SlideShare a Scribd company logo
1 of 35
Design and Simulation of Local Area Network Using Cisco Packet
Tracer
Implant Training report submitted in partial fulfillment of the requirement
for the award of
Diploma in Engineering
In
Computer Science & Engineering
Submitted by Under the guidance of
Abhishek kumar Mr. Md. Imran Alam
Board Roll No-511121818011 Lecturer, CSE
GOVERNMENT POLYTECHNIC, Barari, Bhagalpur
Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi,
Recognized by DST, Govt. of Bihar 812003
Nov-2020
GOVERNMENT POLYTECHNIC, Barari, Bhagalpur
Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi,
Recognized by DST, Govt. of Bihar 812003
Declaration
I, Abhishek kumar bearing Board Roll No 511121818011, hereby certify that the
Training/Project entitled “DESIGN AND SIMULATION OF LOCAL AREA NETWORK
USING CISCO PACKET TRACER”, carried out under the guidance of Mr. Md. Imran
Alam, Lecturer is submitted to State Board of Technical Education, Bihar, Patna in partial
fulfillment of the requirements for the award of Diploma in Engineering in Computer Science
& Engineering. This is a record of bonafide work carried out by me and the results embodied
in this report have not been reproduced or copied from any source. The results embodied in this
report have not been submitted to any other University or Institute for the award of any other
degree.
Date:27 November 2020 Abhishek Kumar
Roll No: 511121818011
Department of CSE, GP
Bhagalpur
I
GOVERNMENT POLYTECHNIC, Barari, Bhagalpur
Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi,
Recognized by DST, Govt. of Bihar 812003
Department of Computer Science & Engineering
Bonafide Certificate
This is to certify that the Project entitled “DESIGN AND SIMULATION OF LOCAL
AREA NETWORK USING CISCO PACKET TRACER”, being submitted by Abhishek
Kumar, bearing Roll No: 511121818011, to State Board of Technical Education, Bihar,
Patna in partial fulfillment of the requirements for the award of Diploma in Engineering in
Computer Science & Engineering, is a record of bonafide work carried out by him. The results
of investigations enclosed in this report have been verified and found satisfactory. The results
embodied in this report have not been submitted to any other University or Institute for the
award of any other degree or diploma.
PROJECT GUIDE HEAD OFTHE DEPARTMENT
II
ACKNOWLEDGEMENT
With great pleasure I take this opportunity to express my heartfelt gratitude to all the
persons who helped me in making this project work a success.
First of all, I am highly indebted to Principal, Dr. Aseem Kumar Thakur for giving
me the permission to carry out this project.
I would like to thank Mr. Kundan Kumar, Lecturer & Head of the Department (CSE),
for giving support throughout the period of my study at GP Bhagalpur. I am grateful for his
valuable suggestions and guidance during the execution of this project work.
My sincere thanks to project guide Mr. Md. Imran Alam for potentially explaining the
entire system and clarifying the queries at every stage of the project.
I would also thank to IT DESK INDIA PVT LTD who provided immense support as
well as answers to our queries that I kept firing on them during the development of this
application. My whole hearted thanks to the staff of GP Bhagalpur who co-operated us for the
completion of project in time.
I also thank my parents and friends who aided me in completion of the project/training.
III
IV
Table of Contents
Declarationt..................................................................................................................................I
Bonafide certificate....................................................................................................................II
Acknowledgement.................................................................................................................. III
1.Introduction 1
1.1 Motivation 1
1.2 Problem statement 1
1.3 Objective 2
1.4 Limitation of project 3
1.5 Organization 4
2.Literature survey 5
2.1 Introduction 5
2.2 Existing system 5
2.3 Proposed system 6
3.Theoretical background 7
3.1Introduction of network topology 7
3.1.1 Bus topology 7
3.1.2 Star topology 8
3.1.3 Ring topology 8
3.1.4 Mesh topology 9
3.1.5 Hybrid topology 9
3.2 Communication media 10
3.2.1 Coaxial cable 10
3.2.2 Twisted pair cable 10
3.2.3 Optic fiber cable 10
3.2.4 Wireless 11
3.3 Networking device 11
3.3.1 Router 11
3.3.2 Switch 13
3.4 IP address 13
3.5 Subnetting 15
3.5.1Introduction 15
3.5.2Subnet mask 15
4. Experimental investigation 16
4.1Research method 16
4.2Design 17
4.2.1First network 17
4.2.1.1Assigning IP 18
IV
4.2.1.2Assigning IP address to PC 19
4.2.2 Second network 22
4.2.3Third network 22
4.2.4Fourth network 23
5.Testing and result 25
5.1Ping test 25
6.Conclusion & Future scope 27
6.1Conclusion 27
6.2Future scope 27
Table of Figures
1. Figure 2.1 – Interface of CPT
2. Figure 3.1- Bus topology
3. Figure 3.2- Star topology
4. Figure 3.3- Ringtopology
5. Figure 3.4- meshtopology
6. Figure 3.5 - Router
7. Figure 3.6 - Switch
8. Figure 3.7 – usable host
9. Figure 4.1- Firstnetwork
10. Figure 4.2-Desktopof PC
11. Figure 4.3- Interface of IPconfiguration
12. Figure 4.4- Interface of IPaddressandsubnetmask
13. Figure 4.5- Interface of router
14. Figure 4.6 – Firstnetwork
15. Figure 4.7- Secondnetwork
16. Figure 4.8- Thirdnetwork
17. Figure 4.9-Fourthnetwork
18. Figure 5- Complete diagramof mynetwork
19. Figure 5.1- ReplyfromHOD’sPC
20. Figure 5.2- ReplyfromExaminationDepartment
21. Figure 5.3- ReplyfromLibraryDepartment
22. Figure 5.4- ReplyfromLab Department
V
Table of Tables
1. Table 3.1-Classesof IPaddress
2. Table 3.2 -Classesof IPwithHOSTaddress
3. Table 4.1-IP forfirstnetwork
4. Table 4.2- IP addressof router1 at all interfaces
5. Table 4.3- IP addressof Router0, Router2, Router3 at all interfaces
VI
CHAPTER 1
Introduction
1.1 MOTIVATION
Computer networks have become extremely important in our present-day
society. A majority of companies depend on the proper functioning of their networks for
communications, administration, automation, e-business solutions, etc. The Local Area
Network (LAN) is the most basic and important computer network owned by individual
companies and could be used for interconnection with wide area networks. A LAN permits
effective cost sharing of high-value data processing equipment such as mass storage media,
mainframe computers or minicomputers, and high-speed printers. Resource sharing is
probably equally as important where a LAN serves as the access vehicle for an intranet or the
Internet. In view of this, system managers need professional tools to help them with the design
and maintenance of LANs.
1.2 Problemdefinition
A simulation tool offers a way to predict the impact on the network of a hardware
upgrade, a change in topology, an increase in traffic load or the use of a new application. So,
in this paper, a LAN network is designed using “Cisco Packet Tracer”. The paper describes
how the tool can be used to develop a simulation model of the LAN for the College of diploma
in Engineering Government polytechnic, Barari, Bhagalpur. The study provides an insight into
various concepts such as topology design, IP address configuration and how to send
information in form of packets in a single network and the use of Virtual Local Area Networks
(VLANs) to separate the traffic generated by different departments.
1.3 Objective
Cisco Packet Tracer is also used by professional network administrators for testing
network changes. Before changing a network, the user can try out new topology changes to
see if everything works correctly. If there aren’t any hiccups then the changes can be deployed
in a live network.
The objective of this “Design and Simulation of Local Area Network Using Cisco Packet
Tracer” project is: -
 To study of topology
 To design topology of college department system
 To study of network IP, IP address, subnetting
 To study of routers, switches pc IOT
 To connecting switch
 To connecting routers
 To configuring routers
 To configuring pcs
 To connecting routers, switch, pc
 To simulate how to send information in form of packets in a single network and the use
of Virtual Local Area Networks (VLANs) to separate the traffic generated by different
departments.
1.4. Limitations of project
o The first major limitation of this program is the more in depth you get with
programming and making your own networks the harder it can become. With
options such as blank routers and PCs dragging one of the incorrect entities into the
program can leads to errors which can be annoying and hard to find and fix and
overcome. This can be really frustrating and lead to a lot of beginners becoming
confused and impact their learning.
o Another major limitation is the fact that some of the entities in the program have to
be manually turned on to function. This includes routers and switches which if not
turned on will not work and this can also lead to networks not working properly
and again errors in running your networks.
o Another limitation is to do with the startup of the program. When installing it I had
a good few problem setting it up with file locations and temporary file storage. A
quick you tube search helped to resolve this problem but again this is annoying
again for the user and the user side of things.
o Last limitation of the program is the different versions of the program. It might not
seem like a big issue but with the last update of the program they gave the whole
home screen and navigation bars a makeover which when learning it all on the old
version has made it difficult to get used to and some of my lecture notes were done
in the old version and I found this hard to get used to.
1.5 Organizationof project
The paper describes how the CPT tool can be used to develop a simulation model of
the LAN for the College of diploma in Engineering Government polytechnic, Barari,
Bhagalpur. The study provides an insight into various concepts such as topology design,
IP address configuration and how to send information in form of packet in a single
network and the use of Virtual Local Area Networks (VLANs) to separate the traffic
generated by the different departments. VLANs are a new type of LAN architecture using
intelligent, high-speed switches. The simulation results and performance analyses showed
