SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1563
IMPLEMENTATION OF DYNAMIC INTERNETWORKING IN THE REAL
WORLD IT DOMAIN
Hemanth SM1, Yathish Babu MP2, Dr. Mary Cherian3, Mr. Pradeep Sagar BL4
1Technical student, Dept of Computer Science Engineering, Dr.AIT, Karnataka 560056, India
2Technical student, Dept of Computer Science Engineering, Dr.AIT, Karnataka 560056, India
3Proffesor, Dept of Computer Science Engineering, Dr.AIT, Karnataka 560056, India
4Technical Manager, Cisco BU, Inflow Technologies Pvt Ltd, Bengaluru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This project is aimed to measure the ease use of a network infrastructure we design, build and operate for an
organization. The project also aims to find out the general aspects of computer networking. For example: the devices, thephysical
or logical aspects of a computer network, as well as network topologies. This study briefly discusses the architecture of an
enterprise network. It examines the barriers to planning, designing and implementing an enterprise network. This study also
covers the methods to implement enterprise level networks. A basic router configuration is used for covering the Routing
technologies which route data between branches using protocols such as Routing Information Protocol (RIP), OpenShortestPath
First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP). A private address 172.16.0.0 networkissubnettedforthe
efficient use of addresses. Dynamic Host Configuration Protocol (DHCP) is configured on the server to automatically assign IP
addresses to hosts. Authentication is enabled using Challenge Handshake Authentication Protocol (CHAP). Access Control List
(ACL) and Domain Name System (DNS) are also configured in the topology.
Key Words: Network infrastructure, Organization, Enterprise, Protocol, Address.
1. INTRODUCTION
Enterprise network implementation is totally based on network. EnterprisesandlargeorganizationsuseITto makereliable
and secure communication including secure transfer of documents, files etc. In an enterprise, departments are separated for
good results which is why we included this characteristic in our project.Thistypeofnetwork avoidstheunauthorized access,it
authenticates the authorized users or hosts. This is done by ACLs as they filter traffic and provide security to the network. The
fundamental purpose of designing this scenario is to provide security in your network to secure your private data and make a
reliable and excellent communication in a WAN connection and reduce the organization dependency on floppy disks etc.
Organizations that share data through the use of floppydisks,DVDS,CDsetcfollowa non-efficientorcost-effective method.The
issue is that the business by using this method to share data leads to duplication of data which effects the growth of the
business. Another major issue is the lack of communication that is all details cannot be conveyed at the required time. The
scope of creating company network scenario is to have a secure WAN network forthecommunicationpurposeofan enterprise
that eradicate data redundancy from the grass root level which shows smooth functioning of a network.
1.1 Objectives
 The objective of this project is to help organizations to implement robust networking solution
 To build a sophisticated networking solution to meet the different organization’s demand
 To consider right networking components to build network from industry leading vendor Cisco
 To detail the skill set required to meet the next generation requirement.
1.2 Methodology
The steps used here are
i. Determine Requirements: The first step in deploying the Network Infrastructure is to determine the requirements
as determined by the client’s situation. This step involves: Analysing business operations to determine features and
functions needed,
Review options and determinetheimplicationsofeachalternativeanddefinethecomponentsthatmeetrequirements.
ii. Determine Solution Requirements: After the determinationoftherequirements,itis timetodefinethesolutionthat
meet these requirements. In this step, determination of thecomponentandcomponent optionsthatmeetthe business
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1564
and operational needs is addressed. The solution consists of the platforms and systems that make up thearchitecture
as well as the features, functions, and applications that provide the services required.
iii. Assess Network and Infrastructure Readiness: Network and infrastructure readiness assessment involves the
review and audit of all network infrastructure areas that will be affected by the deployment. The assessment is
performed at each site where the network solution will be deployed. Items to assessinclude:Network design(routing
and switching network), software, hardware, environment, network links and network services.
iv. Develop a Detailed Design: After developing the site requirements, it is time to develop a detailed design for the
system based on the requirements identified. The detailed design will address a wide variety of issuesregardingeach
component that will be implemented.
v. Developing Implementation Plan: Developing an implementation plan involves defining the processes requiredto
carry out the implementation of the system. Among the necessities considered during his step are the following key
factors: Accurate scheduling of any site-specific actions needed prior to implementation, equipment delivery and
staging, project phases and deadlines, acceptance criteria for each project phase etc.
vi. Stage and Configuring solution: Staging and configuring ofthesystemcanhelpmakefinal installationmoreefficient.
