Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
78 views23 pages

Sl. No. List of Contents Page No. 3 4 5: 1 Department of Tce, Dsce

The document discusses implementing OSPF on a computer network using the GNS3 simulation tool. It provides an overview of Konigtronics PVT Ltd, the company conducting the study. It then introduces computer networks and OSPF routing protocol. It describes the GNS3 software, how it works, and its advantages for network simulation. It also outlines the steps to install GNS3 and use it to simulate a network running OSPF.

Uploaded by

vishesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views23 pages

Sl. No. List of Contents Page No. 3 4 5: 1 Department of Tce, Dsce

The document discusses implementing OSPF on a computer network using the GNS3 simulation tool. It provides an overview of Konigtronics PVT Ltd, the company conducting the study. It then introduces computer networks and OSPF routing protocol. It describes the GNS3 software, how it works, and its advantages for network simulation. It also outlines the steps to install GNS3 and use it to simulate a network running OSPF.

Uploaded by

vishesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

COMPUTER NETWORKS:

IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Sl. No. LIST OF CONTENTS Page No.


1. Chapter 1. Konigtronics PVT. Ltd. Company 3
overview
2. Chapter 2. Introduction to Network 4
3. Chapter 3. Software Description 5
4. 3.1. GNS3 Tool 5

5. 3.2. Steps to install GNS3 Tool 6

6. 3.3. Advantages 7

7. Chapter 4. OSI Layers 8


8. 4.1. Functions in OSI Model 8

9. 4.2. Need for Different Layers 12

10. Chapter 5.Internet Protocol Suite 13


11. 5.1. Telnet 14

12. 5.2. Internet Protocol 15

13. Chapter 6. Narration 17


14. 6.1. Dijkstra’s Algorithm 18

15. 6.1.1. Algorithm 19

16. 6.2. Network 20

17. 6.2.1. Problem statement 21

18. 6.2.2. Setting CTY, TTY, AUX and VTY password 22

19. Chapter 7. Self Evaluation 23

1
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

SL No. List of Figures and Tables Page No.

1. Fig 1. GNS3 Tool Software 5

2. Fig 2. Working of Different layers 9

3. Fig 3. OSI Layer Architecture 10

4. Fig 4. Layer wise Diagram 11

5. Fig 5. TCP/IP Protocol Suite 12

6. Fig 6. Example of Dijkstra’s Algorithm 17

7. Fig 7. Network of Interest 19

8. Table 1. RIP Commands 14

2
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

CHAPTER 1
COMPANY OVERVIEW

Konigtronics (OPC) Pvt.Ltd. was started on August 2016 by Mr. Vishesh S B.E


(telecom), MBA, PGDIB., to educate students and the public on innovative methods of
research and development in the field  of Engineering and Technology. Konigtronics has
conducted many technical workshops on topics like Embedded systems, IoT (Internet of
Things), cloud computing,network simulation and entrepreneurship. Konigtronics has
now extended its service in the field of real-estate, career planning and entrepreneurship.
The company is located in a prime location in central Bangalore and as many as 5
dedicated engineers working in it. Also there are many engineering students undergoing
internship from Konigtronics, Konigtronics has till now guided 2000+
students/professionals in their projects and research works.

The MD of the company is Vishesh S. He hails from Bangalore, Karnataka, India. He


has completed B.E in Telecommunication Engineering from VTU, Belgaum, Karnataka
in 2015. His research interests include Embedded Systems, Wireless Communication,
BAN and Medical Electronics. He is also the Founder and Managing Director of the
corporate company Konigtronics Private Limited. He has guided over a hundred
students/interns/professionals in their research work and projects. He is also the co-author
of many International Research Papers. He is currently pursuing his MBA in e-Business
and PG Diploma in International Business. Presently Konigtronics Private Limited has
extended its services in the field of Software Engineering and Webpage Designing.
Konigtronics also conducts technical and non-technical workshops on various topics.

Konigtronics (opc) Private Limited is an Indian Non-Government Company. It's a one


person company company and is classified as 'company limited by shares'.Company's
authorized capital stands at Rs 0.5 lakhs and has 100.0% paid-up capital which is Rs
0.5lakhs. Konigtronics (opc) Private Limited is majorly in Community, personal & Social
Services business and currently company operations are active.

