Sei sulla pagina 1di 75

MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

INTRODUCTION

Internet Protocol (IP) is used throughout the public Internet and has become the most
important routed protocol to the majority of Internet applications today. Our objective is to
design and implement an IP based data network that securely support IP Data traffic by
properly designing the IP address Pool and network mask using the concept of VLSM.
VLSM increases the efficiency of the network as well as it helps in the optimum
utilization of IP address resources. VLSM is a process of dividing a single network in to
different smaller networks as per the requirement of the System Administrator for reducing
IPV4 address wastage and also helps in the effective routing process.
This project is intended to design a VLSM based Data Network and through this

network implementation, an organization, whose branches are located at remotely different

locations, can view as well as transfer information and data rather than maintaining physical

documents in a cost effective manner.

The Internet is composed of many routers that interconnect different networks. Each
router interface must be on a unique network and must have a unique address. Assigning
different IP addresses to different networks is required because of the IP addressing scheme
required by routers. Subnetting and VLSMs are two ways of dividing an assigned network
address into multiple, smaller networks for use within an organization. In our project we used
these techniques to save the address space.
Subnetting creates subnets with equal number of hosts,in a network. The number of
bits subnetted i.e,the length of subnet mask will be same for all the subnets. A network of
single subnet mask locked the organization into a fixed number of fixed sized subnets. This
method of achieving subnetting,with variable length of subnet mask,is known as Variable
Length Subnet Mask.Subnets of different Subnets of different size can exist within a Class
Based Network ID. Different Sized Subnets are needed to minimize the wasting of IP
addresses. The creation and deployment of various sized subnets of a Network ID is known as
Variable Length Subnetting and uses Variable Length Subnet Masks.

DATA COMMUNICATION 1 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
RFC 1009 specified how a subnetted network could use more than one subnet mask.
When an IP network is assigned more than one subnet mask, it is considered a network with
"Variable Length Subnet Masks" since the extended-network-prefixes have different lengths.
VLSM permits more efficient use of an organization's assigned IP address space and permit
route aggregation which can significantly reduce the amount of routing information at the
"backbone" level within an organization's routing domain. Modern routing protocols OSPF,I-
IS-IS,RIP-2 supports VLSM.

DATA COMMUNICATION 2 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

SUBNETTING

IP networks can be divided into smaller networks or subnets. Subnets are under local
administration. RFC 950 defined a standard procedure to support the subnetting, or
division, of a single Class A, B, or C network number into smaller pieces
Subnetting is

– to overcome the limitations of the classful two-level addressing hierarchy


– to create smaller broadcast domains
– for better utilization of the bits in the Host ID
– to reduce the total number of network numbers that are assigned.
– to reduce the size of the Routing table and the performance of the routing
will be more efficient. Hence Subnetting reduces the routing requirements of the
Internet

Subnetting - How?

Subnetting is done by adding another level of hierarchy to the IP addressing structure.


Subnetting supports a three-level hierarchy.
By dividing the standard classful host-ID field into two parts -
- subnet-ID
- host-ID on that subnet

Subnet ID

A subnet ID is created by borrowing bits from the host field and designating them as
the subnet field.
NETWORK ID HOST ID

NETWORK ID SUBNET ID

LINK-3
DATA COMMUNICATION 3 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

The Number of borrowed bits varies and is specified by subnet mask.

Subnet MASK

Subnet Mask is defined as a 32-bit value which is used to distinguish the Network ID
from the Host ID in an arbitrary IP address
The bits of the subnet mask are defined as
All bits that correspond to Network ID and subnet ID are set to 1.
All bits that correspond to Host ID are reset to 0.

Sample subnet mask for class B address - (8 bit subnetting)

Network Network Subnet Host


Binary
1111111
111111111111111111111111
11111111 00000000
Representation 1

Dotted decimal 255 . 255 . 255. 0


Representation

Subnet mask is required to extract a Network ID and Subnet ID for a subnetted network.
Types of Subnet Mask

1. Default Subnet Masks


It is used when using Class based Network Ids. (that is - when a network is not
divided into subnets.)
2. Custom Subnet Masks
It is used when a network is actually divided into networks.

Network Prefix length Representation of Subnet Mask.

A shorthand way of expressing a subnetmask is to denote the number of bits that


define the network ID and subnet Id as a network prefix using the notation / <# of bits>

Default Subnet mask using network prefix notation

Class A 11111111 00000000 00000000 00000000


DATA COMMUNICATION 4 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Class B 11111111 11111111 00000000 00000000

Class C 11111111 11111111 11111111 00000000

Class A /8

Class B /16

Class C /24

5.4.4 Example

1. Class B network 138.96.0.0 with subnet mask 255.255.0.0 is expressed as


138.96.0.0/16

Extended Network Prefix

Internet routers use only the network-prefix of the destination address to route traffic to
a subnetted environment.
Routers within the subnetted environment use the extended-network- prefix to route
traffic between the individual subnets.
The extended-network-prefix is composed of the classful network-prefix and the
subnet-number.

Extended Network Prefix

NETWORK SUBNET HOST

32 bits

Extended-network-prefix-length

The standards describing modern routing protocols often refer to the extended-
network-prefix- length rather than the subnet mask.
The prefix length is equal to the number of contiguous one-bits in the traditional subnet
mask.
DATA COMMUNICATION 5 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
The network address 130.5.5.25 with a subnet mask of 255.255.255.0 can also be
expressed as 130.5.5.25/24.
The /<prefix-length> notation is more compact and easier to understand than writing
out the mask in its traditional dotted-decimal format.

INTRODUCING VLSM
The Internet is composed of many routers that interconnect different networks.
Each router interface must be on a unique network and must have a unique address.
Assigning different IP addresses to different networks is required because of the IP
addressing scheme required by routers. Subnetting and VLSMs are two ways of dividing
an assigned network address into multiple, smaller networks for use within an
organization. These smaller networks are referred to as subnetworks.

Subnetting

You can divide a network into subnetworks to:

• Isolate network traffic within local subnets, therefore reducing contention for network
bandwidth
• Secure or limit access to a subnet
• Enable localization of specific network protocols to a subnet
• Allow the association of a subnet with a specific geography or a department
• Allow administrative work to be broken into logical units
The basic idea of subnetting is to divide the standard host number field into two parts:
the subnet number and the host number on that subnet. That leads us from two level
hierarchy (NetworkNumber/HostNumber) to three level hierarchy
(NetworkNumber/SubnetNumber/HostNumber).

VLSM

One of the major problems with supporting only a single subnet mask across a
given network number is that once the mask is selected, it locks the organization into a
fixed number of fixed-sized subnets. For example, a Class B subnet that is masked with
DATA COMMUNICATION 6 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
255.255.252.0 yields additional 64 subnets with 1024 hosts per subnet. If you need 1028
subnets with some as large as 1000 hosts and some as small as 64 hosts you are out of luck.
Similar to the IP space separation into A,B, and C classes VLSM permits organization to
use subnets with different number of hosts.
RFC 950 specified how an IP network could use multiple subnet masks. The key
idea here is similar to idea of class A,B,and C network recursively applied to host part of
the address. Variable-Length Subnet Masking (VLSM) is the same concept as CIDR, but
the term is now obsolite. Because the old class distinctions are ignored, the new system
was called classless routing. This led to the original system being called, classful routing.
When an IP network is assigned more than one subnet mask, it is considered a
network with VLSMs because the extended-network numbers have different lengths at
each subnet level. To provide the address mask information the ICMP protocol was
extended by adding a new pair of ICMP message types, "Address Mask Request" and
"Address Mask Reply", analogous to the "Information Request" and "Information Reply"
ICMP messages (type 17 and 18 messages).
In key idea was that netmask becomes the part that is nessesary for the
interpretation of the address and can be specified by the number of the bit in network part
of the address, for example 10.10.10.10/24 mean C class network (24-bit network part of
of the address and 8-bit host part of the address)
Two of the main advantages to assign more than one subnet mask to a given IP network
number are:
• Multiple subnet masks permit more efficient use of an organization’s assigned IP address
space.
• Multiple subnet masks permit route aggregation, which can significantly reduce the amount
of routing information at the backbone level within an organization’s routing domain.
An example of a VLSM entry is:
12.0.0.0 255.255.0.0
12.3.0.0 255.255.255.0
12.3.254.0 255.255.255.224
VLSM subnet masks syntax has been recognized since the Solaris 2.6 OE.