For this step, the following tasks are performed:
Assemble the components that will be installed at each site, perform basic testing of hardware and software and pre-
configure the devices.
vii. Install the Solution: Installing the system involves installing and re-configuring the network infrastructure and
installing and setting up the system components. After verifying the readinessofthe equipment,the followinggeneral
steps to install the solution is performed: Catalogue and inventory the system components, install the equipment in
data racks, complete cabling and other physical connectivity, verify that all units power up correctly and capture
installation-specific information.
1.3 Creation of the topology
We have created our topology using Cisco Packet Tracer software. We have considered our topology to be in two different
regions (branch and head office). We have divided branch office network intosevendepartments. Wehaveconsideredrouters,
switches, computers, DHCP server based on the requirements. Firstly, a private address 172.16.0.0 is sub netted for our
topology. The range of address used here are 172.16.0.0 – 172.16.208.0.DynamicHost Configuration Protocol (DHCP)hasbeen
configured on the server to automaticallyassignIPaddressestothehosts/computers.Routingprotocols(RIP,OSPF andEIGRP)
are configured on all the routers. Access control lists are configured to filter traffic in the network. There are two types of
access lists. Here in our topology we have configured named extended access list. The list does the following:
1. Denies FTP data (port 20) communication from ‘customer service’ to ‘sales.’
2. Denies ICMP communication from ‘marketing’ to ‘production’.
3. Denies telnet (port 23) communication from ‘research’ to ‘marketing’.
4. Denies IP communication from ‘accounting’ to ‘sales’.
5. Denies HTTP (port 80) communication from ‘production’ to ‘human resource’.
Authentication is done to ensure security on the head office router and branch office router. Telnet is also configured in our
topology to provide remote access. It is configured between router0of branchofficeandrouter3ofheadoffice.VLANSare also
configured in our topology to describe the importance of it in an enterprise. It is configured on the hosts in ‘research’
department (PCs 63, 65 and 66 belong to VLAN 10 and PCs 12, 13 and 20 belong toVLAN 20).VLANsdividebroadcastdomains
in a LAN environment. Whenever hosts in one VLAN need to communicate with hosts in another VLAN, the traffic must be
routed between them. This is known as inter-VLAN routing. Inter-VLAN routingcanbeachievedintwo ways:Traditional inter-
VLAN routing and outer-on-a-stick. In our topology we have configured router-on-a-stick in the research departmenttoallow
routing between two different VLANs.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1565
2. NETWORK TOPOLOGY
Fig -2: Network Topology
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1566
3. RESULT
3.1 DHCP configuration
On PC 4 of ‘Customer service’.
Fig -3.1: DHCP
3.2 Routing Protocol:
Result of ‘show Ip protocols’ command in router 1
Fig -3.2.1: EIGRP
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1567
Fig -3.2.2: RIPv2
Fig -3.2.3: OSPF
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1568
Result of ‘show ip route’ command in router 1
Fig -3.2.4: Routing table
Fig -3.2.5: Routing table continued
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1569
3.3 Pinging:
Successful communication from PC 18 ‘marketing’ to another region of topology (head office).
Fig -3.3: Pinging
3.4 Access control list:
Successful denial of communication from marketing to production.
Fig -3.4: Access Control List
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1570
3.5 VLAN Communication:
Successful communication between PC 12 and PC 66 (Inter-VLAN routing).
Fig -3.5: VLAN Communication
3.6 Telnet:
Successful communication from PC 1 of head office to router 0 of branch office.
