You are on page 1of 30

CONTENT

CHAPTER 1: INTRODUCTION 1.1Purpose of System 1.2Scope of the System 1.3 : THEORETICAL BACKGROUND 1.3.1Cisco Packet Tracer 1.3.2Network Topology 1.3.3Introduction To WAN Technologies CHAPTER 2: REQUIREMENTS AND ANALYSIS 2.1Functional Requirement 2.2 Non-Function Requirement 2.2.1 Feasibility report 2.2.2 Feasibility Considerations 2.2.3 Technical Feasibility 2.2.4 Economical Feasibility 2.2.5 Behavioral Feasibility 2.3 Risk analysis 2.4 Software and Hardware Requirements CHAPTER 3: SYSTEM DESIGN / EXPERIMENT DESIGN 3.1 system design 3.2 form layout screen layout

CHAPTER 4 : RESULTS AND DISCUSSION 4.1 Test Reports 4.2 Administrative Documentation

CHAPTER 5: CONCLUSIONS 5.1 conclusions 5.2 Limitations of the system 5.3 Future Scope of the Project

REFERENCES

Synopsis
On

COMMUNICATION SIMMULATION SYSTEM

TECHNOLOGY:CCNA
Submitted By: NAME : ROHIT

KUMAR SAHU ROLL. NO 0709213080 :

DEPARTMENT OF INFORMATION TECHNOLOGY

PRIYADARSHINI COLLEGE OF COMPUTER SCIENCES


CERTIFICATE
This is to certify that project report entitled COMMUNAICTION SIMMULATION SYSTEM submitted to UPTU,Lucknow in partial fulfillment of the requirement for the award of the degree of BACHELORE OF TECHNOLOGY is the work carried out by Mr./Ms Rohit kumar sahu, roll no. 0709213080 under my guidance. The matter in this project is authentic and is genuine work done by the student and has not been submitted either to this University or to any other University/ Institute for the fulfillment of the requirement of any course of study.

HOD

Signature of the guide

Date:

Name, Designation

(Mrs. Shamama Ahmed) Principal

INTRODUCTION

Introduction & Objective of Making This Project:A student specially technical student is expected to do some experimentation and research work on subject, which he though in the class textbook during the course of his studies. Such an effort when well organized with a definite aim or purpose is called a project. The object of a project is to envelop technical thinking and induced the student to make an ordinary analysis to the situation following at hand so as to search a definite conclusion. By doing project student display his spirit of inquiring creating & criticizing way of solving a problem through under standing of existing situation, independent thinking and ability to understand basic fact. The main objective of this project is to give a general exposure to real world network scenario that how the hierarchy of a company network is designed, implemented & executed.

Purpose of System

Transferring data from one place to another Cost reduce Time consuming Transmission rate is fast Low risk to transferring data so highly secure

Scope of the System

The project has a wide scope, as it is not intended to a particular organization. This project is going to develop generic network, which can be applied In any businesses organization. More over it provides facility to organization. With the help of the network we cam connect all the branches of company.we can transfer data with securlly and fastly.

THEORETICAL BACKGROUND

Cisco Packet Tracer


The Cisco Networking Academy program is designed to keep pace with the evolution of networking systems by providing innovative curricula and educational tools that help students understand the complexities of information and communication technologies (ICTs). Within this framework, the Cisco Packet Tracer e-learning software was developed to help Networking Academy students gain practical networking technology skills in a rapidly changing environment. Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask what if questions. As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts. Packet Tracer supplements physical equipment in the classroom by allowing students to create a network with an almost unlimited number of devices, encouraging practice, discovery, and troubleshooting. The simulation-based learning environment helps students develop 21st century skills such as decision making, creative and critical thinking, and problem solving.

Packet Tracer complements the Networking Academy curricula, allowing instructors to easily teach and demonstrate complex technical concepts and networking systems design. With Packet Tracer, instructors can customize individual or multiuser activities, providing hands-on lessons for students that offer value and relevance in their classrooms. Students can build, configure, and troubleshoot networks using virtual equipment and simulated connections, alone or in collaboration with other students. Most importantly, Packet Tracer helps students and instructors create their own virtual network worlds for exploration, experimentation, and explanation of networking concepts and technologies. The software is available free of charge to all Networking Academy instructors, students, and alumni.