that the design was successful.
The rest of the paper is organized as follows: Chapter 2
discusses literature review. This is followed by a discussion in Chapter3, in this chapter
we discuss all the theory part. The concept of IPv4 addressing and subnetting is presented
in Chapter 4. The development of the LAN simulation model is presented in chapter 4;
while Chapter 5presents testing and their results. Lastly in Chapter 6 is the conclusion and
future scope.
CHAPTER 2
Literature Survey
2.1 Introduction
The need for computer networking was borne out of the need to use personal
computers for sharing information within an organization in form of messages, sharing files
and data bases and so forth. Whether the organization is located in one building or spread over
a large campus, the need for networking the computers cannot be over emphasized. As the
name implies, a Local Area Network (LAN) interconnects computer in a limited geographic
area. It provides high-bandwidth communication over inexpensive transmission media. The
corporate LAN has evolved from a passive background business component to a highly active,
visible core asset that enterprises rely on to support day-to-day operations critical to their
market success. Today’s network is a strategic instrument that must be accessible anytime
from anywhere-simultaneously offering fast, secure, reliable services at scale regardless of
location. The main purpose of a network is to reduce isolated users and workgroups. All
systems should be capable of communicating with others and should provide desired
information. Additionally, physical systems and devices should be able to maintain and
provide satisfactory performance, reliability and security. Resource sharing is probably
equally of immense importance where a LAN serves as the access vehicle for an intranet or
the Internet.
2.2 Existing system
Network design is a crucial aspect of any enterprise- grade network. The way a
network is designed impacts our network monitoring capabilities and our overall system
performance, making it as important a factor as the infrastructure itself. There are many tools
for making design of LAN such as CADE, Día Diagram Editor, Microsoft Visio.
Visio is best known diagram mapping tools available and been for many years. But we
use this for making only layout of LANs. it does not provide environment for real- simulation
for testing.
2.3 Proposedsystem
Cisco packet tracer provides real-time environment simulation. CPT offers a way to
predict the impact on the network of a hardware upgrade, a change in topology, an increase in
traffic load or the use of a new application. So, in this paper, a LAN network is designed using
Cisco Packet Tracer.
Cisco Packet Tracer (CPT) is a multi-tasking network simulation
software that can be used to perform and analyze various network activities such as
implementation of different topologies, selection of optimum path based on various routing
algorithms, creation of appropriate servers, subnetting, and analysis of various network
configuration and troubleshooting commands. In order to start communication between end
user devices and to design a network, we need to select appropriate networking devices like
routers, switches, hubs and make physical connection by connecting cables to serial and fast
Ethernet ports from the component list of packet tracer. Networking devices are costly so it is
better to perform first on packet tracer to understand the concept and behavior of the network.
Interface of CPTFigure 2.1:
CHAPTER 3
Theoretical background
In this chapter we discuss all theory part of devices are used in our project, design of our
project and implementation.
3.1 Introduction of network topology
For interconnectivity of components, network topology describes the physical and
logical appearance and interconnection between arrangement of computers, cables and other
components in a data communication network and how it can be used for taking a packet from
one device and sending it through the network to another device on a different network. A
network topology is the physical layout of computers, cables, and other components on a
network. There are a number of different network topologies, and a network may be built
using multiple topologies. The different types of network topologies are: Bus topology, Star
topology, Mesh topology, Ring topology, Hybrid topology.
3.1.1 Bus topology-
A bus topology uses a single backbone cable that is terminated at both ends.
All the hosts connect directly to this backbone.
Figure 3.1: Bus Topology
3.1.2 Star topology
In star topology each device in network is connected to a central device called hub -In
this type of topology devices communicate through hub. If any devices want to send data to
other device, it has to first send data to hub and then hub transmit that data to the designated
devices.
3.1.3 Ring topology
In ring topology each device is connected with the two devices on either side of it.
There are two dedicated point to point links a device has with the devices on the either side of
it. This structure forms a ring thus it is known as ring topology. If a device wants to send data
to another device then it sends the data in one direction, each device in ring topology has a
repeater, if the received data is intended for other device then repeater forwards this data until
the intended device receives it.
Figure 3.2: Star Topology
Figure 3.3: Ring Topology
3.1.4 Meshtopology
In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link
only carries data for the two connected devices only. Let’s say we have n devices in the
network then each device must be connected with (n-1) devices of the network.
Number of links in a mesh topology of n devices would be n(n-1)/2.
3.1.5 Hybrid topology
A combination of two or more topology is known as hybrid topology. For
example, a combination of star and mesh topology is known as hybrid
topology.
Figure3.4: Mesh Topology
3.2 COMMUNICATION MEDIA
Network devices are connected together using a medium, the medium can be cables
which can either be coaxial cable or twisted pair cable or it can be by optic fiber cables or the
medium can be free space (air) by the use of radio waves. A discussion of the media is as
outlined below.
3.2.1 Coaxial Cable
This cable is composed of two conductors. One of the conductors is an inner insulated
conductor and this inner insulated conductor is surrounded by another conductor. This second
conductor is sometimes made of a metallic foil or woven wire. Because the inner conductor is
shielded by the metallic outer conductor, coaxial cable is resistant to electromagnetic
interference (EMI). Coaxial cables have an associated characteristic impedance, which needs to
be balanced with the device (or terminator) with which the cable connects. There are two types
of coaxial cables: Thicket (10Base5), and Thinnet (10Base2). The two differ in thickness (1/4-
inch for thicket and ½-inch for thin net) and in maximum cable distance that the signal can travel
(500 meters for thicket and 185 meters for thin net). A transceiver is often connected directly to
the Thicket cable using a connector known as vampire tap.
3.2.2 Twisted Pair Cable
This is the most popular LAN media type in use today. Individual insulated copper
strands are intertwined into a twisted pair cable. Two categories/types of twisted pair cable
include Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP).
3.2.3 Optic Fiber Cable
An alternative to copper cabling is fiber–optic cabling, which sends light through an optic fiber.
Using light instead of electricity makes fiber optics immune to EMI. Also depending on the
layer 1 technology being used, fiber-optic cables typically have greater maximum distance
between networked devices and greater data carrying capacity.
3.2.4Wireless
Not all media is physical, as is the case with wireless technologies. Wireless clients gain access
to a wired network by communicating via radio waves with a wireless access point (AP). The
access point is then hardwired to a LAN. All wireless devices connecting to the same AP are
considered to be on the same shared network segment, which means that only one device can
send data to and receive data from an AP at any one time (half duplex communication).
3.3 Networking devices
Equipment that connects directly to a network segment is referred to as a device.
These devices are broken up into two classifications.
o end-user devices
o network devices
End-user devices include computers, printers, scanners, and other devices that provide services
directly to the user.
Network devices include all the devices that connect the end-user devices together to allow them
to communicate.
There are many networking devices;
• Repeaters
• Hub
• Switch
• Bridge
• Router
• Pc
3.3.1 Router
A router is a special type of computer. It has the same basic components as a standard desktop
PC. However, routers are designed to perform some very specific functions. Just as computers
need operating systems to run software applications, routers need the Internetwork Operating
System software (IOS) to run configuration files. These configuration files contain the
instructions and parameters that control the flow of traffic in and out of the routers. The many
parts of a router are shown below:
Routers have all capabilities of the previous devices. Routers can regenerate signals, concentrate
multiple connections, convert data transmission formats, and manage data transfers. They can
also connect to a WAN, which allows them to connect LANs that are separated by great
distances.
In this project we use Router 2911. Router 2911 has the property of auxiliary, console
and fast Ethernet. Most advantage of this router is it has three interface 0/0,0/1,0/2.
Auxiliary Port:
Auxiliary port is used for the connection which is being initiated soon. This port has a capability
to accept the data packet if it consists of any error. There is no Control Redundancy Check
(CRC) or Frame Checking System (FRS) in this port.
Console Port/Cable: Console is type of cable used for configuration purposes. The port
availability is used to connect console cable to the router. This port has CRC system and can
only accept from outer end devices.
Fast Ethernet 0/0,0/1 and 0/2:
