Capstone Project Report
Capstone Project Report
Capstone Project Report
On
CAMPUS ENTERPRISE NETWORK
Submitted in the partial fulfillment of the requirement for the award of degree of
Bachelors of Technology
In
Electronics & Communication Engineering
DECLARATION
We, students of B. Tech under Department of ELECTRONICS AND COMMUNICATION,
hereby declare that all the information furnished in this capstone project report is based on
our own intensive work and is genuine.
This report, to the best of my knowledge, contains part of my work which has been submitted
for the award of my degree from Lovely Professional University, Phagwara, under the
guidance of Mr. Sonit Singh (during August to December, 2012).
Name of Students:
Roop Kanwal (10900033)
Divya Pahwa (10901208)
Manik Garg(10900871)
Ramandeep Kaur(10901210)
Mayank Shah(10900154)
2|Page
Ref: _________
Dated:________
Certificate
This is to certify that the declaration statement made by this group of students is correct to the
best of my knowledge and belief. The Capstone Project Proposal based on the technology /
tool learnt is fit for the submission and partial fulfillment of the conditions for the award of
B.Tech in Electronics and Communication Engineering from Lovely Professional University,
Phagwara.
Name : ..
U.ID :
Designation : .
3|Page
ACKNOWLEDGEMENT
We are highly indebted to Faculty of L.P.U, Electronics and Communication Engineering
Department, who have given us all the necessary technical guidance in carrying out this
Project.
This is humble effort to express sincere gratitude toward those who have guided and helped
us to complete this project.
A project report is major milestone during the study period of a student. We could have faced
many problems but our mentor helped us with patient approach and their positive criticism.
A warm thanks to our project-in-charge Mr. Sonit Singh, for the valuable support and
constant encouragement that led to the completion of our project. He provided us his valuable
time and basic information regarding the project.
Finally, we thank all the people who directly or indirectly helped us through the course pf our
Project. Without the help of these people, our project report could have been never so
informative and successful.
Roop Kanwal(10900033)
Divya Pahwa(10901208)
Manik Garg(10900871)
Ramandeep Kaur(10901210)
Mayank Shah(10900154)
4|Page
ABSTRACT
The project which is creating a complex network which is similar to daily life networks
implemented in the offices, colleges, enterprises and organizations. This report presents an
overview of the campus network architecture and includes descriptions of various design
considerations, topologies, technologies, configuration design guidelines, and other
considerations relevant to the design of highly available, full-service campus switching
fabric. It is also intended to serve as a guide to direct readers to more specific campus design
best practices and configuration examples for each of the specific design options. It can be
used as a manual for further designing of more complex networks by the network
administrators and designers.
FLOW CHART
Fig. 1
5|Page
TABLE OF CONTENTS
Chapter 1
Introduction
Page No.
1.1
Aim of Project
7-14
1.2
Need of Networking
1.3
Basic Terminologies
7-8
1.4
Network Types
1.5
Various Topologies
8-9
1.6
Network Models
9-12
1.7
12-14
Chapter 2
15-21
2.1
15
2.2
Design Approach
16-18
2.3
Software Used
18-19
2.4
19-21
Chapter 3
22-26
3.1
VLAN
22-23
3.2
Trunking
23
3.3
VTP
23-24
3.4
Inter-VLAN
24
3.5
STP
24-25
3.6
Default Routing
25
3.7
NAT
25-26
3.8
ACL
26
Chapter 4
27-33
Chapter 5
References
34
6|Page
Chapter 1
INTRODUCTION
1.1 Aim of the project
The aim of the project is to design a complex network which can be implemented in practical
daily life situations using different networking techniques and protocols combined known as
CAMPUS ENTERPRISE NETWORK.
(a.) Internet Protocol (IP): principal communications protocol used for relaying datagrams
(also known as network packets) across an internetwork using the Internet Protocol Suite.
(b.) Protocol: Rules determining the format and transmission of data over a network.
(c.) Network: A group of computers and devices that can communicate with each other and
share resources.
(d.) Domain: A group of computers and devices on a network that are administered as a unit.
(e.)Collision: An attempt by two devices to transmit over the network at the same time
usually resulting in the data being lost.
(f.) Packet: The unit of data sent across a network. Data is broken up into packets for sending
over a packet switching network.
(g.)Hardware (MAC) address: A unique address associated with a particular network
device.
