Академический Документы
Профессиональный Документы
Культура Документы
10 G CAMPUS NETWORK
DESIGN
SUBMITTED IN PARTIAL FULFILMENT FOR AWARD DEGREE OF
BACHELOR OF TECHNOLOGY
IN
BY
SHUBHAJIT MUKHERJEE
(1246469)
MAY 2016
CERTIFICATE
This is to certify that the project entitled Campus Network Design is the bonafide
work carried out by Shubhajit Mukherjee student of B.Tech. (CSE), Punjab Technical
University, Jalandhar during the year fourth, in partial fulfillment of the requirements for
the award of the Degree of Bachelor of Technology and the project has not formed the
basis for the award previously of any degree, diploma, associate-ship, fellowship or any
other similar title to the best of my knowledge.
Er.VIKAS GOYAL
(Assistant Professor)
Department of Computer Sc. & Engineering
ii
ABSTRACT
10 G Campus Network Design is a Network design of an organization which is
developed to optimize the present structure of network. In new campus network we have
a particular network for each department and admin can manage all the device of network
from anywhere in the network. It is being developed in Shaheed Bhagat Singh State
Technical Campus (Firozpur), to optimize the present network. That makes the campus
network faster, more secure and it provide the isolation between the two departments of
our campus. Another goal is to make the project manageable by dividing it into modules
that can be more easily maintained and change. That provides the privacy between
respective departments. That makes the communication quiet fast between the server and
the users in the campus area. The administrator can manage the network easily because of
Campus Network Design is designed in according to cisco hierarchical model structure.
iii
ACKNOWLEDGEMENT
th
Shubhajit Mukherjee
iv
TABLE OF CONTENTS
CHAPTER NO. TITLE
1.
2.
3.
PAGE NO.
Certificate
ii
Abstract
iii
Acknowledgement
iv
Table of Contents
v-vi
List of Figures
vii
INTRODUCTION
1-3
1.1. Description
1.2. Purpose
1.3. Scope
1.5. Overview
FEASIBILITY STUDY
4-5
TECHNOLOGY USED
6-14
10
10
11
13
13
INTRODUCTION TO DEVICES
v
14
15-18
5.
4.1. Router
15
4.2. Switch
16
17
17
17
17
18
19
REQUIREMENT
6.
19
19
METHODOLOGY OF WORK
6.1. Connection between routers to devices
20
20
20
8.
9.
20-22
PROJECT DESCRIPTION
21
22
23-24
23
23
25
8.1. Conclusion
25
8.2. Scope
25
APPENDICES
26-47
9.1. Screen-Shots
26
REFERENCES
27
vi
LIST OF FIGURES
S.No.
Fig. No.
Description
Page No.
1.
Fig. 1.1.
2.
Fig. 3.1.
3.
Fig. 3.2.
4.
Fig. 3.3.
5.
Fig. 3.4.
Routing protocols
10
6.
Fig. 3.5.
11
7.
Fig. 3.6.
Implementation of ACL
13
8.
Fig. 4.1.
Router
15
9.
Fig. 4.2.
Switch
16
10.
Fig. 6.3.1
21
11.
Fig. 6.3.2
Topology Diagram
22
vii
CHAPTER 1
INTRODUCTION
1.1 Description
A campus network is a proprietary local area network (LAN) serving an
organization.
College
and
university
campus
networks
interconnect
1.2 Purpose
The purpose of this project is as follows:
Increase reliability.
Admin
Users
Decrease congestion.
Increased throughput.
Privacy.
Better security
1.3 Scope
The different areas where this system can be used:
Virtual Lan
Sub Interfaces
Routing Protocols
1.5 Overview
10 G Campus Network Design is developed according after the study of the
current network structure and its problem like congestion, looping.
2
CHAPTER 2
FEASIBILITY STUDY
In feasibility study phase we had undergone through various steps which are
Described as under:
1. Identify the origin of the information at different level.
2. Analyze the drawback of existing system (manual) system.
In campus network the http request generated by a single end user firstly
move throughout the network and then reaches the server.