DATA COMMUNICATION 7 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

CIDR

VLSM Subnetting, documented in RFC 950, originally referred to the subdivision of a


class-based network into subnetworks, but it was generalized for the subdivision of the
whole IP addess space into more flexible CIDR blocks instead of fixed A,B and C
networks. Classless Inter-Domain Routing (CIDR, pronounced "cider" or "cedar") was
introduced in 1993 and is the latest refinement to the way IP addresses are interpreted. It
replaced the previous generation of IP address syntax; classful networks. It allowed
increased flexibility when dividing ranges of IP addresses into separate networks and
thereby promoted:
• More efficient use of increasingly scarce IPv4 addresses.
• Greater use of hierarchy in address assignments (prefix aggregation), lowering the
overhead of the Internet-wide routing (routes aggregation)

CIDR allows single routing entries to refer either to the larger block or to its individual
constituents. This permits a single, general routing entry to be used through most of the
Internet, more specific routes only being required for routers in the subnetted block.
A subnet mask is a 32-bit number that determines how an IP address is split into
network and host portions, on a bitwise basis. For example, 255.255.0.0 is a standard class
B subnet mask, since the first two bytes are all ones (network), and the last two bytes are
all zeros (host). In a subnetted network, the network portion is extended. For example, a
subnet mask of 255.255.255.0 would subnet a class B address space using its third byte.
Using this scheme, the first two bytes of an IP address would identify the class B network,
the next byte would identify the subnet within that network, and the final byte would select
an individual host. Since subnet masks are used on a bit-by-bit basis, masks like
255.255.240.0 (4 bits of subnet; 12 bits of host) are perfectly normal.
In a traditional subnetted network, several restrictions apply, which have been lifted by
CIDR. However, if older, non-CIDR routing protocols (such as RIP version 1) are in use,
these restrictions must still be observed.
1. Identical subnet masks. Since non-CIDR routing updates do not include subnet masks, a
router must assume that the subnet mask it has been configured with is valid for all

DATA COMMUNICATION 8 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
subnets. Therefore, a single mask must be used for all subnets with a network. Different
masks can be used for different networks.
Based on this assumption, a router can exchange subnet routes with other routers
within the network. Since the subnet masks are identical across the network, the
routers will interpret these routes in the same manner. However, routers not
attached to the subnetted network can't interpret these subnet routes, since they lack
the subnet mask. Therefore, subnet routes are not relayed to routers on other
networks. This leads to our second restriction.

2. Contiguous subnets. A subnetted network can't be split into isolated portions. All the
subnets must be contiguous, since routing information can't be passed to non-members.
Within a network, all subnets must be able to reach all other subnets without passing traffic
through other networks.
The Internet is composed of many routers that interconnect different networks. Each
router interface must be on a unique network and must have a unique address. Assigning
different IP addresses to different networks is required because of the IP addressing
scheme required by routers. Subnetting and VLSMs are two ways of dividing an assigned
network address into multiple, smaller networks for use within an organization. These
smaller networks are referred to as subnetworks. VLSM, conceptually a stepping stone
from subnetting to CIDR, lifted the restrictions of subnetting by relaying subnet
information through routing protocols

DATA COMMUNICATION 9 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

IP Routing and Routing Protocols.


Routing is the process of sending packets through a network, such as the
Internet. Routing does the following tasks:
a. Defining paths for the transmission of packets through an inter network.
b. Forwarding packets based upon the defined paths.
Routing is distinguished from switching by operating at the Network Layer of
the OSI Model. Switching occur on the Data Link Layer.
Static, Dynamic and Default Routing

Routing can be accomplished by manually entering the information necessary for


packets to reach any part of the network into each router. This is called static routing. A
static route is a route that is created manually by a network administrator. Static routing
works reasonably well for very small networks, but does not scale well. When using static
routing, the routing tables (A routing table is a database in which a router stores
information about the network layer topology of the network) on each router must be
updated manually, each time when the network topology changes.
Static routes have advantages and disadvantages as compares to dynamic routes.
Advantages of Static Routes:
• Easy to configure
• No routing protocol overhead
Disadvantages of Static Routes:

DATA COMMUNICATION 10 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
• Network changes require manual reconfiguration
Creating a Static Route under Cisco IOS

To add a static route on a Cisco router, use the `ip route` command.
The syntax to utilize is: ip route <destination> <netmask> <next hop>.
The example shows the creation of a static route for a single host:
Cisco# conf t
Cisco (config)# ip route 193.252.19.5 255.255.255.255 193.252.19.1
Default routing: Refers to a “last resort” outlet – traffic to destinations that are
unknown to the local router. The destinations that are unknown to the local router are sent
to the default outlet router. Default routing is the easiest form of routing for a domain
connected to a single exit point. A default route is a path on which a router should forward
a packet if it does not have specific knowledge about the packet’s destination.
Dynamic routing
In most networks, routing is managed automatically through the use of dynamic
routing. In dynamic routing, routing protocols create and maintain the routing tables
automatically. Dynamic routing responds much more quickly to network changes (and
network failures) than static routing.
Routing Protocol

In simple terms, a protocol is an agreed set of rules that determine how something
will operate. A routing protocol is a set of rules that describes how Layer 3 routing devices
will send updates between each other about the available networks. If more than one path
to the remote network exists, the protocol also determines how the best path or route is
selected.
The Purpose of a Routing Protocol is
a. A routing protocol is the mechanism used to update the Layer 3 routing devices.
b. When they all have the same accurate understanding of the network, they can route
the data across the best path.

DATA COMMUNICATION 11 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

How the Routing Protocol Works

Participating routers advertise the routes that they know about to their neighbors in
routing updates. Routes learned from routing updates are held in the routing table.

Routed and Routing Protocols.

The routed protocol is the Layer 3 protocol used to transfer data from one end
device to another across the network. The routed protocol is the Layer 3 datagram that
carries the application data as well as the upper-layer information. Also the routing
protocol is the protocol used to send updates between the routers about the networks that
exist in the organization, thereby allowing the routing process to determine the path of the
datagram across the network.
Table 1 provides a list of routed protocols and their corresponding interior routing
protocols.

Routed Protocol Corresponding Interior Routing


Protocol
AppleTalk RTMP, AURP, EIGRP
IPX RIP, NLSP, EIGRP

Vines RTP

IP RIPv1, RIPv2, OSPF, IS-IS, IGRP,


EIGRP

Routing Table

A routing table is a database in which a router stores information about the network
layer topology of the network. The router will reference the routing table and make a
decision about forwarding data packets to the end destination identified in the destination
address of the datagram/packet.

DATA COMMUNICATION 12 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Table 2 shows the fields that are present in a typical routing table.

Network Outgoing Interface Metric Next Logical Hop

140.100.100.0 /24 E0 6 131.108.13.15

140.100.110.0 /24 E0 7 131.108.13.15

140.100.120.0 /24 E0 8 131.108.13.15

140.100.130.0 /24 E0 8 131.108.13.15

166.99.0.0 /16 E1 10 131.108.14.11

166.90.0.0 /16 E1 11 131.108.14.11

145.0.88.0 /24 S0 3 131.108.10.9

The functionality of each field in the table is discussed below.


