Professional Documents
Culture Documents
I hereby declare that the Industrial Training Report entitled VOICE OVER FRAME
RELAY is an authentic record of my own work as requirements of 4- months Industrial
Oriented Project Training during the period from January to May for the award of degree
of B.Tech. Computer Science & Engineering, Chandigarh engineering college.
Ujjwal Rattan
1305827
Date: ____________________
Certified that the above statement made by the student is correct to the best of our
knowledge and belief.
Signatures
Examined by:
Head of Department
(Signature and Seal)
ACKNOWLEDGEMENT
Acknowledgement is not more formality but a genuine opportunity to thanks all those people
without whom active support this project work would not be possible.
I wish to express my appreciation to my family for my continuous love and encouragement, for
always believing in me, for never failing to provide all the support, and for coping with the
pressure that naturally comes with such endeavour.
I also wish to extend my thanks to Shray Modi sir and other teachers for guiding and providing
the knowledge related to machinery and processes.
Ujjwal Rattan
(1305827)
3
COMPANYS PROFILE
CMC Academy provide opportunity to B.Tech/BE, MCA, BCA, Diploma students to enhance
their skills and getting practical knowledge through industrial training. CMC is a leading IT
solutions company
CMC Academy Chandigarh is an ISO 9001:2008 certified Institute and follows the entire quality
standard under ISO 9001:2008. The company has a very strong placement cell that assists
students to place in various corporate after successful completion of the training.
CMC Chandigarh provide training solution nearly for every engineering branch. We offers job
oriented industrial training on latest technologies like Electrical Design, Instrumentation Design,
Piping Design, Process Design, Civil & Structural Design, Industrial Automation, Embedded
Systems, Power Plant Design, ASP.Net, PHP, JAVA and many more. Apart from training solution
we also provide On/Off Campus placement solutions.
CMC Academy has direct and indirect tie-up with multiple industries to provide jobs for fresher
and experienced candidates.
4
CONTENTS
1. Introduction
1.1 software requirements
2. Modules
2.1 server
3. IP Address
3.1 Subnet Mask
3.2 Private IP Addresses
4. IP ROUTING & ROUTING PROTOCOLS
4.1 IP Routing:
4.1.1Dynamic Routing
4.2 Routing Protocols:
4.2.1 RIP (Routing Information Protocol)
4.2.2 EIGRP (Enhanced Interior Gateway Routing Protocol
4.2.3 OSPF (Open Shortest Path First)
5. IP Phones
6. Frame Relay
14
9. NETWORK ADDRESS TRANSLATION
9.1 Types of NAT:
9.2 Configuration NAT:
9.3Command for Basic NAT
12. screenshots
13.Future Enhancement
1. Introduction
6
In this project the main branch is connected to 2 other networks or locations using Microsoft and
Cisco technologies. The main branch includes Domain Name Server, Dynamic Host
Configuration Protocol, Internet information Services, Exchange Server, IP Phones, Cisco
Switches, Cisco Routers. It also includes Cisco Link sys wireless Router. The project is based on
the concepts of networking. It includes configuring different network devices like Router, Switch
connecting it with PCs and ip phones by using different types of connecting wires by allocating
the IP Addresses to all the interfaces after the Sub netting of network id. The beauty of
configuring network devices is that it helps users access the network with few constraints like
allowing some to access the website but not allowing them to access the mail server on the
internet on private IP address which are otherwise excluded by internet service provider (ISP).
Exchange server is used to provide messaging, support for mobile and web access to
information & support for data storage device. Main server & systems as well as exchange server
relies on
IP, DNS, DHCP, IIS and other technologies for communicating between themselves.
Switch here is Cisco switch which provides services like creation & management of systems
And IP phones in main branch and it is the device which connects the devices in main branch,
main router and links to other locations to each other in a network. The information from each
system or device i.e. client or server in main branch, router, ip phones and from other locations
passes through switch interface.
The domain name system (DNS) is a hierarchical, distributed database that Contains mappings
Of DNS domain names to various types of data, such as Internet Protocol (IP) addresses. DNS
allows you to use friendly names, such as www.hcl.com, to easily locate computers and other
resources on TCP/IP based network. DNS is an Internet Engineering Task Force (IETF)
standard. In Computing, a name server (also spelled name server) is a program or computer
Server that implements a name-service protocol. It maps a human-recognizable identifier to a
system-internal, often numeric, identification or addressing component.
Main Router is responsible for communication between different networks that is, main branch
and other networks. The main router here describes the best path to reach the system in a
network from a system in another network.
Other routers are used at the entrance of the each network. These routers receive& send routing
updates to and from main router which ensure the reliability of whole network.
7
1.1 SOFTWARE REQUIREMENTS
To complete the work on VOIP NETWORK, I need a help from some software requirements.
Software requirements are as follow:
Cisco Packet Tracer:
Used to do the project work easily & proper understanding.
