You are on page 1of 54

DECLARATION

I hereby declare that the Industrial Training Report entitled VOICE OVER FRAME
RELAY is an authentic record of my own work as requirements of 4- months Industrial
Oriented Project Training during the period from January to May for the award of degree
of B.Tech. Computer Science & Engineering, Chandigarh engineering college.

Ujjwal Rattan
1305827
Date: ____________________

Certified that the above statement made by the student is correct to the best of our
knowledge and belief.

Signatures

Examined by:

Head of Department
(Signature and Seal)
ACKNOWLEDGEMENT

Acknowledgement is not more formality but a genuine opportunity to thanks all those people
without whom active support this project work would not be possible.

I wish to express my appreciation to my family for my continuous love and encouragement, for
always believing in me, for never failing to provide all the support, and for coping with the
pressure that naturally comes with such endeavour.

I also wish to extend my thanks to Shray Modi sir and other teachers for guiding and providing
the knowledge related to machinery and processes.

Ujjwal Rattan
(1305827)

3
COMPANYS PROFILE

CMC Academy provide opportunity to B.Tech/BE, MCA, BCA, Diploma students to enhance
their skills and getting practical knowledge through industrial training. CMC is a leading IT
solutions company
CMC Academy Chandigarh is an ISO 9001:2008 certified Institute and follows the entire quality
standard under ISO 9001:2008. The company has a very strong placement cell that assists
students to place in various corporate after successful completion of the training.

CMC Chandigarh provide training solution nearly for every engineering branch. We offers job
oriented industrial training on latest technologies like Electrical Design, Instrumentation Design,
Piping Design, Process Design, Civil & Structural Design, Industrial Automation, Embedded
Systems, Power Plant Design, ASP.Net, PHP, JAVA and many more. Apart from training solution
we also provide On/Off Campus placement solutions.

CMC Academy has direct and indirect tie-up with multiple industries to provide jobs for fresher
and experienced candidates.

4
CONTENTS

1. Introduction
1.1 software requirements

1.2 Hardware requirements

1.3 CISCO packet tracer

2. Modules
2.1 server

2.2 Domain Name System

2.2.1 DNS resolvers

2.3 Dynamic Host Configuration Protocol


2.4 Technical overview
2.5 Network Switches
2.6 INTERNET INFORMATION SERVICES

3. IP Address
3.1 Subnet Mask
3.2 Private IP Addresses
4. IP ROUTING & ROUTING PROTOCOLS

4.1 IP Routing:
4.1.1Dynamic Routing
4.2 Routing Protocols:
4.2.1 RIP (Routing Information Protocol)
4.2.2 EIGRP (Enhanced Interior Gateway Routing Protocol
4.2.3 OSPF (Open Shortest Path First)

5. IP Phones

6. Frame Relay

7. VOIP over frame relay


8. Access list control

14
9. NETWORK ADDRESS TRANSLATION
9.1 Types of NAT:
9.2 Configuration NAT:
9.3Command for Basic NAT

10. InterVLAN Routing

11. Project Network design

12. screenshots

13.Future Enhancement

1. Introduction

6
In this project the main branch is connected to 2 other networks or locations using Microsoft and
Cisco technologies. The main branch includes Domain Name Server, Dynamic Host
Configuration Protocol, Internet information Services, Exchange Server, IP Phones, Cisco
Switches, Cisco Routers. It also includes Cisco Link sys wireless Router. The project is based on
the concepts of networking. It includes configuring different network devices like Router, Switch
connecting it with PCs and ip phones by using different types of connecting wires by allocating
the IP Addresses to all the interfaces after the Sub netting of network id. The beauty of
configuring network devices is that it helps users access the network with few constraints like
allowing some to access the website but not allowing them to access the mail server on the
internet on private IP address which are otherwise excluded by internet service provider (ISP).

Exchange server is used to provide messaging, support for mobile and web access to
information & support for data storage device. Main server & systems as well as exchange server
relies on
IP, DNS, DHCP, IIS and other technologies for communicating between themselves.

Switch here is Cisco switch which provides services like creation & management of systems
And IP phones in main branch and it is the device which connects the devices in main branch,
main router and links to other locations to each other in a network. The information from each
system or device i.e. client or server in main branch, router, ip phones and from other locations
passes through switch interface.

The domain name system (DNS) is a hierarchical, distributed database that Contains mappings
Of DNS domain names to various types of data, such as Internet Protocol (IP) addresses. DNS
allows you to use friendly names, such as www.hcl.com, to easily locate computers and other
resources on TCP/IP based network. DNS is an Internet Engineering Task Force (IETF)
standard. In Computing, a name server (also spelled name server) is a program or computer
Server that implements a name-service protocol. It maps a human-recognizable identifier to a
system-internal, often numeric, identification or addressing component.

Main Router is responsible for communication between different networks that is, main branch
and other networks. The main router here describes the best path to reach the system in a
network from a system in another network.

IP Phones refers to the communication protocols, technologies& transmission technique


involved in the delivery of voice communication. IP phones uses voice over IP (voip) technology
allowing telephones calls to be made over an IP network such as the internet.

Other routers are used at the entrance of the each network. These routers receive& send routing
updates to and from main router which ensure the reliability of whole network.

7
1.1 SOFTWARE REQUIREMENTS

To complete the work on VOIP NETWORK, I need a help from some software requirements.
Software requirements are as follow:
Cisco Packet Tracer:
Used to do the project work easily & proper understanding.
Windows Server 2003:
Server is the operating system used for domain network. In the domain model network, server
mainly provides the resources to the clients, and applies the security to the clients
Windows 10:
It is an operating system. It is an interface unit between the user and hardware device.
Microsoft Office:
Used to save the work done on the project.

