Enterprise Network Using Cisco
Enterprise Network Using Cisco
Enterprise Network Using Cisco
Submitted by
in
NOVEMEBER 2022
BONAFIDE CERTIFICATE
SIGNATURE SIGNATURE
Mrs.P.Swathika Dr. J. Angela Jennifa Sujana,
Mepco Schlenk Engg. College, Sivakasi Mepco Schlenk Engg. College, Sivakasi
TABLE OF CONTENT
1 Introduction 4
1.1 Abstract……………………………………………………… 4
2 Implementation 5
2.1 Technology…………………………………………………. 5
2.2 Modules……………………………………………………… 5
3.1 Components…………………………………………………. 15
3.2 Design………………………………………………………. 16
3.3 Output………………………………………………………. 18
4 Conclusion 20
5 References 20
ACKNOWLEDGEMENT
Head of the Artificial Intelligence & Data Science department for their insightful
comments and valuable suggestions helped me to complete this project work successfully.
My sincere thanks go to our revered faculty members and lab technicians for their
help over this project work.
Last but not the least, I extend my indebtedness towards my beloved family and my
friends for their support which made this project a successful one.
1.1 Introduction:
This Enterprise Network Scenario is about designing a topology of a network that is a LAN
(Local Area Network) for a office in which various computers of different departments are set up so
that they can interact and communicate with each other by interchanging data. To design a
networking scenario for a office which connect various departments to each other’s, it puts forward
communication among different departments. CNS is used to design a systematic and well-planned
topology, satisfying all thenecessities of the college (i.e., client). CNS come up with a network with
good performance.
1.2 ABSTRACT:
Campus Network Management (CNM) is most needed in recent times like many
corporate universities opened many branches across the various places. The administrative
process and the main server are splitted into the various branches to access the network
under the same network. In this management, the computers can connect both via intra and
inter connectivity with other computers under the same organization main server, So CNM
using Cisco Packet Tracer emphasizes that the network connectivity through servers and
routers and switches and other computers in same location and in different location .
Packet Tracer offers an effective, interactive environment for learning networking concepts
and protocols. Most importantly, Packet Tracer helps students and instructors create their
own virtual “network worlds” for exploration, experimentation, and explanation of
networking concepts and technologies.
2.IMPLEMENTATION:
In this chapter, the knowledge gathered is applied into the commands and
configuration of various devices.
2.1 TECHNOLOGY:
STAR TOPOLOGY
There technically is no limit to how many computers can connect in a star topology.
However, network performance can decrease as more computers are connected, resulting
in slower network speeds.
ADVANTAGES:
Centralized management of the network through the use of the central computer,
hub, or switch.
Easy to add another computer to the network.
If one computer on the network fails, the rest of the network continues to function
normally.
IP ADDRESSING
IP address is an address having information about how to reach a specific host, especially outside
the LAN. An IP address is a 32 bit unique address having an address space of 232.
Generally, there are two notations in which IP address is written, dotted decimal notation and
hexadecimal notation.
Classful Addressing
Class A
Class B
Class C
Class D
Class E
Each of these classes has a valid range of IP addresses. Classes D and E are reserved for multicast
and experimental purposes respectively. The order of bits in the first octet determine the classes of
IP address.
Network ID
Host ID
The class of IP address is used to determine the bits used for network ID and host ID and the
number of total networks and hosts possible in that particular class. Each ISP or network
administrator assigns IP address to each device that is connected to its network.
Classless Addressing
ICMP PROTOCOL:
The Internet Control Message Protocol (ICMP) is a network layer protocol used by
network devices to diagnose network communication issues. ICMP is mainly used to
determine whether or not data is reaching its intended destination in a timely manner.
Commonly, the ICMP protocol is used on network devices, such as routers. ICMP is
crucial for error reporting and testing, but it can also be used in distributed denial-of-
service (DDoS) attacks.
USES OF ICMP:
The primary purpose of ICMP is for error reporting. When two devices connect
over the Internet, the ICMP generates errors to share with the sending device in the event
that any of the data did not get to its intended destination. For example, if a packet of data
is too large for a router, the router will drop the packet and send an ICMP message back to
the original source for the data.
The ping utility is a simplified version of traceroute. A ping will test the speed of
the connection between two devices and report exactly how long it takes a packet of data to
reach its destination and come back to the sender’s device. Although ping does not provide
data about routing or hops, it is still a very useful metric for gauging the latency between
two devices. The ICMP echo-request and echo-reply messages are commonly used for the
purpose of performing a ping.
Unlike the Internet Protocol (IP), ICMP is not associated with a transport layer
protocol such as TCP or UDP. This makes ICMP a connectionless protocol: one device
does not need to open a connection with another device before sending an ICMP message.
Normal IP traffic is sent using TCP, which means any two devices that exchange data will
first carry out a TCP handshake to ensure both devices are ready to receive data. ICMP
does not open a connection in this way. The ICMP protocol also does not allow for
targeting a specific port on a device.
IT DEPARTMENT (192.168.1.0)
IT LAB 1 192.168.1.3
IT LAB 2 192.168.1.4
IT LAB 3 192.168.1.5
IT LAB 4 192.168.1.6
Printer 0 192.168.1.7
CS LAB 1 192.168.2.3
CS LAB 2 192.168.2.4
CS LAB 3 192.168.2.5
CS LAB 4 192.168.2.6
Printer 7 192.168.2.7
OTHERS (192.168.3.0)
OFFICE 192.168.3.2
Printer 2 192.168.3.6
Printer 3 192.168.3.7
ENQUIRY 192.168.3.4
TPO 192.168.3.5
Printer 4 192.168.3.8
PC2 128.168.0.2
PC3 128.168.0.3
PC4 128.168.0.4
PC5 128.168.0.5
Printer 5 128.168.0.6
PC 0 192.168.4.2
LAPTOP 0 192.168.4.3
3.1 COMPONENTS:
Router
Switches
PCs
Printers
Servers
Connectivity Lines
ROUTER:
4. DHCP DNS
Switches:
It uses packet switching technique to receive and forward data packets from
the source to the destination device.
It is supports unicast (one-to-one), multicast (one-to-many) and broadcast
(one-to-all) communications.
Transmission mode is full duplex, i.e. communication in the channel occurs in
both the directions at the same time. Due to this, collisions do not occur.
Fig 3.2-Switches
SERVERS:
database servers, mail servers, print servers, file servers, web servers, application
servers, and game servers.
Most frequently client–server systems are implemented by the request–
response model., i.e., a client sends a request to the server. In this model server
performs some action and sends a response back to the client, typically with a result or
acknowledgement.
Fig 3.3-Servers
4. OUTPUT:
Fig No 4.1. The prototype of the proposed network is implemented on cisco packet tracer
Fig No 4.3
Fig No 4.4
Fig No 4.5
Fig No 4.6
Fig No 4.7
Fig No 4.8
Fig No 4.9
Fig No 4.10
5.CONCLUSION:
Thus the campus network management is successfully configured with the Cisco
Packet Tracer and routers will successfully connected to the main server and through
switches the IP address is assigned by the DHCP and uses RIP protocol to contact with the
systems in the other location from the main server. So the administrative process and
management process can be done easily and proper network management is done using
DNS,DHCP and RIP protocol.
REFERENCES:
https://www.tutorialspoint.com/what-are-switches-in-computer-network
https://www.geeksforgeeks.org/what-is-cisco-packet-tracer/
https://en.wikipedia.org/wiki/Packet_Tracer