Windows Server 2003:
Server is the operating system used for domain network. In the domain model network, server
mainly provides the resources to the clients, and applies the security to the clients
Windows 10:
It is an operating system. It is an interface unit between the user and hardware device.
Microsoft Office:
Used to save the work done on the project.
8
1.3 ABOUT CISCO PACKET TRACER
Packet tracer overview:
Packet Tracer is a protocol simulator developed by Dennis Freezo and his team at Cisco Systems.
Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols used in
networking, in either Real Time or Simulation mode. This includes layer 2 protocols such as
Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols such as
TCP and UDP. Routing protocols can also be traced.
Cisco Packet Tracer is a network simulation program that allows students to experiment with
network behavior and ask what if questions. As an integral part of the Networking Academy
comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring,
assessment, and collaboration capabilities and facilitates the teaching and learning of complex
technology concepts.
Packet Tracer is commonly used by Cisco Networking Academy students working towards Cisco
Certified Network Associate (CCNA) certification. Due to functional limitations, it is intended
by Cisco to be used only as a learning aid, not a replacement for Cisco routers and switches.
Packet Tracer can be used to understand various concepts of networking with simulation; it can
be used to design a network by connecting various networking devices and running various
troubleshooting tests to check the connectivity and communication between different networking
devices. Packet Tracer can be used to understand the use of different networking devices
appropriately and the difference in their working. As it is costly to buy various networking
equipment while learning networking, Packet Tracer can be used to understand computer
networks.
Purpose: The purpose of this lab is to become familiar with the Packet Tracer interface.
9
Simulation, visualization, collaboration:
10
I. Logical and physical workspaces
II. Real-time and simulation modes
III. User friendly
IV. Global event list (packet sniffer)
V. Lan,switching,tcp/ip, routing and wan protocols
VI. Activity wizard, lab grading
VII. Multi platform support
VIII. Multi language support
Packet tracer 7.0 multiuser functionality:
Packet tracer 7.0 is now a network-capable (peer to peer) application using the real network
(TCP socket connection) to carry the packet tracer virtual packet.
I. The PT application running on one computer can communicate with the PT application
running on 1 or more other computer.
II. This connectivity between multiple instances of PT supports teamwork, classroom
games, collaboration, competition, remote instructor-student interaction and social-
networking.
11
2. MODULES
2.1 Server
A server is a computer program that provides services to other computer program (and their
users), in the same or other computer. The physical computer that runs a server program is also
often referred to as server.
Services can be supplied centrally by the use of a server; in other cases all the machines on a
network have the same status with no dedicated server, and services are supplied peer -to- peer.
Server used as an adjective, as in server operating system, refers to the products ability to
handle multiple requests, and is said to be server- grade. A server operating system is intended
or better enabled to run server applications. The differences between the server and workstation
versions of a product can vary from the removal of an arbitrary software limits due to licensing,
as in the case of window 2000, or the addition of bundled applications as in Mac OS X Server.
A server can also refer to a computer that has been set aside to run a specific server application.
Server application can be divided among server computers over an extreme range, depending
upon the workload.
Server Roles: Server 2003 is a multipurpose operating system capable of handling a diverse
set of server roles, depending on your needs, In either a centralized or distributed fashion. Some
of these server roles include:
a) File and Print Server.
b) Web server and web application services.
c) Exchange server (Mail server).
d) Virtual private network (VPN) server.
e) Domain name system (DNS).
f) Dynamic host configuration protocol (DHCP).
2.2 Domain Name System:
The domain name system (DNS) is a hierarchical naming system for computers, services, or
any resource participating in the internet. It associates various information with domain names
assigned to such participants. Most importantly, it translates domain names meaningful to
humans into the numerical (binary) Identifiers associated with networking equipment for the
12
purpose of locating and addressing these devices worldwide. An often used analogy to explain
the Domain Name System is that it serves as the phone book for the internet by translating
human friendly computer hostnames into ip addresses. For example, www.example.com
translates to 208.77.188.166.
2.2.1 DNS resolvers:
The client side of the DNS is called a DNS resolver. It is responsible for Initiating and
sequencing the queries that ultimately lead to a full Resolution (translation) of resource sought,
e.g. translation of a domain name in to IP address.
Primary Master Name Server contains the master copy of the database files with resource
records for all sub domains and hosts in the zone.
Secondary Master Name Server receives a replicated copy of database files from the primary
server. When the zone structure changes, the primary master database files are modified and
copied to the secondary masters.
Caching Only Name Server starts with no knowledge of the DNS structure and must depend
upon other name servers for this information. Each time a caching only server is queries a name
server and receives an answer, it stores the information in its cache. Over a considerable period
of time the cache will grow to include the information most often requested.
