You are on page 1of 27

ITB5003: Computer Networking

Project Report

Semester B 2015/2016
Semester:

Omar Fayyad; Dimitrios Liarokapis; Andreas Savva; Muhammad Ateeq


Tutors:
Sayed Hasan Mahfoodh, Sayed Qassim alsharakhat
Student
names:
201501553, 201400937
Student
ID:

Learning The following learning outcomes will be tested:


Outcomes 1. Explain the fundamentals, concepts and technologies of the TCP/IP and OSI
Covered: networking model.
2. Design and implement an IP addressing scheme using VLSM.
3. Configure, test and verify network devices.
4. Explain how different routing protocols operate in the network.
5. Implement a network infrastructure to a detailed use case.

20% of the overall mark


Weighting:

Instructions: ∙ Form a group of 2 or 3 students, no groups of 4.


Your group will write a report on the requirements for the Computer Network of
a new company and then implement the physical network.
This report has to be submitted on Sunday 5th June 2016 at 11:55 Pm.
Use PacketTracer 6.1 which is located on Moodle.
Student’s must achieve a grade of 60% overall to pass the course.
1
Country City Staff
Saudi Arabia Riyadh 120

UAE Abu Dhabi 60

Kuwait Kuwait 48

Bahrain Manama 40

(IPv4)
172.10.0.0/22
Saudi Arabia

Student
Specification Input

Network Address 172.10.0.0

Subnet Mask (Decimal) 255.255.255.0

CIDR Notation 24

First IP Host address 172.10.0.1

Last IP Host address 172.10.0.254

Number of usable hosts in 254


subnet

Broadcast address 172.10.0.255


UAE

Student

Specification Input

Network Address 172.10.1.0

Subnet Mask (Decimal) 255.255.255.128

CIDR Notation 25

First IP Host address 172.10.1.1

Last IP Host address 172.10.1.126

Number of usable hosts in 126


subnet

Broadcast address 172.10.1.127

Kuwait

Student

Specification Input

Network Address 172.10.1.128

Subnet Mask (Decimal) 255.255.255.192

CIDR Notation 26

First IP Host address 172.10.1.129

Last IP Host address 172.10.1.190

Number of usable hosts in 62


subnet

Broadcast address 172.10.1.191


Bahrain

Student

Specification Input

Network Address 172.10.1.192

Subnet Mask (Decimal) 255.255.255.192

CIDR Notation 26

First IP Host address 172.10.1.193

Last IP Host address 172.10.1.254

Number of usable hosts in 62


subnet

Broadcast address 172.10.1.255


Network 1 (Bahrain-Kuwait)

Student

Specification Input

Network Address 172.10.2.0

Subnet Mask (Decimal) 255.255.255.252

CIDR Notation 30

First IP Host address 172.10.2.1

Last IP Host address 172.10.2.2

Number of usable hosts in 2


subnet

Broadcast address 172.10.2.3


Network 2(Bahrain-UAE)

Student

Specification Input

Network Address 172.10.2.4

Subnet Mask (Decimal) 255.255.255.252

CIDR Notation 30

First IP Host address 172.10.2.5

Last IP Host address 172.10.2.6

Number of usable hosts in 2


subnet

Broadcast address 172.10.2.7

Network 3(Kuwait-Saudi Arabia)

Student

Specification Input

Network Address 172.10.2.8

Subnet Mask (Decimal) 255.255.255.252

CIDR Notation 30

First IP Host address 172.10.2.9

Last IP Host address 172.10.2.10

Number of usable hosts in 62


subnet

Broadcast address 172.10.2.11


Network 4(UAE-Saudi Arabia)