1.2 HARDWARE REQUIREMENTS


Cisco Router: 1 2811 series (modular)
Link sys wireless router (WRT300N)
Switches: 1 Cisco 2960 series 24 port
8 Dlink 16 port
Cables: Cat 5 and Cat 6
Console cable, serial cable
Length as per requirement
Clients/Nodes: Pentium 4 or up
Windows XP Professional
512 MB RAM
80 GB Hard Disk
IP Phones: 7960 ip phone series

8
1.3 ABOUT CISCO PACKET TRACER
Packet tracer overview:

Packet Tracer is a protocol simulator developed by Dennis Freezo and his team at Cisco Systems.
Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols used in
networking, in either Real Time or Simulation mode. This includes layer 2 protocols such as
Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols such as
TCP and UDP. Routing protocols can also be traced.
Cisco Packet Tracer is a network simulation program that allows students to experiment with
network behavior and ask what if questions. As an integral part of the Networking Academy
comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring,
assessment, and collaboration capabilities and facilitates the teaching and learning of complex
technology concepts.
Packet Tracer is commonly used by Cisco Networking Academy students working towards Cisco
Certified Network Associate (CCNA) certification. Due to functional limitations, it is intended
by Cisco to be used only as a learning aid, not a replacement for Cisco routers and switches.
Packet Tracer can be used to understand various concepts of networking with simulation; it can
be used to design a network by connecting various networking devices and running various
troubleshooting tests to check the connectivity and communication between different networking
devices. Packet Tracer can be used to understand the use of different networking devices
appropriately and the difference in their working. As it is costly to buy various networking
equipment while learning networking, Packet Tracer can be used to understand computer
networks.
Purpose: The purpose of this lab is to become familiar with the Packet Tracer interface.

9
Simulation, visualization, collaboration:

Supports homework and pre-lab prep:

Packet tracer features:

10
I. Logical and physical workspaces
II. Real-time and simulation modes
III. User friendly
IV. Global event list (packet sniffer)
V. Lan,switching,tcp/ip, routing and wan protocols
VI. Activity wizard, lab grading
VII. Multi platform support
VIII. Multi language support
Packet tracer 7.0 multiuser functionality:
Packet tracer 7.0 is now a network-capable (peer to peer) application using the real network
(TCP socket connection) to carry the packet tracer virtual packet.
I. The PT application running on one computer can communicate with the PT application
running on 1 or more other computer.
II. This connectivity between multiple instances of PT supports teamwork, classroom
games, collaboration, competition, remote instructor-student interaction and social-
networking.

11
2. MODULES
2.1 Server
A server is a computer program that provides services to other computer program (and their
users), in the same or other computer. The physical computer that runs a server program is also
often referred to as server.
Services can be supplied centrally by the use of a server; in other cases all the machines on a
network have the same status with no dedicated server, and services are supplied peer -to- peer.
Server used as an adjective, as in server operating system, refers to the products ability to
handle multiple requests, and is said to be server- grade. A server operating system is intended
or better enabled to run server applications. The differences between the server and workstation
versions of a product can vary from the removal of an arbitrary software limits due to licensing,
as in the case of window 2000, or the addition of bundled applications as in Mac OS X Server.
A server can also refer to a computer that has been set aside to run a specific server application.
Server application can be divided among server computers over an extreme range, depending
upon the workload.
Server Roles: Server 2003 is a multipurpose operating system capable of handling a diverse
set of server roles, depending on your needs, In either a centralized or distributed fashion. Some
of these server roles include:
a) File and Print Server.
b) Web server and web application services.
c) Exchange server (Mail server).
d) Virtual private network (VPN) server.
e) Domain name system (DNS).
f) Dynamic host configuration protocol (DHCP).
2.2 Domain Name System:
The domain name system (DNS) is a hierarchical naming system for computers, services, or
any resource participating in the internet. It associates various information with domain names
assigned to such participants. Most importantly, it translates domain names meaningful to
humans into the numerical (binary) Identifiers associated with networking equipment for the

12
purpose of locating and addressing these devices worldwide. An often used analogy to explain
the Domain Name System is that it serves as the phone book for the internet by translating
human friendly computer hostnames into ip addresses. For example, www.example.com
translates to 208.77.188.166.
2.2.1 DNS resolvers:
The client side of the DNS is called a DNS resolver. It is responsible for Initiating and
sequencing the queries that ultimately lead to a full Resolution (translation) of resource sought,
e.g. translation of a domain name in to IP address.
Primary Master Name Server contains the master copy of the database files with resource
records for all sub domains and hosts in the zone.

Secondary Master Name Server receives a replicated copy of database files from the primary
server. When the zone structure changes, the primary master database files are modified and
copied to the secondary masters.

Caching Only Name Server starts with no knowledge of the DNS structure and must depend
upon other name servers for this information. Each time a caching only server is queries a name
server and receives an answer, it stores the information in its cache. Over a considerable period
of time the cache will grow to include the information most often requested.

Installing DNS server

1. Click Start, point to settings, and then click control panel.

2. Double click Add/Remove Programs.

3. Click Add and Remove Windows Components.

4. The window components wizard starts. Click next.

5. Click networking services, and then click details.

6. Click to select the domain name system (DNS) check box, and then click ok.

7. Click ok to start server setup. The DNS server and tools files are copied to your computer.

8. Continue to next step to configure the DNS server.

Configure the DNS server

13
1. Click start, point to programs, point to administrative tools, and then click DNS Manager.
We see two zones under your computer name: forward lookup zone and reverse lookup
zone.

2. The DNS server configuration wizard start. Click next.

3. If the wizard does not auto-start, right-click the server name object in the DNS manager
console and choose configure your server.

4. Select create forward and reverse lookup zones, click next.

5. Select create a forward lookup zone now, click next.

6. Choose the zone type as primary zone as shown in the figure below.

7. The zone name must be exactly the same as your Active Directory Domain
Name.

8. Enable secure dynamic updates so that clients can update their records dynamically
whenever changes occur

9. Instead of giving a zone name a reverse lookup zone requires a network id, since its used
to map IP address to host names using PTR records.

10. Click finish to complete DNS configuration.

2.3 Dynamic Host Configuration Protocol:

The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for
hosts on Internet Protocol (IP) networks. Computers that are connected to IP networks must be
configured before they can communicate with other hosts. The most essential information needed
is an IP address, and a default route and routing prefix. DHCP eliminates the manual task by a
network administrator. It also provides a central database of devices that are connected to the
network and eliminates duplicate resource assignments.

In addition to IP addresses, DHCP also provides other configuration information, particularly the
IP addresses of local caching DNS resolvers, network boot servers, or other service hosts.
DHCP is used for IPv4 as well as IPv6. While both versions perform much the same purpose, the
details of the protocol for IPv4 and IPv6 are sufficiently different that they may be considered
separate protocols.

Hosts that do not use DHCP for address configuration may still use it to obtain other
configuration information. Alternatively, IPv6 hosts may use stateless address auto configuration.
IPv4 hosts may use link-local addressing to achieve limited local connectivity.

14
2.4 Technical overview:

Dynamic Host Configuration Protocol automates network-parameter assignment to network


devices from one or more DHCP servers. Even in small networks, DHCP is useful because it
makes it easy to add new machines to the network.

