0% found this document useful (0 votes)
23 views

CN Project Report

This project discusses designing the topology of a college network using Cisco Packet Tracer software with wireless networking systems implementation. The college network consists of routers, switches, email server, DNS server, web server, wireless access points, PCs, laptops and smartphones across different areas like hostel blocks, academic blocks, library and more.

Uploaded by

GOVIND JHA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

CN Project Report

This project discusses designing the topology of a college network using Cisco Packet Tracer software with wireless networking systems implementation. The college network consists of routers, switches, email server, DNS server, web server, wireless access points, PCs, laptops and smartphones across different areas like hostel blocks, academic blocks, library and more.

Uploaded by

GOVIND JHA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

‭KIET Group Of Institutions, Ghaziabad‬

‭Computer Science and Information Technology‬

‭Project Based Learning‬


‭On‬
‭Networking In College‬

‭Submitted By:‬

‭Govind Jha(2100290110056)‬

‭Jahanvi Vaish(2100290110066)‬

‭Submitted To:‬

‭Dr. Manish Bharadwaj‬

‭1‬
‭Certificate‬

‭This‬ ‭is‬ ‭to‬ ‭certify‬ ‭that‬ ‭the‬ ‭PBL‬ ‭project‬ ‭report‬ ‭entitled‬ ‭“‭N
‬ etworking‬ ‭In‬ ‭College‬‭”‬
‭submitted‬‭by‬‭Govind‬‭Jha(2100290110056)‬‭and‬‭Jahnavi‬‭Vaish(2100290110066)‬‭in‬
‭the‬ ‭department‬ ‭of‬ ‭Computer‬ ‭Science‬ ‭and‬ ‭Information‬ ‭Technology‬ ‭of‬ ‭KIET‬
‭Group‬ ‭of‬ ‭Institutions,‬ ‭Ghaziabad,‬ ‭affiliated‬ ‭to‬ ‭Dr.‬ ‭A.‬ ‭P.‬ ‭J.‬ ‭Kalam‬ ‭Technical‬
‭University, Lucknow, Uttar Pradesh, India.‬

‭He‬ ‭has‬ ‭successfully‬ ‭completed‬ ‭his‬ ‭Project‬ ‭under‬ ‭my‬ ‭supervision‬ ‭and‬ ‭guidance‬ ‭and‬ ‭is‬
‭worthy of consideration for the same.‬

‭Signature of Supervisor:‬

‭2‬
‭ABSTRACT‬

‭ omputer‬ ‭networks‬ ‭have‬ ‭a‬ ‭significant‬ ‭impact‬ ‭on‬ ‭the‬ ‭working‬ ‭of‬ ‭an‬ ‭organization.‬ ‭Universities‬
C
‭depend‬ ‭on‬ ‭the‬ ‭proper‬ ‭functioning‬ ‭and‬ ‭analysis‬ ‭of‬ ‭their‬ ‭networks‬‭for‬‭education,‬‭administration,‬
‭communication,‬ ‭e-library,‬ ‭automation,‬ ‭etc.‬ ‭An‬ ‭efficient‬ ‭network‬ ‭is‬ ‭essential‬ ‭to‬ ‭facilitate‬ ‭the‬
‭systematic‬‭and‬‭cost-efficient‬‭transfer‬‭of‬‭information‬‭in‬‭an‬‭organization‬‭in‬‭the‬‭form‬‭of‬‭messages,‬
‭files,‬‭and‬‭resources.‬ ‭The‬‭project‬‭provides‬‭insights‬‭into‬‭various‬‭concepts‬‭such‬‭as‬‭topology‬‭design,‬
‭IP‬ ‭address‬ ‭configuration,‬ ‭and‬ ‭how‬ ‭to‬ ‭send‬ ‭information‬ ‭in‬ ‭the‬ ‭form‬ ‭of‬ ‭packets‬ ‭to‬‭the‬‭wireless‬
‭networks of different areas of a college.‬

‭ he‬‭aim‬‭of‬‭this‬‭project‬‭is‬‭to‬‭design‬‭the‬‭topology‬‭of‬‭the‬‭college‬‭network‬‭using‬‭the‬‭software‬‭Cisco‬
T
‭Packet‬ ‭Tracer‬ ‭with‬ ‭the‬ ‭implementation‬ ‭of‬ ‭wireless‬ ‭networking‬ ‭systems.‬ ‭This‬ ‭college‬ ‭network‬
‭consists of the following devices:‬

1‭ ) Router (1941)‬
‭2) Switches (2960-24TT)‬
‭3) Email server‬
‭4) DNS server‬
‭5) WEB server (HTTP)‬
‭6) Wireless Device (Access Point)‬
‭7) PCs‬
‭8) Laptops‬
‭9) Smartphones‬

‭ he design includes the following parts of the college:‬


T
‭Hostel Blocks: Girls Block and Boys Block‬
‭Academic Blocks: AB1 and AB2‬
‭Dome Building and Library‬
‭IT Consulting‬