1. The Network Field

The Network field contains the networks that the router knows exist in the
organization. These entries either were entered manually as static routes or default routes,
or were learned via a routing protocol as dynamic routes. The Purpose of the Network
Field is when a datagram comes into the router, the routing process attempts to forward it
to the remote network, where it is hoped that it will find the destination host. To achieve
this, it must know that the remote network exists. It determines this by looking in the
routing table for the remote network.
Typically, only the network portion of the address is stored in the table. Using the
hierarchical strength of the addressing keeps the routing table small and the lookup short.
The routing process makes a decision based on the longest match. This ensures that if
VLSM has been deployed, the most specific network is chosen. Cisco IOS code mandates
that the longest match can be a /32 or 255.255.255.255 mask. This is a match based on the
full host address and is used in specific situations such as an OSPF environment. It is not
encouraged as a common configuration because the size of the routing table grows rapidly.

DATA COMMUNICATION 13 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
The routes in the table are held in an order that speeds up the lookup process, ensuring that
the routing decision is streamlined.
2. The Outgoing Interface Field

The Outgoing Interface is the interface on the router to which the routing process
sends the datagram. This is the first step of its journey, the exit point of the router. This
field is necessary for the routing process to know which interface queue to use to send the
outbound datagram. It also informs the administrator of the interface through which the
network was heard in the routing update—or, more accurately, the interface through which
the chosen network was heard.
3. The Metric Field

The metric is a value that is assigned to each path based on the criteria specified in
the routing protocol. The Metric field is used to determine which path to use if there are
multiple paths to the remote network. The metric used depends on the routing protocol.
This value is used to choose between different paths to the same destination network, to
select the best path. If the values are the same, either the router selects the path that it heard
first, or it uses both paths, sending the datagrams across each route.It is the responsibility
of the end device to reassemble the datagrams before sending them to the Application.

Table 3 shows the metrics used by the different routing protocols.

Routing Protocol Metric

RIPv1 Hop count.

IGRP Bandwidth, delay, load, reliability, MTU.

EIGRP Bandwidth, delay, load, reliability, MTU.

OSPF Cost. (The Cisco default states that the cost of an interface is
inversely proportional to the bandwidth of that interface. A
higher bandwidth indicates a lower cost.)

IS - IS Cost

DATA COMMUNICATION 14 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
By default, on a Cisco router, if multiple equal cost paths exist in IP, up to six paths are used in a
round-robin manner to load balance the traffic across the network.

4. The Next Logical Hop Field

The next logical hop is the destination address of the next forwarding router. The
address of the next logical hop will be on the same subnet as the outgoing interface. The
purpose of identifying the next logical hop is so that the router can create the Layer 2
frame with the destination address.
The reason that the logical address is stored instead of the MAC address of the next
hop is to ensure that the information is accurate. The MAC address may change because of
changes in the hardware; however, such changes do not affect the logical address. Also, the
router is dealing at Layer 3 and just examines the source address of the routing update to
determine the next hop. The simplicity of this action reduces the need for extra
computation and memory.

How the Routing Table Is Kept Current and Correct

The capability to send traffic from one end of the network to the other depends on
how accurate and current the routing table in every router is within the network. Although
all routing protocols have this written into their mission statements, the more recent routing
protocols are more efficient, so their networks scale more easily. For example, RIP will
send out the entire routing table every 30 seconds, while OSPF updates contain only the
change and are sent only when that changes occurs. Although OSPF sends the entire table
every 30 minutes after the last update, this is far less demanding of network resources than
the older protocol, RIP.
The accuracy of the table will be affected by how quickly it responds to changes in
the network.
These changes include the following:
• Learning new networks
• Learning a better path to an existing network
• Learning that a network is no longer available
• Learning an alternative route to a network

DATA COMMUNICATION 15 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
How each of these changes is achieved depends on the routing protocol.

Types of Routing Protocols

IP routing protocols use two main technologies: Link-state and Distance vector
technologies. These are discussed next.

Distance Vector Routing Protocols

Distance vector protocols are the earliest protocols, and they include RIP and
IGRP. Distance vector protocols send periodic updates. These updates are sent to directly
connected neighbors. The update is periodic because it waits for the timer to expire before
it sends an update. After receiving a neighbor’s routing table, the router updates its table
and sends the modified table in subsequent updates. This is the reason that distance vector
routing protocols are said to be “routing by rumor.”

The Distance Vector Routing Metrics

The metric used by distance vector protocols is often stated as being distance
measured in the number of hand-off points or hops (routers) encountered on the way to the
end device. The path selection is made using the Bellman Ford algorithm based on the
metric or value of each available path. RFC 1058 discusses this in depth in reference to
RIPv1.
Routing Information Protocol (RIP) is the best known and most widely used of the
distance vector routing protocols. RIP version 1 (RIP v1), which is now outmoded, was the
first routing protocol accepted as a standard for TCP/IP. RIP version 2 (RIP v2) provides
authentication support, multicast announcing, and better support for classless networks.
Using RIP, the maximum hop count from the first router to the destination is 15.
Any destination greater than 15 hops away is considered unreachable. This limits the
diameter of a RIP network to 15. However, if you place your routers in a hierarchical
structure, 15 hops can cover a large number of destinations.

DATA COMMUNICATION 16 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Link State Routing Protocols

Link state routing protocols address some of the limitations of distance vector
routing protocols. For example, link state routing protocols provide faster convergence
than do distance vector routing protocols. Although link state routing protocols are more
reliable and require less bandwidth than do distance vector routing protocols, they are also
more complex, more memory-intensive, and place a greater load on the CPU.
Unlike distance vector routing protocols, which broadcast updates to all routers at
regularly scheduled intervals, link state routing protocols provide updates only when a
network link changes state. When such an event occurs, a notification in the form of a link
state advertisement is sent throughout the network.
The Open Shortest Path First (OSPF) protocol is the best-known and most widely
used link state routing protocol. OSPF is an open standard developed by the Internet
Engineering Task Force (IETF) as an alternative to RIP. OSPF compiles a complete
topological database of the network. The shortest path first (SPF) algorithm, also known as
the Djikstra algorithm, is used to compute the least-cost path to each destination. Whereas
RIP calculates cost on the basis of hop count only, OSPF can calculate cost on the basis of
metrics such as link speed and reliability in addition to hop count.

Unlike RIP, OSPF can support an inter network diameter of 65,535 (assuming that
each link is assigned a cost of 1). OSPF transmits multicast frames, reducing CPU usage
on a LAN. We can hierarchically subdivide OSPF networks into areas, reducing router
memory overhead and CPU overhead.
Like RIP v2, OSPF supports variable length subnet masks (VLSM).
Selecting the Appropriate Routing Protocol

Select a routing protocol based on the following considerations:


For a small, simple network that is not expected to grow, use a simpler distance
vector routing protocol like RIP v2. For a large, complex network, use a newer, more
sophisticated link state routing protocol like OSPF.

DATA COMMUNICATION 17 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Use RIP v2 or OSPF if you need to support variable length subnet masks. Although
the outdated RIP v1 is still widely used in private networks, it does not support VLSM and
thus is not well suited for enterprise networks.
Interior and Exterior Routing Protocols

Routing protocols that operate within an organization are referred to as interior


routing

protocols (for example, RIPv1, IGRP, EIGRP, OSPF, and IS-IS).

Interior Routing Protocols

The boundaries of the organization are defined as the autonomous system. The
unique number assigned to the autonomous system then identifies the organization. The
autonomous system number may be viewed as another layer of hierarchy in the IP
addressing scheme because the number can represent a collection of NIC numbers.
Exterior Routing Protocols

Routing protocols that exchange routing information between organizations are


known as exterior routing protocols. Exterior routing protocols are highly complex. The
complexity arises from the need to determine policies between different organizations.
Border Gateway Protocol Version 4 (BGP-4) is an example of an exterior gateway
protocol.