Network Topology

Introduction To WAN Technologies

A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. the relationship between the common WAN technologies and the OSI model.

SPECIFIC REQUIREMENT

Functional Requirement:

In network engineering, a functional requirement defines a function of a system or its component. A function is described as a set of inputs, the behavior, and outputs. Functional requirements may be calculations, technical details, data manipulation and processing and other specific functionality that define what a system is supposed to accomplish. Behavioral requirements describing all the cases where the system uses the functional requirements are captured in use cases. Functional requirements are supported by non-functional requirements (also known as quality requirements), which impose constraints on the design or implementation (such as performance requirements, security, or reliability). How a system implements functional requirements is detailed in the system design.

Non-Function Requirement

FEASIBILITY REPORT: On the basis of result of the initial study, feasibility study takes place. The feasibility study is basically the test of the proposed system in the light of its workability, meeting users requirements, and effective use of resources and of course the cost effectiveness. The main goal of feasibility study is not to solve the problem but to achieve the scope. In the process of feasibility study, the cost and benefits are estimated with greater accuracy. Is the project technically, operationally, financially and legally feasible? The feasibility study is used to determine if the project should get the go-ahead. If the project is to proceed the feasibility study will produce a project plan and budget estimates for the future stages of development. The Feasibility Study is intended to determine whether a proposed system can meet the system requirements effectively. It may be initiated either as the result of a new system being proposed or from the analysis of problems perceived in an existing system. A Feasibility Study should consider both business and technical objectives.

Feasibility Considerations

Three keys Consideration are involved in the feasibility study:


Technical Feasibility Economical Feasibility Behavior Feasibility

Technical Feasibility Technical Feasibility centers around existing computer system (Hardware & Software) and to what extend it support the proposed addition. For Example if the current computer is operating at 80% capacity an arbitrary ceiling then running another application could over load the system or require additional hardware support. This involves financial considerations to commanded technical enhancement. If the budget is serious constraint, then the project judged not feasible. As regarding my project, it requires the extensive Java language programming and the Windows or Linux operating system. The required resources are easily available; it makes the project technically feasible.

Economical Feasibility

Economical analysis is the most frequently used method for evaluating the effectiveness of the candidate system. More commonly known as cost benefit analysis, the procedure is to determine the benefits in saving and savings that are expected from a candidate system and compare them with costs. If benefits outweigh cost then decision is made to design and implement the system. The project has been undertaken as the major project in MCA 6th semester. I play the role of System Analysts, Programmer, Developer and Tester and I have used the Java language for programming on Windows/Linux platform. According to above investigation the project is economically feasible. Behavioural Feasibility People are inherently resistant to change and computer has been known to facilitate change. An estimate should be made of how strong a reaction the user staff is likely to have towards the development of computerized system. It is common knowledge that computer installations have something to do with turnover, transfers, restarting and changing employee job status. Therefore it is understandable that the introduction of a candidate system requires special efforts to educate, seal and train the staff on new ways of conducting business. Once developed the software requires moderate training of the staff. Provided the easy to operate status of the project makes it very easy to achieve complete training of the bank staff. This makes the project behavioral feasible

RISK ANALYSIS

Types of risks
Risk are future uncertain events with a probability of occurrence and a potential for loss Risk identification and management are the main concerns in every software project. Effective analysis of software risks will help to effective planning and assignments of work. Risks are identified, classified and managed before actual execution of program. These risks are classified in different categories.

Categories of risks
Schedule Risk: Project schedule get slip when project tasks and schedule release risks are not addressed properly. Schedule risks mainly affect on project and finally on company economy and may lead to project failure. Schedules often slip due to following reasons:

Wrong time estimation Resources are not tracked properly. All resources like staff, systems, skills of individuals etc. Failure to identify complex functionalities and time required to develop those functionalities. Unexpected project scope expansions.