Fig -3.6: Telnet
4. CONCLUSION
Inconclusion,a network istwoormorecomputersconnectedtogetherusinga telecommunicationsystemforthepurposeof
communicatingandsharing resources. Withouthavinga network,Companies would not beabletoshare resourcesandincrease
productivity more effectively. The WAN network allowed companies to use the Internet over large areas. This provided the
company to have meetings overseas by video conferencing and sharing data over the network. As you can see, Networks have
many benefits to the end user. Weather Network is Wired or Wireless, Networks are an important part of technology. My project
shows howdynamicallya network operatesinreal timescenarioandmostofthenetworkingdevices inreal timeITworldis from
Ciscoand my project shows how effectively and efficientlya network operates and communicates withcisco networking devices.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1571
REFERENCES
[1] Comer, Douglas (2000). Internetworking with TCP/IP: Principles, Protocols, and Architectures – 4th ed. Upper Saddle
River, NJ: Prentice Hall. p. 394. ISBN 0-13-018380-6.
[2] S. Floyd & V. Jacobson, “The Synchronization of Periodic Routing Messages”, April 1994
[3] “PORT NUMBERS”, The Internet Assigned Numbers Authority (IANA), May 2008
[4] “Network Security Basics”, 7 May 2004 by Robyn Aber
[5] IEEE 802.1Q-2011, 1. Overview
[6] IEEE 802.1Q-2011, 1.4 VLAN aims and benefits
[7] RFC 760, DOD Standard Internet Protocol (January 1980)
[8] Internet Protocol-DARPA Internet Program Protocol Specification. September 1981. p. 7. RFC 791.
[9] "Net Acuity Edge Offers Hyper-local IP targeting" Retrieved 201112-10.
[10] Groth, David; Toby Skandier (2005). Network+ Study Guide, Fourth Edition. Sybex, Inc. ISBN 0-7821-4406-3.
[11] ATIS committee PRQC. "meshtopology".ATISTelecomGlossary2007.AllianceforTelecommunicationsIndustrySolutions.
Retrieved 2008-10-10.

More Related Content

PDF
En35793797
PPT
Capstone Presentation For Five Rivers Medical Centers
DOC
PPTX
ITT CNS Capstone Project
PPT
Completed+Presentation+Capstone
DOCX
Resume for Wintel Admin- Naveen Gupta
PDF
White Paper on SNMPv3
PPT
Network Developement Capstone Project 2009 Sping Quarter
En35793797
Capstone Presentation For Five Rivers Medical Centers
ITT CNS Capstone Project
Completed+Presentation+Capstone
Resume for Wintel Admin- Naveen Gupta
White Paper on SNMPv3
Network Developement Capstone Project 2009 Sping Quarter

What's hot (20)

DOCX
Robert clarkresumefd
DOC
PDF
Angelo Bryan Santos Bondoc-CV
DOCX
Carlos Morales 2016v3_sinRef
DOC
Resume_Karthikeyan SR
DOCX
Rajesh Gurunathan - Network security & Arcsight
PPT
Capstone Powerpoint
DOC
CV_Sandeeps_Sinha
DOC
jagdeep singh
PDF
Evolve automation v1.01 - White Paper
DOCX
Design Scenario Network Analysis & Design
PPTX
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
PDF
Profile -Sandeep Thakare
PDF
CV Ritesh Dubai
PPTX
ITT - Tech CNS Captstone Project
DOCX
CLARK ROBERT FINAL
PPTX
The Greenway Bank Presentation
DOCX
SHRUTHI SHARMA MS
PDF
Juther Jones CCNP 12
DOCX
Nayan sharma
Robert clarkresumefd
Angelo Bryan Santos Bondoc-CV
Carlos Morales 2016v3_sinRef
Resume_Karthikeyan SR
Rajesh Gurunathan - Network security & Arcsight
Capstone Powerpoint
CV_Sandeeps_Sinha
jagdeep singh
Evolve automation v1.01 - White Paper
Design Scenario Network Analysis & Design
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
Profile -Sandeep Thakare
CV Ritesh Dubai
ITT - Tech CNS Captstone Project
CLARK ROBERT FINAL
The Greenway Bank Presentation
SHRUTHI SHARMA MS
Juther Jones CCNP 12
Nayan sharma
Ad

Similar to IRJET- Implementation of Dynamic Internetworking in the Real World it Domain (20)

PPT
Saidul
PDF
Network assignment on project design
PPTX
network engi بحث جميل للفائده القصوى ليت
PPT
Chapter03
PPTX
Corporation Tech
PDF
Learning SD-WAN with Cisco: Transform Your Existing WAN Into a Cost-effective...