‭3‬
‭TABLE OF CONTENTS‬

‭1.‬ ‭Cover Page‬ ‭1‬

‭2.‬ ‭Certificate‬ ‭2‬

‭3.‬ ‭Abstract‬ ‭3‬

‭4.‬ ‭Table of Contents‬ ‭4‬

‭5.‬ ‭Chapter 1: Introduction‬ ‭5‬

‭6.‬ ‭Chapter 2: Overview‬ ‭6‬

‭7.‬ ‭Chapter 3: Methodology‬ ‭10‬

‭8.‬ ‭Chapter 4: Results and Discussion‬ ‭25‬

‭9.‬ ‭Chapter 5: Conclusions and Future Work‬ ‭29‬

‭10.‬ ‭References‬ ‭30‬

‭4‬
‭CHAPTER 1‬

‭INTRODUCTION‬

‭●‬ ‭Motivation‬
‭ he‬ ‭word‬ ‭“digital”‬ ‭is‬ ‭very‬ ‭significant‬‭in‬‭today’s‬‭world,‬‭with‬‭an‬‭increase‬‭in‬‭the‬‭development‬‭of‬
T
‭technology‬ ‭the‬ ‭entire‬ ‭world‬‭is‬‭moving‬‭towards‬‭the‬‭digital‬‭era.‬‭The‬‭educational‬‭institution‬‭plays‬
‭an‬ ‭important‬ ‭role‬ ‭in‬ ‭this‬ ‭digitalization,‬ ‭hence‬ ‭the‬ ‭campus‬ ‭should‬ ‭adapt‬ ‭to‬ ‭digital‬ ‭means‬ ‭of‬
‭networking‬ ‭as‬ ‭well‬ ‭and‬ ‭become‬ ‭a‬ ‭“digital‬ ‭campus”.‬ ‭Going‬ ‭wireless‬ ‭plays‬ ‭an‬‭important‬‭role‬‭in‬
‭this‬‭digitalization.‬‭The‬‭wireless‬‭network‬‭makes‬‭the‬‭connection‬‭easy‬‭with‬‭a‬‭reduction‬‭in‬‭the‬‭use‬‭of‬
‭wires‬ ‭or‬ ‭cables.‬ ‭A‬ ‭wired‬ ‭connection‬ ‭makes‬ ‭it‬ ‭difficult‬ ‭to‬ ‭keep‬ ‭track‬ ‭of‬ ‭all‬ ‭the‬ ‭devices‬ ‭and‬ ‭to‬
‭manage the cable connection, which is not only chaotic but also challenging to handle.‬

‭ ampus‬ ‭networking‬ ‭via‬ ‭wireless‬ ‭connection‬ ‭becomes‬ ‭an‬ ‭important‬ ‭part‬ ‭of‬ ‭campus‬ ‭life‬ ‭and‬
C
‭provides‬‭the‬‭main‬‭way‬‭for‬‭teachers‬‭and‬‭students‬‭to‬‭access‬‭educational‬‭resources,‬‭which‬‭gives‬‭an‬
‭important‬ ‭platform‬ ‭to‬ ‭exchange‬ ‭information.‬ ‭As‬ ‭laptops‬ ‭and‬ ‭intelligent‬ ‭terminals‬ ‭are‬ ‭widely‬
‭used,‬ ‭demand‬ ‭for‬ ‭access‬ ‭to‬ ‭information‬ ‭anytime‬ ‭and‬ ‭anywhere‬ ‭has‬ ‭become‬ ‭more‬ ‭and‬ ‭more‬
‭urgent,‬ ‭but‬ ‭traditional‬ ‭cable‬ ‭networks‬ ‭cannot‬ ‭meet‬ ‭this‬ ‭requirement.‬ ‭Then‬ ‭wireless‬ ‭network‬
‭construction‬ ‭becomes‬ ‭necessary‬ ‭and‬ ‭essential.‬ ‭The‬ ‭wireless‬ ‭network‬ ‭is‬ ‭one‬ ‭of‬ ‭the‬ ‭important‬
‭components‬‭of‬‭a‬‭digital‬‭campus‬‭and‬‭wisdom‬‭campus.‬‭It‬‭provides‬‭an‬‭efficient‬‭way‬‭to‬‭explore‬‭the‬
‭internet‬‭with‬‭a‬‭mobile‬‭terminal‬‭for‬‭teachers‬‭and‬‭students‬‭regardless‬‭of‬‭cables‬‭and‬‭places.‬‭This‬‭is‬
‭an‬ ‭important‬ ‭mark‬ ‭of‬ ‭the‬ ‭modern‬ ‭campus‬ ‭as‬ ‭a‬ ‭supplement‬ ‭of‬ ‭a‬ ‭cable‬ ‭network.‬ ‭With‬ ‭the‬
‭development‬ ‭of‬ ‭network‬ ‭and‬ ‭communication‬ ‭technology,‬ ‭cable‬ ‭networks‬ ‭on‬ ‭a‬ ‭college‬ ‭campus‬
‭bring‬ ‭much‬ ‭convenience‬ ‭for‬‭teaching‬‭and‬‭research‬‭work.‬‭But‬‭for‬‭mobility‬‭and‬‭flexibility,‬‭it‬‭has‬
‭obvious‬‭shortcomings.‬‭A‬‭wireless‬‭network‬‭can‬‭overcome‬‭these‬‭drawbacks‬‭and‬‭has‬‭been‬‭applied‬
‭to the college campus.‬

‭●‬ ‭Project Statement‬


I‭ n‬‭this‬‭mini-project,‬‭we‬‭defined‬‭a‬‭simulation‬‭of‬‭campus‬‭networks‬‭based‬‭on‬‭wireless‬‭networking.‬
‭The network is divided into two sets: one for the campus area and the other for the hostel area.‬
‭The‬ ‭major‬‭aim‬‭of‬‭this‬‭project‬‭is‬‭to‬‭show‬‭the‬‭wireless‬‭connectivity‬‭that‬‭is‬‭used‬‭in‬‭universities‬‭to‬
‭make‬ ‭the‬‭network‬‭efficient‬‭and‬‭mobile‬‭at‬‭the‬‭same‬‭time.‬‭Mobility‬‭is‬‭the‬‭major‬‭concentration‬‭of‬
‭this‬ ‭project.‬ ‭In‬ ‭order‬ ‭to‬ ‭provide‬ ‭equal‬ ‭functionality‬‭to‬‭all‬‭the‬‭users‬‭(college‬‭staff‬‭and‬‭students),‬
‭we have added DNS, Email, and HTTP servers for the maximum utilization of resources.‬

‭5‬
‭ ence‬‭the‬‭campus‬‭network‬‭provides‬‭different‬‭services‬‭such‬‭as‬‭connecting‬‭the‬‭user‬‭to‬‭the‬‭internet,‬
H
‭data‬‭sharing‬‭among‬‭users‬‭(students,‬‭teachers,‬‭and‬‭different‬‭college‬‭members),‬‭accessing‬‭different‬
‭web services for different functionalities, so it needs wireless networking for smooth processing.‬