3
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

CHAPTER 2
INTRODUCTION TO NETWORK

A network can be classified into the following based on their span:

 PAN- Personal Area Network


 LAN- Local Area Network
 WAN- Wide Area Network
 MAN- Metropolitan Area Network
 Global Network
 Open Shortest Path First Routing Protocol (OSPF) configured on routers to effectively
move packets around the computer network. OSPF uses the Dijkstra shortest path first
algorithm to determine the shortest path in the network. OSPF follows the Link-state
routing protocol.
 Each router establishes a relationship-an adjacency-with each of its neighbours.
 Each router sends Link State Advertisements (LSAs) and each OSPF area is flooded
with Link State Advertisements
 Each router stores a copy of all the LSAs it has seen in a database.
 The completed topological database, called the Link-state database, describes a graph of
the internetwork. Using the Dijkstra algorithm [1] the shortest path is calculated and
routing table is updated.

The OSPF process builds and maintains three separate tables:

 Neighbour table
 Topology table
 Routing table

4
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

CHAPTER 3

SOFTWARE DESCRIPTION

3.1.GNS3 Tool

Fig 1: GNS 3 TOOL SOFTWARE

Graphical Network Simulator-3 (shortened to GNS3) is


a network software emulator first released in 2008.It allows the combination of virtual
and real devices, used to simulate complex networks. Originally developed as tool for
Cisco networking, GNS3 (short for Graphical Network Simulator) has developed into a
multi-vendor network simulator. GNS3 was initially developed by a university student on
top of Dynamips as a means of emulating Cisco software, the interface was developed as
a means to design and configure networks. However, thanks to networking professionals
looking for a tool to learn more about networking and testing their ideas and to prepare
for the rigorous Cisco certification exams the software has been downloaded more than
11 million times since 2008.

5
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

GNS3 combines the best features of existing emulation software (such as Dynamips and
Qemu) into a GU

I interface and allows to create an unlimited number of Cisco routing-and-switching lab


scenarios. Because truly learning about routing and switching requires some hands-on
practice and again, most people and companies can’t afford to invest in all of the
equipment necessary to test dozens of different scenarios GNS3 is a viable option.
There’s no need to customize the software at all, and can work within the main window
to drag and drop different network components such as routers, firewalls, switches, etc.,
into the networking area, and then try different connections between them that meet the
network standards.

Best of all, GNS3 is free. The open-source software is compatible with all Windows
machines, and comes in a bundle that includes additional tools such as Putty, SuperPutty,
Wireshark, and WinPcap.We can also access a free license for a Solarwinds toolset;
knowing how to use Solarwinds is becoming a more important skill, so it’s worth
checking out what GNS3 has to offer.

3.2.STEPS TO INSTALL GNS3 TOOL

 Go to GNS3 official website (gns3.com) from your favorite web browser.


 You must Sign Up and Login before any download. So, Sign Up and Login with your
personal information.
 Now click on DOWNLOAD menu item. GNS3 current version (now it is 2.1.9)
information will appear with a download button. Click on this Download button. GNS3
download pop up window will appear where installer file for major three operating
systems will be found.
 Click on Download button under Window operating system. Within a few seconds your
download will be started. The installer file (GNS3-2.1.9-all-in-one.exe) size is about 54.5
MB.
 Click twice on your downloaded GNS3 Windows installer file (GNS3-2.1.9-all-in-
one.exe). A security warning window will appear. Inside this window, click on Run
button.

6
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

 GNS3-2.1.9 Setup starting window will appear to welcome you. Nothing to do in this
window. Just click on Next button.
 License Agreement window will appear. Accept the license agreement clicking the I
Agree button.
 Choose Start Menu Folder window will appear. Keep default name (GNS3) or if you
wish you can change it. Click on Next button.
 Choose Components window will appear where available GNS3 features will be listed.
Among these features uncheck only Wireshark, SolarWinds Response and Npcap
features because initially we don’t require these features. Now click Next button.
 Choose Install Location window will appear. Keep default location or if you wish you
can change browsing destination folder. Now click Install button.
 GNS3 features installation will be started and installation progress will be found on
progress bar. During GNS3 installation, WinPCAP installation will be appeared
separately. Follow some easy instructions as indicated. Also keep your internet
connection OK because virt-viewer will be downloaded during GNS3 installation.
 Within a few minutes, GNS3 installation will be completed and Installation Complete
window will appear with success message. Click Next button from this window.
 Solarwinds Standards Toolset window will appear. We don’t need any toolset now. So,
click on No radio button and then click on Next button.
 GNS3 Setup close window will appear. Click Finish button. GNS3 installation will be
finished and GNS3 will start to run now.

3.3.ADVANTAGES

 GNS3 is an open source, free program.


 Can simulate complex network.
 Simulated topology can be connected to real world.
 You can take packet capture between devices on your lab.
 Other devices and vendors are also supported.