6. Click to select the domain name system (DNS) check box, and then click ok.
7. Click ok to start server setup. The DNS server and tools files are copied to your computer.
13
1. Click start, point to programs, point to administrative tools, and then click DNS Manager.
We see two zones under your computer name: forward lookup zone and reverse lookup
zone.
3. If the wizard does not auto-start, right-click the server name object in the DNS manager
console and choose configure your server.
6. Choose the zone type as primary zone as shown in the figure below.
7. The zone name must be exactly the same as your Active Directory Domain
Name.
8. Enable secure dynamic updates so that clients can update their records dynamically
whenever changes occur
9. Instead of giving a zone name a reverse lookup zone requires a network id, since its used
to map IP address to host names using PTR records.
The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for
hosts on Internet Protocol (IP) networks. Computers that are connected to IP networks must be
configured before they can communicate with other hosts. The most essential information needed
is an IP address, and a default route and routing prefix. DHCP eliminates the manual task by a
network administrator. It also provides a central database of devices that are connected to the
network and eliminates duplicate resource assignments.
In addition to IP addresses, DHCP also provides other configuration information, particularly the
IP addresses of local caching DNS resolvers, network boot servers, or other service hosts.
DHCP is used for IPv4 as well as IPv6. While both versions perform much the same purpose, the
details of the protocol for IPv4 and IPv6 are sufficiently different that they may be considered
separate protocols.
Hosts that do not use DHCP for address configuration may still use it to obtain other
configuration information. Alternatively, IPv6 hosts may use stateless address auto configuration.
IPv4 hosts may use link-local addressing to achieve limited local connectivity.
14
2.4 Technical overview:
Depending on implementation, the DHCP server may have three methods of allocating IP-
addresses:-
Dynamic allocation: A network administrator assigns a range of IP addresses to DHCP, and each
client computer on the LAN is configured to request an IP address from the DHCP server during
network initialization. The request-and-grant process uses a lease concept with a controllable
time period, allowing the DHCP server to reclaim (and then reallocate) IP addresses that are not
renewed.
Automatic allocation: The DHCP server permanently assigns a free IP address to a requesting
client from the range defined by the administrator. This is like dynamic allocation, but the DHCP
server keeps a table of past IP address assignments, so that it can preferentially assign to a client
the same IP address that the client previously had.
Static allocation: The DHCP server allocates an IP address based on a table with MAC
address/IP address pairs, which are manually filled in (perhaps by a network administrator). Only
requesting clients with a MAC address listed in this table will be allocated an IP address. This
feature (which is not supported by all DHCP servers) is variously called Static DHCP
Assignment (by DD-WRT), fixed-address (by the dhcp documentation), Address Reservation (by
Net gear), DHCP reservation or Static DHCP (by Cisco/Linksys), and IP reservation or MAC/IP
binding (by various other router manufacturers).
1. On the run dialog box write dhcpmgmt.msc and click ok. The DHCP window pops out.
Click on the server name and select new scope option.
2. Fill in the necessary details in the new scope wizard.
15
3. The next window will ask you to define the range of addresses that the scope will distribute
across the network and the subnet mask for the IP address. Enter the appropriate details and
click next.
4. In the next window, we must add any exclusion to the range of IP addresses we specified in
the previous window. So, these IPs will be reserved and not distributed amongst the
network devices.
5. Now we set the lease duration for how long a client can use an IP address assigned to it
from this scope.
6. In the following window, the DNS and domain name settings can be entered. The DNS
server IP address will be distributed by the DHCP server and given the client.
7. The last step is to activate the scope just press next when you see the window.
8. The DHCP server has now been installed with the basic settings in place. The next stage is
to configure it to the needs of your network structure. As shown in the figure below.
2.5 Network Switches:
A network switch is a computer networking device that connects network segments. The term
commonly refers to a network bridge that processes and routes data at the Data Link layer (layer
2) of the OSI model. Switches that additionally process data at the network layer (layer 3 and
above) are often referred to as layer 3 switches or multilayer switches.
2.5.1 Functions:
a) Learning
b) Forward and filtering
c) Loop Avoidance
Internet Information Services (IIS) formerly called Internet Information Server is a web server
application and set of feature extension modules created by Microsoft for use with Microsoft
Windows. It is the most used web server after Apache HTTP Server. IIS 7.5 supports HTTP,
HTTPS, FTP, FTPS, SMTP and NNTP. It is an integral part of Windows Server family of
products, as well as certain editions of Windows XP, Windows Vista and Windows 7. IIS is not
turned on by default when Windows is installed.
Features:
HTTP modules Used to perform tasks specific to HTTP in the request-processing pipeline,
such as responding to information and inquiries sent in client headers, returning HTTP errors,
and redirecting requests.
Security modules Used to perform tasks related to security in the request-processing pipeline,
such as specifying authentication schemes, performing URL authorization, and filtering requests.