(h.) IP address: A 32-bit address assigned to hosts using the TCP/IP protocol. Each
computer/device on the public Internet has a unique IP address. An example of an IP address
is 192.168.1.2.
(i.) Server: A computer that handles requests for data, email, files, and other network
services from other computers.
(j.)Bandwidth: the rated throughput capacity of a given network media or protocol. The
amount of data that can be transmitted in a fixed amount of time.
(k.) Gateway: A device on network as an entrance to other network and routes traffic.
8|Page
topology means the physical design of a network including the devices, location and cable
installation. Logical topology refers to how data is actually transferred in a network as
opposed to its physical design.
(a.)Bus topology
Fig. 2
Many devices connect to a single cable "backbone". If the backbone is broken, the entire
segment fails. Bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives.
(b.)Ring Topology
Fig. 3
In a ring network, every device has exactly two neighbours for communication purposes. All
messages travel through a ring in the same direction. A disadvantage of the ring is that if any
device is added to or removed from the ring, the ring is broken and the segment fails until it is
"reformed". It is also considerably more expensive than other topologies.
(c.)Star Topology
Fig. 4
10 | P a g e
A star network has a central connection point - like a hub or switch. While it takes more
cable, the benefit is that if a cable fails, only one node will be brought down.
All traffic emanates from the hub of the star. The central site is in control of all the nodes
attached to it. The central hub is usually a fast, self contained computer and is responsible for
routing all traffic to other nodes. The main advantages of a star network are that one
malfunctioning node does not affect the rest of the network.
(d.)Tree Topology
Fig. 5
It is also known as the 'Hierarchical topology', the tree topology is a combination of bus and
star topologies. They are very common in larger networks. A typical scenario is: a file server
is connected to a backbone cable (e.g. coaxial) that runs through the building, from which
switches are connected, branching out to workstations.
(e.)Mesh topology
Fig. 6
11 | P a g e
Mesh topology uses lots of cables to connect every node with every other node. It is very
expensive to wire up, but if any cable fails, there are many other ways for two nodes to
communicate.
(f.)Hybrid Topology
Fig. 7
Hybrid network is the combination of different topologies such as star, Ring, Mesh, Bus etc.
For example, if a department uses a Bus network, second department uses the ring network,
third department uses the Mesh network and fourth department uses the star network. All the
networks of different types (of four departments) can be connected together through a central
hub (in the form of star network) as shown in the figure.
12 | P a g e
Transport Layer (host-to-host): The Transport Layer constitutes the networking regime
between two network hosts, either on the local network or on remote networks separated by
routers.
Internet Layer (internetworking): The Internet Layer has the task of exchanging datagrams
across network boundaries. It is therefore also referred to as the layer that establishes
internetworking; indeed, it defines and establishes the Internet. This layer defines the
addressing and routing structures used for the TCP/IP protocol suite.
Link Layer: This layer defines the networking methods with the scope of the local network
link on which hosts communicate without intervening routers. This layer describes the
protocols used to describe the local network topology and the interfaces needed to affect
transmission of Internet Layer datagrams to next-neighbor hosts.
(b.)OSI Network Model - When networks first came into existence computers could
communicate with computers made by the same manufacturers only,so a company running an
IBM PC could communicate with all it's PC only if they are from the same manufacturer
IBM but this limitation barrier was broken by International Organization for Standards (ISO)
by creating open system interconnections reference model (OSI) in 1970.The OSI model was
made to help vendors to create inter-operable network devices and software in the form of
protocols so that different vendor networks could work with each other. The OSI is not a
physical model though it is a set of guidelines that application developers can use to create
applications that run on a network.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session
layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between
the applications at each end. It deals with session and connection coordination.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node.
Data Link (Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission
protocol knowledge and management and handles errors in the physical layer, flow control
and frame synchronization. The data link layer is divided into two sub layers: The Media
Access Control (MAC) layer and the Logical Link Control (LLC) layer.
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the
network at the electrical and mechanical level.
clearly distinguished
Loosely layered
Strict layering
More Credible
Less Credible
No.
