID MEMORY_REQ TYPE

    0X003AA110 public buffer pools

    0X00211000 public particle pools

    0X00020000 Crypto module pools

    0X000021B8 Onboard USB

    If any of the above Memory Requirements are

    "UNKNOWN", you may be using an unsupported

    configuration or there is a software problem and

    system operation may be compromised.

    Allocating additional 19646199 bytes to IO Memory.

    PMem allocated: 240123904 bytes; IOMem allocated: 28311552 bytes

    Restricted Rights Legend

    Use, duplication, or disclosure by the Government is

    subject to restrictions as set forth in subparagraph

    (c) of the Commercial Computer Software - Restricted

    Rights clause at FAR sec. 52.227-19 and subparagraph

    DATA COMMUNICATION 41 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    42/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    (c) (1) (ii) of the Rights in Technical Data and Computer

    Software clause at DFARS sec. 252.227-7013.

    cisco Systems, Inc.

    170 West Tasman Drive

    San Jose, California 95134-1706

    Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),

    REL

    EASE SOFTWARE (fc2)

    Technical Support: http://www.cisco.com/techsupport

    Copyright (c) 1986-2007 by Cisco Systems, Inc.

    Compiled Wed 28-Nov-07 18:48 by stshenImage text-base: 0x6008873C, data-base: 0x61A83150

    Port Statistics for unclassified packets is not turned on.

    This product contains cryptographic features and is subject to United

    States and local country laws governing import, export, transfer and

    use. Delivery of Cisco cryptographic products does not imply

    third-party authority to import, export, distribute or use encryption.

    Importers, exporters, distributors and users are responsible for

    compliance with U.S. and local country laws. By using this product youagree to comply with applicable laws and regulations. If you are unable

    to comply with U.S. and local laws, return this product immediately.

    A summary of U.S. laws governing Cisco cryptographic products may be found at:

    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

    If you require further assistance please contact us by sending email to

    [email protected].

    Cisco 1841 (revision 7.0) with 234496K/27648K bytes of memory.

    Processor board ID FHK124421KX

    2 FastEthernet interfaces

    1 Virtual Private Network (VPN) Module

    DRAM configuration is 64 bits wide with parity disabled.

    191K bytes of NVRAM.

    DATA COMMUNICATION 42 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    43/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    62720K bytes of ATA CompactFlash (Read/Write)

    Press RETURN to get started!

    sslinit fn

    *Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change

    d to: Initialized

    *Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change

    d to: Enabled

    *Jan 3 05:48:09.751: %SYS-5-CONFIG_I: Configured from memory by console

    *Jan 3 05:48:10.063: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state

    to administratively down

    *Jan 3 05:48:10.063: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up

    *Jan 3 05:48:10.575: %SYS-5-RESTART: System restarted --

    Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),

    REL

    EASE SOFTWARE (fc2)

    Technical Support: http://www.cisco.com/techsupport

    Copyright (c) 1986-2007 by Cisco Systems, Inc.

    Compiled Wed 28-Nov-07 18:48 by stshen

    *Jan 3 05:48:10.575: %SNMP-5-COLDSTART: SNMP agent on host R2 is undergoing a

    cold start

    *Jan 3 05:48:10.739: %SYS-6-BOOTTIME: Time taken to reboot after reload = 66

    seconds

    *Jan 3 05:48:10.887: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF

    *Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/1, changed state to down

    *Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/0, changed state to up

    *Jan 3 05:48:14.303: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/0, changed state to down

    R2>en

    R2#config t

    Enter configuration commands, one per line. End with CNTL/Z.

    R2(config)#interface fa 0/0

    DATA COMMUNICATION 43 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    44/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    R2(config-if)#ip add 192.168.100.14 255.255.255.252

    R2(config-if)#no shutdown

    R2(config-if)#exit

    R2(config)#^Z

    R2#

    *Jan 3 06:05:33.335: %SYS-5-CONFIG_I: Configured from console by console

    R2#wr memory

    Building configuration...

    [OK]

    R2#sh start

    Using 642 out of 196600 bytes

    !