The Ethernet connectivity is also available in router 2911. Ethernet describes which port and
cable to be used for internet connectivity. In this router three ports are available in every router.
They are “0/0”,”0/1” and “0/2”.
Figure 3.5: Router
3.3.2 Switch
Switches can determine whether data should remain on a LAN or not, and they can transfer the
data to the connection that needs that data.
Switches are Data Link layer devices.
Each Switch port has a unique MAC address.
Connected host MAC addresses are learned and stored on a MAC address table.
Switch 2960-24TT is used in this project. It has 24 fast Ethernet interface and 2 gigabit Ethernet
interfaces.
3.4 IP ADDRESSING
Using the IP address of the destination network, a router can deliver a packet to the correct
network.
When the packet arrives at a router connected to the destination network, the router uses the IP
address to locate the particular computer connected to that network.
Accordingly, every IP address has two parts.
IP Addressing is a hierarchical structure. An IP address combines two identifiers into one
number. This number must be a unique number, because duplicate addresses would make
routing impossible. The first part identifies the system's network address. The second part, called
the host part, identifies which particular machine it is on the network.
Figure 3.6: Switch
IP addresses are divided into classes to define the large, medium, and small networks.
Class A addresses are assigned to larger networks.
Class B addresses are used for medium-sized networks, &
Class C for small networks.
Classes of Addresses
There are five classes of IP addresses and they are shown in the Table 3.1
TABLE-3.1
Address class Value in First Octet
A 1-126
B 128 – 191
C 192 – 223
D 224 – 239
Figure 3.7: usable IP
E 240 – 255
IP addresses can be dynamically configured using DHCP or they can be statically configured
by inputting it manually on the device.
3.5 SUBNETTING
Subnetting is the process of stealing bits from the host part of an IP address in order to divide
the larger network into smaller sub-networks called subnets [8]. After subnetting, network
subnet host fields are created. An IP address is always reserved to identify the subnet and another
one to identify the broadcast address within the subnet.
Subnetting a network means to use the subnet mask to divide the network and break a large
network up into smaller, more efficient and manageable segments, or subnets.
With subnetting, the network is not limited to the default Class A, B, or C network masks and
there is more flexibility in the network design.
Subnet addresses include the network portion, plus a subnet field and a host field. The ability to
decide how to divide the original host portion into the new subnet and host fields provides
addressing flexibility for the network administrator.
3.5.2 Subnet Mask
For the subnet scheme to work, every host (machine) on the network must know which part of
the host address will be used as the subnet address. This is accomplished by assigning subnet
mask to each machine. A subnet mask is a 32-bit value that allows the recipient of an IP packet
to distinguish the network ID portion of the IP address from the host ID portion of the IP address.
Table 3.2 shows the default subnet masks for all classes of network.
TABLE 3.2
CLASSES OF IP FORMAT DEFAULT SUBNET MASK
A Network.node.node.node 255.0.0.0
B Network.network.node.node 255.255.0.0
C Network.network.network.node 255.255.255.0
CHAPTER 4
Experimental Investigations
In this chapter we discuss the development of LAN simulation model
4.1 Researchmethod
Starting of this research is to conduct data collection, using observation techniques, to
inventories existing network equipment and computer hardware devices and software tools are
used. The next step is to interview relevant parties, in this case is a computer lab coordinator
who is directly responsible for the conditions that exist in the computer lab. After getting all
the information about the devices used and the activities running on a research, further
research from the literature to study the problems faced in order to identify the problem as a
whole. The proposed development method will design into a new network topology that uses
an application Cisco Packet Tracer network simulation. The design of this new network
solution that emphasizes efficiency, because the devices will still be used, without having to
replace the whole. The next step is a simulation of the new network to test if the method
proposed development has been solving the problems that exist in the computer lab.
Evaluation of the results of the simulation to be important in proving that the proposed method
possible to have an increase in accordance with the objectives of this research, namely to
increase the performance and security on the LAN.
One of such key performance indicators is how flexible a network can be without a
compromise on its objective. It combines hardware, software, cables, operating systems,
switches, routers, hubs for communication to take place). Hierarchical model is employed in
LAN designs. In a hierarchical model designs are done in layers.
4.2 DESIGN
we design network step by step for all four department.
4.2.1 First network for College department
Take one router, one switch, and four PCs and connect four PCs with the switch by
using copper straight-through wire. Then router connect with switch. Also take one IOT things
and one IOT alarm and connect them with switch.
4.2.1.1 Assigning IP
If you want to computers communicate network in the network, they must have same IP
address.
The table of IP for first network.
Table 4.1
DEVICES(PC) IP ADDRESS SUBNET MASK
Principle 192.168.1.36 255.255.255.240
Hod 192.168.1.35 255.255.255.240
Exam controller 192.168.1.34 255.255.255.240
Director 192.168.1.37 255.255.255.240
IOT things 192.168.1.39 255.255.255.240
Alarm 192.168.1.38 255.255.255.240
Figure 4.1: First Network
4.2.1.2 Assign IP address To PCs in first network
CLICK ON PC AND GO TO DESKTOP.
Again, click on IP configuration.
Figure 4.2: Desktop of pc
Figure 4.3: Interface of IP configuration
Insert IP address and subnet mask
Same as insert IP address for all pc od first network and also for IOT things and alarm as
shown in Table
Now Insert IP address on router1 at all interface.
INTERFACE IP ADDRESS SUBNET MASK
GigabitEthernet0/0 192.168.1.1 255.255.255.240
GigabitEthernet0/1 192.168.1.146 255.255.255.240
GigabitEthernet0/2 192.168.1.33 255.255.255.240
Figure 4.4: Interface of IP address and subnet mask
Table 4.2
THIS IS A FIRST COMPLETE NETWORK
Figure 4.5: Interface of Router
Figure 4.6: First Network
Same as pervious: These two networks are same as pervious which I have discussed.
4.2.2 SECOND NETWORK
4.2.3THIRD NETWORK
Figure 4.7
Figure 4.8
4.2.4 Fourth network
4.3 Connectrouters
If you want to routers communicate in the network, they must be assigning IP address
Click on router and insert IP of router0, router2, router3 at all interface with the help of table
Router name GigabitEthernet0/0 GigabitEthernet0/1 GigabitEthernet0/2
Router0 192.168.1.2 192.168.1.61 192.168.1.81
Router2 192.168.1.62 192.168.1.113 192.168.1.129
Router3 192.168.1.145 192.168.1.114 192.168.1.177
Figure 4.9
Table 4.3
This is my complete network
Figure 5: Complete diagram of the college of engineering local area network as created in
packet tracer environment
CHAPTER 5
TESTING AND RESULTS
In this chapter we test all pc for checking they are work or not using Cisco
packet tracer and see the result.
5.1 Ping test
Network connectivity and communication can be tested using a ping command,
followed by the domain name or the IP address of the device (equipment) one wishes to test
connectivity to. Two VLANs have been added to the existing network and the ping test was
performed to test if the devices connected to those VLANs are communicating with the rest of
the devices on the network. The results obtained are as shown in Fig
Principle’s pc to HOD’s pc Principle’s pc to EC’ pc
Figure 5.1 Figure 5.2
Principle’s pc to Ex- depart. Principle’s pc to library department
Principle’s pc to lab department
Figure 5.3
Figure 5.4
Figure 5.5
CHAPTER 6
Conclusions & Future Scope
6.1 conclusions
In this paper, a Local Area Network (LAN) that uses both wired and wireless topology have
been implemented with some important concepts using cisco packet tracer. It is observed that
the network is performing well, this is because when we compared the ping test of the network
designed to the ping test on the existing network of College of diploma in Engineering,
polytechnic college, barari, the values were similar. Fig. 7 shows the ping test on the live
network in existence.
At last I want to conclude that, according to me I have a great experience while
working on this software cisco packet tracer.
6.2 Future Scope
By using this software (Packet Tracer) we can improve the quality of the IT Infrastructure,
Datacenter, Software simulation which we can’t get by hand drafting. By the help of this
software, drawing can be easily modified whenever wanted which reduces the human effort.
files can be transfer from one place to another very easily by using this software.
Reference
[1]. Tim Reardon, Planning, Designing and operating local area networks, DISAM Journal,
Summer, 1997.
[2]. www.wikipedia.org/wiki/computer_networks, Retrieved 10th October, 2016.
[3]. www.wikipedia.org/wiki/local_area_network, Retrieved 10th October, 2016.
[4]. Garima Jain, Nasreen Noor ani, Nisha Kiran, Sourabh Sharma, Designing & simulation
of topology network using Packet Tracer, International Research Journal of Engineering and
Technology (IRJET), 2(2), 2015.
[6]. Kenan Xu, Performance analysis of differentiated QoS MAC in wireless local area
networks (WLANs), Thesis Submitted to the Department of Electrical and Computer
Engineering, Queen’s University, Canada. September, 2003.
[7]. David D. C., Kenneth T.P., David P.R, An introduction to local area networks, Proc. of
the IEEE conf., Vol. 66, 1978. [8]. Todd Lammle, Cisco Certified network associate study
guide (Wiley Publishing Inc., 2007).
[8]. Cisco URL- https://www.netacad.com/
[9]. Cisco packet tracer- https://www.netacad.com/courses/packet-tracer
For any question contact me-abhiabhishek.1137@gmail.com
Design and Simulation of Local Area Network Using Cisco Packet Tracer