‭6‬
‭CHAPTER 2‬

‭OVERVIEW‬

‭●‬ ‭What is Packet Tracer?‬‭[1]‬

‭ acket‬ ‭Tracer is‬ ‭a cross-platform visual simulation tool‬ ‭designed‬ ‭by Cisco‬ ‭Systems that‬ ‭allows‬
P
‭users‬ ‭to‬ ‭create network‬ ‭topologies and‬‭imitate‬‭modern computer‬‭networks.‬‭The‬‭software‬‭allows‬
‭users‬ ‭to‬ ‭simulate‬ ‭the‬ ‭configuration‬ ‭of‬ ‭Cisco‬ ‭routers‬ ‭and‬ ‭switches‬ ‭using‬ ‭a‬ ‭simulated‬
‭command-line‬ ‭interface.‬ ‭Packet‬ ‭Tracer‬ ‭makes‬ ‭use‬ ‭of‬ ‭a drag-and-drop user‬ ‭interface,‬ ‭allowing‬
‭users‬ ‭to‬ ‭add‬ ‭and‬ ‭remove‬ ‭simulated‬ ‭network‬ ‭devices‬ ‭as‬ ‭they‬ ‭see‬ ‭fit.‬ ‭The‬ ‭software‬ ‭is‬ ‭mainly‬
‭focused‬ ‭on‬ ‭Certified‬ ‭Cisco‬ ‭Network‬ ‭Associate‬ ‭Academy‬ ‭students‬ ‭as‬ ‭an‬ ‭educational‬ ‭tool‬ ‭for‬
‭helping‬ ‭them‬ ‭learn‬ ‭fundamental‬ ‭CCNA‬ ‭concepts.‬ ‭Previously‬ ‭students‬ ‭enrolled‬ ‭in‬ ‭a‬ ‭CCNA‬
‭Academy program could freely download and use the tool free of charge for educational use.‬

‭●‬ ‭Router‬

‭ ‬‭router‬‭is‬‭a‬‭device‬‭like‬‭a‬‭switch‬‭that‬‭routes‬‭data‬‭packets‬‭based‬‭on‬‭their‬‭IP‬‭addresses.‬‭The‬‭router‬
A
‭is‬ ‭mainly‬ ‭a‬ ‭Network‬ ‭Layer‬ ‭device.‬ ‭Routers‬ ‭normally‬ ‭connect‬ ‭LANs‬ ‭and‬ ‭WANs‬ ‭together‬ ‭and‬
‭have‬ ‭a‬ ‭dynamically‬ ‭updating‬ ‭routing‬ ‭table‬ ‭based‬ ‭on‬ ‭which‬ ‭they‬‭make‬‭decisions‬‭on‬‭routing‬‭the‬
‭data packets. Router divides broadcast domains of hosts connected through it.‬

‭●‬ ‭Switch‬
‭ ‬‭network‬‭switch‬‭(also‬‭called‬‭switching‬‭hub,‬‭bridging‬‭hub,‬‭officially‬‭MAC‬‭bridge‬‭is‬‭networking‬
A
‭hardware‬‭that‬‭connects‬‭devices‬‭on‬‭a‬‭computer‬‭network‬‭by‬‭using‬‭packet‬‭switching‬‭to‬‭receive‬‭and‬
‭forward‬‭data‬‭to‬‭the‬‭destination‬‭device.‬‭A‬‭network‬‭switch‬‭is‬‭a‬‭multiport‬‭network‬‭bridge‬‭that‬‭uses‬
‭MAC‬‭addresses‬‭to‬‭forward‬‭data‬‭at‬‭the‬‭data‬‭link‬‭layer‬‭(layer‬‭2)‬‭of‬‭the‬‭OSI‬‭model.‬‭Some‬‭switches‬
‭can‬ ‭also‬ ‭forward‬ ‭data‬ ‭at‬ ‭the‬ ‭network‬ ‭layer‬ ‭(layer‬ ‭3)‬ ‭by‬ ‭additionally‬ ‭incorporating‬ ‭routing‬
‭functionality. Such switches are commonly known as layer-3 switches or multilayer switches.‬

‭●‬ ‭Network Packet‬

‭ ‬ ‭network‬ ‭packet‬ ‭is‬ ‭a‬ ‭formatted‬ ‭unit‬ ‭of‬ ‭data‬ ‭carried‬ ‭by‬ ‭a‬ ‭packet-switched‬ ‭network.‬ ‭A‬ ‭packet‬
A
‭consists of control information and user data, which is also known as the payload.‬

‭●‬ ‭Server‬‭[2]‬

‭7‬
‭ ‬ ‭server‬ ‭is‬ ‭a‬ ‭computer‬ ‭or‬ ‭system‬ ‭that‬ ‭provides‬ ‭resources,‬ ‭data,‬ ‭services,‬ ‭or‬ ‭programs‬‭to‬‭other‬
A
‭computers,‬ ‭known‬ ‭as‬ ‭clients,‬ ‭over‬ ‭a‬ ‭network.‬ ‭In‬ ‭theory,‬ ‭whenever‬ ‭computers‬ ‭share‬ ‭resources‬
‭with‬‭client‬‭machines‬‭they‬‭are‬‭considered‬‭servers.‬‭There‬‭are‬‭many‬‭types‬‭of‬‭servers,‬‭including‬‭web‬
‭servers, mail servers, and virtual servers.‬

‭ any‬‭networks‬‭contain‬‭one‬‭or‬‭more‬‭of‬‭the‬‭common‬‭servers.‬‭The‬‭servers‬‭used‬‭in‬‭our‬‭project‬‭are‬
M
‭as follows:‬

‭➢‬ ‭DNS Server‬

‭ NS‬‭stands‬‭for‬‭Domain‬‭Name‬‭System‬‭servers‬‭which‬‭are‬‭application‬‭servers‬‭that‬‭provide‬
D
‭a‬ ‭human-friendly‬ ‭naming‬ ‭method‬ ‭to‬ ‭the‬ ‭user‬ ‭computers‬ ‭in‬ ‭order‬ ‭to‬ ‭make‬ ‭IP‬ ‭addresses‬
‭readable‬ ‭by‬ ‭users.‬‭The‬‭DNS‬‭system‬‭is‬‭a‬‭widely‬‭distributed‬‭database‬‭of‬‭names‬‭and‬‭other‬
‭DNS‬ ‭servers,‬ ‭each‬ ‭of‬ ‭which‬ ‭can‬ ‭be‬ ‭used‬ ‭to‬ ‭request‬ ‭an‬ ‭otherwise‬ ‭unknown‬ ‭computer‬
‭name.‬‭When‬‭a‬‭user‬‭needs‬‭the‬‭address‬‭of‬‭a‬‭system,‬‭it‬‭sends‬‭a‬‭DNS‬‭request‬‭with‬‭the‬‭name‬
‭of‬‭the‬‭desired‬‭resource‬‭to‬‭a‬‭DNS‬‭server.‬‭The‬‭DNS‬‭server‬‭responds‬‭with‬‭the‬‭necessary‬‭IP‬
‭address from its table of names.‬