DATA COMMUNICATION 18 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

OSPF, IS-IS and RIP are IGPs used within the individual ASs; BGP is the EGP
used between ASs.

DATA COMMUNICATION 19 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

NETWORK ARCHITECTURE

DATA COMMUNICATION 20 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

DESCRIPTION OF ARCHITECTURE

The architecture consists of three networks as shown above having two routerts R1
and R2.Network 1 consists of three workstations connected via a switch(Intex 10/100 fast
Ethernet switch). Network2 lies between the routers. Network 3 contains the webserver in
one of it’s interfaces. In this network we use CISCO 1840 series (1841) router. The
webserver is configured in Microsoft Windows 2003 server OS. Whereas the workstations
are loaded with Microsoft windows 2000 Proffessional OS.

1. Server – Windows 2003 Operating System


2. Work Stations – 3 nos
3. Switch – Layer 2 unmanaged
4. Router – Cisco 1841 (2 nos)
5. IP Address – 192.168.100.0/27

Network No: of Host


Network 1 4

Network 2 2

Network 3 2

Given IP = 192.168.100.0/27
No of IP available = 2^5 = 32
Ip requirement for each network

Network 1

Total number of Host= 4

Network address= 1

DATA COMMUNICATION 21 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Broadcast address= 1

Total requirement= 6

Network 2

Total number of Host= 2

Network address= 1

Broadcast address= 1

Total requirement= 4

Network 3

Total number of Host= 2

Network address= 1

Broadcast address= 1

Total requirement= 4

Number of IP address required for all networks= 6+4+4= 14

Given IP block= 192.168.100.0/27 which is a private ip.

We now got a single network consists of 32 hosts(2^5= 32), but we require three
different networks having different number of ip pools, ie 6,4 and 4 respectively. So we are
going to split this single IP pool using subnetting.

One bit Subnetting

In this step we will take one bit from host and will give it to the network portion. So the
network mask now becomes 28 and getting splitted into two equal networks having
number of ip addresses 16 each.
Subnet 1: 192.168.100.0/28 to 192.168.100.15/28
DATA COMMUNICATION 22 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Subnet 2: 192.168.100.16/28 to 192.168.100.31/28
Subnet mask: 255.255.255.240
Since we only require 14 IP address we only select subnet block 192.168.100.0/28 and
discard subnet block 192.168.100.16/28 as spare block.
Two bit subnetting

In this step we will take one more bit from host and will give it to the network
portion. So the network mask now becomes 29 and getting splitted into two equal
networks having number of ip addresses 8 each.
Subnet 1.1: 192.168.100.0/29 to 192.168.100.7/29

Subnet 2.1: 192.168.100.8/29 to 192.168.100.15/29

Subnet mask: 255.255.255.248


First network need 6 number of IP addresses. So we will allocate the entire subnet 1.1 to
network 1.
Network 1
Network address: 192.168.100.0/29
Broadcast address: 192.168.100.5/29
Host Name Host IP address Subnet Mask
PC1 192.168.100.1 255.255.255.248
PC2 192.168.100.2 255.255.255.248
PC3 192.168.100.3 255.255.255.248
FE 0/0 192.168.100.4 255.255.255.248
Spare 1 192.168.100.6 255.255.255.248
Spare 2 192.168.100.7 255.255.255.248

We will again split subnet 2.1 by taking one more bit to the network portion. This is
three bit subnetting.

Three bit Subnetting

In this step we will take one more bit from host and will give it to the network
portion. So the network mask now becomes 30 and getting splitted into two equal
networks having number of ip addresses 4 each.

DATA COMMUNICATION 23 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Subnet 2.1.1: 192.168.100.8/30 to 192.168.100.11/30
Subnet 2.1.2: 192.168.100.12/30 to 192.168.100.15/30
Subnet mask: 255.255.255.252
We will allocate the entire subnet 2.1.1 to the network 2 and subnet 2.1.2 to the network 3.
Network 2

Network address: 192.168.100.8/30


Broadcast address: 192.168.100.11/30

Host name Host IP address Subnet mask


R1 FE 0/1 192.168.100.9 255.255.255.252
R2 FE 0/1 192.168.100.10 255.255.255.252

Network 3
Network address: 192.168.100.12/30
Broadcast address: 192.168.100.15/30

Host name Host IP address Subnet mask


R1 FE 0/1 192.168.100.13 255.255.255.252
R2 FE 0/1 192.168.100.14 255.255.255.252

Details of Allocation of Subnets to the Networks.

Netwo No : N/W Adderss Host Address Broadcaste Subnet


rk of Range Address Mask
Host
s
192.168.100.1
1 to 255.255.255.
DATA COMMUNICATION 24 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

4 192.168.100.0 192.168.100.4 192.168.100.5 248

192.168.100.9
2 2 192.168.100.8 to 192.168.100.11 255.255.255.
192.168.100.10 252

192.168.100.13
3 2 192.168.100.12 to 192.168.100.15 255.255.255.
192.168.100.14 252
Network Details

Network 1

Host Range : 192.168.100.225/29 to


Subnet Address : 192.168.100.224/29 192.168.100.230/29

Device IP Address Subnet Mask

R1 FE 0/0 192.168.100.225 255.255.255.248

PC 1 192.168.100.226 255.255.255.248

PC 2 192.168.100.227 255.255.255.248

PC 3 192.168.100.228 255.255.255.248

PC 4 192.168.100.229 255.255.255.248
Network 1

DATA COMMUNICATION 25 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

WINDOWS SERVER 2003 INSTALLATION &


CONFIGURATION

System Hardware requirements

CPU: It is recommended for a machine with 1GHz, of course 2 GHz is better.


RAM: Recommended memory is 256 MB, More memory for more applications.
Storage: 1.5 GB is recommended, but 4GB space is to be preferred.
Procedure for installing Windows 2003 Server .

• Note the partition in which the existing OS is loaded


• Insert the Windows 2003 Server CD into the CD Drive
• If the Windows 2003 Server CD is with auto run option it gives the first window
with the following menu.
a) Install Windows Server 2003, Standard Edition.
b) Perform additional tasks.
c) Check system compatibility.
(If the CD is not having auto run option, click on SETUP icon inside the CD, to get
the above window.)

• Click the first option (Install Windows Server 2003, Standard


Edition.)
• The new window will give a message ‘Windows setup does not
support upgrading from Microsoft windows 2000 professional to Microsoft

DATA COMMUNICATION 26 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
windows 2003,Standard edition’, if we are installing from windows 2000
professional.
• Click on OK
• From the new window, select Installation type as New Installation and click on
Next.
• Accept the license agreement by clicking on the accept this agreement and click
Next.
• Enter the 25-digit product key and click Next.
• Click Next for Set up option window.