More Related Content

What's hot

THIRED YEAR MINI PROJECT PPT
THIRED YEAR MINI PROJECT PPTTHIRED YEAR MINI PROJECT PPT
THIRED YEAR MINI PROJECT PPT
MATHAVAN S
 
Design and simulation of wireless local area network for administrative offic...
Design and simulation of wireless local area network for administrative offic...Design and simulation of wireless local area network for administrative offic...
Design and simulation of wireless local area network for administrative offic...
Alexander Decker
 

What's hot (20)

Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security Manager
 
Bus Topology Design in Cisco Packet Tracer
Bus Topology Design in Cisco Packet TracerBus Topology Design in Cisco Packet Tracer
Bus Topology Design in Cisco Packet Tracer
 
Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
 
Final project report
Final project reportFinal project report
Final project report
 
FINAL PROJECT REPORT IOT BASED AUTOMATED IRRIGATION SYSTEM
FINAL PROJECT REPORT IOT BASED AUTOMATED IRRIGATION SYSTEMFINAL PROJECT REPORT IOT BASED AUTOMATED IRRIGATION SYSTEM
FINAL PROJECT REPORT IOT BASED AUTOMATED IRRIGATION SYSTEM
 
College Network
College NetworkCollege Network
College Network
 
Final internship-report on the networking department of the internet service ...
Final internship-report on the networking department of the internet service ...Final internship-report on the networking department of the internet service ...
Final internship-report on the networking department of the internet service ...
 