When a DHCP-configured client (a computer or any other network-aware device) connects to a


network, the DHCP client sends a broadcast query requesting necessary information from a
DHCP server. The DHCP server manages a pool of IP addresses and information about client
configuration parameters such as default gateway, domain name, the name servers, other servers
such as time servers, and so forth. On receiving a valid request, the server assigns the computer
an IP address, a lease (length of time the allocation is valid), and other IP configuration
parameters, such as the subnet mask and the default gateway. The query is typically initiated
immediately after booting, and must complete before the client can initiate IP-based
communication with other hosts.

Depending on implementation, the DHCP server may have three methods of allocating IP-
addresses:-

Dynamic allocation: A network administrator assigns a range of IP addresses to DHCP, and each
client computer on the LAN is configured to request an IP address from the DHCP server during
network initialization. The request-and-grant process uses a lease concept with a controllable
time period, allowing the DHCP server to reclaim (and then reallocate) IP addresses that are not
renewed.

Automatic allocation: The DHCP server permanently assigns a free IP address to a requesting
client from the range defined by the administrator. This is like dynamic allocation, but the DHCP
server keeps a table of past IP address assignments, so that it can preferentially assign to a client
the same IP address that the client previously had.

Static allocation: The DHCP server allocates an IP address based on a table with MAC
address/IP address pairs, which are manually filled in (perhaps by a network administrator). Only
requesting clients with a MAC address listed in this table will be allocated an IP address. This
feature (which is not supported by all DHCP servers) is variously called Static DHCP
Assignment (by DD-WRT), fixed-address (by the dhcp documentation), Address Reservation (by
Net gear), DHCP reservation or Static DHCP (by Cisco/Linksys), and IP reservation or MAC/IP
binding (by various other router manufacturers).

Setting up a DHCP server

1. On the run dialog box write dhcpmgmt.msc and click ok. The DHCP window pops out.
Click on the server name and select new scope option.
2. Fill in the necessary details in the new scope wizard.

15
3. The next window will ask you to define the range of addresses that the scope will distribute
across the network and the subnet mask for the IP address. Enter the appropriate details and
click next.
4. In the next window, we must add any exclusion to the range of IP addresses we specified in
the previous window. So, these IPs will be reserved and not distributed amongst the
network devices.
5. Now we set the lease duration for how long a client can use an IP address assigned to it
from this scope.
6. In the following window, the DNS and domain name settings can be entered. The DNS
server IP address will be distributed by the DHCP server and given the client.
7. The last step is to activate the scope just press next when you see the window.
8. The DHCP server has now been installed with the basic settings in place. The next stage is
to configure it to the needs of your network structure. As shown in the figure below.
2.5 Network Switches:

A network switch is a computer networking device that connects network segments. The term
commonly refers to a network bridge that processes and routes data at the Data Link layer (layer
2) of the OSI model. Switches that additionally process data at the network layer (layer 3 and
above) are often referred to as layer 3 switches or multilayer switches.

2.5.1 Functions:

a) Learning
b) Forward and filtering
c) Loop Avoidance

2.6 INTERNET INFORMATION SERVICES

Internet Information Services (IIS) formerly called Internet Information Server is a web server
application and set of feature extension modules created by Microsoft for use with Microsoft
Windows. It is the most used web server after Apache HTTP Server. IIS 7.5 supports HTTP,
HTTPS, FTP, FTPS, SMTP and NNTP. It is an integral part of Windows Server family of
products, as well as certain editions of Windows XP, Windows Vista and Windows 7. IIS is not
turned on by default when Windows is installed.

Features:

HTTP modules Used to perform tasks specific to HTTP in the request-processing pipeline,
such as responding to information and inquiries sent in client headers, returning HTTP errors,
and redirecting requests.

Security modules Used to perform tasks related to security in the request-processing pipeline,
such as specifying authentication schemes, performing URL authorization, and filtering requests.

16
Content modules Used to perform tasks related to content in the request-processing pipeline,
such as processing requests for static files, returning a default page when a client does not
specify a resource in a request, and listing the contents of a directory.

Compression modules Used to perform tasks related to compression in the request-processing


pipeline, such as compressing responses, applying Gzip compression transfer coding to
responses, and performing pre-compression of static content.

Caching modules Used to perform tasks related to caching in the request-processing pipeline,
such as storing processed information in memory on the server and using cached content in
subsequent requests for the same resource.

Logging and Diagnostics modules Used to perform tasks related to logging and diagnostics in
the request-processing pipeline, such as passing information and processing status to HTTP.sys
for logging, reporting events, and tracking requests currently executing in worker processes.

3. IP Address

IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts
one is network address and second is host address. In local area network, we can use private IP
address, which is provided by IANA (Internet Assigning Numbering Authority). When IP was
first standardized, the specification required that each system attached to an IP-based internet be
assigned a unique, 32-bitninternet address value. Systems that have interface to more than one
network require a unique IP address for each network interface. The first part of an internet
address identifies the network on which the host resides, while the second part identifies the
particular host on the given network. IP addresses are divided into five classes.
Class Range N/w bits Host bits Subnet mask Total IP Valid IP
A 1 126 8 24 255.0.0.0 16777216 16777214
B 128 191 16 16 255.255.0.0 65536 65534
C 192 223 24 8 255.255.255.0 256 254
D 224 239 it is reserved for multicast.
E 240 255 it is reserved for research/scientific use.
We can use first three classes. IANA provides private IP addresses from first three classes.
Class Private IP Range
A 10.0.0.0 10.255.255.255
B 172.16.0.0 172.31.255.255
C 192.168.0.0 192.168.255.255

17
3.1 Subnet Mask:
Subnet mask is also 32-bit address, which tells us how many bits are used for network and how
many bits are used for host address.
In Subnet mask Network bits are always 1 and Host bits are always 0.
When we are going to assign IP addresses to our computers then we have to follow some rules.
Rules: -
(1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved
for router.
(2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network
(10th network).
(3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default
routing is used in case of Stub n/w (means our network has one exit point).
(4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting.
(5) 127.0.0.1 - This is Loopback address, which is used for self-communication or
troubleshooting purpose.
C:\>ipconfig
C:\>ipconfig/all
It shows all detail.
3.2 Private IP Addresses:

Computer not connected to the internet, such as factory machines that communicate only with
each other via TCP/IP, need not have globally unique IP addresses. Three ranges of IPv4
addresses for private networks, one range for each class (A,B,C) were reserved. These addresses
are not routed on the Internet, and thus their use need not be coordinated with an IP address
registry.
4. IP ROUTING & ROUTING PROTOCOLS

4.1 IP Routing:
14
When we want to connect two or more networks using different n/w addresses then we have to
use IP Routing technique. The router will be used to perform routing between the networks. A
router will perform following functions for routing.
i. Path determination
ii. Packet forwarding

(1) Path determination:-The process of obtaining path in routing table is called path
determination. There are three different methods to which router can learn path.