• Click No, Skip this step and continue installing windows for Get Updated Setup
Files window and click Next.
• Windows start to load installation files
• Setup will Restart (Don’t enter for boot from CD, while booting)
• Welcome to setup window appears as follows
o To set up Windows now, press ENTER.
o To repair a windows installation using Recovery console, press R.
o To quit setup without installing windows, press F3.
• Press Enter (First Option)
• Now the setup will sense all the hard disk part ions and we
should select one partition for installation.
• Select the needed partition (Never Select the existing OS
partition) and press ENTER.
• Setup will ask to continue Setup using this partition, press C.
Press C.
• Setup will ask to select the Format pattern. Highlight Format the
partition using the NTFS file system. And press ENTER.
• For confirmation press F to the next window.
Setup will format the partition and will copy the windows file system to the hard disk
o Setup will restart the system and gives the first GUI window.
DATA COMMUNICATION 27 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
o The computer screen will blink ones or twice to adjust the display setting.
• For region and Language setting Click Next after selecting the Regional location as
India.
• Enter the Name: Network Lab PCn and Organization : RTTC .
• For licensing Modes, Simply Click NEXT.
• Enter Computer Name: PCn , Administrator Password: NTlabPCn
• Setup will restart the system again for final setup and will get the Ctrl+Alt+del
window.
• Enter password: NtlabPCn and click Enter for the Windows 2003 Desktop.
• Note down the logical disk of Windows 2003
(If the software is an OEM version it is to be registered with Microsoft within 30 days,
otherwise your desktop will be locked after 30 days)

Restoring your Desktop icons and start menu

To restore My Computer and My Network places icons to your desktop,


• Right Click the desktop and choose the properties.
• Go to the desktop tab, Click on Customize desktop tab and check the needed items
and Click on the change icon tab to change the default icons and click OK.
To change the start menu view to the Classical style
• Right Click the task bar and choose the properties
• Click the Start Menu tab, choose the radio button for classical start menu and click
OK.
• Include the Log Off & Admin Tools also.
Note down the hardware not installed

• Right Click My Computer


• Select Properties
• Click the Hardware Tab
• Select the Device manager

DATA COMMUNICATION 28 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
If a hardware item is marked with a question mark in yellow background, then it means
that the Device Driver for it is not installed properly.

Procedure to install the driver for a hardware

• Insert the mother board CD into the CD drive (CD may automatically run, then stop
it)
• R. Click the hardware you want to install (Say Ethernet controller)
• Click on Update Driver
• Select Install the software Automatically and Click Next
• The setup will install the driver for the selected hardware from the CD
• Click Finish
• Using Device manager verify that the hardware is properly installed.

Assigning IP address, Default Gateway, Subnet mask & DNS


setting for the NIC

• Right Click My Network places


• Take Properties
• Right Click Local Area Connection and take Properties
(Check the Show icon in the notification area when connected)
• Under General tab Select Internet Protocol (TCP/IP)
• Take properties and click Use the following IP address
(Give the needed IP address & Mask)
• DNS and Default gateway can also be given

Microsoft Management Console (MMC)

To get the MMC three ways are there

1. Right Click My Computer and Click Manage

DATA COMMUNICATION 29 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
2. Start/Programs/Administrative tools/Computer management
3. Start/Run/compmgmt.msc
The window will looks like in figure below.

Computer Management window is having three main Menus:


1. System Tools
2. Storage
3. Services and Applications.
Stop the avoidable services and thus increase the speed of
your server

• Take the Computer management window


• Expand services and applications
• Select services
• Select the standard tab and note the unwanted services started
• Select the service
• Right click and take properties
• Click Stop for the service status (Now the Service will stop and it will restart when
the server is switch on again)
• To stop the services forever select Automatic against Startup Type.
• At any time you can restart the service.

DATA COMMUNICATION 30 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

Disk management

With disk management tool, we can do the following


• Create and delete partitions on a hard disk and make logical drives
• Get the status of the disk, disk partition sizes, free space on a partition, volume
labels, drive-letter assigned, file system type ,size and disk health.
• Alter drive letter and volume
• Format any volume etc
Disk Formatting and Partition

Take the MMC


Now you can see the details of partitions available, what partition is having the OS, File
System, Healthy or Not etc.
Select the Disk Management under the Storage menu.
Right Click the Hard disk section to be Partitioned or Formatted and proceed.

Change the Drive Letters


• Right Click the partition and select Change drive letter and path
• Click on change
• Select the needed alphabet against Assign Drive Letters.
• Click OK and respond YES for confirm.
• Verify that the drive letter has changed.

Rename the disk Volume

• R Click the partition and select Change drive letter and path
• Take properties
• Under General tab Enter the needed Name for the Partition.

User Management

DATA COMMUNICATION 31 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
By default the OS will create only two users 1) Administrator and 2) Guest
Normally the Guest account will disabled, since it is not having a Password.
• Take the MMC
• Expand System Tools
• Expand Local Users and Group
• Click Users
Now two users can be seen with names Administrator and Guest. Guest will be
deactivated since you are logged on as the administrator, let us activate the Guest
account and logon as the guest.

Activate the Guest

• R Click the Guest


• Take properties
• Under General tab Uncheck the Account is Disabled menu
• Click OK

Log on as Guest

To log on as Guest, first logoff the administrator & then try for Guest
• Start / Log Off administrator (Wait for saving the settings)
• Press Ctrl+Alt+Delete to logon.
• Type User Name: Guest and Click OK (Since the Guest has no Password)
• Verify that the Guest is not having any Administrative rights
Then logoff the Guest and logon as Administrator with the password: NtlabPCn
Users & Groups

For User management two folders are created as Users & Groups.
These can be seen under Local Users and groups in MMC.
Users folder has all the list of users created and the Groups folder has the Powers of the
users.

DATA COMMUNICATION 32 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Create a User:

• Click the Action tab and then select the New User. OR
• R. Click the empty space and select the new user.
• Enter the Username and Password (twice)
• Uncheck the User must change the password at nest logon
• Check the User Cannot change the password & Password never expires.
• Click Create
• Click Close
Now the user is having only user level privileges. Verify the privileges of the newly crated
user by logging on.

Assign Administrative Power to the User

• R. Click the user in MMC


• Take Properties
• Click Member Of tab (Note that the user is having Membership only with Users
privilege)
• Click Add
• Click Advanced
• Click Find Now (Now all the Group powers/Membership will be displayed and
select the Administrators)
• Click OK
• Click OK (Note that the user is now having Administrative membership also)
Log on with the new user and verify that the user is having all the Administrative
privileges.

Dynamic Host Configuration Protocol (DHCP) /P 304

DHCP (Dynamic Host Configuration Protocol) is a communications protocol that


lets network administrators centrally manage and automate the assignment of IP addresses
in an organization's network. Using the Internet Protocol, each machine that can connect to
the Internet needs a unique IP address. Without DHCP, the IP address must be entered
manually at each computer and a new IP address must be entered each time a computer
DATA COMMUNICATION 33 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
moves to a new location on the network. DHCP lets a network administrator supervise and
distribute IP addresses from a central point and automatically sends a new IP address when
a computer is plugged into a network.
DHCP uses the concept of a "lease" or amount of time that a given IP address
will be valid for a computer. The lease time can vary depending on how long a user is
likely to require the Internet connection at a particular location. It's especially useful in
education and other environments where users change frequently. Using very short leases,
DHCP can dynamically reconfigure networks in which there are more computers than
there are available IP addresses. The protocol also supports static addresses for computers
that need a permanent IP address, such as Web servers.
DHCP assigns a TCP/IP address when a system is started. Typically, it works
like this:

a. A user turns on a computer with a DHCP client.


b. The client computer sends a broadcast request (called a DISCOVER or
DHCPDISCOVER), looking for a DHCP server to answer.
c. The router directs the DISCOVER packet to the correct DHCP server.
d. The server receives the DISCOVER packet.
e. Based on availability and usage policies set on the server, the server
determines an appropriate address (if any) to give to the client.
f. The server then temporarily reserves that address for the client and sends
back to the client an OFFER (or DHCPOFFER) packet, with that address
information.
g. The server also configures the client's DNS servers, WINS servers, NTP
servers, and sometimes other services as well.
h. The client sends a REQUEST (or DHCPREQUEST) packet, letting the
server know that it intends to use the address.
i. The server sends an ACK (or DHCPACK) packet, confirming that the
client has a been given a lease on the address for a server-specified period of time.

DATA COMMUNICATION 34 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Installing and Configuring DHCP server

DHCP is not installed by default while loading the OS; we should install the DHCP
separate.
• Insert the windows 2003 CD into the CD drive
• Start/Setting/Control Panel/Add Remove Programs
• Click Add Remove Windows Component
• Select Network services and then click on the Details
• Check the DHCP & next (Wait while loading the DHCP)
• Click Finish & Close Add Remove Programs
• Better Reboot the PC
Note that now in Services the DHCP server is also available.
Also in Start/Programs/Administrative Tools/DHCP

Creating a range of IP Address.