Syed IoT - module 5
Syed  IoT - module 5Syed  IoT - module 5
Syed IoT - module 5
 
THIRED YEAR MINI PROJECT PPT
THIRED YEAR MINI PROJECT PPTTHIRED YEAR MINI PROJECT PPT
THIRED YEAR MINI PROJECT PPT
 
Performance Analysis of Wired, Wireless and Optical Network using NS2
Performance Analysis of Wired, Wireless and Optical Network using NS2Performance Analysis of Wired, Wireless and Optical Network using NS2
Performance Analysis of Wired, Wireless and Optical Network using NS2
 
Lecture notes on mobile communication
Lecture notes on mobile communicationLecture notes on mobile communication
Lecture notes on mobile communication
 
Ch 06
Ch 06Ch 06
Ch 06
 
Design and simulation of wireless local area network for administrative offic...
Design and simulation of wireless local area network for administrative offic...Design and simulation of wireless local area network for administrative offic...
Design and simulation of wireless local area network for administrative offic...
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
VTU final year project report
VTU final year project reportVTU final year project report
VTU final year project report
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Design and implementation of home automation system u...
Design and implementation of home                         automation system u...Design and implementation of home                         automation system u...
Design and implementation of home automation system u...
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 

Similar to Design and Simulation of Local Area Network Using Cisco Packet Tracer

WIRELESS ROBOT
WIRELESS ROBOTWIRELESS ROBOT
WIRELESS ROBOT
AIRTEL
 
interoperatbility between IPv4 and IPv6
interoperatbility between IPv4 and IPv6interoperatbility between IPv4 and IPv6
interoperatbility between IPv4 and IPv6
Nitin Gehlot
 
181114051_Intern Report (11).pdf
181114051_Intern Report (11).pdf181114051_Intern Report (11).pdf
181114051_Intern Report (11).pdf
ToshikJoshi
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
firstlast467690
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
hlksd
 

Similar to Design and Simulation of Local Area Network Using Cisco Packet Tracer (20)

finalwithrec4
finalwithrec4finalwithrec4
finalwithrec4
 
WIRELESS ROBOT
WIRELESS ROBOTWIRELESS ROBOT
WIRELESS ROBOT
 
Minor project report format for 2018 2019 final
Minor project report format for 2018 2019 finalMinor project report format for 2018 2019 final
Minor project report format for 2018 2019 final
 
interoperatbility between IPv4 and IPv6
interoperatbility between IPv4 and IPv6interoperatbility between IPv4 and IPv6
interoperatbility between IPv4 and IPv6
 
Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewt
 
Thesis v06-13th jan
Thesis v06-13th janThesis v06-13th jan
Thesis v06-13th jan
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharing
 
181114051_Intern Report (11).pdf
181114051_Intern Report (11).pdf181114051_Intern Report (11).pdf
181114051_Intern Report (11).pdf
 
Intranet database
Intranet databaseIntranet database
Intranet database
 
Report training
Report trainingReport training
Report training
 
edge-computing
edge-computingedge-computing
edge-computing
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
IOT Personal Weather Station
IOT Personal Weather StationIOT Personal Weather Station
IOT Personal Weather Station
 
IRJET- Online Programming Assessment and Evaluation Platform in Education System
IRJET- Online Programming Assessment and Evaluation Platform in Education SystemIRJET- Online Programming Assessment and Evaluation Platform in Education System
IRJET- Online Programming Assessment and Evaluation Platform in Education System
 
Adaptive Computing Seminar Report - Suyog Potdar
Adaptive Computing Seminar Report - Suyog PotdarAdaptive Computing Seminar Report - Suyog Potdar
Adaptive Computing Seminar Report - Suyog Potdar
 
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...Implementing Saas as Cloud controllers using Mobile Agent based technology wi...
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...
 
Sport.net(2).doc
Sport.net(2).docSport.net(2).doc
Sport.net(2).doc
 
combinepdf
combinepdfcombinepdf
combinepdf
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
 
travel guidence.pdf
travel guidence.pdftravel guidence.pdf
travel guidence.pdf
 

Recently uploaded

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Design and Simulation of Local Area Network Using Cisco Packet Tracer