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msecno service password-encryption

    !

    hostname R2

    !

    boot-start-marker

    boot-end-marker

    !

    !

    no aaa new-model

    !resource policy

    !

    mmi polling-interval 60

    no mmi auto-configure

    no mmi pvc

    mmi snmp-timeout 180

    ip subnet-zero

    ip cef

    !

    !

    !

    R2#

    R2#exit

    R2 con0 is now available

    DATA COMMUNICATION 44 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    45/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Press RETURN to get started.

    R2>

    R2>en

    R2#config t

    Enter configuration commands, one per line. End with CNTL/Z.

    R2(config)#interface fa 0/0

    R2(config-if)#ip address 192.168.100.13 255.255.255.252

    R2(config-if)#no shutdownR2(config-if)#exit

    R2(config)#interface fa 0/1

    R2(config-if)#ip address 192.168.100.10 255.255.255.252

    R2(config-if)#no shutdown

    R2(config-if)#exit

    *Jan 3 06:20:06.199: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state t

    o up

    *Jan 3 06:20:07.199: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/1, changed state to up

    *Jan 3 06:20:14.359: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to down

    R2(config-if)#interface fa 0/0

    R2(config-if)#ip address 192.168.100.13 255.255.255.252

    R2(config-if)#no shutdown

    R2(config-if)#exit

    R2(config)#^Z

    R2#

    *Jan 3 06:23:05.067: %SYS-5-CONFIG_I: Configured from console by console

    R2#wr memory

    Building configuration...

    [OK]

    R2#sh start

    Using 660 out of 196600 bytes

    !

    version 12.4

    DATA COMMUNICATION 45 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    46/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    service timestamps debug datetime msec

    service timestamps log datetime msec

    no service password-encryption

    !

    hostname R2

    !

    boot-start-marker

    boot-end-marker

    !

    !

    no aaa new-model

    !

    resource policy

    !

    mmi polling-interval 60no mmi auto-configure

    no mmi pvc

    mmi snmp-timeout 180

    ip subnet-zero

    ip cef

    DATA COMMUNICATION 46 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    47/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Router R1 configuration

    CISCO Router R2 configuration using Hyper Terminal Application software.

    Hyper Terminal Commands and Responses

    R2#erase st

    Erasing the nvram filesystem will remove all configuration files! Continue? [con

    firm]y[OK]

    Erase of nvram: complete

    R2#

    *Jan 3 05:45:11.351: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram

    R2#reload

    System configuration has been modified. Save? [yes/no]: y

    Building configuration...

    [OK]

    Proceed with reload? [confirm]y

    *Jan 3 05:47:03.879: %SYS-5-RELOAD: Reload requested by console. Reload Reason:

    Reload command.

    System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)

    Technical Support: http://www.cisco.com/techsupport

    DATA COMMUNICATION 47 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    48/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Copyright (c) 2006 by cisco Systems, Inc.

    PLD version 0x10

    GIO ASIC version 0x127

    c1841 platform with 262144 Kbytes of main memory

    Main memory is configured to 64 bit mode with parity disabled

    Readonly ROMMON initialized

    program load complete, entry point: 0x8000f000, size: 0xcb80

    program load complete, entry point: 0x8000f000, size: 0xcb80

    program load complete, entry point: 0x8000f000, size: 0x11d96ac

    Self decompressing the image :

    #################################################

    ################################################################################

    ################################################# [OK]

    Smart Init is enabled

    smart init is sizing iomem

    ID MEMORY_REQ TYPE

    0X003AA110 public buffer pools

    0X00211000 public particle pools

    0X00020000 Crypto module pools

    0X000021B8 Onboard USB

    If any of the above Memory Requirements are

    "UNKNOWN", you may be using an unsupported

    configuration or there is a software problem and

    system operation may be compromised.

    Allocating additional 19646199 bytes to IO Memory.