Student

Specification Input

Network Address 172.10.2.12

Subnet Mask (Decimal) 255.255.255.252

CIDR Notation 30

First IP Host address 172.10.2.13

Last IP Host address 172.10.2.14

Number of usable hosts in 62


subnet

Broadcast address 172.10.2.15


Device Interface IP Address Subnet Mask Default Gateway

S0/0/0 172.10.2.1 255.255.255.252 N/A


Bahrain-RTR S0/0/1 172.10.2.5 255.255.255.252 N/A
Fa0/0 172.10.1.254 255.255.255.192 N/A
Bahrain-Server Fa0/0 172.10.1.193 255.255.255.192 172.10.1.254
Bahrain-Printer Fa0/0 172.10.1.194 255.255.255.192 172.10.1.254
Bahrain-PC Fa0/0 172.10.1.195 255.255.255.192 172.10.1.254
Bahrain-Laptop Fa0/0 172.10.1.196 255.255.255.192 172.10.1.254
S0/0/0 172.10.2.2 255.255.255.252 N/A
Kuwait-RTR S0/0/1 172.10.2.9 255.255.255.252 N/A

Fa0/0 172.10.1.190 255.255.255.192 N/A


Kuwait -Server Fa0/0 172.10.1.129 255.255.255.192 172.10.1.190
Kuwait -Printer Fa0/0 172.10.1.130 255.255.255.192 172.10.1.190
Kuwait -PC Fa0/0 172.10.1.131 255.255.255.192 172.10.1.190
Kuwait -Laptop Fa0/0 172.10.1.132 255.255.255.192 172.10.1.190
S0/0/0 172.10.2.13 255.255.255.252 N/A
UAE-RTR S0/0/1 172.10.2.6 255.255.255.252 N/A

Fa0/0 172.10.1.126 255.255.255.128 N/A


UAE -Server Fa0/0 172.10.1.1 255.255.255.128 172.10.1.126
UAE -Printer Fa0/0 172.10.1.2 255.255.255.128 172.10.1.126
UAE -PC Fa0/0 172.10.1.3 255.255.255.128 172.10.1.126
UAE -Laptop Fa0/0 172.10.1.4 255.255.255.128 172.10.1.126
S0/0/0 172.10.2.10 255.255.255.252 N/A
Saudi-Arabia-RTR S0/0/1 172.10.2.14 255.255.255.252 N/A
Fa0/0 172.10.0.254 255.255.255.0 N/A
Saudi-Arabia -Server Fa0/0 172.10.0.1 255.255.255.0 172.10.0.254
Saudi-Arabia -Printer Fa0/0 172.10.0.2 255.255.255.0 172.10.0.254
Saudi-Arabia -PC Fa0/0 172.10.0.3 255.255.255.0 172.10.0.254
Saudi-Arabia -Laptop Fa0/0 172.10.0.4 255.255.255.0 172.10.0.254
Country City Staff Hosts
Saudi Arabia Riyadh 120 254

UAE Abu Dhabi 60 126

Kuwait Kuwait 48 62

Bahrain Manama 40 62

Used more hosts than staff for IP addresses in the future if the branch wishes to expand (More
Scalability).

IPv6
Country City Staff
Saudi Arabia Riyadh 120

UAE Abu Dhabi 60

Kuwait Kuwait 48

Bahrain Manama 40

2001:cc1a:0::/48

Infrastructure: 2001:cc1a:0::/52

Bahrain: 2001:cc1a:0:1000::/52
2001:cc1a:0:1000::/56
Infrastructure:
Manama Branch: 2001:cc1a:0:1100::/56
Kuwait: 2001:cc1a:0:2000::/52
2001:cc1a:0:2000::/56
Infrastructure:
Kuwait Branch: 2001:cc1a:0:2100::/56

UAE: 2001:cc1a:0:3000::/52
2001:cc1a:0:3000::/56
Infrastructure:
Abu Dhabi Branch: 2001:cc1a:0:3100::/56