7
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

CHAPTER 4

OSI LAYERS

The Open Systems Interconnection model (OSI model) is a conceptual model that


characterizes and standardizes the communication functions of a telecommunication or
computing system without regard to its underlying internal structure and technology. Its
goal is the interoperability of diverse communication systems with
standard communication protocols. The model partitions a communication system
into abstraction layers. The original version of the model had seven layers.

4.1. Functions in OSI model

Functions that are needed for proper communication can be divided into 2 types :-

1. Mandatory functions:
Here the implementation of the functions is not optional, i.e., it means these functions
must be implemented for proper communication.
 Error Control.
 Flow Control.
 Access Control.
 Multiplexing and De-Multiplexing.
 Addressing etc
2. Optional functions:
Here the implementation of the functions are optional, i.e., it means these functions are
not must.
 Encryption/Decryption.
 Check pointing.
 Routing etc
Routing is optional we can sustain in Computer networks even by using Flooding.

4.2. NEED FOR DIFFERENT LAYERS

8
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Now the reasons ISO-OSI model says to group together similar functions, here we will
be explaining why exactly we need different layer for efficient routing.

1. Every layer can implement the similar functions and every layer can perform some
specific tasks.
2. It would even help in grouping all the variables together used in those similar functions,
thus this would protect the variables in a layer and are not scattered all over the layers (so
it’s kind of Encapsulation).
3. Now as every layer is performing their some specific task so we are cornered about our
layer only and not in how under-lying layer is implemented (so its kind of Abstraction).
In simple words, we can say we are concerned only about what function we get from a
layer and not how we get that.
4. It helps in Testing, it means each layer can be tested separately thus it would be easy to
find errors if present any.

Fig2 : WORKING OF DIFFERENT LAYERS

9
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Fig 3: OSI LAYER ARCHITECHURE

A layer serves the layer above it and is served by the layer below it. For example, a layer
that provides error-free communications across a network provides the path needed by
applications above it, while it calls the next lower layer to send and receive packets that
constitute the contents of that path. Two instances at the same layer are visualized as
connected by a horizontal connection in that layer.

The model is a product of the Open Systems Interconnection project at the International


Organization for Standardization (ISO).

10
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Fig 4: LAYER WISE DIAGRAM

11
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

CHAPTER 5
INTERNET PROTOCOL SUITE

Internet Protocol, or just IP, is a TCP/IP network layer protocol for addressing and
routing packets of data between hosts on a TCP/IP network. Internet Protocol (IP) is a
connectionless protocol that provides best-effort delivery using packet-switching
services.

Fig 5: TCP/IP PROTOCOL SUITE

12
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

5.1.TELNET
Telnet, developed in 1969, is a protocol that provides a command line interface for
communication with a remote device or server, sometimes employed for remote
management but also for initial device setup like network hardware. Telnet stands for
Teletype Network, but it can also be used as a verb; 'to telnet' is to establish a connection
using the Telnet protocol.Because it was developed before the mainstream adaptation of
the internet, telnet on its own does not employ any form of encryption, making it
outdated in terms of modern security. It has largely been overlapped by Secure Shell
(SSH) protocol, at least on the public internet.

5.2.INTERNET PROTOCOL

The Internet Protocol (IP) is the principal communications protocol in the Internet


protocol suite for relaying datagrams across network boundaries. Its routing function
enables internetworking, and essentially establishes the Internet.

IP has the task of delivering packets from the source host to the destination host solely
based on the IP addresses in the packet headers. It also defines addressing methods that
are used to label the datagram with source and destination information.

Historically, IP was the connectionless datagram service in the original Transmission


Control Program introduced by Vint Cerf and Bob Kahn in 1974, which was
complemented by a connection-oriented service that became the basis for
the Transmission Control Protocol (TCP). The Internet protocol suite is therefore often
referred to as TCP/IP.

The Internet Protocol is responsible for addressing host interfaces, encapsulating data


into datagrams and routing datagrams from a source host interface to a destination host
interface across one or more IP networks. For these purposes, the Internet Protocol
defines the format of packets and provides an addressing system.

Each datagram has two components: a header and a payload. The IP header includes


source IP address, destination IP address, and other metadata needed to route and deliver
the datagram. The payload is the data that is transported. This method of nesting the data
payload in a packet with a header is called encapsulation.

13
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

The address space is divided into subnetworks, involving the designation of network


prefixes. IP routing is performed by all hosts, as well as routers, whose main function is
to transport packets across network boundaries. Routers communicate with one another
via specially designed routing protocols, either interior gateway protocols or exterior
gateway protocols, as needed for the topology of the network.