18
i. Automatic detection of directly connected n/w.
ii. Static & Default routing
iii. Dynamic routing

(2) Packet forwarding: - It is a process that is by default enable in router. The router will
perform packet forwarding only if route is available in the routing table.
In this project, we are using only DYNAMIC ROUTING

4.1.1Dynamic Routing

In dynamic routing, we will enable a routing protocol on router. This protocol will send its
routing information to the neighbor router. The neighbors will analyze the information and write 15
new routes to the routing table. The routers will pass routing information receive from one router
to other router also. If there is more than one path available then routes are compared and best
path is selected. Some examples of dynamic protocol are: -
RIP, IGRP, EIGRP, OSPF

Types of Dynamic Routing Protocols:


According to the working there are two types of Dynamic Routing Protocols.

(1) Distance Vector


(2) Link State

According to the type of area in which protocol is used there are again two types of protocol: -

(1) Interior Routing Protocol


(2) Exterior Routing Protocol
Distance vector routing algorithm: Class of routing algorithms that iterate on the number of
hops in a route to find a shortest-path spanning tree. Distance vector routing algorithms call for
each router to send its entire routing table in each update, but only to its neighbors. Distance
vector routing algorithms can be prone to routing loops, but are computationally simpler than
link state routing algorithms. Distance vector algorithms do not allow a router to know the exact
topology of an internetwork. Also called Bellman-Ford routing algorithm.

Distance Vector Routing:

I. Pass periodic copies of routing table to neighbor routers and accumulate distance vectors

II. Routers discover the best path to destination from each neighbor

III. Updates proceed step-by-step from router to router

Link state routing algorithm: (also called Shortest Path First) routing algorithm in which each
router broadcasts (floods) or multicasts information regarding the cost of reaching each of its
neighbors to all nodes in the internetwork. Link state algorithms create a consistent view of the
network and are therefore not prone to routing loops, but they achieve this at the cost of

19
relatively greater computational difficulty and more widespread traffic (compared with distance
vector routing algorithms).

Autonomous System (AS): consists of routers, run by one or more operators that present a
consistent view of routing to the external world. (Routers under a common administration). The
Internet Network Information Center (InterNIC) assigns a unique autonomous system to
enterprises. This autonomous system is a 16-bit number. A routing protocol such as Cisco's
Interior Gateway Routing Protocol (IGRP) requires that you specify this unique, assigned
autonomous system number in your configuration.

Exterior routing protocols are used to communicate between autonomous systems.


Interior routing protocols are used within a single autonomous system.
Interior IP Routing Protocols:

i. RIP - A distance vector routing protocol.

ii. IGRP - Ciscos distance vector routing protocol. (supports multipath routing)

iii. OSPF - A link-state routing protocol.

iv. Enhanced IGRP - A balanced hybrid routing protocol.

IP Routing configuration tasks:

i. Global Configuration:

a) Select a routing protocol, RIP or IGRP.

b) Assign IP network numbers without specifying subnet values.

ii. Interface Configuration

a) Assign network/subnet addresses and subnet mask

Dynamic Routing configuration


Router (config) # router-protocol [keyword]

I. Defines an IP routing protocol (starts a routing process)

20
II. protocol - RIP,IGRP,OSPF,EIGRP

III. keyword - autonomous system

Router (config-router) # network network-number

I. The network subcommand is a mandatory configuration command for each IP routing


process (allows the routing process to determine which interfaces will participate in the
sending and receiving of routing updates)

II. Network-number - specifies a directly connected network (must be based on the NIC
network numbers, not subnet numbers or individual addresses)

4.2 Routing Protocols:

Routed protocol used between routers to carry user traffic (Ex. IP, IPX)
Routing protocol used between routers to maintain tables (Ex. RIP, IGRP)
Routed protocol - Protocol that can be routed by a router. A router must be able to interpret the
logical internetwork as specified by that routed protocol. Examples of routed protocols include
AppleTalk, DECNET, and IP.

Routing protocol - Protocol that accomplishes routing through the implementation of a specific
routing algorithm. Examples of routing protocols include IGRP, OSPF, and RIP.

A routing protocol describes:

I. How updates are sent

II. What knowledge is contained in these updates

III. When to send this knowledge

IV. How to locate recipients of the updates

IGRP (Interior Gateway Routing Protocol) - IGP developed by Cisco to address the problems
associated with routing in large, heterogeneous networks.

Internetworking functions of the 3Network Layer include 'network addressing' and 'best
path selection' for traffic.

'Routed protocols' carry user traffic, while 'Routing protocols' work between routers to
maintain path tables.

21
Network discovery for 'Distance vector' involves exchange of routing tables; problems
can include 'slower convergence'.

For 'Link-state', routers calculate the shortest paths to other routers; problems can include
'inconsistent updates'.

Configuring IGRP:

IGRP is a distance vector routing protocol developed by Cisco. IGRP sends routing updates at
90-second intervals that advertise networks for a particular autonomous system.

I. Composite metric selects the path

II. Speed is the primary consideration

III. Supports multi-path routing

IV. Supports Equal-cost and Unequal-cost load balancing

V. Versatility to automatically handle indefinite, complex topologies.

VI. Flexibility for segments having different bandwidth and delay characteristics.

VII. Scalability to function in very large networks.

Variables IGRP uses include:

I. Bandwidth

II. Delay

III. Load

IV. Reliability

V. Maximum transmission unit (MTU)

MTU (Maximum transmission unit) - Maximum packet size, in bytes, that a particular interface
can handle.

Router> show ip route

22
i. Show ip route - Command that displays the contents of an IP routing table.

ii. The table contains a list of all known networks and subnets and the metrics associated
with each entry.

Configuring following options in IGRP as same as in case of RIP: -

(1) Neighbor
(2) Passive interface
(3) Timer
(4) Distance (AD)
(5) Maximum path

23
4.2.1 RIP (Routing Information Protocol) - IGP supplied with UNIX BSD systems. The most
common IGP in the Internet. RIP uses hop count as a routing metric.

Configuring RIP:

Router#conf terminal
Router (config) #routers rip
Router (config-router) #network <own net address>
Router (config-router) #network <own net address>
Router (config-router) #exit

4.2.2 EIGRP (Enhanced Interior Gateway Routing Protocol) -Advanced version of IGRP
developed by Cisco. Provides superior convergence properties and operating efficiency, and
combines the advantages of link state protocols with those of distance vector protocols.