Saudi Arabia: 2001:cc1a:0:4000::/52


2001:cc1a:0:4000::/56
Infrastructure:
Riyadh Branch: 2001:cc1a:0:4100::/56

Network 1(Bahrain-Kuwait): 2001:cc1a:0:5000::/52

Network 2(Bahrain-UAE): 2001:cc1a:0:6000::/52

Network 3(Kuwait-Saudi Arabia): 2001:cc1a:0:7000::/52

Network 4(UAE-Saudi Arabia): 2001:cc1a:0:8000::/52


Device Interface Type IP Address Prefix Default Gateway

S0/0/0 Global Unicast 2001:cc1a:0:5000::1 /64 N/A


Bahrain-RTR S0/0/1 Global Unicast 2001:cc1a:0:6000::1 /64 N/A
Fa0/0 Global Unicast 2001:cc1a:0:1100::1 /64 N/A
Bahrain-Server Fa0/0 Static 2001:cc1a:0:1100::100 /64 2001:cc1a:0:1100::1
Bahrain-Printer Fa0/0 Static 2001:cc1a:0:1100::101 /64 2001:cc1a:0:1100::1
Bahrain-PC Fa0/0 Static 2001:cc1a:0:1100::102 /64 2001:cc1a:0:1100::1
Bahrain-Laptop Fa0/0 Static 2001:cc1a:0:1100::103 /64 2001:cc1a:0:1100::1
S0/0/0 Global Unicast 2001:cc1a:0:5000::2 /64 N/A
Kuwait-RTR S0/0/1 Global Unicast 2001:cc1a:0:7000::1 /64 N/A
Fa0/0 Global Unicast 2001:cc1a:0:2100::1 /64 N/A
Kuwait -Server Fa0/0 Static 2001:cc1a:0:2100::100 /64 2001:cc1a:0:2100::1
Kuwait -Printer Fa0/0 Static 2001:cc1a:0:2100::101 /64 2001:cc1a:0:2100::1
Kuwait -PC Fa0/0 Static 2001:cc1a:0:2100::102 /64 2001:cc1a:0:2100::1
Kuwait -Laptop Fa0/0 Static 2001:cc1a:0:2100::103 /64 2001:cc1a:0:2100::1
S0/0/0 Global Unicast 2001:cc1a:0:8000::1 /64 N/A
UAE-RTR S0/0/1 Global Unicast 2001:cc1a:0:6000::2 /64 N/A
Fa0/0 Global Unicast 2001:cc1a:0:3100::1 /64 N/A
UAE -Server Fa0/0 Static 2001:cc1a:0:3100::100 /64 2001:cc1a:0:3100::1
UAE -Printer Fa0/0 Static 2001:cc1a:0:3100::101 /64 2001:cc1a:0:3100::1
UAE -PC Fa0/0 Static 2001:cc1a:0:3100::102 /64 2001:cc1a:0:3100::1
UAE -Laptop Fa0/0 Static 2001:cc1a:0:3100::103 /64 2001:cc1a:0:3100::1
S0/0/0 Global Unicast 2001:cc1a:0:7000::2 /64 N/A
Saudi-Arabia-RTR S0/0/1 Global Unicast 2001:cc1a:0:8000::2 /64 N/A
Fa0/0 Global Unicast 2001:cc1a:0:4100::1 /64 N/A
Saudi-Arabia -Server Fa0/0 Static 2001:cc1a:0:4100::100 /64 2001:cc1a:0:4100::1
Saudi-Arabia -Printer Fa0/0 Static 2001:cc1a:0:4100::101 /64 2001:cc1a:0:4100::1
Saudi-Arabia -PC Fa0/0 Static 2001:cc1a:0:4100::102 /64 2001:cc1a:0:4100::1
Saudi-Arabia -Laptop Fa0/0 Static 2001:cc1a:0:4100::103 /64 2001:cc1a:0:4100::1
Telnet passwords

Bahrain-RTR Bahrain
Kuwait-RTR Kuwait
UAE-RTR UAE
Saudi-Arabia-RTR Saudi Arabia

DNS
DNS server is working on converting the names of the websites into IP address, because the
computer for example don’t understand Google.com but it understand 173.194.39.78 which is
the IP address for Google. When someone types Google.com in the searching bar the
DNS converts that to 173.194.39.78 to make understandable for the computer machine.
FTP
FTP stands for File Transfer Protocol and the aim of this protocol is to transfer files between the
computers on the network, and there are some other uses for this protocol such as, transferring
files between an account and desktop computer, exchanging files between computer accounts and
access online software archives.
SMTP
SMTP stands for Simple Mail Transfer Protocol which is a part of the application layer, by the use
of a process called “store and forward”, STMP moves your email across the network. Moreover,
with the help of MTA Mail Transfer Agent which helps the user to send communication to the
right computer and email box. The aim of SMTP is to move an email on communication from
one computer to another.