  • 1. Design and Simulation of Local Area Network Using Cisco Packet Tracer Implant Training report submitted in partial fulfillment of the requirement for the award of Diploma in Engineering In Computer Science & Engineering Submitted by Under the guidance of Abhishek kumar Mr. Md. Imran Alam Board Roll No-511121818011 Lecturer, CSE
  • 2. GOVERNMENT POLYTECHNIC, Barari, Bhagalpur Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi, Recognized by DST, Govt. of Bihar 812003 Nov-2020 GOVERNMENT POLYTECHNIC, Barari, Bhagalpur Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi, Recognized by DST, Govt. of Bihar 812003 Declaration I, Abhishek kumar bearing Board Roll No 511121818011, hereby certify that the Training/Project entitled “DESIGN AND SIMULATION OF LOCAL AREA NETWORK USING CISCO PACKET TRACER”, carried out under the guidance of Mr. Md. Imran Alam, Lecturer is submitted to State Board of Technical Education, Bihar, Patna in partial fulfillment of the requirements for the award of Diploma in Engineering in Computer Science & Engineering. This is a record of bonafide work carried out by me and the results embodied in this report have not been reproduced or copied from any source. The results embodied in this report have not been submitted to any other University or Institute for the award of any other degree. Date:27 November 2020 Abhishek Kumar Roll No: 511121818011 Department of CSE, GP Bhagalpur I
  • 3. GOVERNMENT POLYTECHNIC, Barari, Bhagalpur Affiliated to S.B.T.E, Bihar, Patna, Approved by AICTE New Delhi, Recognized by DST, Govt. of Bihar 812003 Department of Computer Science & Engineering Bonafide Certificate This is to certify that the Project entitled “DESIGN AND SIMULATION OF LOCAL AREA NETWORK USING CISCO PACKET TRACER”, being submitted by Abhishek Kumar, bearing Roll No: 511121818011, to State Board of Technical Education, Bihar, Patna in partial fulfillment of the requirements for the award of Diploma in Engineering in Computer Science & Engineering, is a record of bonafide work carried out by him. The results of investigations enclosed in this report have been verified and found satisfactory. The results embodied in this report have not been submitted to any other University or Institute for the award of any other degree or diploma. PROJECT GUIDE HEAD OFTHE DEPARTMENT II
  • 4. ACKNOWLEDGEMENT With great pleasure I take this opportunity to express my heartfelt gratitude to all the persons who helped me in making this project work a success. First of all, I am highly indebted to Principal, Dr. Aseem Kumar Thakur for giving me the permission to carry out this project. I would like to thank Mr. Kundan Kumar, Lecturer & Head of the Department (CSE), for giving support throughout the period of my study at GP Bhagalpur. I am grateful for his valuable suggestions and guidance during the execution of this project work. My sincere thanks to project guide Mr. Md. Imran Alam for potentially explaining the entire system and clarifying the queries at every stage of the project. I would also thank to IT DESK INDIA PVT LTD who provided immense support as well as answers to our queries that I kept firing on them during the development of this application. My whole hearted thanks to the staff of GP Bhagalpur who co-operated us for the completion of project in time. I also thank my parents and friends who aided me in completion of the project/training. III
  • 5. IV
  • 6. Table of Contents Declarationt..................................................................................................................................I Bonafide certificate....................................................................................................................II Acknowledgement.................................................................................................................. III 1.Introduction 1 1.1 Motivation 1 1.2 Problem statement 1 1.3 Objective 2 1.4 Limitation of project 3 1.5 Organization 4 2.Literature survey 5 2.1 Introduction 5 2.2 Existing system 5 2.3 Proposed system 6 3.Theoretical background 7 3.1Introduction of network topology 7 3.1.1 Bus topology 7 3.1.2 Star topology 8 3.1.3 Ring topology 8 3.1.4 Mesh topology 9 3.1.5 Hybrid topology 9 3.2 Communication media 10 3.2.1 Coaxial cable 10 3.2.2 Twisted pair cable 10 3.2.3 Optic fiber cable 10 3.2.4 Wireless 11 3.3 Networking device 11 3.3.1 Router 11 3.3.2 Switch 13 3.4 IP address 13 3.5 Subnetting 15 3.5.1Introduction 15 3.5.2Subnet mask 15 4. Experimental investigation 16 4.1Research method 16 4.2Design 17 4.2.1First network 17 4.2.1.1Assigning IP 18 IV
  • 7. 4.2.1.2Assigning IP address to PC 19 4.2.2 Second network 22 4.2.3Third network 22 4.2.4Fourth network 23 5.Testing and result 25 5.1Ping test 25 6.Conclusion & Future scope 27 6.1Conclusion 27 6.2Future scope 27 Table of Figures 1. Figure 2.1 – Interface of CPT 2. Figure 3.1- Bus topology 3. Figure 3.2- Star topology 4. Figure 3.3- Ringtopology 5. Figure 3.4- meshtopology 6. Figure 3.5 - Router 7. Figure 3.6 - Switch 8. Figure 3.7 – usable host 9. Figure 4.1- Firstnetwork 10. Figure 4.2-Desktopof PC 11. Figure 4.3- Interface of IPconfiguration 12. Figure 4.4- Interface of IPaddressandsubnetmask 13. Figure 4.5- Interface of router 14. Figure 4.6 – Firstnetwork 15. Figure 4.7- Secondnetwork 16. Figure 4.8- Thirdnetwork 17. Figure 4.9-Fourthnetwork 18. Figure 5- Complete diagramof mynetwork 19. Figure 5.1- ReplyfromHOD’sPC 20. Figure 5.2- ReplyfromExaminationDepartment 21. Figure 5.3- ReplyfromLibraryDepartment 22. Figure 5.4- ReplyfromLab Department V
  • 8. Table of Tables 1. Table 3.1-Classesof IPaddress 2. Table 3.2 -Classesof IPwithHOSTaddress 3. Table 4.1-IP forfirstnetwork 4. Table 4.2- IP addressof router1 at all interfaces 5. Table 4.3- IP addressof Router0, Router2, Router3 at all interfaces VI
  • 9. CHAPTER 1 Introduction 1.1 MOTIVATION Computer networks have become extremely important in our present-day society. A majority of companies depend on the proper functioning of their networks for communications, administration, automation, e-business solutions, etc. The Local Area Network (LAN) is the most basic and important computer network owned by individual companies and could be used for interconnection with wide area networks. A LAN permits effective cost sharing of high-value data processing equipment such as mass storage media, mainframe computers or minicomputers, and high-speed printers. Resource sharing is probably equally as important where a LAN serves as the access vehicle for an intranet or the Internet. In view of this, system managers need professional tools to help them with the design and maintenance of LANs. 1.2 Problemdefinition A simulation tool offers a way to predict the impact on the network of a hardware upgrade, a change in topology, an increase in traffic load or the use of a new application. So, in this paper, a LAN network is designed using “Cisco Packet Tracer”. The paper describes how the tool can be used to develop a simulation model of the LAN for the College of diploma in Engineering Government polytechnic, Barari, Bhagalpur. The study provides an insight into various concepts such as topology design, IP address configuration and how to send information in form of packets in a single network and the use of Virtual Local Area Networks (VLANs) to separate the traffic generated by different departments.
  • 10. 1.3 Objective Cisco Packet Tracer is also used by professional network administrators for testing network changes. Before changing a network, the user can try out new topology changes to see if everything works correctly. If there aren’t any hiccups then the changes can be deployed in a live network. The objective of this “Design and Simulation of Local Area Network Using Cisco Packet Tracer” project is: -  To study of topology  To design topology of college department system  To study of network IP, IP address, subnetting  To study of routers, switches pc IOT  To connecting switch  To connecting routers  To configuring routers  To configuring pcs  To connecting routers, switch, pc  To simulate how to send information in form of packets in a single network and the use of Virtual Local Area Networks (VLANs) to separate the traffic generated by different departments.
  • 11. 1.4. Limitations of project o The first major limitation of this program is the more in depth you get with programming and making your own networks the harder it can become. With options such as blank routers and PCs dragging one of the incorrect entities into the program can leads to errors which can be annoying and hard to find and fix and overcome. This can be really frustrating and lead to a lot of beginners becoming confused and impact their learning. o Another major limitation is the fact that some of the entities in the program have to be manually turned on to function. This includes routers and switches which if not turned on will not work and this can also lead to networks not working properly and again errors in running your networks. o Another limitation is to do with the startup of the program. When installing it I had a good few problem setting it up with file locations and temporary file storage. A quick you tube search helped to resolve this problem but again this is annoying again for the user and the user side of things. o Last limitation of the program is the different versions of the program. It might not seem like a big issue but with the last update of the program they gave the whole home screen and navigation bars a makeover which when learning it all on the old version has made it difficult to get used to and some of my lecture notes were done in the old version and I found this hard to get used to.
  • 12. 1.5 Organizationof project The paper describes how the CPT tool can be used to develop a simulation model of the LAN for the College of diploma in Engineering Government polytechnic, Barari, Bhagalpur. The study provides an insight into various concepts such as topology design, IP address configuration and how to send information in form of packet in a single network and the use of Virtual Local Area Networks (VLANs) to separate the traffic generated by the different departments. VLANs are a new type of LAN architecture using intelligent, high-speed switches. The simulation results and performance analyses showed that the design was successful. The rest of the paper is organized as follows: Chapter 2 discusses literature review. This is followed by a discussion in Chapter3, in this chapter we discuss all the theory part. The concept of IPv4 addressing and subnetting is presented in Chapter 4. The development of the LAN simulation model is presented in chapter 4; while Chapter 5presents testing and their results. Lastly in Chapter 6 is the conclusion and future scope.