1
2
14 | P a g e
Chapter 2
KEY FEATURES OF THE PROJECT
2.1 Introduction of Campus Network:
The enterprise campus is usually understood as that portion of the computing infrastructure
that provides access to network communication services and resources to end users and
devices spread over a single geographic location. It might span a single floor, building or
even a large group of buildings spread over an extended geographic area. Some networks will
have a single campus that also acts as the core or backbone of the network and provide
interconnectivity between other portions of the overall network. The campus core can often
interconnect the campus access, the data center and WAN portions of the network. In the
largest enterprises, there might be multiple campus sites distributed worldwide with each
providing both end user access and local backbone connectivity.
The campus network, as defined for the purposes of the enterprise design guides, consists of
the integrated elements that comprise the set of services used by a group of users and endstation devices that all share the same high-speed switching communications fabric. These
include the packet-transport services (both wired and wireless), traffic identification and
control (security and application optimization), traffic monitoring and management,
and overall systems management and provisioning. These basic functions are implemented
in such a way as to provide and directly support the higher-level services provided by the IT
organization for use by the end user community. These functions include:
Non-Stop High Availability Services
Access and Mobility Services
Application Optimization and Protection Services
Visualization Services
Security Services
Operational and Management Services
15 | P a g e
(a.)Hierarchy:
Any large complex system must be built using a set of modularized components that can be
assembled in a hierarchical and structured manner. Dividing any task or system into
components provides a number of immediate benefits. Each of the components or modules
can be designed with some independence from the overall design and all modules can be
operated as semi-independent elements providing for overall higher system availabilityas
well as for simpler management and operations. By dividing the campus system into
subsystemsor building blocksand assembling them into a clear order, we achieve a
higher degree of stability, flexibility, and manageability for the individual pieces of the
campus and the campus as a whole. Campus is traditionally defined as a three-tier
hierarchical model comprising the core, distribution, and access layers as shown in figure.
The key principle of the hierarchical design is that each element in the hierarchy has a
specific set of functions and services that it offers and a specific role to play in each of the
design.
Access: the access layer is the first tier or edge of the campus. It is the place where
end devices (PCs, printers, cameras, and the like) attach to the wired portion of the
campus network. It is also the place where devices that extend the network out one
more level are attachedIP phones and wireless access points (APs) being the prime
two key examples of devices that extend the connectivity out one more layer from the
actual campus access switch.
16 | P a g e
Distribution: It is an aggregation point for all of the access switches and acts as an
integral member of the access-distribution block providing connectivity and policy
services for traffic flows within the access-distribution block.It defines a
summarization boundary for network control plane protocols (EIGRP, OSPF,
Spanning Tree) and serves as the policy boundary between the devices and data flows
within the access-distribution block and the rest of the network. In providing all these
functions the distribution layer participates in both the access-distribution block and
the core. As a result, the configuration choices for features in the distribution layer are
often determined by the requirements of the access layer or the core layer, or by the
need to act as an interface to both.
Core: the campus core is in some ways the simplest yet most critical part of the
campus. It provides a very limited set of services and is designed to be highly
available and operate in an always-on mode non-stop 7x24x365 service.
Fig. 8
(b.) Modularity:
The modules of the system are the building blocks that are assembled into the larger campus.
The advantage of the modular approach is largely due to the isolation that it can provide.
Failures that occur within a module can be isolated from the remainder of the network,
providing for both simpler problem detection and higher overall system availability. Network
changes, upgrades, or the introduction of new services can be made in a controlled and staged
fashion, allowing greater flexibility in the maintenance and operation of the campus network.
When a specific module no longer has sufficient capacity or is missing a new function or
service, it can be updated or replaced by another module that has the same structural role in
the overall hierarchical design.
(c.)Resiliency: A basic feature of resiliency is the ability for the system to remain available
for use under both normal and abnormal conditions. Normal conditions include such events
17 | P a g e
as change windows and normal or expected traffic flows and traffic patterns. Abnormal
conditions include hardware or software failures, extreme traffic loads, unusual traffic
patterns, denial-of-service (DoS) events whether intentional or unintentional, and any other
unplanned event.
(d.)Flexibility: networks have become larger and more complex, while the business
environment and its underlying communication requirements continue to evolve. The result is
that network designs must allows for an increasing degree of adaptability or flexibility. The
ability to modify portions of the network, add new services, or increase capacity without
going through a major fork-lift upgrade are key considerations to the effectiveness campus
designs.