16
Content modules Used to perform tasks related to content in the request-processing pipeline,
such as processing requests for static files, returning a default page when a client does not
specify a resource in a request, and listing the contents of a directory.
Caching modules Used to perform tasks related to caching in the request-processing pipeline,
such as storing processed information in memory on the server and using cached content in
subsequent requests for the same resource.
Logging and Diagnostics modules Used to perform tasks related to logging and diagnostics in
the request-processing pipeline, such as passing information and processing status to HTTP.sys
for logging, reporting events, and tracking requests currently executing in worker processes.
3. IP Address
IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts
one is network address and second is host address. In local area network, we can use private IP
address, which is provided by IANA (Internet Assigning Numbering Authority). When IP was
first standardized, the specification required that each system attached to an IP-based internet be
assigned a unique, 32-bitninternet address value. Systems that have interface to more than one
network require a unique IP address for each network interface. The first part of an internet
address identifies the network on which the host resides, while the second part identifies the
particular host on the given network. IP addresses are divided into five classes.
Class Range N/w bits Host bits Subnet mask Total IP Valid IP
A 1 126 8 24 255.0.0.0 16777216 16777214
B 128 191 16 16 255.255.0.0 65536 65534
C 192 223 24 8 255.255.255.0 256 254
D 224 239 it is reserved for multicast.
E 240 255 it is reserved for research/scientific use.
We can use first three classes. IANA provides private IP addresses from first three classes.
Class Private IP Range
A 10.0.0.0 10.255.255.255
B 172.16.0.0 172.31.255.255
C 192.168.0.0 192.168.255.255
17
3.1 Subnet Mask:
Subnet mask is also 32-bit address, which tells us how many bits are used for network and how
many bits are used for host address.
In Subnet mask Network bits are always 1 and Host bits are always 0.
When we are going to assign IP addresses to our computers then we have to follow some rules.
Rules: -
(1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved
for router.
(2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network
(10th network).
(3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default
routing is used in case of Stub n/w (means our network has one exit point).
(4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting.
(5) 127.0.0.1 - This is Loopback address, which is used for self-communication or
troubleshooting purpose.
C:\>ipconfig
C:\>ipconfig/all
It shows all detail.
3.2 Private IP Addresses:
Computer not connected to the internet, such as factory machines that communicate only with
each other via TCP/IP, need not have globally unique IP addresses. Three ranges of IPv4
addresses for private networks, one range for each class (A,B,C) were reserved. These addresses
are not routed on the Internet, and thus their use need not be coordinated with an IP address
registry.
4. IP ROUTING & ROUTING PROTOCOLS
4.1 IP Routing:
14
When we want to connect two or more networks using different n/w addresses then we have to
use IP Routing technique. The router will be used to perform routing between the networks. A
router will perform following functions for routing.
i. Path determination
ii. Packet forwarding
(1) Path determination:-The process of obtaining path in routing table is called path
determination. There are three different methods to which router can learn path.
18
i. Automatic detection of directly connected n/w.
ii. Static & Default routing
iii. Dynamic routing
(2) Packet forwarding: - It is a process that is by default enable in router. The router will
perform packet forwarding only if route is available in the routing table.
In this project, we are using only DYNAMIC ROUTING
4.1.1Dynamic Routing
In dynamic routing, we will enable a routing protocol on router. This protocol will send its
routing information to the neighbor router. The neighbors will analyze the information and write 15
new routes to the routing table. The routers will pass routing information receive from one router
to other router also. If there is more than one path available then routes are compared and best
path is selected. Some examples of dynamic protocol are: -
RIP, IGRP, EIGRP, OSPF
According to the type of area in which protocol is used there are again two types of protocol: -
I. Pass periodic copies of routing table to neighbor routers and accumulate distance vectors
II. Routers discover the best path to destination from each neighbor
Link state routing algorithm: (also called Shortest Path First) routing algorithm in which each
router broadcasts (floods) or multicasts information regarding the cost of reaching each of its
neighbors to all nodes in the internetwork. Link state algorithms create a consistent view of the
network and are therefore not prone to routing loops, but they achieve this at the cost of
19
relatively greater computational difficulty and more widespread traffic (compared with distance
vector routing algorithms).
Autonomous System (AS): consists of routers, run by one or more operators that present a
consistent view of routing to the external world. (Routers under a common administration). The
Internet Network Information Center (InterNIC) assigns a unique autonomous system to
enterprises. This autonomous system is a 16-bit number. A routing protocol such as Cisco's
Interior Gateway Routing Protocol (IGRP) requires that you specify this unique, assigned
autonomous system number in your configuration.
ii. IGRP - Ciscos distance vector routing protocol. (supports multipath routing)
i. Global Configuration:
20
II. protocol - RIP,IGRP,OSPF,EIGRP
II. Network-number - specifies a directly connected network (must be based on the NIC
network numbers, not subnet numbers or individual addresses)
Routed protocol used between routers to carry user traffic (Ex. IP, IPX)
Routing protocol used between routers to maintain tables (Ex. RIP, IGRP)
Routed protocol - Protocol that can be routed by a router. A router must be able to interpret the
logical internetwork as specified by that routed protocol. Examples of routed protocols include
AppleTalk, DECNET, and IP.