Telnet
Telnet is command od user services that allows the user to access the computer remotely, HTTP
and FTP protocols allows the user to have some specific data and files from remote computers
without being actually logged on as a user, rather than Telnet which allows the user to have all
the applications and data on the computer and you log on as a regular user.
HTTP
HTTP stands for Hyper Text Transfer Protocol, which allows the user to search to exchange
information worldwide on the web pages, to communicate over the HTTP you have to enter
http:// before the website name; todays browsers don’t require the user to enter http:// before
the website name since it’s the default communication method.

3
Router
A router links computers to the Internet (Routers connect networks) so users can share the
connection. Also they are used to tie multiple networks together. The router will act as a
dispatcher, choosing the best route for your information to travel.

Switch
Switches are used to connect multiple devices on the same network, creating a network of
shared resources, allowing the various devices to share information and talk to each other.

4
CSMA/CD (Carrier sense multiple access with collision detection) is a protocol that is used to
operate the LAN. It uses carrier sensing scheme in which when detecting other signal while
transmitting a frame it stops the frame from transmitting. It terminates transmission as soon as
there is collision.

Point-to-Point Protocol (PPP) is a data-link layer protocol used to establish a direct connection
between two nodes. It provides transmission encryption, compression and authentication for
the connection. There are to derivatives of PPP PPPoE (Point-to-Point Protocol over Ethernet)
PPPoA (Point-to-Point Protocol over ATM)

PPP uses a feature involving magic numbers to detect looped links and PPP frames are
encapsulated in a lower-layer protocol that provides framing and may provide other functions.

5
Ethernet Cables
Ethernet cables is one of the most popular cables in networking area, the main mission for the
Ethernet cables is connect the devices together such as connecting PCs with the switch and
routers. Crossover is one type of Ethernet cables and its made specially to connect two
computers together.

Serial cables
Serial cables is used to connect two devices together such as the routers, the cable has two
sides which are DCE which provides clock rate and DTE which receives the clock rate, clock rate
means the speed of data transmission
6

*example of the network connection data flow

Bahrain-pc (Initial source) Fa0/0(172.10.1.195) start with an application layer protocols like
HTTP message Request (Application layer), then the transport layer uses TCP or UDP to segment
the message into segments transfer to switch then to Bahrain router Fa0/0(172.10.1.254) . After
that Bahrain router S0/0/0(172.10.2.1) (network layer) uses routing protocols to send the
segments into packets to destination IP address S0/0/0(172.10.2.2). Then Kuwait router
Fa0/0(172.10.1.190) sends the packets to the switch (Data link layer) which then sends frames
to the (physical layer) then hardware converts frames into bits so the Destination (Kuwait-pc)
(172.10.1.131) can interrupt the message.
**captured connection protocols used in connection by Wire shark.

1.
2.

3.
4.

5.

6.
6a. End devices (PCs, Laptops, printers and servers), Switches and routers are used in the data
flow.

6b. we used fast Ethernet cables to connect end devises to switches and switches to routers, we
used serial cables to connect routers to each other.

6c.
● Transmission Control Protocol (TCP): A transport layer protocol that makes
communication between the Internet Protocol and an application program.
● User Datagram Protocol (UDP): A transport layer protocol that establishes host-to-host
communications and sends messages to applications.
● Hypertext Transfer Protocol (HTTP): this protocol is called wen a web page is accessed,
this protocol formats and sends requests from client browser to the server.
● Internet Message Access Protocol (IMAP) : an Application Layer Internet protocol that
allows a client to access e-mail on a remote server.
● File Transfer Protocol (FTP) : A standard network protocol used to transfer files between
a server and a client on a network.
● Internet Control Message Protocol (ICMP): main protocols of the internet protocol suite
it’s used by network devises (routers) to send error messages.