Features: -
* Cisco proprietary
* Hybrid protocol
Link State
Distance Vector
* Multicast Updates using
Address 224.0.0.10
* Support AS
* Support VLSM
* Automatic Route Summarization
* Unequal path cost load balancing
* Metric (32 bit composite)

24
Bandwidth
Delay
Load
Reliability
MTU
* Neighbor Recovery
* Partial updates
* Triggered updates
* Backup Route

Configuring EIGRP:

Router (config) #router eigrp <auto number>


Router (config-router) #network <net addr.>
Router (config-router) #network <net addr.>
Router (config-router) #exit

4.2.3 OSPF (Open Shortest Path First) - Link-state, hierarchical IGP routing protocol proposed
as a successor to RIP in the Internet community. OSPF features include least-cost routing,
multipath routing, and load balancing. OSPF was derived from an early version of the ISIS
protocol.

OSPF Terminology

(1) Hello packets


(2) LSA (Link State Advertisement)
(3) Neighbor
(4) Neighbor table
(5) Topology table (LSA database).sass
Commands to configure OSPF:

Router#conf terminal
Router (config) #router ospf <process no>
Router (config-router) #network <net address><wild mask> area <area id>
Router (config-router) #network <net address><wild mask> area <area id>
Router (config-router) #exit

Wild Mask Complement of subnet mask

Example 255.255.0.0

25
0.0.255.255

255.255.255.255
- Subnet mask

Wild mask
255.255.255.255
- 255.255.192.0 Subnet mask

0.0.63.255 wild mask


R1
Router (config) #router ospf 33
Router (config-router) #network 200.100.100.32 0.0.0.3 area 0
Router (config-router) #network 200.100.100.64 0.0.0.31 area 0
Router (config-router) #exit
R2
Router (config) #router ospf 2
Router (config-router) #network 200.100.100.32 0.0.0.3 area 0
Router (config-router) #network 200.100.100.128 0.0.0.63 area 0
Router (config-router) #exit

5. IP Phones

An IP phone uses voice over IP (VoIP) technologies allowing telephone calls to be made over an
IP network such as the Internet instead of the ordinary PSTN system. Calls can traverse the
Internet, or a private IP network such as that of a company. The phones use control protocols
such as Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP) or one of
various proprietary protocols such as that used bySkype. It is commonly refers to the
communication protocols, technologies and transmission techniques involved in the delivery of
voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the
Internet.

Session Initiation Protocol (SIP):is a signaling protocol widely used [citation needed] for
controlling communication sessions such as voice and video calls over Internet Protocol (IP).
The protocol can be used for creating, modifying and terminating two-party (unicast) or
multiparty (multicast) sessions. Sessions may consist of one or several media streams.

26
Skinny Client Control Protocol (SCCP):is a proprietary network terminal controlprotocol.
SCCP is a lightweight protocol for session signaling with Cisco CallManager. Examples of
SCCP clients include the Cisco 7900 series of IP phones, Cisco IP Communicator softphone
along with Cisco Unity voicemailserver. CallManager acts as a signaling proxy for call events
initiated over other common protocols such as Session Initiation Protocol (SIP), ISDN.A SCCP
client uses TCP/IP to communicate with one or more Call Manager applications in a cluster.

Configuration of IP Phones:

First you need to set the following topology ip phones / analog phones but connect phones to
power one by one after finishing configuration:

Switch (config) #interface


angefa0/1 5
Switch (config-if-range) #switch port mode access
Switch (config-if-range) #switch port voice vlan 1
Router (config) #int fa 0/0
Router (config-if) #ip add 192.168.10.1 255.255.255.0
Router (config-if) #no shut down
Router (config-if) #exit
Router (config) #ip dhcp pool voicelab
Router (dhcp-config) #network 192.168.10.0 255.255.255.0
Router (dhcp-config) #default-router 192.168.10.1
Router (dhcp-config) #option 150 ip 192.168.10.1
Router (dhcp-config) #exit
Router (config) #telephony-service
Router (config-telephony) #max-dn 5 <- max numbers on directory
Router (config-telephony) #max-ephones 5 <-- max number of phones
Router (config-telephony) #ip source-address 192.168.10.1 port 2000 < gateway can be used by
phones
Router (config-telephony) #auto assign 4 to 6
Router (config-telephony) #auto assign 1 to 5
Router (config) #ephone-dn 1 <--- phone number 1
Router (config-ephone-dn) #number 54001 <--- phone calling number

27
Router (config) #ephone-dn 2
Router (config-ephone-dn) #number 54002
Router (config) #ephone-dn 3
Router (config-ephone-dn) #number 11111

Testing of IP Phones

1. Select the series 7960 IP phone0.


2. When we select any of IP phone, the below figure will be ope

3. Plug the wire in the port to ON the device. Then select GUI.
The following will be open
4. Click on the receiver.
5. Enter the phone no. of IP phone1 that is 54002. Ring out to the IP phone 1.

6. Frame Relay

Frame Relay is a standardized wide area network technology that specifies the physical and data
link layers of digital telecommunications channels using a packet switching methodology.

28
Originally designed for transport across Integrated Services Digital Network (ISDN)
infrastructure, it may be used today in the context of many other network interfaces.
Network providers commonly implement Frame Relay for voice (VoFR) and data as an
encapsulation technique used between local area networks (LANs) over a wide area network
(WAN). Each end-user gets a private line (or leased line) to a Frame Relay.

Frame Relay Point to Point:

Coding:

29
7. Voip over frame relay:

Voice over frame relay (VoFR) is the packetizing of voice to transmit over leased lines to a frame
relay cloud. Once we order this service, we are provided with enough bandwidth to access frame
relay packet networks that are optimized to carry both voice and data. Using Frame relay
networks to send voice can cut down on the cost of long distance dialing since access to the
cloud is via leased line. Voice over IP (VoIP) can be sent over VoFR networks.
VoIP is a technology devised to utilize our existing IP infrastructure to carry voice. This can be
accomplished by using intelligent phones that have both a MAC address (NIC card) and an IP
address. Our voice is encapsulated into an IP packet and transmitted to the PBX. This allows
your phone to be identified by an IP address instead of a phone number. The reason behind this is
so that like a computer, a phone can be relocated easily to any location without the need for
patching or PBX reprogramming. Essentially, since the PBX now communicates to the phone
using IP, it will know what phone number to send and receive voice information regardless of
location.