  • 13. CHAPTER 2 Literature Survey 2.1 Introduction The need for computer networking was borne out of the need to use personal computers for sharing information within an organization in form of messages, sharing files and data bases and so forth. Whether the organization is located in one building or spread over a large campus, the need for networking the computers cannot be over emphasized. As the name implies, a Local Area Network (LAN) interconnects computer in a limited geographic area. It provides high-bandwidth communication over inexpensive transmission media. The corporate LAN has evolved from a passive background business component to a highly active, visible core asset that enterprises rely on to support day-to-day operations critical to their market success. Today’s network is a strategic instrument that must be accessible anytime from anywhere-simultaneously offering fast, secure, reliable services at scale regardless of location. The main purpose of a network is to reduce isolated users and workgroups. All systems should be capable of communicating with others and should provide desired information. Additionally, physical systems and devices should be able to maintain and provide satisfactory performance, reliability and security. Resource sharing is probably equally of immense importance where a LAN serves as the access vehicle for an intranet or the Internet. 2.2 Existing system Network design is a crucial aspect of any enterprise- grade network. The way a network is designed impacts our network monitoring capabilities and our overall system performance, making it as important a factor as the infrastructure itself. There are many tools for making design of LAN such as CADE, Día Diagram Editor, Microsoft Visio. Visio is best known diagram mapping tools available and been for many years. But we use this for making only layout of LANs. it does not provide environment for real- simulation for testing.
  • 14. 2.3 Proposedsystem Cisco packet tracer provides real-time environment simulation. CPT offers a way to predict the impact on the network of a hardware upgrade, a change in topology, an increase in traffic load or the use of a new application. So, in this paper, a LAN network is designed using Cisco Packet Tracer. Cisco Packet Tracer (CPT) is a multi-tasking network simulation software that can be used to perform and analyze various network activities such as implementation of different topologies, selection of optimum path based on various routing algorithms, creation of appropriate servers, subnetting, and analysis of various network configuration and troubleshooting commands. In order to start communication between end user devices and to design a network, we need to select appropriate networking devices like routers, switches, hubs and make physical connection by connecting cables to serial and fast Ethernet ports from the component list of packet tracer. Networking devices are costly so it is better to perform first on packet tracer to understand the concept and behavior of the network. Interface of CPTFigure 2.1:
  • 15. CHAPTER 3 Theoretical background In this chapter we discuss all theory part of devices are used in our project, design of our project and implementation. 3.1 Introduction of network topology For interconnectivity of components, network topology describes the physical and logical appearance and interconnection between arrangement of computers, cables and other components in a data communication network and how it can be used for taking a packet from one device and sending it through the network to another device on a different network. A network topology is the physical layout of computers, cables, and other components on a network. There are a number of different network topologies, and a network may be built using multiple topologies. The different types of network topologies are: Bus topology, Star topology, Mesh topology, Ring topology, Hybrid topology. 3.1.1 Bus topology- A bus topology uses a single backbone cable that is terminated at both ends. All the hosts connect directly to this backbone. Figure 3.1: Bus Topology
  • 16. 3.1.2 Star topology In star topology each device in network is connected to a central device called hub -In this type of topology devices communicate through hub. If any devices want to send data to other device, it has to first send data to hub and then hub transmit that data to the designated devices. 3.1.3 Ring topology In ring topology each device is connected with the two devices on either side of it. There are two dedicated point to point links a device has with the devices on the either side of it. This structure forms a ring thus it is known as ring topology. If a device wants to send data to another device then it sends the data in one direction, each device in ring topology has a repeater, if the received data is intended for other device then repeater forwards this data until the intended device receives it. Figure 3.2: Star Topology Figure 3.3: Ring Topology
  • 17. 3.1.4 Meshtopology In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only. Let’s say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of links in a mesh topology of n devices would be n(n-1)/2. 3.1.5 Hybrid topology A combination of two or more topology is known as hybrid topology. For example, a combination of star and mesh topology is known as hybrid topology. Figure3.4: Mesh Topology
  • 18. 3.2 COMMUNICATION MEDIA Network devices are connected together using a medium, the medium can be cables which can either be coaxial cable or twisted pair cable or it can be by optic fiber cables or the medium can be free space (air) by the use of radio waves. A discussion of the media is as outlined below. 3.2.1 Coaxial Cable This cable is composed of two conductors. One of the conductors is an inner insulated conductor and this inner insulated conductor is surrounded by another conductor. This second conductor is sometimes made of a metallic foil or woven wire. Because the inner conductor is shielded by the metallic outer conductor, coaxial cable is resistant to electromagnetic interference (EMI). Coaxial cables have an associated characteristic impedance, which needs to be balanced with the device (or terminator) with which the cable connects. There are two types of coaxial cables: Thicket (10Base5), and Thinnet (10Base2). The two differ in thickness (1/4- inch for thicket and ½-inch for thin net) and in maximum cable distance that the signal can travel (500 meters for thicket and 185 meters for thin net). A transceiver is often connected directly to the Thicket cable using a connector known as vampire tap. 3.2.2 Twisted Pair Cable This is the most popular LAN media type in use today. Individual insulated copper strands are intertwined into a twisted pair cable. Two categories/types of twisted pair cable include Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP). 3.2.3 Optic Fiber Cable An alternative to copper cabling is fiber–optic cabling, which sends light through an optic fiber. Using light instead of electricity makes fiber optics immune to EMI. Also depending on the layer 1 technology being used, fiber-optic cables typically have greater maximum distance between networked devices and greater data carrying capacity.
  • 19. 3.2.4Wireless Not all media is physical, as is the case with wireless technologies. Wireless clients gain access to a wired network by communicating via radio waves with a wireless access point (AP). The access point is then hardwired to a LAN. All wireless devices connecting to the same AP are considered to be on the same shared network segment, which means that only one device can send data to and receive data from an AP at any one time (half duplex communication). 3.3 Networking devices Equipment that connects directly to a network segment is referred to as a device. These devices are broken up into two classifications. o end-user devices o network devices End-user devices include computers, printers, scanners, and other devices that provide services directly to the user. Network devices include all the devices that connect the end-user devices together to allow them to communicate. There are many networking devices; • Repeaters • Hub • Switch • Bridge • Router • Pc 3.3.1 Router A router is a special type of computer. It has the same basic components as a standard desktop PC. However, routers are designed to perform some very specific functions. Just as computers need operating systems to run software applications, routers need the Internetwork Operating System software (IOS) to run configuration files. These configuration files contain the
  • 20. instructions and parameters that control the flow of traffic in and out of the routers. The many parts of a router are shown below: Routers have all capabilities of the previous devices. Routers can regenerate signals, concentrate multiple connections, convert data transmission formats, and manage data transfers. They can also connect to a WAN, which allows them to connect LANs that are separated by great distances. In this project we use Router 2911. Router 2911 has the property of auxiliary, console and fast Ethernet. Most advantage of this router is it has three interface 0/0,0/1,0/2. Auxiliary Port: Auxiliary port is used for the connection which is being initiated soon. This port has a capability to accept the data packet if it consists of any error. There is no Control Redundancy Check (CRC) or Frame Checking System (FRS) in this port. Console Port/Cable: Console is type of cable used for configuration purposes. The port availability is used to connect console cable to the router. This port has CRC system and can only accept from outer end devices. Fast Ethernet 0/0,0/1 and 0/2: The Ethernet connectivity is also available in router 2911. Ethernet describes which port and cable to be used for internet connectivity. In this router three ports are available in every router. They are “0/0”,”0/1” and “0/2”. Figure 3.5: Router