‭➢‬ ‭WEB Server‬

‭ ne‬ ‭of‬ ‭the‬ ‭widely‬ ‭used‬ ‭servers‬ ‭in‬ ‭today’s‬ ‭market‬ ‭is‬ ‭a‬ ‭web‬ ‭server.‬ ‭A‬ ‭web‬ ‭server‬ ‭is‬ ‭a‬
O
‭special‬‭kind‬‭of‬‭application‬‭server‬‭that‬‭hosts‬‭programs‬‭and‬‭data‬‭requested‬‭by‬‭users‬‭across‬
‭the‬ ‭Internet‬ ‭or‬ ‭an‬ ‭intranet.‬ ‭Web‬ ‭servers‬ ‭respond‬ ‭to‬ ‭requests‬ ‭from‬ ‭browsers‬ ‭running‬ ‭on‬
‭client computers for web pages, or other web-based services.‬

‭➢‬ ‭EMAIL Server‬


‭ n‬ ‭e-mail‬ ‭server‬ ‭is‬ ‭a‬ ‭server‬ ‭that‬ ‭handles‬ ‭and‬ ‭delivers‬ ‭e-mail‬ ‭over‬ ‭a‬ ‭network,‬ ‭using‬
A
‭standard‬ ‭email‬ ‭protocols.‬ ‭For‬ ‭example,‬‭the‬‭SMTP‬‭protocol‬‭sends‬‭messages‬‭and‬‭handles‬
‭outgoing‬ ‭mail‬ ‭requests.‬ ‭The‬ ‭POP3‬ ‭protocol‬ ‭receives‬ ‭messages‬ ‭and‬ ‭is‬ ‭used‬ ‭to‬ ‭process‬
‭incoming‬ ‭mail.‬ ‭When‬ ‭you‬ ‭log‬ ‭on‬ ‭to‬ ‭a‬ ‭mail‬ ‭server‬ ‭using‬ ‭a‬ ‭webmail‬ ‭interface‬ ‭or‬ ‭email‬
‭client, these protocols handle all the connections behind the scenes.‬

‭●‬ ‭Wireless Network‬


‭ ‬‭wireless‬‭network‬‭broadcasts‬‭an‬‭access‬‭signal‬‭to‬‭the‬‭workstations‬‭or‬‭PCs.‬‭This‬‭enables‬‭mobility‬
A
‭among‬ ‭laptops,‬ ‭tablets,‬ ‭and‬ ‭PCs‬ ‭from‬ ‭room‬ ‭to‬ ‭room‬ ‭while‬ ‭maintaining‬ ‭a‬ ‭firm‬ ‭network‬
‭connection continuously. A wireless network also presents additional security requirements.‬

‭●‬ ‭Ethernet‬
‭This is the backbone of our network. It consists of the cabling and is typically able to‬

‭8‬
t‭ransfer‬‭data‬‭at‬‭a‬‭rate‬‭of‬‭100mb/s.‬‭It‬‭is‬‭a‬‭system‬‭for‬‭connecting‬‭a‬‭number‬‭of‬‭computer‬‭systems‬‭to‬
‭form‬ ‭a‬ ‭local‬ ‭area‬ ‭network,‬ ‭with‬ ‭protocols‬ ‭to‬ ‭control‬ ‭the‬ ‭passing‬ ‭of‬ ‭information‬ ‭and‬ ‭to‬ ‭avoid‬
‭simultaneous‬ ‭transmission‬ ‭by‬ ‭two‬ ‭or‬ ‭more‬ ‭systems.‬ ‭Among‬ ‭the‬ ‭different‬‭types‬‭of‬‭ethernet,‬‭we‬
‭have‬‭used‬‭Gigabit‬‭Ethernet,‬‭which‬‭is‬‭a‬‭type‬‭of‬‭Ethernet‬‭network‬‭capable‬‭of‬‭transferring‬‭data‬‭at‬‭a‬
‭rate‬‭of‬‭1000‬‭Mbps‬‭and‬‭fast‬‭Ethernet‬‭is‬‭a‬‭type‬‭of‬‭Ethernet‬‭network‬‭that‬‭can‬‭transfer‬‭data‬‭at‬‭a‬‭rate‬
‭of 100 Mbps.‬

‭●‬ ‭Computing Device‬


‭ omputing‬ ‭devices‬ ‭are‬‭the‬‭electronic‬‭devices‬‭that‬‭take‬‭user‬‭inputs,‬‭process‬‭the‬‭inputs,‬‭and‬‭then‬
C
‭provide‬ ‭us‬ ‭with‬ ‭the‬ ‭end‬ ‭results.‬ ‭These‬ ‭devices‬ ‭may‬ ‭be‬ ‭Smartphones,‬ ‭PC‬ ‭Desktops,‬ ‭Laptops,‬
‭printers, and many more.‬

‭●‬ ‭Internet Protocol‬


I‭ nternet‬ ‭Protocol‬ ‭(IP)‬ ‭is‬ ‭one‬ ‭of‬ ‭the‬ ‭fundamental‬ ‭protocols‬ ‭that‬ ‭allow‬ ‭the‬ ‭internet‬ ‭to‬ ‭work.‬ ‭IP‬
‭addresses‬‭are‬‭a‬‭unique‬‭set‬‭of‬‭numbers‬‭on‬‭each‬‭network‬‭and‬‭they‬‭allow‬‭machines‬‭to‬‭address‬‭each‬
‭other across a network. It is implemented on the internet layer in the IP/TCP model.‬