Microsoft calls the range of IP address and the descriptive information associated with
them as a SCOPE. To create a scope
• Right click the servers icon and choose new scope & Click Next
• Give the descriptive information for the Scope (NW Lab) & Click Next
• Enter the start IP address and the End IP address
• For mask either select the Length or Enter the subnet mask
• Click Next
• Add the IP exclusions & Click next
• Click Next for Lease Duration (for these days the client IP will not change and
after the default 8 days the client will get the new IP. But once in 4 days the Client
will sent new broadcast for new IP for DHCP and will get the fresh IP)
• Next for Configure DHCP Options
• Next for Gateway
• Next for Domain
• Next for WINS servers
DATA COMMUNICATION 35 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

• Next for Activate the Scope


• Click Finish to end the setup.
Note that the Status is Active
DHCP Server is now ready for send IP to clients

Work Sheet for Windows 2003 Server Installation and


Configuration

1) Install Windows 2003 Server.


2) Customize the Desktop and Start Menu
3) Install or Reinstall the NIC card
4) Assign IP & Mask
5) Stop IIS Admin Service (Startup type- Manual) and Restart the service
6) Change Drive letter of CD drive to ‘D’
7) Change the volume name of the partition with Windows 2003 Server as
Win2003Server.
8) Activate Guest account and login as Guest and verify that the Guest has no
administrative powers.
9) Create a user and assign Administrative powers. Log on with the new
administrator and verify the administrative powers.
10) Install & configure DHCP server.
11) Activate the DHCP server by giving IP range (192.168.1.25 to 30) and
Mask (255.255.255.0) and verify the DHCP is activated.
12) Using a switch interconnect 2computers and the DHCP server as a
LAN
13) Load NIC software on the 2 computers and configure for getting IP
automatically and verify that the LAN is working properly with the IP
supplied centrally.

DATA COMMUNICATION 36 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

Set Up of Network Routers


1. Choose a convenient location to begin installing your router such as an open floor
space or table. This does not need to be the permanent location of the device.
Particularly for wireless routers, you may find it necessary to re-position the unit
after installing it as the cables / signals may not reach all areas needed. At the

DATA COMMUNICATION 37 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
beginning, its better to choose a location where it's easiest to work with the router
and worry about final placement later.
2. Plug in the router's electrical power source, then turn on the router by pushing the
power button.
3. (Optional) Connect your Internet modem to the router. Most network modems
connect via an Ethernet cable but USB connections are becoming increasingly
common. The cable plugs into the router jack named "WAN" or "uplink" or
"Internet." After connecting the cable, be sure to power cycle (turn off and turn
back on) the modem to ensure the router recognizes it.
4. Connect one computer to the router. Even if the router is a wireless model, connect
this first computer to the router via a network cable. Using a cable during router
installation ensures the maximum reliability of the equipment. Once a wireless
router installation is complete, the computer can be changed over to a wireless
connection if desired.
5. Open the router's administration tool. From the computer connected to the router,
first open your Web browser. Then enter the router's address for network
administration in the Web address field and hit return to reach the router's home
page.
Many routers are reached by either the Web address "http://192.168.1.1" or
"http://192.168.0.1" Consult your router's documentation to determine the exact
address for your model. Note that you do not need a working Internet connection
for this step.
6. Log in to the router. The router's home page will ask you for a username and
password. Both are provided in the router's documentation. You should change the
router's password for security reasons, but do this after the installation is complete
to avoid unnecessary complications during the basic setup.
7. If you want your router to connect to the Internet, you must enter Internet
connection information into that section of the router's configuration (exact location
varies). If using DSL Internet, you may need to enter the PPPoE username and
password. Likewise, if you have been issued a static IP address by your provider

DATA COMMUNICATION 38 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
(you would need to have requested it), the static IP fields (including network mask
and gateway) given to you by the provider must also must be set in the router.
8. If you were using a primary computer or an older network router to connect to the
Internet, your provider may require you to update the MAC address of the router
with the MAC address of the device you were using previously. Read How to
Change a MAC Address for a detailed description of this process.
9. If this is a wireless router, change the network name (often called SSID). While the
router comes to you with a network name set at the factory, you will never want to
use this name on your network. Read How to Change the Router SSID for detailed
instructions.
10. Verify the network connection is working between your one computer and the
router. To do this, you must confirmed that the computer has received IP address
information from the router. See How to Find IP Addresses for a description of this
process.
11. (If applicable) Verify your one computer can connect to the Internet properly. Open
your Web browser and visit a few Internet sites such as http://www.google.com/.
12. Connect additional computers to the router as needed. If connecting wirelessly,
ensure the network name (SSID) of each is computer matches that of the router.
13. Finally, configure additional network security features as desired to guard your
systems against Internet attackers. These WiFi Home Network Security Tips offer a
good checklist to follow.
Tips:

1. When connecting devices with network cables, be sure each end of the cable
connects tightly. Loose cables are one of the most common sources of network
setup problems.

Items Needed:
• A network router (wireless or wired)
• Network adapters installed on all devices to be connected to the router
• A working Internet modem (optional)
• A Web browser installed at least one computer in the network
DATA COMMUNICATION 39 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

Router R2 configuration
CISCO Router 1841 is configured using hyper terminal application software.

Hyper Terminal Commands and Responses

R2#erase st
Erasing the nvram filesystem will remove all configuration files! Continue? [con
firm]y[OK]
Erase of nvram: complete
R2#
*Jan 3 05:45:11.351: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram
R2#reload

System configuration has been modified. Save? [yes/no]: y


Building configuration...
[OK]
Proceed with reload? [confirm]y
*Jan 3 05:47:03.879: %SYS-5-RELOAD: Reload requested by console. Reload Reason:
Reload command.
System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport

DATA COMMUNICATION 40 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Copyright (c) 2006 by cisco Systems, Inc.
PLD version 0x10
GIO ASIC version 0x127
c1841 platform with 262144 Kbytes of main memory
Main memory is configured to 64 bit mode with parity disabled

Readonly ROMMON initialized


program load complete, entry point: 0x8000f000, size: 0xcb80
program load complete, entry point: 0x8000f000, size: 0xcb80

program load complete, entry point: 0x8000f000, size: 0x11d96ac


Self decompressing the image :
#################################################
#########################################################################
#######
################################################# [OK]

Smart Init is enabled


smart init is sizing iomem
ID MEMORY_REQ TYPE
0X003AA110 public buffer pools
0X00211000 public particle pools
0X00020000 Crypto module pools
0X000021B8 Onboard USB

If any of the above Memory Requirements are


"UNKNOWN", you may be using an unsupported
configuration or there is a software problem and
system operation may be compromised.

Allocating additional 19646199 bytes to IO Memory.


PMem allocated: 240123904 bytes; IOMem allocated: 28311552 bytes

Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
DATA COMMUNICATION 41 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706

Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),


REL
EASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 28-Nov-07 18:48 by stshen
Image text-base: 0x6008873C, data-base: 0x61A83150

Port Statistics for unclassified packets is not turned on.

This product contains cryptographic features and is subject to United


States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to


export@cisco.com.

Cisco 1841 (revision 7.0) with 234496K/27648K bytes of memory.