    PMem allocated: 240123904 bytes; IOMem allocated: 28311552 bytes

    Restricted Rights Legend

    Use, duplication, or disclosure by the Government is

    subject to restrictions as set forth in subparagraph

    (c) of the Commercial Computer Software - Restricted

    Rights clause at FAR sec. 52.227-19 and subparagraph

    DATA COMMUNICATION 48 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    49/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    (c) (1) (ii) of the Rights in Technical Data and Computer

    Software clause at DFARS sec. 252.227-7013.

    cisco Systems, Inc.

    170 West Tasman Drive

    San Jose, California 95134-1706

    Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),

    REL

    EASE SOFTWARE (fc2)

    Technical Support: http://www.cisco.com/techsupport

    Copyright (c) 1986-2007 by Cisco Systems, Inc.

    Compiled Wed 28-Nov-07 18:48 by stshenImage text-base: 0x6008873C, data-base: 0x61A83150

    Port Statistics for unclassified packets is not turned on.

    This product contains cryptographic features and is subject to United

    States and local country laws governing import, export, transfer and

    use. Delivery of Cisco cryptographic products does not imply

    third-party authority to import, export, distribute or use encryption.

    Importers, exporters, distributors and users are responsible for

    compliance with U.S. and local country laws. By using this product youagree to comply with applicable laws and regulations. If you are unable

    to comply with U.S. and local laws, return this product immediately.

    A summary of U.S. laws governing Cisco cryptographic products may be found at:

    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

    If you require further assistance please contact us by sending email to

    [email protected].

    Cisco 1841 (revision 7.0) with 234496K/27648K bytes of memory.

    Processor board ID FHK124421KX

    2 FastEthernet interfaces

    1 Virtual Private Network (VPN) Module

    DRAM configuration is 64 bits wide with parity disabled.

    191K bytes of NVRAM.

    DATA COMMUNICATION 49 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    50/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    62720K bytes of ATA CompactFlash (Read/Write)

    Press RETURN to get started!

    sslinit fn

    *Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change

    d to: Initialized

    *Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change

    d to: Enabled

    *Jan 3 05:48:09.751: %SYS-5-CONFIG_I: Configured from memory by console

    *Jan 3 05:48:10.063: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state

    to administratively down*Jan 3 05:48:10.063: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state t

    o up

    *Jan 3 05:48:10.575: %SYS-5-RESTART: System restarted --

    Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),

    REL

    EASE SOFTWARE (fc2)

    Technical Support: http://www.cisco.com/techsupport

    Copyright (c) 1986-2007 by Cisco Systems, Inc.

    Compiled Wed 28-Nov-07 18:48 by stshen

    *Jan 3 05:48:10.575: %SNMP-5-COLDSTART: SNMP agent on host R2 is undergoing ac

    old start

    *Jan 3 05:48:10.739: %SYS-6-BOOTTIME: Time taken to reboot after reload = 66

    seconds

    *Jan 3 05:48:10.887: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF

    *Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/1, changed state to down

    *Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/0, changed state to up

    *Jan 3 05:48:14.303: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/0, changed state to down

    R1>

    R1>

    R1>config t

    ^

    DATA COMMUNICATION 50 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    51/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    % Invalid input detected at '^' marker.

    R1>en

    R1#config t

    Enter configuration commands, one per line. End with CNTL/Z.

    R1(config)#interface fa 0/0

    R1(config-if)#ip add 192.168.100.14 255.255.255.252

    R1(config-if)#no shutdown

    R1(config-if)#

    R1(config-if)#

    R1(config-if)#

    R1(config-if)#

    R1(config-if)#exit

    R1(config)#^Z

    R1#*Jan 3 06:05:33.335: %SYS-5-CONFIG_I: Configured from console by console

    R1#wr memory

    Building configuration...

    [OK]

    R1#sh start

    Using 642 out of 196600 bytes

    !

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msecno service password-encryption

    !

    hostname R1

    !

    boot-start-marker

    boot-end-marker

    !

    !

    no aaa new-model

    !

    resource policy

    !

    mmi polling-interval 60

    no mmi auto-configure

    no mmi pvc

    DATA COMMUNICATION 51 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    52/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    mmi snmp-timeout 180

    ip subnet-zero

    ip cef

    !

    !

    !

    R1#

    R1#exi

    R1 con0 is now available

    Press RETURN to get started.