Cisco Packet Tracer is a powerful network simulation program that allows students to
experiment with network behavior. Packet Tracer provides simulation, visualization,
authoring, assessment, and collaboration capabilities and facilitates the teaching and learning
of complex technology concepts. The current version of Packet Tracer supports an array of
simulated Application Layer protocols, as well as basic routing with RIP, OSPF, and EIGRP .
Features:
Cisco Packet Tracer includes the following features:
Makes teaching easier by providing a free, multiuser environment for instructors to easily
teach complex technical concepts.
18 | P a g e
(b.)Supported Protocols:
Sr.no
Device
Type
Specification
Vendor
Router
Wireless,wired
WRT300N,2620XM,2621XM
Linksys,Cisco
Switch
Multilayer,single
layer
Cisco
End
points
Laptops,personal
computers
Servers
19 | P a g e
Compliant
Protocols:IEEE
802.3af,802.3x,802.1Q,802.1w,
802.1p,802.3z,802.3,
802.1x,802.1D,802.3ab
20 | P a g e
21 | P a g e
Chapter 3
TECHNIQUES USED IN THE NETWORK
Fig. 10
TYPES:
(a). Static VLANs
In a static VLAN, the administrator assigns switch ports to the VLAN, and the association
does not change until the administrator changes the port assignment. This is the typical way
of creating VLANs, and it is the most secure. This type of VLAN configuration is easy to set
22 | P a g e
up and monitor, working well in a network where the movement of users within the network
is maintained by basically just locking the network closet doors. Using network management
software to configure the ports can be helpful but is not mandatory.
(b). Dynamic VLANs
If the administrator wants to do a little more work up front and assign all devices hardware
addresses into a database, hosts in an internetwork can be assigned VLAN assignments
dynamically. Using intelligent management software, you can enable hardware (MAC)
addresses, protocols, or even applications to create dynamic VLANs.
3.2 TRUNKING
Trunk links are point-to-point, 100 or 1000Mbps links between two switches, between a
switch and a router, or between a switch and a server. Trunked links carry the traffic of
multiple VLANs, from 1 to 1,005 at a time. Trunk links are most beneficial when switches
are connected to other switches or switches are connected to routers. A trunk link is not
assigned to particular VLAN. Instead one, many or all active VLANs can be transported
between switches using a single physical trunk link.
To allow VTP to manage VLANs across the network, we must first create a VTP server. All
servers that need to share VLAN information must use the same domain name, and a switch
can be in only one domain at a time. This means that a switch can share VTP domain
information only with switches configured in the same VTP domain. A VTP domain can be
used if we have more than one switch connected in a network. If all switches in the network
23 | P a g e
are in only one VLAN, then VTP doesnt need to be used. VTP information is sent between
switches via a trunk port between the switches.
There are three different modes of operation within a VTP domain: server, client, and
transparent.
Server: VTP server mode is the default for all Catalyst switches. There is at least one server
in VTP domain to propagate VLAN information throughout the domain. The following must
be completed within server mode:
Any change made to a switch in server mode is advertised to the entire VTP domain.
Client: VTP clients receive information from VTP servers and send and receive updates, but
they cannot make any changes. No ports on a client switch can be added to a new VLAN
before the VTP server notifies the client switch about the new VLAN.
Transparent: VTP transparent switches do not participate in the VTP domain, but they will
still forward VTP advertisements through the configured trunk links. VTP transparent
switches can add and delete VLANs because they keep their own database and do not share it
with other switches. Transparent switches are considered locally significant.
3.4 INTER-VLAN
It is concept of exchanging information between different VLAN where we require layer 3
switches or router.
24 | P a g e
other port or ports on the bridge are considered non designated ports and will not send or
receive traffic. This is called blocking mode.
The ports on a bridge or switch running the STP can transition through four different states:
Blocking: Wont forward frames; listens to BPDU. All ports are in blocking state by default
when the switch is powered on.
Listening: Listens to BPDUs to make sure no loops occur on the network before passing data
frames.
Learning: Learns MAC addresses and builds a filter table, but does not forward frames.
Forwarding: Bridge port is able to send and receive data. A port will never be placed in
forwarding state unless there are no redundant links or the port determines that it has the best
path to the root bridge.
3.7 NAT
Fig. 11
NAT (Network Address Translation or Network Address Translator) is the translation of an
Internet Protocol address used within one network to a different IP address known within
another network. One network is designated the inside network and the other is the outside.