Routing protocol - Protocol that accomplishes routing through the implementation of a specific
routing algorithm. Examples of routing protocols include IGRP, OSPF, and RIP.
IGRP (Interior Gateway Routing Protocol) - IGP developed by Cisco to address the problems
associated with routing in large, heterogeneous networks.
Internetworking functions of the 3Network Layer include 'network addressing' and 'best
path selection' for traffic.
'Routed protocols' carry user traffic, while 'Routing protocols' work between routers to
maintain path tables.
21
Network discovery for 'Distance vector' involves exchange of routing tables; problems
can include 'slower convergence'.
For 'Link-state', routers calculate the shortest paths to other routers; problems can include
'inconsistent updates'.
Configuring IGRP:
IGRP is a distance vector routing protocol developed by Cisco. IGRP sends routing updates at
90-second intervals that advertise networks for a particular autonomous system.
VI. Flexibility for segments having different bandwidth and delay characteristics.
I. Bandwidth
II. Delay
III. Load
IV. Reliability
MTU (Maximum transmission unit) - Maximum packet size, in bytes, that a particular interface
can handle.
22
i. Show ip route - Command that displays the contents of an IP routing table.
ii. The table contains a list of all known networks and subnets and the metrics associated
with each entry.
(1) Neighbor
(2) Passive interface
(3) Timer
(4) Distance (AD)
(5) Maximum path
23
4.2.1 RIP (Routing Information Protocol) - IGP supplied with UNIX BSD systems. The most
common IGP in the Internet. RIP uses hop count as a routing metric.
Configuring RIP:
Router#conf terminal
Router (config) #routers rip
Router (config-router) #network <own net address>
Router (config-router) #network <own net address>
Router (config-router) #exit
4.2.2 EIGRP (Enhanced Interior Gateway Routing Protocol) -Advanced version of IGRP
developed by Cisco. Provides superior convergence properties and operating efficiency, and
combines the advantages of link state protocols with those of distance vector protocols.
Features: -
* Cisco proprietary
* Hybrid protocol
Link State
Distance Vector
* Multicast Updates using
Address 224.0.0.10
* Support AS
* Support VLSM
* Automatic Route Summarization
* Unequal path cost load balancing
* Metric (32 bit composite)
24
Bandwidth
Delay
Load
Reliability
MTU
* Neighbor Recovery
* Partial updates
* Triggered updates
* Backup Route
Configuring EIGRP:
4.2.3 OSPF (Open Shortest Path First) - Link-state, hierarchical IGP routing protocol proposed
as a successor to RIP in the Internet community. OSPF features include least-cost routing,
multipath routing, and load balancing. OSPF was derived from an early version of the ISIS
protocol.
OSPF Terminology
Router#conf terminal
Router (config) #router ospf <process no>
Router (config-router) #network <net address><wild mask> area <area id>
Router (config-router) #network <net address><wild mask> area <area id>
Router (config-router) #exit
Example 255.255.0.0
25
0.0.255.255
255.255.255.255
- Subnet mask
Wild mask
255.255.255.255
- 255.255.192.0 Subnet mask
5. IP Phones
An IP phone uses voice over IP (VoIP) technologies allowing telephone calls to be made over an
IP network such as the Internet instead of the ordinary PSTN system. Calls can traverse the
Internet, or a private IP network such as that of a company. The phones use control protocols
such as Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP) or one of
various proprietary protocols such as that used bySkype. It is commonly refers to the
communication protocols, technologies and transmission techniques involved in the delivery of
voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the
Internet.
Session Initiation Protocol (SIP):is a signaling protocol widely used [citation needed] for
controlling communication sessions such as voice and video calls over Internet Protocol (IP).
The protocol can be used for creating, modifying and terminating two-party (unicast) or
multiparty (multicast) sessions. Sessions may consist of one or several media streams.
26
Skinny Client Control Protocol (SCCP):is a proprietary network terminal controlprotocol.
SCCP is a lightweight protocol for session signaling with Cisco CallManager. Examples of
SCCP clients include the Cisco 7900 series of IP phones, Cisco IP Communicator softphone
along with Cisco Unity voicemailserver. CallManager acts as a signaling proxy for call events
initiated over other common protocols such as Session Initiation Protocol (SIP), ISDN.A SCCP
client uses TCP/IP to communicate with one or more Call Manager applications in a cluster.