DOCX
Option #1 Mastery Finance CalculationsProblem 1Hologram Corpo.docx
DOCX
Enterprise network
PPT
Slides of Chapter 3 network design and management book
PDF
Bcc network connection
DOCX
IT327-1404A-01 Implementing, Managing and Mainta.docx
PPTX
Designing network topology.pptx
PPTX
IT Infrastructure Project
PPTX
Chapternetworkdesign d1 [Autosaved].pptx
PDF
FINAL REPORT ON ENTERPRISE NETWORK
PPS
Pmw2 k3ni 1-1b
DOCX
2232016 Sample Implementation Plan1.htmlfileCUsers.docx
PDF
Diseño de red isp cisco
PDF
Exam Ref 70413 Designing And Implementing A Server Infrastructure Steve Suehring
PDF
1. Lecturer 1 - Computer Network Design.pdf
Saidul
Network assignment on project design
network engi بحث جميل للفائده القصوى ليت
Chapter03
Corporation Tech
Learning SD-WAN with Cisco: Transform Your Existing WAN Into a Cost-effective...
Option #1 Mastery Finance CalculationsProblem 1Hologram Corpo.docx
Enterprise network
Slides of Chapter 3 network design and management book
Bcc network connection
IT327-1404A-01 Implementing, Managing and Mainta.docx
Designing network topology.pptx
IT Infrastructure Project
Chapternetworkdesign d1 [Autosaved].pptx
FINAL REPORT ON ENTERPRISE NETWORK
Pmw2 k3ni 1-1b
2232016 Sample Implementation Plan1.htmlfileCUsers.docx
Diseño de red isp cisco
Exam Ref 70413 Designing And Implementing A Server Infrastructure Steve Suehring
1. Lecturer 1 - Computer Network Design.pdf
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
DOCX
573137875-Attendance-Management-System-original
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
web development for engineering and engineering
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
PPT on Performance Review to get promotions
PDF
Digital Logic Computer Design lecture notes
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Automation-in-Manufacturing-Chapter-Introduction.pdf
bas. eng. economics group 4 presentation 1.pptx
Internet of Things (IOT) - A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Model Code of Practice - Construction Work - 21102022 .pdf
573137875-Attendance-Management-System-original
R24 SURVEYING LAB MANUAL for civil enggi
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Embodied AI: Ushering in the Next Era of Intelligent Systems
OOP with Java - Java Introduction (Basics)
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Foundation to blockchain - A guide to Blockchain Tech
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
web development for engineering and engineering
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT on Performance Review to get promotions
Digital Logic Computer Design lecture notes

IRJET- Implementation of Dynamic Internetworking in the Real World it Domain

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1563 IMPLEMENTATION OF DYNAMIC INTERNETWORKING IN THE REAL WORLD IT DOMAIN Hemanth SM1, Yathish Babu MP2, Dr. Mary Cherian3, Mr. Pradeep Sagar BL4 1Technical student, Dept of Computer Science Engineering, Dr.AIT, Karnataka 560056, India 2Technical student, Dept of Computer Science Engineering, Dr.AIT, Karnataka 560056, India 3Proffesor, Dept of Computer Science Engineering, Dr.AIT, Karnataka 560056, India 4Technical Manager, Cisco BU, Inflow Technologies Pvt Ltd, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This project is aimed to measure the ease use of a network infrastructure we design, build and operate for an organization. The project also aims to find out the general aspects of computer networking. For example: the devices, thephysical or logical aspects of a computer network, as well as network topologies. This study briefly discusses the architecture of an enterprise network. It examines the barriers to planning, designing and implementing an enterprise network. This study also covers the methods to implement enterprise level networks. A basic router configuration is used for covering the Routing technologies which route data between branches using protocols such as Routing Information Protocol (RIP), OpenShortestPath First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP). A private address 172.16.0.0 networkissubnettedforthe efficient use of addresses. Dynamic Host Configuration Protocol (DHCP) is configured on the server to automatically assign IP addresses to hosts. Authentication is enabled using Challenge Handshake Authentication Protocol (CHAP). Access Control List (ACL) and Domain Name System (DNS) are also configured in the topology. Key Words: Network infrastructure, Organization, Enterprise, Protocol, Address. 