    R1>

    R1>en

    R2#config t

    Enter configuration commands, one per line. End with CNTL/Z.

    R1(config)#interface fa 0/0

    R1(config-if)#ip address 192.168.100.13

    % Incomplete command.

    R1(config-if)#ip address 192.168.100.13 255.255.255.252

    R1(config-if)#no shutdown

    R1(config-if)#exit

    R1(config)#interface fa 0/1

    R1(config-if)#ip address 192.168.100.8 255.255.255.252

    R1(config-if)#no shutdown

    R1(config-if)#exit

    *Jan 3 06:20:06.199: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state t

    o up

    *Jan 3 06:20:07.199: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/1, changed state to up

    *Jan 3 06:20:14.359: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern

    et0/1, changed state to down

    R1(config-if)#interface fa 0/0

    DATA COMMUNICATION 52 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    53/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    R1(config-if)#ip address 192.168.100.0 255.255.255.248

    R1(config-if)#no shutdown

    R1(config-if)#exit

    R1(config)#^Z

    R1#

    *Jan 3 06:23:05.067: %SYS-5-CONFIG_I: Configured from console by console

    R1#wr memory

    Building configuration...

    [OK]

    R1#sh start

    Using 660 out of 196600 bytes

    !

    version 12.4

    service timestamps debug datetime msec

    service timestamps log datetime msecno service password-encryption

    !

    hostname R1

    !

    boot-start-marker

    boot-end-marker

    !

    !

    no aaa new-model

    !resource policy

    !

    mmi polling-interval 60

    no mmi auto-configure

    no mmi pvc

    mmi snmp-timeout 180

    ip subnet-zero

    ip cef

    DATA COMMUNICATION 53 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    54/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    HTML CODE FOR CREATING A WEBSITE IN THE

    SERVER

    THIS IS A SAMPLE WEB PAGE

    COLLEGE OF ENGINEERING

    DATA COMMUNICATION 54 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    55/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK


    THALASSERY

    Click here to see the Project Details



    DEVELOPED BY :



    NITHIN PV

    NIVIL KM

    MUHAMMED SHAFEEQ PU

    PRAFUL RAMESH O

    SUSMITH C

    RTTC

    OBSERVATION

    IP CONFIGURATION

    IP addresses are the unique network addresses for the network nodes which interact

    each other with in a network. IP addresses are the 32 bit addresses with a network id part

    and host id part in it.So in the subnetted network one IP address each should be allotted for the server

    and the clients for interconnecting them with in the network.

    While assigning the IP addresses for the PCs the interface IP addresses of the

    routers with which they are connected should also be made into consideration, i.e. ,both

    should have the same network address.

    The IP configurations of server and the client PCs are given below.

    DATA COMMUNICATION 55 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    56/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Route to assign IP addresses:

    My computerMy network placesView network connections

    LANPropertiesInternet Protocol(TCP/IP)Properties

    Here we can assign the IP address, subnet mask and the default gateway.

    1)SERVER

    DATA COMMUNICATION 56 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    57/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    The address configured is,

    IP address : 192.168.100.14

    Subnet Mask : 255.255.255.252

    Default Gateway: 192.168.100.14

    2) PC1

    DATA COMMUNICATION 57 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    58/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    The address configured is,

    IP address : 192.168.100.1

    Subnet Mask : 255.255.255.248

    Default Gateway: 192.168.100. 4

    3) PC 2DATA COMMUNICATION 58 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    59/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    The address configured is,

    IP address : 192.168.100.2

    Subnet Mask : 255.255.255.248

    Default Gateway: 192.168.100. 4

    4) PC 3

    DATA COMMUNICATION 59 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    60/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    The address configured is,

    IP address : 192.168.100.3

    Subnet Mask : 255.255.255.248

    Default Gateway: 192.168.100. 4

    WEBSITE ACCESS

    DATA COMMUNICATION 60 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    61/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Hosting The WEB site

    The WEB site can be created as below:

    1. Open IIS Manager via,

    StartProgramsAdministrative toolsIIS Manager

    2. Right click Web sitesNewWeb siteNext

    Description of sightNextSet a home folder of sightNext

    Read permissionNextFinish

    Web site PropertiesDocumentsAddName of html page

    WEB SITE VIEW

    ROUTER CONNECTIVITY CHECKING

    Before connecting the routers with in the network its interface ports will be shut

    DATA COMMUNICATION 61 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    62/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    down. The up/down status of router interfaces can be seen as the status of protocol.When

    the router is connected within the network after configuring it the interface ports of the

    router will get up.