‭●‬ ‭SSH Protocol‬‭[3]‬


‭ ecure‬ ‭Shell‬ ‭enables‬ ‭a‬ ‭user‬ ‭to‬ ‭access‬ ‭a‬ ‭remote‬ ‭device‬ ‭and‬ ‭manage‬ ‭it‬‭remotely.‬‭However,‬‭with‬
S
‭SSH,‬‭all‬‭data‬‭transmitted‬‭over‬‭a‬‭network‬‭(including‬‭usernames‬‭and‬‭passwords)‬‭is‬‭encrypted‬‭and‬
‭secure from eavesdropping.‬
‭SSH‬ ‭is‬ ‭a‬ ‭client-server‬ ‭protocol,‬ ‭with‬ ‭an‬ ‭SSH‬ ‭client‬ ‭and‬ ‭an‬ ‭SSH‬ ‭server.‬ ‭The‬ ‭client‬
‭machine‬ ‭(such‬ ‭as‬ ‭a‬ ‭PC)‬ ‭establishes‬ ‭a‬ ‭connection‬ ‭to‬‭an‬‭SSH‬‭server‬‭running‬‭on‬‭a‬‭remote‬‭device‬
‭(such‬ ‭as‬ ‭a‬ ‭router).‬ ‭Once‬ ‭the‬ ‭connection‬ ‭has‬ ‭been‬ ‭established,‬ ‭a‬ ‭network‬ ‭admin‬ ‭can‬ ‭execute‬
‭commands on the remote device.‬

‭●‬ ‭Benefits of wireless networking over wired networking‬‭[5]‬


‭ o‬‭better‬‭understand‬‭the‬‭wide‬‭usage‬‭of‬‭wireless‬‭networking‬‭in‬‭today’s‬‭world,‬‭is‬‭to‬‭start‬‭with‬‭the‬
T
‭benefits‬‭it‬‭has‬‭over‬‭traditional‬‭wired‬‭networking‬‭is‬‭crucial‬‭for‬‭our‬‭project‬‭implementation.‬‭Some‬
‭major‬ ‭aspects‬ ‭have‬ ‭been‬ ‭stated‬ ‭below‬ ‭that‬ ‭show‬ ‭the‬ ‭various‬ ‭advantages‬ ‭of‬ ‭a‬‭wireless‬‭network‬
‭over wired ones.‬

‭1.‬ ‭Mobility‬

‭9‬
‭ ne‬ ‭of‬ ‭the‬ ‭major‬ ‭advantages‬ ‭of‬ ‭wireless‬ ‭is‬ ‭mobility.‬ ‭Users‬ ‭have‬ ‭the‬ ‭freedom‬ ‭to‬ ‭move‬
O
‭within‬ ‭the‬ ‭area‬ ‭of‬ ‭the‬ ‭network‬ ‭with‬ ‭their‬ ‭computing‬ ‭devices‬ ‭staying‬ ‭connected‬ ‭to‬ ‭a‬
‭network without being concerned about the cable connection.‬

‭2.‬ ‭Less Hassle‬


‭The‬ ‭wireless‬ ‭network‬ ‭helps‬ ‭in‬ ‭the‬ ‭reduction‬ ‭of‬ ‭large‬ ‭amounts‬ ‭of‬‭cables‬‭or‬‭wires‬‭which‬
b‭ ecomes chaotic and difficult to maintain, it makes the connection hassle-free.‬

‭3.‬ ‭Accessibility‬
‭ rovide‬ ‭network‬ ‭access‬ ‭across‬ ‭your‬ ‭organization,‬ ‭even‬ ‭in‬ ‭areas‬ ‭that‬ ‭have‬ ‭been‬
P
‭challenging to reach with the wired network, so your entire team can stay in touch‬‭.‬

‭4.‬ ‭Expandability‬
‭The‬ ‭wireless‬ ‭network‬ ‭helps‬ ‭in‬ ‭the‬ ‭expansion‬ ‭of‬ ‭the‬ ‭network‬‭to‬‭a‬‭wide‬‭range‬‭by‬‭adding‬
‭ ultiple new users and locations without additional need to run cables and wires‬‭.‬
m

‭5.‬ ‭Guest Access‬


‭Offer‬ ‭secure‬ ‭network‬ ‭access‬ ‭to‬ ‭guest‬‭users,‬‭including‬‭customers‬‭and‬‭business‬‭partners,‬
‭while keeping your network resources protected.‬

‭With‬ ‭lots‬ ‭of‬ ‭advantages,‬ ‭there‬ ‭come‬ ‭disadvantages‬ ‭as‬ ‭well,‬ ‭like‬ ‭security‬ ‭issues‬ ‭which‬ ‭can‬ ‭be‬
‭resolved‬‭using‬‭strict‬‭protection‬‭passwords.‬‭Also,‬‭the‬‭Speed‬‭of‬‭wireless‬‭networks‬‭is‬‭considered‬‭to‬
‭be slow and having low bandwidth when compared to the direct cable connection networks.‬

‭●‬ ‭Simulation Environment‬


‭The‬‭simulations‬‭of‬‭our‬‭network‬‭topology‬‭can‬‭be‬‭easily‬‭achieved‬‭using‬‭cisco‬‭packet‬‭tracer.‬‭Using‬
‭a‬‭simulation‬‭mode,‬‭you‬‭can‬‭see‬‭packets‬‭flowing‬‭from‬‭one‬‭node‬‭to‬‭another‬‭and‬‭can‬‭also‬‭click‬‭on‬‭a‬
‭packet‬ ‭to‬ ‭see‬ ‭detailed‬ ‭information‬ ‭about‬ ‭the‬ ‭OSI‬ ‭layers‬ ‭of‬ ‭the‬ ‭network.‬‭Packet‬‭Tracer‬‭offers‬‭a‬
‭huge‬‭platform‬‭to‬‭combine‬‭realistic‬‭simulations‬‭and‬‭visualize‬‭them‬‭simultaneously.‬‭Cisco‬‭Packet‬
‭Tracer‬ ‭makes‬ ‭learning‬ ‭and‬ ‭teaching‬ ‭significantly‬ ‭easier‬ ‭by‬ ‭supporting‬ ‭multi-user‬ ‭collaboration‬
‭and by providing a realistic simulation environment for experimenting with projects.‬