Processor board ID FHK124421KX
2 FastEthernet interfaces
1 Virtual Private Network (VPN) Module
DRAM configuration is 64 bits wide with parity disabled.
191K bytes of NVRAM.
DATA COMMUNICATION 42 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
62720K bytes of ATA CompactFlash (Read/Write)

Press RETURN to get started!

sslinit fn
*Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change
d to: Initialized
*Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change
d to: Enabled
*Jan 3 05:48:09.751: %SYS-5-CONFIG_I: Configured from memory by console
*Jan 3 05:48:10.063: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state
to administratively down
*Jan 3 05:48:10.063: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state t
o up
*Jan 3 05:48:10.575: %SYS-5-RESTART: System restarted --
Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),
REL
EASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 28-Nov-07 18:48 by stshen
*Jan 3 05:48:10.575: %SNMP-5-COLDSTART: SNMP agent on host R2 is undergoing a
c
old start
*Jan 3 05:48:10.739: %SYS-6-BOOTTIME: Time taken to reboot after reload = 66
seconds
*Jan 3 05:48:10.887: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF
*Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to down
*Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/0, changed state to up
*Jan 3 05:48:14.303: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/0, changed state to down

R2>en
R2#config t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#interface fa 0/0
DATA COMMUNICATION 43 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
R2(config-if)#ip add 192.168.100.14 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#^Z
R2#
*Jan 3 06:05:33.335: %SYS-5-CONFIG_I: Configured from console by console
R2#wr memory
Building configuration...
[OK]
R2#sh start
Using 642 out of 196600 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
!
R2#
R2#exit
R2 con0 is now available

DATA COMMUNICATION 44 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

Press RETURN to get started.

R2>
R2>en
R2#config t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#interface fa 0/0
R2(config-if)#ip address 192.168.100.13 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface fa 0/1
R2(config-if)#ip address 192.168.100.10 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
*Jan 3 06:20:06.199: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state t
o up
*Jan 3 06:20:07.199: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to up
*Jan 3 06:20:14.359: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to down
R2(config-if)#interface fa 0/0
R2(config-if)#ip address 192.168.100.13 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#^Z
R2#
*Jan 3 06:23:05.067: %SYS-5-CONFIG_I: Configured from console by console
R2#wr memory
Building configuration...
[OK]
R2#sh start
Using 660 out of 196600 bytes
!
version 12.4
DATA COMMUNICATION 45 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef

DATA COMMUNICATION 46 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

Router R1 configuration
CISCO Router R2 configuration using Hyper Terminal Application software.

Hyper Terminal Commands and Responses

R2#erase st
Erasing the nvram filesystem will remove all configuration files! Continue? [con
firm]y[OK]
Erase of nvram: complete
R2#
*Jan 3 05:45:11.351: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram
R2#reload

System configuration has been modified. Save? [yes/no]: y


Building configuration...
[OK]
Proceed with reload? [confirm]y
*Jan 3 05:47:03.879: %SYS-5-RELOAD: Reload requested by console. Reload Reason:
Reload command.
System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
DATA COMMUNICATION 47 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Copyright (c) 2006 by cisco Systems, Inc.
PLD version 0x10
GIO ASIC version 0x127
c1841 platform with 262144 Kbytes of main memory
Main memory is configured to 64 bit mode with parity disabled

Readonly ROMMON initialized


program load complete, entry point: 0x8000f000, size: 0xcb80
program load complete, entry point: 0x8000f000, size: 0xcb80

program load complete, entry point: 0x8000f000, size: 0x11d96ac


Self decompressing the image :
#################################################
#########################################################################
#######
################################################# [OK]

Smart Init is enabled


smart init is sizing iomem
ID MEMORY_REQ TYPE
0X003AA110 public buffer pools
0X00211000 public particle pools
0X00020000 Crypto module pools
0X000021B8 Onboard USB

If any of the above Memory Requirements are


"UNKNOWN", you may be using an unsupported
configuration or there is a software problem and
system operation may be compromised.

Allocating additional 19646199 bytes to IO Memory.


PMem allocated: 240123904 bytes; IOMem allocated: 28311552 bytes

Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
DATA COMMUNICATION 48 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706

Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),


REL
EASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 28-Nov-07 18:48 by stshen
Image text-base: 0x6008873C, data-base: 0x61A83150

Port Statistics for unclassified packets is not turned on.

This product contains cryptographic features and is subject to United


States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to


export@cisco.com.

Cisco 1841 (revision 7.0) with 234496K/27648K bytes of memory.


Processor board ID FHK124421KX
2 FastEthernet interfaces
1 Virtual Private Network (VPN) Module
DRAM configuration is 64 bits wide with parity disabled.
191K bytes of NVRAM.
DATA COMMUNICATION 49 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
62720K bytes of ATA CompactFlash (Read/Write)

Press RETURN to get started!

sslinit fn

*Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change


d to: Initialized
*Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change
d to: Enabled
*Jan 3 05:48:09.751: %SYS-5-CONFIG_I: Configured from memory by console
*Jan 3 05:48:10.063: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state
to administratively down
*Jan 3 05:48:10.063: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state t
o up
*Jan 3 05:48:10.575: %SYS-5-RESTART: System restarted --
Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),
REL
EASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 28-Nov-07 18:48 by stshen
*Jan 3 05:48:10.575: %SNMP-5-COLDSTART: SNMP agent on host R2 is undergoing a
c
old start
*Jan 3 05:48:10.739: %SYS-6-BOOTTIME: Time taken to reboot after reload = 66
seconds
*Jan 3 05:48:10.887: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF
*Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to down
*Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/0, changed state to up
*Jan 3 05:48:14.303: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/0, changed state to down
R1>
R1>
R1>config t
^
DATA COMMUNICATION 50 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
% Invalid input detected at '^' marker.

R1>en
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface fa 0/0
R1(config-if)#ip add 192.168.100.14 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#
R1(config-if)#
R1(config-if)#
R1(config-if)#
R1(config-if)#exit
R1(config)#^Z
R1#
*Jan 3 06:05:33.335: %SYS-5-CONFIG_I: Configured from console by console
R1#wr memory
Building configuration...
[OK]
R1#sh start
Using 642 out of 196600 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
DATA COMMUNICATION 51 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
!
R1#
R1#exi
R1 con0 is now available

Press RETURN to get started.

R1>
R1>en
R2#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface fa 0/0
R1(config-if)#ip address 192.168.100.13
% Incomplete command.

R1(config-if)#ip address 192.168.100.13 255.255.255.252


R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#interface fa 0/1
R1(config-if)#ip address 192.168.100.8 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#exit
*Jan 3 06:20:06.199: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state t
o up
*Jan 3 06:20:07.199: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to up
*Jan 3 06:20:14.359: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to down
R1(config-if)#interface fa 0/0
DATA COMMUNICATION 52 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
R1(config-if)#ip address 192.168.100.0 255.255.255.248
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#^Z
R1#
*Jan 3 06:23:05.067: %SYS-5-CONFIG_I: Configured from console by console
R1#wr memory
Building configuration...
[OK]
R1#sh start
Using 660 out of 196600 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef

DATA COMMUNICATION 53 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

HTML CODE FOR CREATING A WEBSITE IN THE


SERVER
<HTML>
<BODY BGCOLOR=LIGHTYELLOW TEXT=BLUE>
<MARQUEE BGCOLOR=GREEN>
<H1>THIS IS A SAMPLE WEB PAGE
</MARQUEE>
</H1><FONT SIZE=6>
<P ALIGN=CENTER>
COLLEGE OF ENGINEERING
DATA COMMUNICATION 54 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
<BR> THALASSERY</P>
</FONT><H4 ALIGN=CENTER>
<A HREF=C:/VLSM/PROJECT.DOC>
Click here to see the Project Details
</A></H4>
<H2 ALAIGN CENTER><IMG SRC=C:/VLSM/1.JPG></H2>
<H3>
<BR><BR><P ALIGN=LEFT>
DEVELOPED BY :
<BR><BR></H3>
NITHIN PV<BR>
NIVIL KM <BR>
MUHAMMED SHAFEEQ PU <BR>
PRAFUL RAMESH O <BR>
SUSMITH C<BR>
</H4><P ALIGN=LEFT>
RTTC</P>
</BODY>
</HTML>

OBSERVATION

IP CONFIGURATION
IP addresses are the unique network addresses for the network nodes which interact
each other with in a network. IP addresses are the 32 bit addresses with a network id part
and host id part in it.
So in the subnetted network one IP address each should be allotted for the server
and the clients for interconnecting them with in the network.
While assigning the IP addresses for the PCs the interface IP addresses of the
routers with which they are connected should also be made into consideration, i.e. ,both
should have the same network address.
The IP configurations of server and the client PCs are given below.
DATA COMMUNICATION 55 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

Route to assign IP addresses:


My computerMy network placesView network connections
LANPropertiesInternet Protocol(TCP/IP)Properties
Here we can assign the IP address, subnet mask and the default gateway.