    The interface status of both routers R1 and R2 before and after their connectivity is

    given below.

    ROUTER R1

    BEFORE CONNECTIVITY:

    Interface IP-Address OK? Method Status Protocol

    FastEthernet0/0 192.168.100.13 YES manual up down

    FastEthernet0/1 192.168.100.10 YES manual up down

    AFTER CONNCTIVITY:

    Interface IP-Address OK? Method Status Protocol

    FastEthernet0/0 192.168.100.13 YES manual up up

    FastEthernet0/1 192.168.100.10 YES manual up up

    ROUTER R2

    BEFORE CONNECTIVITY:

    Interface IP-Address OK? Method Status Protocol

    FastEthernet0/0 192.168.100.4 YES manual up down

    FastEthernet0/1 192.168.100.9 YES manual up down

    AFTER CONNCTIVITY:

    Interface IP-Address OK? Method Status Protocol

    FastEthernet0/0 192.168.100.4 YES manual up up

    FastEthernet0/1 192.168.100.9 YES manual up up

    DATA COMMUNICATION 62 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    63/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    Routing Table Verification

    After configuring a router using a PC, the routing table of the particular router will

    only contain the addresses of networks associated with its own interface. So if we areinterested to connect the router with in an internetwork we must also specify the network

    addresses of other networks also.

    It can be seen from the following routing tables for both the routers R1 and R2

    below .

    ROUTER R1

    BEFORE static ROUTING:

    R1#sh ip route

    Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

    N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

    E1 - OSPF external type 1, E2 - OSPF external type 2

    i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2

    ia - IS-IS inter area, * - candidate default, U - per-user static route

    o - ODR, P - periodic downloaded static route

    Gateway of last resort is not set

    192.168.100.0/24 is variably subnetted, 2 subnets, 2 masks

    C 192.168.100.8/30 is directly connected, FastEthernet0/1

    C 192.168.100.0/29 is directly connected, FastEthernet0/0

    AFTER STATIC ROUTING:

    R1#sh ip route

    Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

    DATA COMMUNICATION 63 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    64/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

    E1 - OSPF external type 1, E2 - OSPF external type 2

    i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2

    ia - IS-IS inter area, * - candidate default, U - per-user static route

    o - ODR, P - periodic downloaded static route

    Gateway of last resort is not set

    192.168.100.0/24 is variably subnetted, 3 subnets, 2 masks

    S 192.168.100.12/30 is directly connected, FastEthernet0/1

    C 192.168.100.8/30 is directly connected, FastEthernet0/1

    C 192.168.100.0/29 is directly connected, FastEthernet0/0

    ROUTER R2

    BEFORE static ROUTING:

    R1#sh ip route

    Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

    N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

    E1 - OSPF external type 1, E2 - OSPF external type 2

    i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2

    ia - IS-IS inter area, * - candidate default, U - per-user static route

    o - ODR, P - periodic downloaded static route

    Gateway of last resort is not set

    192.168.100.0/30 is subnetted, 2 subnets

    C 192.168.100.12/30 is directly connected, FastEthernet0/0

    C 192.168.100.8/30 is directly connected, FastEthernet0/1

    DATA COMMUNICATION 64 RTTC

    TRIVANDRUM

  • 8/7/2019 Introduction onwards

    65/75

    MAJOR PROJECT REPORT2011 VLSM BASED IP DATA NETWORK

    AFTER STATIC ROUTING:

    R1#sh ip route

    Codes C - connected, S - static, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

    N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

    E1 - OSPF external type 1, E2 - OSPF external type 2

    i - IS-IS, su