Budget Risk:

Wrong budget estimation. Cost overruns Project scope expansion

Operational Risks: Risks of loss due to improper process implementation, failed system or some external events risks. Causes of Operational risks:

Failure to address priority conflicts Failure to resolve the responsibilities Insufficient resources No proper subject training No resource planning No communication in team.

Technical risks: Technical risks generally leads to failure of functionality and performance. Causes of technical risks are:

Continuous changing requirements No advanced technology available or the existing technology is in initial stages. Product is complex to implement. Difficult project modules integration.

Programmatic Risks:

These are the external risks beyond the operational limits. These are all uncertain risks are outside the control of the program. These external events can be:

Running out of fund. Market development Changing customer product strategy and priority

Software and Hardware Requirements

Software requirement: Packet tracer

If any one want to implement this model in its organization then its requirements are Routers Switches Cables Systems (computers) Internet

SYSTEM DESIGN

Survey, feasibility study and system analysis the system analyst carries out all these three things. In this the user requirement is translated into technical design and program design, which involves database design and program design. The project is carried out with great efforts and efficiently, keeping in mind all the needs and demands of the user, easy to understand by the user. All the above three steps are checked and maintained. Designing and caring of the system has been taken with great responsibility. Thus a well- defined project has been designed to present and use.

TESTING

The aim of the testing process is to identify all defects existing in a networking system. However, for most practical system, even after satisfactorily carrying out the testing phase, it is not possible to guarantee that the network is error free. Even with this practical limitation of the testing process, we should not underestimate the importance of testing. We must remember that testing does expose many defects existing in a network system. Therefore we can safely conclude that testing provide a practical way of reducing defects in a system and increasing the users confidence in a developed system. Testing a program consists of subjecting the program to a set of test input (or test cases) and observing if the program behaves as expected. If the program fail to behave as expected, then the condition under which failure occur are noted for later debugging and correction. The following are some commonly used terms associated with testing.

A failure is a manifestation of an error (or defects or bug). But the A test case is the triplet [I, S, O], where I is the data input to the

mere presence of an error may not necessarily lead to a failure.

system, S is the state of the system at which the data is input, and O is the expected output of the system A test suite is the set of all test cases with which a given software production is to be tested.

Design of Testing :

Exhaustive testing of almost any non-trivial system is impractical due to the fact that the domain of input data value to mast practical software system is either extremely large or infinite. Therefore, we must design an optimal test suite that is of reasonable size and can uncover as many errors existing in the system as possible. Actually, if test cases are selected randomly, many of these randomly selected test cases contribute to the significance of the test suite.

Testing Level: Software productions are normally tested at the individual component level. This is referring to as testing in the small. After testing all the component individually, the component are slowly integrated and tested at each level of integration (integration testing). Finally, the fully integrated system is tested (called system testing). Integration and the system testing are known as testing in the large. Thus, a software product goes through three levels of testing:

Unit Testing Integration Testing System Testing

Unit testing is the testing of different units of a system in isolation. Many beginners ask: why test module in isolation first and then integrate these module and again test the integrated set of module-why not just integrated set of module once thoroughly? the answer to this question is the following: one reason why it is necessary to test a module in isolation is because of the fact that other modules with which this module needs to be interfaced may not be ready at the same time. also, it is always as good idea to first test the module in isolation before integration because it makes debugging easier, if an error is detected when a module is being tested along with several other modules, it would be difficult to determine which module exactly has the error. We discuss different level testing. Black-Box Testing In the black box testing, test cases are designed from an examination of the input/output value only and no knowledge of design or code is required. The following are the two main approaches to designing block-box testing cases. Equivalence class partitioning Boundary value analysis Lets us now elaborated these two test case design techniques.

Equivalence Class Partitioning


In this approach, the domain pf input values to a program is partitioned into set of equivalence classes. This partitioning is done such that the behavior of the program is similar to every input data belonging to the same equivalence class.