8. Access list control

30
ACL are the basic security feature that is required in any network to control the flow of traffic.
Most of time our network may have servers and clients for which traffic control is required. We
can also use ACL to classify the traffic. ACLs are used in features like QOS (Quality of Service),
Prioritize traffic and interesting traffic for ISDN.

Types of ACL based on Protocol: -


(1) IP Access Control List
(2) IPX Access Control List
(3) AppleTalk Access Control List

Types of ACL based on Feature: -


(1) Standard ACL
(2) Extended ACL

Types of ACL based on Access mode: -


(1) Numbered ACL
(2) Named ACL

Types of ACL based on Order of rules: -


(1) Deny, permit
(2) Permit, deny

IP Standard ACL (Numbered)


In Standard ACL, we are only able to specify source address for the filtering of packets. The
syntax to create IP standard ACL are: -

IP Standard ACL (Named)


In Numbered ACL editing feature is not available that is we are not able to delete single rule
from the ACL. In Named ACL editing feature is available.

IP Extended ACL (Numbered)


Extended ACL are advanced ACL. ACL, which can control traffic flow on the basis of five
different parameters that are: -
(i) Source address
(ii) Destination address
(iii) Source port
(iv) Destination port
(v) Protocol (layer 3/layer 4)

Time-Based ACLs
In this you can specify a certain time of day and week and then identity that particular period by
giving it a name referenced by a task. The reference function will fall under whatever time
constraints you have dictated. The time period is based upon the routers clock, but it is highly
recommended that using it in conjunction with Network Time Protocol (NTP) synchronization.
Access Lists perform several functions within a Cisco router, including:

31
1. Implement security / access procedures

2. Act as a protocol "firewall"

Extended Access Lists allow filtering on address, protocol, and applications. Access lists are
used to limit broadcast traffic.

Why use Access Lists:

1. Deny traffic you do not want based on packet tests


(for example, addressing or traffic type)

2. Identify packets for priority or custom queuing

3. Restrict or reduce the contents of routing updates

4. Provide IP traffic dynamic access control with enhanced user authentication using the
lock-and-key feature

5. Identify packets for encryption

6. Identify Telnet access allowed to the router virtual terminals

7. Specify packet traffic for dial-in remote sites using dial-on-demand routing (DDR)

Dial-on-demand routing (DDR) - technique whereby a Cisco router can automatically initiate
and close a circuit-switched session as transmitting stations demand. The router spoofs keep lives
so that end stations treat the session as active. DDR permits routing over ISDN or telephone lines
using an external ISDN terminal adaptor or modem.

8.2 Types of ACL

i. Standard access lists

a) Standard access lists for IP check the 'source address' of packets that could be
routed.

b) The result permits or denies output for an 'entire protocol' suite, based on the
network/subnet/host address.

ii. Extended access lists

a) Extended access lists check for both 'source' and 'destination' packet addresses.
They also can check for 'specific protocols', 'port numbers', and other parameters.

32
b) Packets can be 'permitted' or 'denied' output based on where the packet originated
and on its destination.

c) Generally permits or denies 'specific protocols'

8.3 Access List command overview


Step 1: Set parameters for this access list test statement (which can be one of several statements).
The access list process contains global statements:

i. This global statement identifies the access list, usually an access list number. This number
refers to the type of access list this will be. In Cisco IOS Release 11.2 or newer, access
lists for IP may also use an access list name rather than a number.

ii. The permit or deny term in the global access list statement indicates how packets that meet
the test conditions will be handled by Cisco IOS. Permit usually means the packet will be
allowed to use one or more interfaces that you will specify later.

iii. The final term or terms specifies the test conditions used by this access list statement. The
test can be as simple as checking for a single source address, but usually test conditions
are extended to include several test conditions. Use several global access list statements
with the same identifier to stack several test conditions into a logical sequence or list of
tests.

Router (config) # access-list acl-number {permits / deny} {conditions}


Step 2: Enable an interface to become part of the group that uses the specific access list. The
access list process uses an interface command. All the access list statements identified by the
access-list number associate with one or more interfaces. Any packets that pass the access list
test conditions can be permitted to use any interface in the access group of interfaces.

Router (config-if) # {protocol} access-group acl-number


Access lists are numbered (for IP, numbered or named)
How to identify Access Lists:

IP Standard 1 - 99

IP Extended 100-199
Named (Cisco IOS 11.2 and later)

IPX Standard 800 - 899

IPX SAP filters 1000 - 1099

Apple Talk 600 - 699

Number identifies the protocol and type

33
Other number ranges for most protocols
For TCP/IP packet filters, Cisco IOS access lists check the packet and upper-layer headers for:

i. Source IP addresses using standard access lists; identify these with a number in the range 1
to 99.

ii. Destination and source IP addresses or specific protocols using extended access lists;
identify these with a number in the range 100 to 199.

iii. Upper-level TCP or UDP port numbers in addition to the other tests in extended access
lists; also identify these with a number in the range 100 to 199.

iv. For all of these TCP/IP access lists, after a packet is checked for a match with the access
list statement, it can be denied or permitted to use an interface in the access group.

Key Concepts for IP Access Lists:

i. Standard lists (1-99) test conditions of all IP packets from source address

ii. Extended lists (100-199) can test conditions of:

a) Source and destination address

b) Specific TCP/IP-suite protocols

c) Destination ports

iii. Wildcard bits indicate how to check the corresponding address bits (0=check, 1=ignore)

Wildcard mask - 32-bit quantity used in conjunction with an IP address to determine which bits
in an IP address should be ignored when comparing that address with another IP address. A
wildcard mask is specified when setting up access lists.

i. A wildcard mask bit 0 means "check the corresponding bit value."

ii. A wildcard mask bit 1 means "do not check (ignore) that corresponding bit value."

NOTE: Wildcard masking for access lists operates differently from an IP subnet mask. A zero in
a bit position of the access list mask indicates that the corresponding bit in the address must be
checked; a one in a bit position of the access list mask indicates the corresponding bit in the
address is not 'interesting' and can be ignored.

How to use Wildcard mask bits -

i. IP access list test conditions:

34
Check for IP subnets: 172.30.16.0 to 172.30.31.0
Address and wildcard mask: 172.30.16.0 0.0.15.255

ii. Test condition: Ignore all the address bits (match any)

Accept any address: 0.0.0.0 255.255.255.255 (ignore all)


Abbreviate the expression using the key word "any"

iii. Test condition: Check all the address bits (match all)

Check for an IP host: 172.30.16.29 0.0.0.0 (check all bits)


Abbreviate the wildcard using the key word "host" followed by the IP address
8.4 Standard IP Access List configuration

1. List kept by Cisco routers to control access to or from the router for a number of services
(for example, to prevent packets with a certain IP address from leaving a particular
interface on the router).