6d. Bahrain-pc (172.10.1.195), Kuwait-pc (172.10.1.131), Bahrain router fa0/0 (172.10.1.254),


Bahrain router s0/0/0 (172.10.2.1), Kuwait router fa0/0 (172.10.1.190), Kuwait router s0/0/0
(172.10.2.2).

6e. we used multiple router to get multiple connection points (Fault tolerance) for each branch.

We also enabled passive interfaces on Fa0/0 on each router so that only administration can get
information from routers (Security) and we put passwords on telnet and FTP services.

Each branch have one server that have one or two application layer services in them, so that
when a server is down not all services are down (Quality of Services).

OSI layers (1-3) (201400937)

Layer 1 which is the Physical layer, in this layers which is all about the physical cables used for
sending data, it is working on transforming the data to electrical signals or bits and place it in the
cables, while HUB and Repeater are just the mediator in this operation to send the data without
making any changes on the data, also in this layer, all the data are going to look like bits. The
protocols used in this layer are ARP, COAX and Fiber.
Layer 2 is the Data Link layer, the data in this layer called Frame, they call it like this because it
provides for the packets head and tail, the head is consisting of llc logical link control and mac
addressing and the tail consists of (FCS) frame check sequence and its working on finding the
errors only. In this layer the cable must be empty of data for sending. The protocols used in this
layers are divided to LAN and WAN protocols, the main job for this layer is to apply the MAC
addressing, defining the errors and to determinate the best time for sending the data and
making sure that the cable has no data. On the other hand, the hardware for this layer is Switch
and Bridge and the data format is Frames.

Layer 3 is the networking layer which is working on addressing and routing of all the data, also it
is important for sending the data in the right direction to the right destination on the other side,
this layer has 2 protocols and they are IP an IPX protocols, the town main jobs for this layer are
addressing and routing, the device or the hardware for this layer is the router, and the data
format is Packet.

For example, when you are using the messenger and you are communicating with your friend
and you are going to send data for your friend for example compressed image, in transport layer
the used protocols between TCP and IP protocols will decided in this stage. After this it will jump
for the network layer which will work on adding your device IP address and your friend’s IP
address in the data and decide the path will be used for reaching your friend’s device. Then we
will jump to another stage which is Data Link Layer which will add your device MAC Address and
the switch MAC Address which is the first device you are connected with the data will be divided
into Frames in small sizes, now the data is look like a group of frames and each frame has your
IP and your friend’s IP also your MAC Address for you and for the switch you are connected
with. Finally, we go into the last stage which is Physical Layer where it works on transforming
these Frames to an electrical signal and place it in the network cables. By that, the data is going
to reach your friend’s device and he will use OSI Layers in reverse to get the data

OSI layers (4-7) (201501553)

Layer 4 is the transport layer, the main job in this layer is to transfer data and then deciding the
protocol used in the transform operation, because some data are using TCP protocol because
it’s the one that used for sending the data and to check if the data has been delivered safely to
destination or not, this layer is also using UPD protocol which working on sending the data
without making sure or check if this data has been received or not for example video files, radio
and television station online. Most of the protocols are using TCP protocol except TFTP, SNMP
and RIP are using UPD protocol, but DNS protocol is using both TCP and UDP layers. In TCP
protocol, before sending the data and to make sure that the other side is connecting here
Three-Way Handshake operation will start, the main reason for this operation is to make sure
that the receiver device is connected and base on this the operation will start in three steps, also
before this there are basic steps to use for the connection which are “SYN”, Synchronize
sequence numbers and “ACK”, Acknowledge.

Layer 5 is the session layer, the session layer ensures that sessions between processes running
on multiple stations are established. One of the tow important tasks of the session layer is
Session support which allow communication of processes over the network, name recognitions,
logging, and preforming security and so on. The other task is Session establishment which is
important for using and terminating connections.