1. INTRODUCTION Enterprise network implementation is totally based on network. EnterprisesandlargeorganizationsuseITto makereliable and secure communication including secure transfer of documents, files etc. In an enterprise, departments are separated for good results which is why we included this characteristic in our project.Thistypeofnetwork avoidstheunauthorized access,it authenticates the authorized users or hosts. This is done by ACLs as they filter traffic and provide security to the network. The fundamental purpose of designing this scenario is to provide security in your network to secure your private data and make a reliable and excellent communication in a WAN connection and reduce the organization dependency on floppy disks etc. Organizations that share data through the use of floppydisks,DVDS,CDsetcfollowa non-efficientorcost-effective method.The issue is that the business by using this method to share data leads to duplication of data which effects the growth of the business. Another major issue is the lack of communication that is all details cannot be conveyed at the required time. The scope of creating company network scenario is to have a secure WAN network forthecommunicationpurposeofan enterprise that eradicate data redundancy from the grass root level which shows smooth functioning of a network. 1.1 Objectives  The objective of this project is to help organizations to implement robust networking solution  To build a sophisticated networking solution to meet the different organization’s demand  To consider right networking components to build network from industry leading vendor Cisco  To detail the skill set required to meet the next generation requirement. 1.2 Methodology The steps used here are i. Determine Requirements: The first step in deploying the Network Infrastructure is to determine the requirements as determined by the client’s situation. This step involves: Analysing business operations to determine features and functions needed, Review options and determinetheimplicationsofeachalternativeanddefinethecomponentsthatmeetrequirements. ii. Determine Solution Requirements: After the determinationoftherequirements,itis timetodefinethesolutionthat meet these requirements. In this step, determination of thecomponentandcomponent optionsthatmeetthe business
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1564 and operational needs is addressed. The solution consists of the platforms and systems that make up thearchitecture as well as the features, functions, and applications that provide the services required. iii. Assess Network and Infrastructure Readiness: Network and infrastructure readiness assessment involves the review and audit of all network infrastructure areas that will be affected by the deployment. The assessment is performed at each site where the network solution will be deployed. Items to assessinclude:Network design(routing and switching network), software, hardware, environment, network links and network services. iv. Develop a Detailed Design: After developing the site requirements, it is time to develop a detailed design for the system based on the requirements identified. The detailed design will address a wide variety of issuesregardingeach component that will be implemented. v. Developing Implementation Plan: Developing an implementation plan involves defining the processes requiredto carry out the implementation of the system. Among the necessities considered during his step are the following key factors: Accurate scheduling of any site-specific actions needed prior to implementation, equipment delivery and staging, project phases and deadlines, acceptance criteria for each project phase etc. vi. Stage and Configuring solution: Staging and configuring ofthesystemcanhelpmakefinal installationmoreefficient. For this step, the following tasks are performed: Assemble the components that will be installed at each site, perform basic testing of hardware and software and pre- configure the devices. vii. Install the Solution: Installing the system involves installing and re-configuring the network infrastructure and installing and setting up the system components. After verifying the readinessofthe equipment,the followinggeneral steps to install the solution is performed: Catalogue and inventory the system components, install the equipment in data racks, complete cabling and other physical connectivity, verify that all units power up correctly and capture installation-specific information. 