2.3Economic feasibility
In the proposed system I used the technology through which we can reduce the
hardware devices and increase the reliability and maintenance ability.
To implement the new campus network design will not increase the cost for
hardware or any networking device cause of proposed system will not require any
extra devices, It will work on available devices no extra requirement.
So, Proposed system (Campus Network Design with FTP Server) is economically
feasible to implement in future.
CHAPTER 3
TECHNOLOGY USED
3.1. Virtual Local Area Network
In computer networking, a single layer-2 network may be partitioned to create
multiple distinct broadcast domains, which are mutually isolated so that packets
can only pass between them via one or more routers; such a domain is referred to
as a virtual local area network, virtual LAN or VLAN.
This is usually achieved on
support partitioning on a port level (if at all), so sharing VLANs across devices
requires running dedicated cabling for each VLAN. More sophisticated devices
can mark packets through tagging, so that a single interconnect (trunk) may be
used to transport data for multiple VLANs.
To physically replicate the functions of a VLAN would require a separate,
parallel collection of network cables and equipment separate from the primary
network. However, unlike physically separate networks, VLANs share
bandwidth, so VLAN trunks may require aggregated links and/or quality of
service prioritization.
A VLAN allows several networks to work virtually as an LAN. One of the most
beneficial elements of a VLAN is that it removes latency in the network, which
saves network resources and increases network efficiency.
The key benefits of implementing VLANs include:
Decreasing the latency and traffic load on the network and the
network devices, offering increased performance.
Server Mode
Client Mode
Transparent Mode
8
VLANs of a VTP domain in a Switch which is in VTP Server mode and change
VLAN information in a VTP Server. The changes made in a switch in server
mode are advertised to the entire VTP domain.
VLAN Trunking Protocol (VTP) Client Mode
VLAN Trunking Protocol (VTP) client mode switches listen to VTP
advertisements from other switches and modify their VLAN configurations
accordingly. A network switch in VTP client mode requires a server switch to
inform it about the VLAN changes. We CANNOT create, add, or delete VLANs
in a VTP client.
VLAN Trunking Protocol (VTP) Transparent Mode
VLAN Trunking Protocol (VTP) transparent mode switches do not participate in
the VTP domain, but VTP transparent mode switches can receive and forward
VTP advertisements through the configured trunk links.
with
each
other,
10
11
12
There are both IP standard and IP extended named ACLs. Another advantage to
named ACLs is that they allow you to remove individual lines out of an ACL.
With numbered ACLs, you cannot delete individual statements. Instead, you will
need to delete your existing access list and re-create the entire list.
Permit
Redirect
Deny
14
CHAPTER 4
INTRODUCTION TO DEVICES
4.1. Router
Routers are networking devices used to extend or segment networks by
forwarding packets from one logical network to another. Routers are most often
used in large internetworks that use the TCP/IP protocol suite and for connecting
TCP/IP hosts and local area networks (LANs) to the Internet using dedicated
leased lines.
When a data packet comes in one of the lines, the router reads the address
information in the packet to determine its ultimate destination. Then, using
information in its routing table or routing policy, it directs the packet to the next
network on its journey.
Routers perform the "traffic directing" functions on the Internet. A data packet is
typically forwarded from one router to another through the networks that
constitute the internetwork until it reaches its destination node.
A router is a specialized networking device connected
to two or
more
move data
from
15
An example of a router would be the owner's cable or DSL router, which connects
to the Internet through an ISP. More sophisticated routers, such as enterprise
routers, connect large business or ISP networks up to the powerful core routers
that forward data at high speed along the optical fibres lines of the Internet
backbone. Though routers are typically dedicated hardware devices, use of
software-based routers has grown increasingly common.
4.2. Switch
A network switch is a
17
Coaxial lines can therefore be bent and twisted (subject to limits) without
negative effects, and they can be strapped to conductive supports without
inducing unwanted currents in them and though.