Configuration of IP Phones:
First you need to set the following topology ip phones / analog phones but connect phones to
power one by one after finishing configuration:
27
Router (config) #ephone-dn 2
Router (config-ephone-dn) #number 54002
Router (config) #ephone-dn 3
Router (config-ephone-dn) #number 11111
Testing of IP Phones
3. Plug the wire in the port to ON the device. Then select GUI.
The following will be open
4. Click on the receiver.
5. Enter the phone no. of IP phone1 that is 54002. Ring out to the IP phone 1.
6. Frame Relay
Frame Relay is a standardized wide area network technology that specifies the physical and data
link layers of digital telecommunications channels using a packet switching methodology.
28
Originally designed for transport across Integrated Services Digital Network (ISDN)
infrastructure, it may be used today in the context of many other network interfaces.
Network providers commonly implement Frame Relay for voice (VoFR) and data as an
encapsulation technique used between local area networks (LANs) over a wide area network
(WAN). Each end-user gets a private line (or leased line) to a Frame Relay.
Coding:
29
7. Voip over frame relay:
Voice over frame relay (VoFR) is the packetizing of voice to transmit over leased lines to a frame
relay cloud. Once we order this service, we are provided with enough bandwidth to access frame
relay packet networks that are optimized to carry both voice and data. Using Frame relay
networks to send voice can cut down on the cost of long distance dialing since access to the
cloud is via leased line. Voice over IP (VoIP) can be sent over VoFR networks.
VoIP is a technology devised to utilize our existing IP infrastructure to carry voice. This can be
accomplished by using intelligent phones that have both a MAC address (NIC card) and an IP
address. Our voice is encapsulated into an IP packet and transmitted to the PBX. This allows
your phone to be identified by an IP address instead of a phone number. The reason behind this is
so that like a computer, a phone can be relocated easily to any location without the need for
patching or PBX reprogramming. Essentially, since the PBX now communicates to the phone
using IP, it will know what phone number to send and receive voice information regardless of
location.
30
ACL are the basic security feature that is required in any network to control the flow of traffic.
Most of time our network may have servers and clients for which traffic control is required. We
can also use ACL to classify the traffic. ACLs are used in features like QOS (Quality of Service),
Prioritize traffic and interesting traffic for ISDN.
Time-Based ACLs
In this you can specify a certain time of day and week and then identity that particular period by
giving it a name referenced by a task. The reference function will fall under whatever time
constraints you have dictated. The time period is based upon the routers clock, but it is highly
recommended that using it in conjunction with Network Time Protocol (NTP) synchronization.
Access Lists perform several functions within a Cisco router, including:
31
1. Implement security / access procedures
Extended Access Lists allow filtering on address, protocol, and applications. Access lists are
used to limit broadcast traffic.
4. Provide IP traffic dynamic access control with enhanced user authentication using the
lock-and-key feature
7. Specify packet traffic for dial-in remote sites using dial-on-demand routing (DDR)
Dial-on-demand routing (DDR) - technique whereby a Cisco router can automatically initiate
and close a circuit-switched session as transmitting stations demand. The router spoofs keep lives
so that end stations treat the session as active. DDR permits routing over ISDN or telephone lines
using an external ISDN terminal adaptor or modem.
a) Standard access lists for IP check the 'source address' of packets that could be
routed.
b) The result permits or denies output for an 'entire protocol' suite, based on the
network/subnet/host address.
a) Extended access lists check for both 'source' and 'destination' packet addresses.
They also can check for 'specific protocols', 'port numbers', and other parameters.
32
b) Packets can be 'permitted' or 'denied' output based on where the packet originated
and on its destination.
i. This global statement identifies the access list, usually an access list number. This number
refers to the type of access list this will be. In Cisco IOS Release 11.2 or newer, access
lists for IP may also use an access list name rather than a number.
ii. The permit or deny term in the global access list statement indicates how packets that meet
the test conditions will be handled by Cisco IOS. Permit usually means the packet will be
allowed to use one or more interfaces that you will specify later.
iii. The final term or terms specifies the test conditions used by this access list statement. The
test can be as simple as checking for a single source address, but usually test conditions
are extended to include several test conditions. Use several global access list statements
with the same identifier to stack several test conditions into a logical sequence or list of
tests.
IP Standard 1 - 99
IP Extended 100-199
Named (Cisco IOS 11.2 and later)
33
Other number ranges for most protocols
For TCP/IP packet filters, Cisco IOS access lists check the packet and upper-layer headers for:
i. Source IP addresses using standard access lists; identify these with a number in the range 1
to 99.
ii. Destination and source IP addresses or specific protocols using extended access lists;
identify these with a number in the range 100 to 199.
iii. Upper-level TCP or UDP port numbers in addition to the other tests in extended access
lists; also identify these with a number in the range 100 to 199.
iv. For all of these TCP/IP access lists, after a packet is checked for a match with the access
list statement, it can be denied or permitted to use an interface in the access group.
i. Standard lists (1-99) test conditions of all IP packets from source address
c) Destination ports
iii. Wildcard bits indicate how to check the corresponding address bits (0=check, 1=ignore)
Wildcard mask - 32-bit quantity used in conjunction with an IP address to determine which bits
in an IP address should be ignored when comparing that address with another IP address. A
wildcard mask is specified when setting up access lists.
ii. A wildcard mask bit 1 means "do not check (ignore) that corresponding bit value."