  • 21. 3.3.2 Switch Switches can determine whether data should remain on a LAN or not, and they can transfer the data to the connection that needs that data. Switches are Data Link layer devices. Each Switch port has a unique MAC address. Connected host MAC addresses are learned and stored on a MAC address table. Switch 2960-24TT is used in this project. It has 24 fast Ethernet interface and 2 gigabit Ethernet interfaces. 3.4 IP ADDRESSING Using the IP address of the destination network, a router can deliver a packet to the correct network. When the packet arrives at a router connected to the destination network, the router uses the IP address to locate the particular computer connected to that network. Accordingly, every IP address has two parts. IP Addressing is a hierarchical structure. An IP address combines two identifiers into one number. This number must be a unique number, because duplicate addresses would make routing impossible. The first part identifies the system's network address. The second part, called the host part, identifies which particular machine it is on the network. Figure 3.6: Switch
  • 22. IP addresses are divided into classes to define the large, medium, and small networks. Class A addresses are assigned to larger networks. Class B addresses are used for medium-sized networks, & Class C for small networks. Classes of Addresses There are five classes of IP addresses and they are shown in the Table 3.1 TABLE-3.1 Address class Value in First Octet A 1-126 B 128 – 191 C 192 – 223 D 224 – 239 Figure 3.7: usable IP
  • 23. E 240 – 255 IP addresses can be dynamically configured using DHCP or they can be statically configured by inputting it manually on the device. 3.5 SUBNETTING Subnetting is the process of stealing bits from the host part of an IP address in order to divide the larger network into smaller sub-networks called subnets [8]. After subnetting, network subnet host fields are created. An IP address is always reserved to identify the subnet and another one to identify the broadcast address within the subnet. Subnetting a network means to use the subnet mask to divide the network and break a large network up into smaller, more efficient and manageable segments, or subnets. With subnetting, the network is not limited to the default Class A, B, or C network masks and there is more flexibility in the network design. Subnet addresses include the network portion, plus a subnet field and a host field. The ability to decide how to divide the original host portion into the new subnet and host fields provides addressing flexibility for the network administrator. 3.5.2 Subnet Mask For the subnet scheme to work, every host (machine) on the network must know which part of the host address will be used as the subnet address. This is accomplished by assigning subnet mask to each machine. A subnet mask is a 32-bit value that allows the recipient of an IP packet to distinguish the network ID portion of the IP address from the host ID portion of the IP address. Table 3.2 shows the default subnet masks for all classes of network. TABLE 3.2 CLASSES OF IP FORMAT DEFAULT SUBNET MASK A Network.node.node.node 255.0.0.0 B Network.network.node.node 255.255.0.0 C Network.network.network.node 255.255.255.0
  • 24. CHAPTER 4 Experimental Investigations In this chapter we discuss the development of LAN simulation model 4.1 Researchmethod Starting of this research is to conduct data collection, using observation techniques, to inventories existing network equipment and computer hardware devices and software tools are used. The next step is to interview relevant parties, in this case is a computer lab coordinator who is directly responsible for the conditions that exist in the computer lab. After getting all the information about the devices used and the activities running on a research, further research from the literature to study the problems faced in order to identify the problem as a whole. The proposed development method will design into a new network topology that uses an application Cisco Packet Tracer network simulation. The design of this new network solution that emphasizes efficiency, because the devices will still be used, without having to replace the whole. The next step is a simulation of the new network to test if the method proposed development has been solving the problems that exist in the computer lab. Evaluation of the results of the simulation to be important in proving that the proposed method possible to have an increase in accordance with the objectives of this research, namely to increase the performance and security on the LAN. One of such key performance indicators is how flexible a network can be without a compromise on its objective. It combines hardware, software, cables, operating systems, switches, routers, hubs for communication to take place). Hierarchical model is employed in LAN designs. In a hierarchical model designs are done in layers. 4.2 DESIGN we design network step by step for all four department. 4.2.1 First network for College department Take one router, one switch, and four PCs and connect four PCs with the switch by using copper straight-through wire. Then router connect with switch. Also take one IOT things and one IOT alarm and connect them with switch.
  • 25. 4.2.1.1 Assigning IP If you want to computers communicate network in the network, they must have same IP address. The table of IP for first network. Table 4.1 DEVICES(PC) IP ADDRESS SUBNET MASK Principle 192.168.1.36 255.255.255.240 Hod 192.168.1.35 255.255.255.240 Exam controller 192.168.1.34 255.255.255.240 Director 192.168.1.37 255.255.255.240 IOT things 192.168.1.39 255.255.255.240 Alarm 192.168.1.38 255.255.255.240 Figure 4.1: First Network
  • 26. 4.2.1.2 Assign IP address To PCs in first network CLICK ON PC AND GO TO DESKTOP. Again, click on IP configuration. Figure 4.2: Desktop of pc Figure 4.3: Interface of IP configuration
  • 27. Insert IP address and subnet mask Same as insert IP address for all pc od first network and also for IOT things and alarm as shown in Table Now Insert IP address on router1 at all interface. INTERFACE IP ADDRESS SUBNET MASK GigabitEthernet0/0 192.168.1.1 255.255.255.240 GigabitEthernet0/1 192.168.1.146 255.255.255.240 GigabitEthernet0/2 192.168.1.33 255.255.255.240 Figure 4.4: Interface of IP address and subnet mask Table 4.2
  • 28. THIS IS A FIRST COMPLETE NETWORK Figure 4.5: Interface of Router Figure 4.6: First Network
  • 29. Same as pervious: These two networks are same as pervious which I have discussed. 4.2.2 SECOND NETWORK 4.2.3THIRD NETWORK Figure 4.7 Figure 4.8
  • 30. 4.2.4 Fourth network 4.3 Connectrouters If you want to routers communicate in the network, they must be assigning IP address Click on router and insert IP of router0, router2, router3 at all interface with the help of table Router name GigabitEthernet0/0 GigabitEthernet0/1 GigabitEthernet0/2 Router0 192.168.1.2 192.168.1.61 192.168.1.81 Router2 192.168.1.62 192.168.1.113 192.168.1.129 Router3 192.168.1.145 192.168.1.114 192.168.1.177 Figure 4.9 Table 4.3
  • 31. This is my complete network Figure 5: Complete diagram of the college of engineering local area network as created in packet tracer environment
  • 32. CHAPTER 5 TESTING AND RESULTS In this chapter we test all pc for checking they are work or not using Cisco packet tracer and see the result. 5.1 Ping test Network connectivity and communication can be tested using a ping command, followed by the domain name or the IP address of the device (equipment) one wishes to test connectivity to. Two VLANs have been added to the existing network and the ping test was performed to test if the devices connected to those VLANs are communicating with the rest of the devices on the network. The results obtained are as shown in Fig Principle’s pc to HOD’s pc Principle’s pc to EC’ pc Figure 5.1 Figure 5.2
  • 33. Principle’s pc to Ex- depart. Principle’s pc to library department Principle’s pc to lab department Figure 5.3 Figure 5.4 Figure 5.5
  • 34. CHAPTER 6 Conclusions & Future Scope 6.1 conclusions In this paper, a Local Area Network (LAN) that uses both wired and wireless topology have been implemented with some important concepts using cisco packet tracer. It is observed that the network is performing well, this is because when we compared the ping test of the network designed to the ping test on the existing network of College of diploma in Engineering, polytechnic college, barari, the values were similar. Fig. 7 shows the ping test on the live network in existence. At last I want to conclude that, according to me I have a great experience while working on this software cisco packet tracer. 6.2 Future Scope By using this software (Packet Tracer) we can improve the quality of the IT Infrastructure, Datacenter, Software simulation which we can’t get by hand drafting. By the help of this software, drawing can be easily modified whenever wanted which reduces the human effort. files can be transfer from one place to another very easily by using this software. Reference [1]. Tim Reardon, Planning, Designing and operating local area networks, DISAM Journal, Summer, 1997. [2]. www.wikipedia.org/wiki/computer_networks, Retrieved 10th October, 2016. [3]. www.wikipedia.org/wiki/local_area_network, Retrieved 10th October, 2016. [4]. Garima Jain, Nasreen Noor ani, Nisha Kiran, Sourabh Sharma, Designing & simulation of topology network using Packet Tracer, International Research Journal of Engineering and Technology (IRJET), 2(2), 2015. [6]. Kenan Xu, Performance analysis of differentiated QoS MAC in wireless local area networks (WLANs), Thesis Submitted to the Department of Electrical and Computer Engineering, Queen’s University, Canada. September, 2003. [7]. David D. C., Kenneth T.P., David P.R, An introduction to local area networks, Proc. of the IEEE conf., Vol. 66, 1978. [8]. Todd Lammle, Cisco Certified network associate study guide (Wiley Publishing Inc., 2007). [8]. Cisco URL- https://www.netacad.com/ [9]. Cisco packet tracer- https://www.netacad.com/courses/packet-tracer For any question contact me-abhiabhishek.1137@gmail.com