‭10‬
‭CHAPTER 3‬

‭METHODOLOGY‬

I‭ n‬‭order‬‭to‬‭make‬‭our‬‭project‬‭understandable,‬‭we‬‭have‬‭divided‬‭the‬‭content‬‭into‬‭steps.‬‭They‬‭are‬‭as‬
‭follows:‬

‭1.‬ ‭Software and hardware requirements‬

‭ efore‬ ‭heading‬ ‭towards‬ ‭the‬ ‭implementation‬ ‭we‬ ‭need‬ ‭to‬ ‭make‬ ‭sure‬ ‭of‬ ‭the‬ ‭following‬
B
‭requirements.‬

‭‬
● ‭ proper workstation (any mid-high range laptop will suffice).‬
A
‭●‬ ‭Packet Tracer by Cisco‬
‭●‬ ‭8 GB RAM.‬
‭●‬ ‭Any 10,000+ Average CPU Mark scored processor.‬
‭●‬ ‭16 GB of dedicated hard disk space.‬
‭●‬ ‭USB 3.0+ port.‬

‭2.‬ ‭Brief knowledge about our approach‬

‭ he‬ ‭proposed‬ ‭wireless‬ ‭network‬ ‭is‬ ‭implemented‬ ‭for‬ ‭a‬ ‭college‬ ‭campus.‬ ‭We‬‭have‬‭made‬‭a‬
T
‭virtual‬‭visualization‬‭of‬‭the‬‭network‬‭using‬‭the‬‭Cisco‬‭Packet‬‭tracer‬‭which‬‭provides‬‭a‬‭huge‬
‭platform‬‭for‬‭users‬‭to‬‭test‬‭their‬‭projects‬‭using‬‭simulation‬‭tools.‬‭A‬‭Wireless‬‭network‬‭in‬‭an‬
‭educational‬ ‭campus‬ ‭makes‬ ‭it‬ ‭easier‬ ‭for‬ ‭teachers‬ ‭and‬ ‭students‬ ‭to‬ ‭access‬ ‭educational‬
‭resources, by enabling an important platform to exchange information.‬

‭Figure 1: Shows the wireless connection access by various tool‬

‭3.‬ ‭Network Requirements‬

‭11‬
‭ he college outline is considered for this wireless college network.‬
T
‭The network is divided into 2 areas :‬

‭1.‬ C ‭ ampus Area‬


‭The‬ ‭Campus‬ ‭area‬ ‭is‬ ‭further‬ ‭divided‬ ‭into‬ ‭various‬ ‭accessing‬ ‭points‬ ‭like‬ ‭Dome‬
‭building,‬ ‭Library,‬ ‭Academic‬ ‭Blocks‬ ‭(AB1‬ ‭and‬ ‭AB2),‬ ‭Server‬ ‭Center,‬ ‭and‬ ‭IT‬
‭consulting.‬
‭2.‬ ‭Hostel Area‬
‭The Hostel area is further divided into Boys blocks and Girls blocks respectively.‬

‭Figure 2:Basic layout of our wireless access points in college‬

‭Devices Used In The Network‬


‭Devices‬ ‭Quantity‬

‭1) Router (1941)‬ ‭3‬

‭2) Switches (2960-24TT)‬ ‭3‬

‭3) EMAIL server‬ ‭1‬

‭4) DNS server‬ ‭1‬

‭5) WEB server (HTTP)‬ ‭1‬

‭6) Wireless Device (Access Point)‬ ‭7‬

‭7) PCs‬ ‭12‬

‭8) Laptops‬ ‭10‬

‭9) Smartphones‬ ‭2‬

‭12‬
‭Figure 3: Devices used in the network‬

‭4.‬ ‭Implementation and Flow Diagram‬

‭●‬ T
‭ o‬ ‭design‬ ‭the‬ ‭wireless‬ ‭network‬ ‭of‬ ‭the‬ ‭college‬‭we‬‭initially‬‭started‬‭by‬‭placing‬‭the‬
‭core devices into the frame as mentioned in the layout.‬

‭●‬ F
‭ irstly,‬‭we‬‭placed‬‭the‬‭main‬‭router‬‭at‬‭the‬‭center‬‭of‬‭the‬‭college‬‭outline,‬‭which‬‭was‬
‭further‬‭connected‬‭to‬‭the‬‭server‬‭switch‬‭using‬‭the‬‭gigabit‬‭ethernet‬‭port‬‭with‬‭copper‬
‭straight-through‬ ‭cable‬‭and‬‭sub‬‭routers‬‭(‬‭campus‬‭router‬‭and‬‭hostel‬‭router‬‭)‬‭using‬
‭the‬ ‭serial‬ ‭port‬ ‭with‬ ‭serial‬ ‭DCE‬ ‭cable‬ ‭at‬ ‭the‬ ‭hostel‬ ‭area‬ ‭and‬ ‭campus‬ ‭area‬
‭respectively.‬

‭●‬ T
‭ he‬‭server‬‭switch‬‭was‬‭further‬‭connected‬‭to‬‭the‬‭EMAIL,‬‭DNS,‬‭and‬‭WEB‬‭servers‬
‭respectively.‬

‭●‬ C
‭ ampus‬‭router‬‭was‬‭connected‬‭to‬‭the‬‭campus‬‭switch‬‭which‬‭was‬‭further‬‭connected‬
‭with‬ ‭wireless‬ ‭access‬ ‭points‬ ‭of‬ ‭the‬ ‭academic‬ ‭block‬ ‭(‭A
‬ B1‬ ‭and‬ ‭AB2‬‭),‬ ‭dome‬
‭building‬‭,‬‭library,‬‭and‬‭IT consulting.‬

‭●‬ T
‭ he‬ ‭wireless‬ ‭access‬ ‭points‬ ‭were‬ ‭then‬ ‭connected‬ ‭to‬ ‭computing‬ ‭devices‬ ‭(PCs,‬
‭laptops, and smartphones).‬

‭●‬ S
‭ imilarly,‬‭the‬‭hostel‬‭router‬‭was‬‭connected‬‭to‬‭the‬‭hostel‬‭switch‬‭which‬‭was‬‭further‬
‭connected with the wireless access point of boys block and girls block.‬