The most common use for coaxial cables is for television and other signals with
bandwidth of multiple megahertz. Although in most homes coaxial cables have
been installed for transmission of TV signals, new technologies (such as the ITUT G.hn standard) open the possibility of using home coaxial cable for high-speed
home networking applications (Ethernet over coax).
In the 20th century they carried long distance telephone connections.
4.3.4. Ethernet (crossover) cable
An Ethernet crossover cable is a type of Ethernet cable used to connect
computing devices together directly where they would normally be connected via
a network switch, hub or router, such as directly connecting two personal
computers via their network adapters. Some newer Ethernet devices support the
use of cross-over cables in the place of patch cables.
18
CHAPTER 5
HARDWARE AND SOFTWARE REQUIREMENTS
5.1Hardware Requirement
CSU/DSU.
5.2Software Requirement
19
CHAPTER 6
METHODOLOGY/PLANNING OF WORK
Steps followed to achieve the objective of the project during the project
development are following:
21
Routing Protocols.
22
CHAPTER 7
PROJECT DESCRIPTION
7.1. About the project
Easy to add a new building, floor, remote site, e-commerce service so on.
VACL is used.
Bandwidth
In the new network have many small networks logically instead of a large
network, through which number of users are less in the network so in one
network traffic congestion probability is low as compare to previous
network.
Troubleshooting
The new network is well structured and easy to understand by admin
because in this admin can understand where is the really problem is
occurred and the admin can repair that.
No Loop Occurrence
In new network have the probability of less loop occurrences and it helps
to increase the throughput of network.
23
Console security
In the new structure have the security on the console means any person
that unauthorized person can't access or modify the configuration of
routers and switches.
Password Encryption
For the security purpose in the new campus network have password
encryption service, it helps to protect from the cracking of password on
routers and switches all passwords are in encrypted form.
Port Security
In the new network structure have the features of port security. It allow the
port don't work if any violation occur. There are two type of port security
used in new campus network.
1. Sticky Mac Address
When an end device connect to the switch through the port then that
device is reserved for that port, if any user try to connect another device to
that port then that port not work. It can change by the admin.
2. Violation Restrict
When any end device try to connect the switch without any permission to
any port then switch restrict to the connection.
24
CHAPTER 8
CONCLUSION AND SCOPE
8.1. Conclusion
Local Area Network of Shaheed Bhagat Singh State Technical Campus
(Firozpur), to accommodate their needs. Using Cisco Three Layer Hierarchical
Model to optimize the campus network. First focus is to provide a high
availability in the network, redundant link and a fast link failure detection and
failover inside the routing protocol is required buildings need to be
interconnected. The building block components hierarchical structure network are
the core layer, the distribution layer and the access layer. Campus network design
will provide the better security than previous network.
8.2. Scope
In future if campus network design project will implement in our college then it
effect the reliability of the network. It help to remove the congestion occur in the
network, so it increase the throughput of the network system.
25
CHAPTER 9
APPENDICES
9.1. SCREENSHOTS
9.1.1. Campus Network Design Cisco Packet Tracer Screen Shot
26
REFERENCES
[1]"Cisco IOS Network Address Translation Overview"., http://www.cisco.com/
en/US/technologies/tk648/tk361/tk438/technologies_white_paper09186a008
0091cb9.html., Technical report, September 1998.,
[2] Oppenheimer. P., "Top-Down Network Design, Second Edition, Cisco
System.".,2004
[3] Sandhu. R., 2001," The next generation of access control Models: Do we need
them and what should they be? In SACMAT01 ", SACMAT., pp. 53.
[4] Lammle. T., 2014," VLANs and Inter VLANs Routing ", Wiley India
Ltd., pp. 459.
[5] Lammle. T., 2014," The Cisco Three Layer Hierarchical Model", Wiley
India Ltd., pp. 70.
27