Layer 6 is the presentations layer, this layer formats data to be presented to application layer.
This layer is called the translator in the network. This layer translate data from application layer
into data to the sending station. Then From the sending station to the application layer at
receiving station.

The presentation layer provides:

● Data encryption: encrypts data to get more security e.g. password encryption.
● Data conversion : CR-CR/LF, integer-floating point, bit order and more
● Data compression: the number of bits that is transmitted on a network is reduced by
this layer
● Character code translation.
The presentation layer protocols that preforms compression and coding and they also interpret
code and compressed formats.

Some of the protocols used in presentation layer:

● NDR (Network Data Representation)


● LPP (Lightweight Presentation Protocol)
● NCP (NetWare Core Protocol )

Layer 7 is the application layer, the application layer serves as the window for the user and
application presences to the network. This layer facilitate communication between lower-layer
network and software applications.

Commonly needed functions:

● Electronic messaging (such as mail)


● Directory services
● Remote file access
● Network virtual terminals
● Remote printer access
● Inter-process communication
● Network management
● Resource sharing and device redirection

Application layers protocols:

HTTP (Hypertext Transfer Protocol): this protocol is called wen a web page is accessed, this
protocol formats and sends requests from client browser to the server.

DNS (Domain name System) this protocol is used to translate IP addresses into human-friendly
hostnames.

Also FTP (File Transfer Protocol), TFTP, SMTP (Simple Mail Transfer Protocol), SNMP and telnet
are used in the application layer.

7
For IPv4 we used EIGRP over OSPF for the reasons that:

● It’s easy to configure.


● Works very well in small to medium size networks.
● EIGRP has summarization capabilities of interfaces.
● You can Cisco gear with other non-Cisco gear while using EIGRP.
● EIGRP is a cisco protocol and cisco is the most trusted vendor out there.

For IPv6 we used EIGRPv6 over OSPFv3 because:

● EIGRPv6 is supported in Cisco IOS beginning 12.4(6)T


● There is automatic summarization inEIGRPv6 unlike the IPv4 no auto-summary as there
is no concept of classful routing in IPv6.
● EIGRPv6 requires router-id which means it is easier to configure.
● EIGRP v6 is more secure because the passive interfaces has to be configured in the
routing protocol.
References:

2.
http://www.howtogeek.com/122845/htg-explains-what-is-dns/

https://kb.iu.edu/d/aerg

http://whatismyipaddress.com/smtp

http://searchnetworking.techtarget.com/definition/Telnet

http://www.computerhope.com/jargon/h/http.htm

3.
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/connect_e
mployees_and_offices/networking_basics/index.html

4.
Point-to-Point (PPP) Protocol Field Assignment: https://www.iana.org/assignments/ppp-
numbers/ppp-numbers.xhtml

5.
http://compnetworking.about.com/od/ethernet/f/what-is-an-ethernet-cable.htm

http://www.computernetworkingnotes.com/ccna-study-guide/cabling-cisco-devices-guide.html

6.
http://www.ccnahub.com/ip-fundamentals/understanding-packet-flow-across-the-network/

http://www.conetworks.net/2012/06/tcpip-layers.html

http://www.conetworks.net/2012/05/osi.html

http://www.aoua.com/vb/showthread.php?t=165804

Microsoft support: https://support.microsoft.com/en-us/kb/103884

Network+ Guide to Networks (book):


https://books.google.com.bh/books?id=UD0h_GqgbHgC&printsec=frontcover&dq=network%
2B+guide+to+networks&redir_esc=y&hl=en#v=onepage&q&f=false
7.
NetworkWorld: http://www.networkworld.com/article/2347622/cisco-subnet/eigrp-vs-
ospf.html

Roger Perkin: http://www.rogerperkin.co.uk/ipv6/eigrp-ipv6/

Keeping it classless: https://keepingitclassless.net/2013/03/a-contest-of-protocols-eigrp-or-


ospf/

You might also like