NOTE: Wildcard masking for access lists operates differently from an IP subnet mask. A zero in
a bit position of the access list mask indicates that the corresponding bit in the address must be
checked; a one in a bit position of the access list mask indicates the corresponding bit in the
address is not 'interesting' and can be ignored.
34
Check for IP subnets: 172.30.16.0 to 172.30.31.0
Address and wildcard mask: 172.30.16.0 0.0.15.255
ii. Test condition: Ignore all the address bits (match any)
iii. Test condition: Check all the address bits (match all)
1. List kept by Cisco routers to control access to or from the router for a number of services
(for example, to prevent packets with a certain IP address from leaving a particular
interface on the router).
4. Standard access lists permit or deny the entire TCP/IP protocol suite.
3. Permit | deny - does this entry allow or block the specified address
35
3. in | out - Selects whether the access list is applied to the incoming or outgoing interface.
If in or out is not specified, out is the default
NOTE: To remove an access list, first enter the 'no ip access-group' command, including 'list
number', for each interface where the list had been used, then enter the 'no access-list' command
(with list number).
iii. Permit | deny - does this entry allow or block the specified address
vii. operator and operand - lt, gt, eq, neq (not equal), and a port number
viii. established - Allows TCP traffic to pass if packet uses an established connection (for
example, has ACK bits set)
36
IP access-group - Command that links an existing access list to an outbound interface. Only one
access list per port per protocol is allowed.
ii. acl-number - the number of the access list to be linked to this interface
iii. In | out - Selects whether the access list is applied to the incoming or outgoing interface.
If in or out is not specified, out is the default
Command that displays IP interface information and indicates whether any access lists are set.
(Monitor Access Lists)
Command that displays the contents of all access lists. This Cisco IOS command provides more
details about the access list statements. By entering the access list name or number as an option
for this command, you can see a specific list. (Monitor Access List statements).
37
NAT is the feature that can be enable in a Router, Firewall or a Pc. With the help of NAT, we are
able to translate network layer addresses that are IP addresses of packets. With the help of Port
Address Translation, we are also able to translate port nos present in transport layer header.
There are two reasons due to which we use NAT: -
ii. NAT enhances the network security by hiding PC & devices behind NAT.
9.1 Types of NAT:
Static NAT
This NAT is used for servers in which one Live IP is directly mapped to one Local IP. This NAT
will forward on the traffic for the Live IP to the Local PC in the n/w.
Dynamic NAT
Dynamic NAT is used for clients, which want to access Internet. The request from multiple
clients IPs is translated with the Live IP obtained from the Pool. It is also called Pool Based
Dynamic NAT.
38
Except => 172.16.0.5
172.16.0.6
172.16.0.7
9.2 Configuration NAT:
Router#conf terminal
Router (config) #int serial 0
Router (config-if) #ip nat outside
Router (config-if) #int eth 0
Router (config-if) #ip nat inside
Router (config-if) #exit
Router (config) #ip nat inside source static 172.16.0.7 200.1.1.3
Router (config) #ip nat inside source static tcp 172.16.0.5 80 200.1.1.4 80
Router (config) #ip nat inside source static udp 172.16.0.6 53 200.1.1.4 53
Router (config) #access-list 30 deny 172.16.0.5
Router (config) #access-list 30 deny 172.16.0.6
Router (config) #access-list 30 deny 172.16.0.7
Router (config) #access-list 30 permit any
Router (config) #ip nat pool abc 200.1.1.8 200.1.1.12 netmask 255.255.255.240
Router (config) #ip nat inside source list 30 pool abc overload
39
Virtual LANs (VLANs) divide one physical network into multiple broadcast domains. But,
VLAN-enabled switches cannot, by themselves, forward traffic across VLAN boundaries. So
you need to have routing between these VLANs which is called InterVLAN routing
Configuration:
Interface FastEthernet0/1
Switch port access vlan 3
Interface FastEthernet0/2
Switch port access vlan 2
Interface FastEthernet0/3
Switch port access vlan 3
Interface FastEthernet0/4
Switch port access vlan 2
Interface FastEthernet0/12
Switch port trunk native vlan 99
Switch port trunk encapsulation dot1q
Switch port mode trunk
Interface FastEthernet0/13
Switch port trunk encapsulation dot1q
Mac-address 0010.1196.1301
ip address 10.0.0.9 255.0.0.0
!