Boundary Value Analysis


A type of programming error frequently occurs at the boundaries of different equivalence class of inputs. The reason behind such error might purely be due to psychological factors. Programmers often fail to see the special processing required by the input values that lie at the boundary of different equivalence classes for example, programmers may improperly use <instead of <=, or conversely <= instead of <. Boundary value analysis leads to section of test cases at the boundaries of different equivalence class.

White-Box Testing There are several types of testing strategies. We will discuss some important ones in the following section. Each testing strategies is based on some heuristic. One white-box testing strategies is said to be stronger than another strategy, if all types of error detected by the first testing strategy (say B) are also detected by the second testing strategy (say A), and the second strategy additionally detects some more types of errors. When two testing strategies detect error that is different at least with respect to some types of errors, they are then called complimentary. The concept of stronger and complementary testing is schematically.
In the practical design of testing cases, if a stronger testing is performing, then the weaker testing need not be carried out. But using all the complementary testing strategies should enrich the test suite.

ADMINISTRATICVE MANUAL

1. To enter in enable mode use enable (en) command.

2. To enter configuration mode config t command.

3. For checking communication using ping +hostname command.

4. To check the route using traceroute + hostname command.

5. For telneting use telnet+ hostname command.

6. Administrator should be CCNA certified.

CONCLUSION

Networks are becoming a strategic cornerstone for organizations in every industry. As companies explore new global marketplaces and virtual organizations, they rely increasingly on electronic communication. Access to networks becomes a crucial component of business maneuvers in todays business environment. Consider the following examples which illustrate the vital role networks play today.

Comdata provides credit cards for long-haul truck drivers use in paying for fuel. With trucks continually on the road, the network that handles these transactions must be absolutely reliable, accurate, secure, and always available. To ensure reliability and cost-effective access to improved technology, Comdata outsourced its network to IBM, which has responsibility for hardware, network design, operation, management, and maintenance. Brunswick Outdoor Group was challenged with creating an infrastructure that would pull together its newly acquired units (American Camper,

Roadmaster, and Igloo). The company outsourced the project to Affiliated Computer Service to implement and manage a network connecting all of its facilities. It would have been cost prohibitive without the leverage of the outsourcer. Organizational demands are reliable, flexible, and scalable have put an enormous amount of pressure on internal IT infrastructure, which drives forward-thinking organizations to outsource their network design and management. Hands-on management is not possible for companies with multiple locations, nor can most companies retain qualified IT personnel to develop and maintain a winning network. Thus, the increase in outsourcing of networks.

References
Bibliography

CCNA certified by Tod Lemmle Cisco Networking Academy Program - CCNA [Dark Demon] CCNA exploration companion guide by bob vachon
CCNA Official Exam Certification by Wendell Odom

The Ultimate CCNA Study Package by Chris Bryant

Web-site

www.google.com www.gnu.com

www.wekipidia.org
www.programmerworld.netfirms.com www.simulationexams.com www.semsim.com www.2000trainers.com www.ccnatutorial.com/ www.ssuet.edu.pk/%7Eamkhan/

Limitations of the system


If gateway is not correct then system will not communicate to each other. If path not define then connection not establish.

If any cable connection is lose then connection in not established .

If any error in routers, connection loss will be occurred.

Future Scope of the Project

We can modify the system as per requirement of organization. We can increase the security in communication system. According to organization requirement, we can add different topologies in our project.

We can add many other services in topology, like V-LAN and ISDN etc.

ACKNOWLEDGEMENT
I would like to express my deep gratitude to my project supervisor, Mr. Mainejar Yadav for his guidance, suggestion and support throughout the project. He has been of tremendous help right from deciding of the project domain to the completion of the report. His constructive criticism of the approach to the problem and the result obtained during the course of this work has helped me to a great extent in bringing work to its present shape. I would also like to thank the Faculty of Information Technology, for giving me an opportunity to do my project for the partial fulfillment of the requirements for the degree of B.TECH. In UPTU, Lucknow.

Student Name: - Rohit kumar Sahu Roll. no.:- 0709213108 PCCS, Greater Noida

You might also like