‭●‬ T
‭ he‬ ‭wireless‬ ‭access‬ ‭points‬ ‭were‬ ‭then‬ ‭connected‬ ‭to‬ ‭the‬‭computing‬‭devices‬‭(PCs,‬
‭laptops,‬‭and‬‭smartphones),‬‭every‬‭area‬‭has‬‭a‬‭dedicated‬‭access‬‭point‬‭which‬‭can‬‭only‬
‭be connected with the help of a password.‬

‭●‬ A
‭ ll‬ ‭these‬ ‭connections‬ ‭are‬ ‭made‬ ‭through‬ ‭ethernet‬ ‭ports‬ ‭(gigabit‬‭ethernet‬‭and‬‭fast‬
‭ethernet) using copper straight-through cables.‬

‭13‬
‭This is the flow diagram for a better understanding of the steps mentioned above.‬

‭14‬
‭5.‬ ‭Configuring IP Addresses‬
‭We have attached the screenshots of all the IP configuration below:‬

‭●‬ ‭Main Router configuration‬

‭GigabitEthernet0/1‬

‭Serial0/1/0‬

‭Serial0/1/1‬

‭RIP‬

‭15‬
‭●‬ ‭DNS SERVER‬

‭●‬ ‭WEB SERVER‬

‭16‬
‭●‬ ‭EMAIL SERVER‬

‭●‬ ‭COLLEGE ROUTER‬

‭GigabitEthernet0/0‬

‭Serial0/1/0‬

‭●‬ ‭ACADEMIC BLOCK 1‬

‭17‬
I‭ P Address are as follows‬
‭192.168.1.14- Laptop‬
‭192.168.1.15- PC‬
‭192.168.1.16- Laptop‬
‭192.168.1.17- PC‬
‭Subnet Mask- 255.255.255.0‬
‭Default Gateway- 192.168.1.1‬
‭DNS Server- 192.168.2.3‬

‭●‬ ‭ACADEMIC BLOCK 2‬

I‭ P Address are as follows‬


‭192.168.1.10- Laptop‬
‭192.168.1.11- PC‬
‭192.168.1.12- Laptop‬
‭192.168.1.13- PC‬
‭Subnet Mask- 255.255.255.0‬
‭Default Gateway- 192.168.1.1‬
‭DNS Server- 192.168.2.3‬

‭●‬ ‭DOME BUILDING‬

‭18‬
I‭ P Addresses are as follows‬
‭192.168.1.2- PC‬
‭192.168.1.3- PC‬
‭192.168.1.4- Laptop‬
‭Subnet Mask- 255.255.255.0‬
‭Default Gateway- 192.168.1.1‬
‭DNS Server- 192.168.2.3‬

‭●‬ ‭LIBRARY‬

I‭ P Addresses are as follows‬


‭192.168.1.5- PC‬
‭192.168.1.6- PC‬
‭Subnet Mask- 255.255.255.0‬
‭Default Gateway- 192.168.1.1‬
‭DNS Server- 192.168.2.3‬

‭●‬ ‭IT Consulting‬

‭19‬
I‭ P Addresses are as follows‬
‭192.168.1.7- Laptop‬
‭192.168.1.8- PC‬
‭192.168.1.9- PC‬
‭Subnet Mask- 255.255.255.0‬
‭Default Gateway- 192.168.1.1‬
‭DNS Server- 192.168.2.3‬

‭●‬ ‭HOSTEL ROUTER‬

‭GigabitEthernet0/0‬

‭Serial0/1/0‬

‭●‬ ‭Boys Block‬

‭20‬
I‭ P Addresses are as follows‬
‭192.168.3.6- PC‬
‭192.168.3.7-Laptop‬
‭192.168.3.8- PC‬
‭192.168.3.9- Smartphone‬
‭Subnet Mask- 255.255.255.0‬
‭Default Gateway- 192.168.3.1‬
‭DNS Server- 192.168.2.3‬

‭●‬ ‭Girls Block‬

I‭ P Addresses are as follows‬


‭192.168.3.2- PC‬
‭192.168.3.3-Laptop‬
‭192.168.3.4- PC‬
‭192.168.3.5- Smartphone‬
‭Subnet Mask- 255.255.255.0‬
‭Default Gateway- 192.168.3.1‬
‭DNS Server- 192.168.2.3‬

‭21‬
‭●‬ ‭WIRELESS ACCESS POINT‬

‭SSID‬ ‭Password‬

‭1)muj_dome‬ ‭1234567890‬

‭2)muj_library‬ ‭1234567890‬

‭3)muj_ITC‬ ‭1234567890‬

‭4)muj_AB1‬ ‭1234567890‬

‭5)muj_AB2‬ ‭1234567890‬

‭6)muj_boys‬ ‭1234567890‬

‭7)muj_girls‬ ‭1234567890‬

‭22‬
‭6.‬ ‭Securing the network‬

‭ asswords‬ ‭are‬ ‭used‬ ‭in‬ ‭accessing‬ ‭the‬ ‭router‬ ‭and‬ ‭all‬‭the‬‭wireless‬‭networks‬‭(mentioned‬‭in‬


P
‭step 5 wireless access point) to make the access limited to college authorized users only.‬

‭Routers‬ ‭are‬ ‭also‬ ‭secured‬ ‭with‬ ‭ssh‬ ‭(Secure‬ ‭Shell).‬ ‭Routers‬‭and‬‭their‬‭assigned‬‭passwords‬


a‭ re mentioned below:‬

‭Router Name‬ ‭Passwords‬

‭1)main_router‬ ‭ onsole password: cisco‬


C
‭ssh password: admin‬

‭2)Router1(College Router)‬ ‭ onsole password:muj@123‬


C
‭ssh password: admin‬

‭3)Router2(Hostel Router)‬ ‭ onsole password:muj@123‬


C
‭ssh password: admin‬

‭23‬
‭24‬
‭Connectivity of wireless network on computing devices‬

‭25‬
‭CHAPTER 4‬

‭RESULT & DISCUSSION‬

‭ inally,‬ ‭we‬ ‭have‬ ‭combined‬ ‭all‬ ‭the‬ ‭steps‬ ‭as‬ ‭mentioned‬ ‭in‬ ‭chapter‬ ‭3‬ ‭(work‬ ‭done)‬ ‭and‬
F
‭implemented‬ ‭the‬ ‭desired‬ ‭wireless‬ ‭network‬ ‭for‬ ‭college.‬ ‭We‬ ‭have‬ ‭a‬ ‭complete‬ ‭network‬
‭providing various facilities to the teaching staff, non-teaching staff, and students.‬