1) SERVER

DATA COMMUNICATION 56 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

The address configured is,


IP address : 192.168.100.14
Subnet Mask : 255.255.255.252
Default Gateway: 192.168.100.14

2) PC1

DATA COMMUNICATION 57 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

The address configured is,

IP address : 192.168.100.1

Subnet Mask : 255.255.255.248

Default Gateway: 192.168.100. 4

3) PC 2
DATA COMMUNICATION 58 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

The address configured is,

IP address : 192.168.100.2

Subnet Mask : 255.255.255.248

Default Gateway: 192.168.100. 4

4) PC 3

DATA COMMUNICATION 59 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

The address configured is,

IP address : 192.168.100.3

Subnet Mask : 255.255.255.248

Default Gateway: 192.168.100. 4

WEBSITE ACCESS

DATA COMMUNICATION 60 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Hosting The WEB site

The WEB site can be created as below:


1. Open IIS Manager via,
StartProgramsAdministrative toolsIIS Manager
2. Right click Web sitesNew Web siteNext

Description of sightNextSet a home folder of sightNext


Read permissionNextFinish
Web site Properties DocumentsAddName of html page
WEB SITE VIEW

ROUTER CONNECTIVITY CHECKING

Before connecting the routers with in the network it’s interface ports will be shut

DATA COMMUNICATION 61 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
down. The up/down status of router interfaces can be seen as the status of ‘protocol’.When
the router is connected within the network after configuring it the interface ports of the
router will get up.
The interface status of both routers R1 and R2 before and after their connectivity is
given below.
ROUTER R1

BEFORE CONNECTIVITY:

Interface IP-Address OK? Method Status Protocol

FastEthernet0/0 192.168.100.13 YES manual up down

FastEthernet0/1 192.168.100.10 YES manual up down

AFTER CONNCTIVITY:

Interface IP-Address OK? Method Status Protocol

FastEthernet0/0 192.168.100.13 YES manual up up

FastEthernet0/1 192.168.100.10 YES manual up up

ROUTER R2

BEFORE CONNECTIVITY:

Interface IP-Address OK? Method Status Protocol

FastEthernet0/0 192.168.100.4 YES manual up down

FastEthernet0/1 192.168.100.9 YES manual up down

AFTER CONNCTIVITY:

Interface IP-Address OK? Method Status Protocol

FastEthernet0/0 192.168.100.4 YES manual up up

FastEthernet0/1 192.168.100.9 YES manual up up

DATA COMMUNICATION 62 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

Routing Table Verification

After configuring a router using a PC, the routing table of the particular router will
only contain the addresses of networks associated with it’s own interface. So if we are
interested to connect the router with in an internetwork we must also specify the network
addresses of other networks also.
It can be seen from the following routing tables for both the routers R1 and R2
below .
ROUTER R1
BEFORE static ROUTING:

R1#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

192.168.100.0/24 is variably subnetted, 2 subnets, 2 masks


C 192.168.100.8/30 is directly connected, FastEthernet0/1
C 192.168.100.0/29 is directly connected, FastEthernet0/0

AFTER STATIC ROUTING:

R1#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

DATA COMMUNICATION 63 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

192.168.100.0/24 is variably subnetted, 3 subnets, 2 masks


S 192.168.100.12/30 is directly connected, FastEthernet0/1
C 192.168.100.8/30 is directly connected, FastEthernet0/1
C 192.168.100.0/29 is directly connected, FastEthernet0/0

ROUTER R2
BEFORE static ROUTING:

R1#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

192.168.100.0/30 is subnetted, 2 subnets


C 192.168.100.12/30 is directly connected, FastEthernet0/0
C 192.168.100.8/30 is directly connected, FastEthernet0/1

DATA COMMUNICATION 64 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

AFTER STATIC ROUTING:

R1#sh ip route
Codes C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

192.168.100.0/24 is variably subnetted, 3 subnets, 2 masks


C 192.168.100.12/30 is directly connected, FastEthernet00
C 192.168.100.8/30 is directly connected, FastEthernet01
S 192.168.100.0/24 is directly connected, FastEthernet01

DATA COMMUNICATION 65 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

CLIENT TO SERVER PING TEST

A ping test determines whether your computer can communicate with another
computer over the network. Then, if network communication is established, ping tests also
determine the connection latency (technical term for delay) between the two computers.
The ping test is used to check the connectivity of different nodes within the network. In our
network the clients in network 1 can check their connectivity with the server in network 3
using the ping test.
Ping test can be conducted as below

Ping Test:
1. Click on Start.
2. Click on Run. (You will get a small Run window with Open Combo Box)
3. Type Cmd
4. In the Black DOS prompt screen, type ipconfig.

For our network we will conduct the client to server ping tests from the 3 PCs namely PC
1,PC 2 and PC 3

DATA COMMUNICATION 66 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

CLIENT TO SERVER PING TEST FROM PC 1:

The 0% loss defines the perfect connection between PC 1 and the server

DATA COMMUNICATION 67 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

CLIENT TO SERVER PING TEST FROM PC 2:

The 0% loss defines the perfect connection between PC 2 and the server

DATA COMMUNICATION 68 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

CLIENT TO SERVER PING TEST FROM PC 3:

The 0% loss defines the perfect connection between PC 3 and the server

DATA COMMUNICATION 69 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

WEBSITE ACCESS

After connecting the three workstations and the server with in the inter network
each workstation will be able to access the web page in the server

WEBSITE ACCESS FROM PC 1:

DATA COMMUNICATION 70 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

WEBSITE ACCESS FROM PC 2:

DATA COMMUNICATION 71 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

WEBSITE ACCESS FROM PC 3:

DATA COMMUNICATION 72 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

APPLICATIONS

1) Networks having different number of hosts can be set up in a single organization


2) Different subnets masks the broadcast from one subnet and is not transmitted to other
subnets. This saves lots of bandwidth for complex networks.
3) Routers having simple algorithms can be used as nodes
4) Simplify network topology
5) Data intermixing can be avoided
6) It makes the maximum use of IP addresses available for an organization

DATA COMMUNICATION 73 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

CONCLUSION

Subnet masking has arrived as a network supporter for data networks. Among this
variable length subnet masking is been the most suitable technique for the efficient use of
IP class addresses.
The design of subnet masking from class level IP addresses can be made of variable

length subnet masks also. This makes the network more user applicable. VLSM based Data

Network can be used in network implementation of an organization, whose branches are

located at remotely different locations, can view as well as transfer information and data

rather than maintaining physical documents in a cost effective manner.

DATA COMMUNICATION 74 RTTC


TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK

REFERENCES

[1].BSNL STUDY MATERIAL ABOUT COMPUTER NETWORKING


[2].INTERNETWORKING TECHNOLOGIES HANDBOOK ON ROUTING
[3].CISCO IOS COMMANDS ,1840 SERIES ROUTER COMMAND REFERENCE
[4]. CISCO ROUTER GUIDE, CISCO
[5]. VLSM USER GUIDE, 5.2, CISCO IP SOLUTION CENTER
[6]. WWW.CISCO.COM

DATA COMMUNICATION 75 RTTC


TRIVANDRUM

Potrebbero piacerti anche