Interface Vlan3
Mac-address 0010.1196.1302
Ip address 20.0.0.9 255.0.0.0
40
11. Project Network design
In the network structure, there are three branches- BRANCH 1,BRANCH 2 and BRANCH 3.
41
ii. Front end tools : Cisco Packet Tracer, GNS3.
Workgroup Switch
Switches can determine whether data should remain on a LAN or not, and they can transfer the
data to the connection that needs that data.
42
9
Router
Routers have all capabilities of the previous devices. Routers can regenerate signals, concentrate
multiple connections, convert data transmission formats, and manage data transfers. They can
also connect to a WAN, which allows them to connect LANs that are separated by great distances
Device configuration:
Step 2: Configure basic settings for the router and each switch.
Router to router:
10
To connectivity of router to router, first we have select serial ports from WIC 2T.
10
43
Router to switch: For connectivity of router to switch, we used straight wire at fast Ethernet
port Fat0/0 to Fat 0/1.
Switch to switch: For connectivity of switch to switch, we used straight wire at fast Ethernet
port Fat0/1 to Fat 0/3.
44
Switch to servers and IP phones : For connectivity of switch to servers and IP phones, we used
straight wire at fast Ethernet port.
45
Conclusion
The project VOIP (VOICE OVER INTERNET PROTOCOL) NETWORK is an effort to help
the readers understand the network scenario of corporate world. We thoroughly studied the
available hardware and software solutions available. In the market, before implementing them
in our project. Moreover we developed this project at minimal cost. This project will definitely
help users in some from or the either, since it has been developed keeping both. Ease of use
and understanding features in mind. We plan to future enhance this project, with help of various
users input too. Concluding compactly, through this project, we intend to serve the users the be
stand in turn serve ourselves for there is a profound sense of satisfaction and pride.
Voice over Internet Protocol (VoIP) is one of the hottest and most hyped technologies in the
communications industry. Businesses and consumers are already taking advantage of the cost
savings and new features of making calls over a converged voice-data network, and the logical
next step is to take those advantages to the wireless world. The most widely publicized benefit of
VoIP is the ability to save costs on long distance charges and to network multiple offices
together. Businesses that have a data connection between their offices can utilize VoIP
technology to bypass long distance networks and provide more efficient communications
between offices. In a traditional setting, someone would have to dial the phone number to a
branch office, possibly paying a long distance charge for the call, wait for a receptionist or
automated system to answer and then become connected to the party theyre trying to reach.
Using VoIP, a person can simply dial an extension number and be connected immediately to a
party in another office, whether across town or around the world avoiding costly long distance
charges.
A second benefit is in the design of many telephone systems, often called IP based systems.
Rather than traditional phone systems with their own wiring infrastructure, IP based systems use
46
a data network infrastructure. This convergence of voice and data into a single platform has
tremendous advantages in simplifying the administration of the communications network. Plus,
IP utilizes data infrastructure that most likely already exists in many companies.
A third benefit is the ability to have remote phones with a single telephone number. For example,
an employee could work out of their home in New York, utilizing a phone number with a
California area code. This enables corporations to truly take advantage of having a virtual office
and or remote agents working out of a variety of location
SCREENSHOTS
47
Interfaces:
48
Frame Relay Mapping:
DNS Server:
49
Command Prompt:
50
Graphical User Interface:
51
Web Browser:
Future Enhancement
52
Voice over Internet Protocol (VoIP) is one of the hottest and most hyped technologies in the
communications industry. Businesses and consumers are already taking advantage of the cost
savings and new features of making calls over a converged voice-data network, and the logical
next step is to take those advantages to the wireless world. The most widely publicized benefit of
VoIP is the ability to save costs on long distance charges and to network multiple offices
together. Businesses that have a data connection between their offices can utilize VoIP
technology to bypass long distance networks and provide more efficient communications
between offices. In a traditional setting, someone would have to dial the phone number to a
branch office, possibly paying a long distance charge for the call, wait for a receptionist or
automated system to answer and then become connected to the party theyre trying to reach.
Using VoIP, a person can simply dial an extension number and be connected immediately to a
party in another office, whether across town or around the world avoiding costly long distance
charges.
A second benefit is in the design of many telephone systems, often called IP based systems.
Rather than traditional phone systems with their own wiring infrastructure, IP based systems use
a data network infrastructure. This convergence of voice and data into a single platform has
tremendous advantages in simplifying the administration of the communications network. Plus,
IP utilizes data infrastructure that most likely already exists in many companies.
A third benefit is the ability to have remote phones with a single telephone number. For example,
an employee could work out of their home in New York, utilizing a phone number with a
California area code. This enables corporations to truly take advantage of having a virtual office
and or remote agents working out of a variety of location
BLIOGRAPHY
53
Books
Todd Lammle by Cisco
Cisco press
Internet Source
www.google.com
www.cisco.com
www.learningnetwork.cisco.com
www.lifewire.com
54