2. Command that creates an entry in a standard traffic filter list.

3. Standard access lists filter based on a 'source address' and mask.

4. Standard access lists permit or deny the entire TCP/IP protocol suite.

Router (config) # access-list acl-number {permit / deny} source [mask]

1. Sets parameters for this list entry

2. IP standard access list 'acl-number' uses 1 - 99

3. Permit | deny - does this entry allow or block the specified address

4. source - source IP addresses

5. mask - 0s = must match, 1s = dont care positions

IP access-group - Command that links an existing access list to an outbound interface.

Router (config-if) # ip access-group acl-number {in | out}

1. Activates the list on an interface

2. acl-number - the number of the access list to be linked to this interface

35
3. in | out - Selects whether the access list is applied to the incoming or outgoing interface.
If in or out is not specified, out is the default

NOTE: To remove an access list, first enter the 'no ip access-group' command, including 'list
number', for each interface where the list had been used, then enter the 'no access-list' command
(with list number).

8.5 Extended IP Access List configuration


Allow more precise filtering conditions:

1. Check source and destination IP address

2. Specify an optional IP (TCP or UDP) protocol port number

3. Use access list number range 100 - 199

Well-Known IP Protocol Port Numbers (Decimal):

20 - File Transfer Protocol (FTP) data


21 - FTP program
23 - Telnet
25 - Simple Mail Transport Protocol (SMTP)
69 - Trivial File Transfer Protocol (TFTP)
53 - Domain Name System (DNS)
Router (config) # access-list acl-number {permit | deny} protocol
Source source-mask destination destination-mask
[Operator operand] [Established]

i. Sets parameters for this list entry

ii. IP uses a acl-list number in range 100 - 100

iii. Permit | deny - does this entry allow or block the specified address

iv. protocol - IP, TCP, UDP, ICMP, GRE, IGRP

v. source and destination - source and destination IP addresses

vi. masks - Wildcard mask; 0s = must match, 1s = dont care positions

vii. operator and operand - lt, gt, eq, neq (not equal), and a port number

viii. established - Allows TCP traffic to pass if packet uses an established connection (for
example, has ACK bits set)

36
IP access-group - Command that links an existing access list to an outbound interface. Only one
access list per port per protocol is allowed.

Router (config-if) # ip access-group acl-number {in | out}

i. Activates the extended list on an interface

ii. acl-number - the number of the access list to be linked to this interface

iii. In | out - Selects whether the access list is applied to the incoming or outgoing interface.
If in or out is not specified, out is the default

Router> show ip interface

Command that displays IP interface information and indicates whether any access lists are set.
(Monitor Access Lists)

Router> show access-lists

Command that displays the contents of all access lists. This Cisco IOS command provides more
details about the access list statements. By entering the access list name or number as an option
for this command, you can see a specific list. (Monitor Access List statements).

9. NETWORK ADDRESS TRANSLATION

37
NAT is the feature that can be enable in a Router, Firewall or a Pc. With the help of NAT, we are
able to translate network layer addresses that are IP addresses of packets. With the help of Port
Address Translation, we are also able to translate port nos present in transport layer header.
There are two reasons due to which we use NAT: -

(1) Conserve Live IP address

i. On Internet, there are limited no of IP addresses. If our Pc wants to communicate on


Internet then it should have a Live IP address assigned by our ISP. So that IP address
request will depend on no. of PCs that we want to connect on Internet. Due to this, there
will be a lot of wastage in IP addresses. To reduce wastage, we can share live IP
addresses between multiple PCs with the help of NAT.

ii. NAT enhances the network security by hiding PC & devices behind NAT.
9.1 Types of NAT:
Static NAT
This NAT is used for servers in which one Live IP is directly mapped to one Local IP. This NAT
will forward on the traffic for the Live IP to the Local PC in the n/w.

Dynamic NAT
Dynamic NAT is used for clients, which want to access Internet. The request from multiple
clients IPs is translated with the Live IP obtained from the Pool. It is also called Pool Based
Dynamic NAT.

Pool => 200.1.1.8 200.1.1.12/28


Local address => 172.16.X.X

38
Except => 172.16.0.5
172.16.0.6
172.16.0.7
9.2 Configuration NAT:
Router#conf terminal
Router (config) #int serial 0
Router (config-if) #ip nat outside
Router (config-if) #int eth 0
Router (config-if) #ip nat inside
Router (config-if) #exit
Router (config) #ip nat inside source static 172.16.0.7 200.1.1.3
Router (config) #ip nat inside source static tcp 172.16.0.5 80 200.1.1.4 80
Router (config) #ip nat inside source static udp 172.16.0.6 53 200.1.1.4 53
Router (config) #access-list 30 deny 172.16.0.5
Router (config) #access-list 30 deny 172.16.0.6
Router (config) #access-list 30 deny 172.16.0.7
Router (config) #access-list 30 permit any
Router (config) #ip nat pool abc 200.1.1.8 200.1.1.12 netmask 255.255.255.240
Router (config) #ip nat inside source list 30 pool abc overload

9.3Command for Basic NAT

Router (config) #ip nat inside source list 30 interface seen


<Exiting interface name>
To display NAT translation
Router #sh ip nat translations
(After ping any address, it shows ping details)

To clear IP NAT Translation


Router #clear ip nat Translation

10. InterVLAN Routing

39
Virtual LANs (VLANs) divide one physical network into multiple broadcast domains. But,
VLAN-enabled switches cannot, by themselves, forward traffic across VLAN boundaries. So
you need to have routing between these VLANs which is called InterVLAN routing

Configuration:

Interface FastEthernet0/1
Switch port access vlan 3
Interface FastEthernet0/2
Switch port access vlan 2
Interface FastEthernet0/3
Switch port access vlan 3
Interface FastEthernet0/4
Switch port access vlan 2
Interface FastEthernet0/12
Switch port trunk native vlan 99
Switch port trunk encapsulation dot1q
Switch port mode trunk
Interface FastEthernet0/13
Switch port trunk encapsulation dot1q

Switch port mode trunk interface Vlan2

Mac-address 0010.1196.1301
ip address 10.0.0.9 255.0.0.0
!
Interface Vlan3
Mac-address 0010.1196.1302
Ip address 20.0.0.9 255.0.0.0