This helps ensure security since each outgoing or incoming request must go through a
translation process that also offers the opportunity to qualify or authenticate the request or
match it to a previous request. NAT also conserves on the number of global IP addresses that
25 | P a g e
a company needs and it lets the company use a single IP address in its communication with
the world.
Fig. 12
26 | P a g e
Chapter 4
CONFIGURATION AND SNAPSHOTS
1. VLAN
We have created 8 Vlans:
Staff Vlan 10->10.1.1.0/24
CSE Vlan 20->10.1.2.0/24
ECE Vlan 30->10.1.3.0/24
IT Vlan 40->10.1.4.0/24
MBA Vlan 50->10.1.5.0/24
Admin Vlan 60-> 10.1.6.0/24
Canteen Vlan 70->10.1.7.0/24
Hostel Vlan 80->10.1.8.0/24
Snapshot 1
Snapshot 2
2. TRUNKING
Commands for creating trunk port:
Switch(config)#interface f0/0
Switch(config-if)#switchport trunk encapsulation dot1q
Snapshot 3
28 | P a g e
3. VTP
Commands to make a switch as VTP server:
Switch(config)#vtp mode server
Switch(config)#vtp domain lpu
Switch(config)#vtp password 123
Snapshot 4
Snapshot 5
29 | P a g e
4. DEFAULT ROUTING
Commands:
Router(config)#interface f0/0
Router(config-if)#ip route 0.0.0.0 0.0.0.0 95.15.1.100
Router(config-if)#no shutdown
Snapshot 6
Snapshot 7
30 | P a g e
5. NAT
Commands used:
Router(config)#ip nat pool lpu 95.15.1.1 95.15.1.10 netmask 255.255.255.0
Router(config)# access list 1 permit 10.1.0.0 0.0.255.255
Router(config)#ip nat inside source list 1 pool lpu overload
Router(config)#int s0/0
Router(config)#ip nat outside
Snapshot 8
Snapshot 9
6. STP
Command for creating STP:
Switch(config)#spanning-tree vlan 10 priority 4096
By changing the Vlan ID we could configure STP for different Vlans.
Snapshot 10
Snapshot 11
7. ACL
In the project, considering the real world scenario, the facebook server is denied for hostel
and permitted to rest of the departments.
Commands used:
Router(config)#ip access-list extended block
Router(config)#deny tcp 10.1.8.0 0.0.0.255 150.1.1.2 0.0.0.0 eq 80
Router(config)#permit any any
32 | P a g e
Router(config)#int f0/0.8
Router(config-if)#ip access-group block in
Snapshot 12
Snapshot 13
33 | P a g e
Chapter 5
CONCLUSION AND FUTURE SCOPE
CONCLUSION:
By designing this network we have implemented the practical scenario of an enterprise. By
designing the network we got a glimpse or rather get our hands on the real life problems
faced in it. We get to know about the various specifications and minute detailing while
designing the network. We had certain constrains while designing the network which we need
to keep in mind while designing the network. This report could work as a guideline for the
network designers for further designing of a network of similar kind.
FUTURE SCOPE:
This project was aimed at designing a complex practical enterprise network with all the
possible services used in an organization or in a company. We can explore this further
network by explaining about the security issues faced by a network in a company. We could
discuss the various attacks the network is prone to by hacker and we could explains these
attacks and find out the loopholes in the protocols and measures to prevent it. We could also
work on the packet walk of the the packets of the in the network and work on the sniffing of
the packets and extract useful information from it. We could also work on the encryption
algorithm in the layers and protocols.
34 | P a g e
References:
[1]http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps5528/product_data_sheet0
9186a00801f3d7d.html
[2]http://reviews.cnet.com/routers/cisco-2621-ethernet-fast/4507-3319_7-112030.html
[3]http://reviews.cnet.com/routers/linksys-wrt300n-router/4507-3319_7-31851121.html
[4]http://www.cisco.com/web/learning/netacad/course_catalog/docs/Cisco_PacketTracer_AA
G.pdf
[5]http://www.cisco.com/web/learning/netacad/downloads/pdf/PacketTracer5_0_Brochure_0
707.pdf
[6]http://ieeexplore.ieee.org/ielx5/49/32439/01514524.pdftp=&arnumber=1514524&isnumbe
r=32439
[7]http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1514531
35 | P a g e