‭The complete diagram of the college Area Network Scenario created in Packet‬
‭Tracer environment‬

‭26‬
‭●‬ ‭Final Simulation‬

I‭ n‬‭Simulation‬‭Mode,‬‭you‬‭can‬‭watch‬‭your‬‭network‬‭run‬‭at‬‭a‬‭slower‬‭pace,‬‭observing‬‭the‬‭paths‬‭that‬
‭packets‬‭take‬‭and‬‭inspecting‬‭them‬‭in‬‭detail.‬‭The‬‭proposed‬‭architecture,‬‭when‬‭simulated‬‭on‬‭Cisco‬
‭Packet Tracer, produced results which are demonstrated as follows:‬

‭Final simulation for the network system to check‬‭all the connections‬

‭27‬
‭●‬ ‭Ping‬ ‭Test:‬ ‭Network‬ ‭connectivity‬ ‭and‬ ‭communication‬ ‭can‬ ‭be‬ ‭tested‬ ‭using‬ ‭the‬ ‭ping‬ ‭command,‬
f‭ ollowed‬ ‭by‬ ‭the‬ ‭domain‬ ‭name‬ ‭or‬ ‭the‬ ‭IP‬ ‭address‬ ‭of‬ ‭the‬ ‭device‬‭(equipment)‬‭whose‬‭connectivity‬
‭one wishes to verify‬‭.‬

‭28‬
‭29‬
‭CHAPTER 5‬

‭CONCLUSION AND FUTURE WORK‬

‭●‬ ‭Conclusion‬

‭ e‬ ‭started‬ ‭our‬ ‭discussion‬ ‭with‬ ‭the‬ ‭word‬ ‭“digitalization”‬ ‭and‬ ‭in‬ ‭order‬ ‭to‬ ‭achieve‬ ‭it,‬ ‭we‬
W
‭aimed‬ ‭to‬ ‭start‬ ‭with‬ ‭an‬ ‭educational‬ ‭institute,‬ ‭and‬ ‭finally,‬ ‭we‬ ‭designed‬ ‭a‬ ‭network‬ ‭for‬ ‭a‬
‭college,‬‭which‬‭is‬‭wireless.‬‭As‬‭we‬‭mentioned,‬‭mobility‬‭and‬‭efficiency‬‭are‬‭the‬‭key‬‭aspects‬
‭of‬ ‭wireless‬ ‭networks,‬ ‭which‬ ‭were‬ ‭our‬ ‭main‬ ‭goal,‬ ‭and‬ ‭hence,‬ ‭we‬ ‭decided‬ ‭to‬ ‭shift‬ ‭to‬ ‭a‬
‭wireless network instead of a wired one, making our network clean and less chaotic.‬
‭In‬‭this‬‭project,‬ ‭we‬‭designed‬‭a‬ ‭college‬‭Network‬‭using‬ ‭Cisco‬ ‭Packet‬ ‭Tracer‬‭that‬
‭uses‬ ‭a‬ ‭networking‬ ‭topology‬ ‭implemented‬ ‭using‬ ‭servers,‬ ‭routers,‬ ‭switches,‬ ‭and‬ ‭end‬
‭devices‬ ‭in‬ ‭a‬ ‭multiple‬‭area‬‭networks.‬‭We‬‭have‬‭covered‬‭all‬‭the‬‭necessary‬‭features‬‭that‬‭are‬
‭required‬ ‭for‬ ‭a‬ ‭network‬ ‭to‬ ‭function‬ ‭properly.‬ ‭We‬‭have‬‭included‬‭a‬‭DNS‬‭server‬‭and‬‭a‬‭web‬
‭server‬ ‭for‬ ‭establishing‬ ‭a‬ ‭smooth‬ ‭communication‬ ‭system‬ ‭between‬ ‭different‬ ‭areas‬ ‭of‬ ‭our‬
‭network‬‭and‬‭specifically‬‭for‬‭the‬‭communication‬‭between‬‭students‬‭and‬‭teachers.‬‭We‬‭have‬
‭included‬ ‭an‬‭email‬‭server‬‭to‬‭facilitate‬‭intra‬‭college‬‭communication‬‭through‬‭emails‬‭within‬
‭the‬‭domain.‬‭We‬‭have‬‭used‬‭console‬‭passwords‬‭and‬‭ssh‬‭protocol‬‭to‬‭ensure‬‭a‬‭safe‬‭and‬‭secure‬
‭transfer of data.‬

‭●‬ ‭Future Work‬

‭ he‬ ‭configuration‬ ‭and‬ ‭specifications‬ ‭are‬ ‭for‬ ‭the‬ ‭initial‬ ‭prototype‬ ‭and‬ ‭can‬‭further‬‭be‬‭developed‬
T
‭and‬ ‭additional‬ ‭functionality‬ ‭can‬ ‭be‬ ‭added‬ ‭to‬ ‭increase‬ ‭support‬ ‭and‬ ‭coverage‬ ‭of‬ ‭our‬ ‭existing‬
‭network.‬

‭30‬
‭REFERENCES‬

‭[1]‬‭https://en.wikipedia.org/wiki/Packet_Tracer‬

‭[2]‬‭https://www.paessler.com/it-explained/server‬

[‭ 3]‬‭https://computernetworking747640215.wordpress.com/2018/07/05/secure-shell-ssh-configura‬
‭tion-on-a-switch-and-router-in-packet-tracer/‬

‭[4]‬‭http://router.over-blog.com/article-how-to-configure-cisco-router-password-106850439.html‬

‭[5]‬‭https://www.cognoscape.com/benefits-going-wireless/‬

‭31‬

You might also like