40
11. Project Network design

In the network structure, there are three branches- BRANCH 1,BRANCH 2 and BRANCH 3.

a) BRANCH 1 has five departments- SERVER , DEPARTMENT 1 and DEPARTMENT


2.DEPARTMENT 3,DEPARTMENT 4.
b) SERVER has end devices connected to Cisco 2960 series Switch-SWITCH 1.
c) DEPARTMENT 1 has end devices connected to Cisco 2960 series Switch-SWITCH 2
d) DEPARTMENT 2 has end devices connected to Cisco 2960 series Switch-SWITCH 3.
e) DEPARTMENT 3 has end devices connected to Cisco 2960 series Switch-SWITCH 4.
f) DEPARTMENT 4 has end devices connected to Linksys WRT300N series wireless
devices 1.
g) SWITCH 1 ,SWITCH 2 and SWITCH 3, SWITCH 4 are connected via straight wires.
h) BRANCH 1 is connected to BRANCH 2 and BRANCH 3 via Cisco 2811 series Routers-
ROUER 0, ROUTER 1 , ROUTER 2 and ROUTER
i) Open shortest path first(OSPF) Protocol is configured on Routers.
j) Router 3 is connected to Router 1 and Router 2.
Router 0 is connected to Router 2.
k) IP phones is connected with SWICHES by end devices in all departments..

3.1 Hardware Used

i. Routers : Cisco 2811 Series.


ii. Switches : Cisco 2960 Series.
iii. Devices : Computers, Servers, IP phones.
iv. Other Media : Console cables, Ethernet cables, Serial
Cable
3.2 Software Used
i. Operating System : Windows 2003SERVER,Windows XP,
Windows7

41
ii. Front end tools : Cisco Packet Tracer, GNS3.

Device used in network


Router and switch:

Workgroup Switch

Workgroup switches add more intelligence to data transfer management.

Switches can determine whether data should remain on a LAN or not, and they can transfer the
data to the connection that needs that data.

42

9
Router
Routers have all capabilities of the previous devices. Routers can regenerate signals, concentrate
multiple connections, convert data transmission formats, and manage data transfers. They can
also connect to a WAN, which allows them to connect LANs that are separated by great distances

Device configuration:

Step 1: Cable the network as shown in the topology.


Attach the devices shown in the topology diagram and cable as necessary.

Step 2: Configure basic settings for the router and each switch.
Router to router:
10
To connectivity of router to router, first we have select serial ports from WIC 2T.

10

43
Router to switch: For connectivity of router to switch, we used straight wire at fast Ethernet
port Fat0/0 to Fat 0/1.

Switch to switch: For connectivity of switch to switch, we used straight wire at fast Ethernet
port Fat0/1 to Fat 0/3.

44
Switch to servers and IP phones : For connectivity of switch to servers and IP phones, we used
straight wire at fast Ethernet port.

45
Conclusion

The project VOIP (VOICE OVER INTERNET PROTOCOL) NETWORK is an effort to help
the readers understand the network scenario of corporate world. We thoroughly studied the
available hardware and software solutions available. In the market, before implementing them
in our project. Moreover we developed this project at minimal cost. This project will definitely
help users in some from or the either, since it has been developed keeping both. Ease of use
and understanding features in mind. We plan to future enhance this project, with help of various
users input too. Concluding compactly, through this project, we intend to serve the users the be
stand in turn serve ourselves for there is a profound sense of satisfaction and pride.
Voice over Internet Protocol (VoIP) is one of the hottest and most hyped technologies in the
communications industry. Businesses and consumers are already taking advantage of the cost
savings and new features of making calls over a converged voice-data network, and the logical
next step is to take those advantages to the wireless world. The most widely publicized benefit of
VoIP is the ability to save costs on long distance charges and to network multiple offices
together. Businesses that have a data connection between their offices can utilize VoIP
technology to bypass long distance networks and provide more efficient communications
between offices. In a traditional setting, someone would have to dial the phone number to a
branch office, possibly paying a long distance charge for the call, wait for a receptionist or
automated system to answer and then become connected to the party theyre trying to reach.
Using VoIP, a person can simply dial an extension number and be connected immediately to a
party in another office, whether across town or around the world avoiding costly long distance
charges.

A second benefit is in the design of many telephone systems, often called IP based systems.
Rather than traditional phone systems with their own wiring infrastructure, IP based systems use

46
a data network infrastructure. This convergence of voice and data into a single platform has
tremendous advantages in simplifying the administration of the communications network. Plus,
IP utilizes data infrastructure that most likely already exists in many companies.

A third benefit is the ability to have remote phones with a single telephone number. For example,
an employee could work out of their home in New York, utilizing a phone number with a
California area code. This enables corporations to truly take advantage of having a virtual office
and or remote agents working out of a variety of location

SCREENSHOTS

47
Interfaces:

48
Frame Relay Mapping:

DNS Server:

49
Command Prompt:

Command Line Interface:

50
Graphical User Interface:

51
Web Browser:

Future Enhancement

52
Voice over Internet Protocol (VoIP) is one of the hottest and most hyped technologies in the
communications industry. Businesses and consumers are already taking advantage of the cost
savings and new features of making calls over a converged voice-data network, and the logical
next step is to take those advantages to the wireless world. The most widely publicized benefit of
VoIP is the ability to save costs on long distance charges and to network multiple offices
together. Businesses that have a data connection between their offices can utilize VoIP
technology to bypass long distance networks and provide more efficient communications
between offices. In a traditional setting, someone would have to dial the phone number to a
branch office, possibly paying a long distance charge for the call, wait for a receptionist or
automated system to answer and then become connected to the party theyre trying to reach.
Using VoIP, a person can simply dial an extension number and be connected immediately to a
party in another office, whether across town or around the world avoiding costly long distance
charges.

A second benefit is in the design of many telephone systems, often called IP based systems.
Rather than traditional phone systems with their own wiring infrastructure, IP based systems use
a data network infrastructure. This convergence of voice and data into a single platform has
tremendous advantages in simplifying the administration of the communications network. Plus,
IP utilizes data infrastructure that most likely already exists in many companies.

A third benefit is the ability to have remote phones with a single telephone number. For example,
an employee could work out of their home in New York, utilizing a phone number with a
California area code. This enables corporations to truly take advantage of having a virtual office
and or remote agents working out of a variety of location

BLIOGRAPHY

53
Books
Todd Lammle by Cisco

Cisco Routing and Switching

Cisco press
Internet Source
www.google.com

www.cisco.com

www.learningnetwork.cisco.com

www.lifewire.com

54

You might also like