1.3 Creation of the topology We have created our topology using Cisco Packet Tracer software. We have considered our topology to be in two different regions (branch and head office). We have divided branch office network intosevendepartments. Wehaveconsideredrouters, switches, computers, DHCP server based on the requirements. Firstly, a private address 172.16.0.0 is sub netted for our topology. The range of address used here are 172.16.0.0 – 172.16.208.0.DynamicHost Configuration Protocol (DHCP)hasbeen configured on the server to automaticallyassignIPaddressestothehosts/computers.Routingprotocols(RIP,OSPF andEIGRP) are configured on all the routers. Access control lists are configured to filter traffic in the network. There are two types of access lists. Here in our topology we have configured named extended access list. The list does the following: 1. Denies FTP data (port 20) communication from ‘customer service’ to ‘sales.’ 2. Denies ICMP communication from ‘marketing’ to ‘production’. 3. Denies telnet (port 23) communication from ‘research’ to ‘marketing’. 4. Denies IP communication from ‘accounting’ to ‘sales’. 5. Denies HTTP (port 80) communication from ‘production’ to ‘human resource’. Authentication is done to ensure security on the head office router and branch office router. Telnet is also configured in our topology to provide remote access. It is configured between router0of branchofficeandrouter3ofheadoffice.VLANSare also configured in our topology to describe the importance of it in an enterprise. It is configured on the hosts in ‘research’ department (PCs 63, 65 and 66 belong to VLAN 10 and PCs 12, 13 and 20 belong toVLAN 20).VLANsdividebroadcastdomains in a LAN environment. Whenever hosts in one VLAN need to communicate with hosts in another VLAN, the traffic must be routed between them. This is known as inter-VLAN routing. Inter-VLAN routingcanbeachievedintwo ways:Traditional inter- VLAN routing and outer-on-a-stick. In our topology we have configured router-on-a-stick in the research departmenttoallow routing between two different VLANs.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1565 2. NETWORK TOPOLOGY Fig -2: Network Topology
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1566 3. RESULT 3.1 DHCP configuration On PC 4 of ‘Customer service’. Fig -3.1: DHCP 3.2 Routing Protocol: Result of ‘show Ip protocols’ command in router 1 Fig -3.2.1: EIGRP
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1567 Fig -3.2.2: RIPv2 Fig -3.2.3: OSPF
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1568 Result of ‘show ip route’ command in router 1 Fig -3.2.4: Routing table Fig -3.2.5: Routing table continued
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1569 3.3 Pinging: Successful communication from PC 18 ‘marketing’ to another region of topology (head office). Fig -3.3: Pinging 3.4 Access control list: Successful denial of communication from marketing to production. Fig -3.4: Access Control List
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1570 3.5 VLAN Communication: Successful communication between PC 12 and PC 66 (Inter-VLAN routing). Fig -3.5: VLAN Communication 3.6 Telnet: Successful communication from PC 1 of head office to router 0 of branch office. Fig -3.6: Telnet 4. CONCLUSION Inconclusion,a network istwoormorecomputersconnectedtogetherusinga telecommunicationsystemforthepurposeof communicatingandsharing resources. Withouthavinga network,Companies would not beabletoshare resourcesandincrease productivity more effectively. The WAN network allowed companies to use the Internet over large areas. This provided the company to have meetings overseas by video conferencing and sharing data over the network. As you can see, Networks have many benefits to the end user. Weather Network is Wired or Wireless, Networks are an important part of technology. My project shows howdynamicallya network operatesinreal timescenarioandmostofthenetworkingdevices inreal timeITworldis from Ciscoand my project shows how effectively and efficientlya network operates and communicates withcisco networking devices.
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1571 REFERENCES [1] Comer, Douglas (2000). Internetworking with TCP/IP: Principles, Protocols, and Architectures – 4th ed. Upper Saddle River, NJ: Prentice Hall. p. 394. ISBN 0-13-018380-6. [2] S. Floyd & V. Jacobson, “The Synchronization of Periodic Routing Messages”, April 1994 [3] “PORT NUMBERS”, The Internet Assigned Numbers Authority (IANA), May 2008 [4] “Network Security Basics”, 7 May 2004 by Robyn Aber [5] IEEE 802.1Q-2011, 1. Overview [6] IEEE 802.1Q-2011, 1.4 VLAN aims and benefits [7] RFC 760, DOD Standard Internet Protocol (January 1980) [8] Internet Protocol-DARPA Internet Program Protocol Specification. September 1981. p. 7. RFC 791. [9] "Net Acuity Edge Offers Hyper-local IP targeting" Retrieved 201112-10. [10] Groth, David; Toby Skandier (2005). Network+ Study Guide, Fourth Edition. Sybex, Inc. ISBN 0-7821-4406-3. [11] ATIS committee PRQC. "meshtopology".ATISTelecomGlossary2007.AllianceforTelecommunicationsIndustrySolutions. Retrieved 2008-10-10.