5.3. ROUTING INFORMATION PROTOCOL

Routing Information Protocol (RIP) is a dynamic routing protocol which uses hop


count as a routing metric to find the best path between the source and the destination
network. It is a distance vector routing protocol which has AD value 120 and works on
the application layer of OSI model. RIP uses port number 520.
5.3.1. Hop Count :
Hop count is the number of routers occurring in between the source and destination
network. The path with the lowest hop count is considered as the best route to reach a
network and therefore placed in the routing table. RIP prevents routing loops by limiting
the number of hopes allowed in a path from source and destination. The maximum hop
count allowed for RIP is 15 and hop count of 16 is considered as network unreachable.
5.3.2. Features of RIP :
1. Updates of the network are exchanged periodically.
2. Updates (routing information) are always broadcast.
3. Full routing tables are sent in updates.
4. Routers always trust on routing information received from neighbor routers. This is
also known as Routing on rumours.
RIP v1 is known as Classful Routing Protocol because it doesn’t send information of
subnet mask in its routing update.RIP v2 is known as Classless Routing Protocol because
it sends information of subnet mask in its routing update.
>> Use debug command to get the details :
# debug ip rip
>> Use this command to show all routes configured in router, say for router R1 :
R1# show ip route
>> Use this command to show all protocols configured in router, say for router R1 :
R1# show ip protocols

Table.1. RIP Commands

14
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

CHAPTER 6

NARRATION
6.1.DIJKSTRA’S ALGORITHM

Dijkstra's algorithm (or Dijkstra's Shortest Path First algorithm, SPF algorithm)is


an algorithm for finding the shortest paths between nodes in a graph, which may
represent, for example, road networks. It was conceived by computer scientist Edsger W.
Dijkstra in 1956 and published three years later.

The algorithm exists in many variants. Dijkstra's original algorithm found the shortest
path between two given nodes,but a more common variant fixes a single node as the
"source" node and finds shortest paths from the source to all other nodes in the graph,
producing a shortest-path tree.

For a given source node in the graph, the algorithm finds the shortest path between that
node and every other. It can also be used for finding the shortest paths from a single node
to a single destination node by stopping the algorithm once the shortest path to the
destination node has been determined. For example, if the nodes of the graph represent
cities and edge path costs represent driving distances between pairs of cities connected by
a direct road (for simplicity, ignore red lights, stop signs, toll roads and other
obstructions), Dijkstra's algorithm can be used to find the shortest route between one city
and all other cities. A widely used application of shortest path algorithm is
network routing protocols, most notably IS-IS (Intermediate System to Intermediate
System) and Open Shortest Path First (OSPF). It is also employed as a subroutine in
other algorithms such as Johnson's.

The Dijkstra algorithm uses labels that are positive integers or real numbers, which
are totally ordered. It can be generalized to use any labels that are partially ordered,
provided the subsequent labels (a subsequent label is produced when traversing an edge)
are monotonically non-decreasing. This generalization is called the generic Dijkstra
shortest-path algorithm.

15
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

6.1.1Algorithm:

Let the node at which we are starting be called the initial node. Let the distance of
node Y be the distance from the initial node to Y. Dijkstra's algorithm will assign some
initial distance values and will try to improve them step by step.

 Mark all nodes unvisited. Create a set of all the unvisited nodes called
the unvisited set.
 Assign to every node a tentative distance value: set it to zero for our initial node
and to infinity for all other nodes. Set the initial node as current.
 For the current node, consider all of its unvisited neighbours and calculate
their tentative distances through the current node. Compare the newly
calculated tentative distance to the current assigned value and assign the smaller
one. For example, if the current node A is marked with a distance of 6, and the
edge connecting it with a neighbour B has length 2, then the distance
to B through A will be 6 + 2 = 8. If B was previously marked with a distance
greater than 8 then change it to 8. Otherwise, the current value will be kept.
 When we are done considering all of the unvisited neighbours of the current node,
mark the current node as visited and remove it from the unvisited set. A visited
node will never be checked again.
 If the destination node has been marked visited (when planning a route between
two specific nodes) or if the smallest tentative distance among the nodes in
the unvisited set is infinity (when planning a complete traversal; occurs when
there is no connection between the initial node and remaining unvisited nodes),
then stop. The algorithm has finished.
 Otherwise, select the unvisited node that is marked with the smallest tentative
distance, set it as the new "current node", and go back to step 3.

 When planning a route, it is actually not necessary to wait until the destination
node is "visited" as above: the algorithm can stop once the destination node has
the smallest tentative distance among all "unvisited" nodes (and thus could be
selected as the next "current").

16
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Following figure shows the description of Dijkstra’s Algorithm by considering a simple


example.

Fig. 6: EXAMPLE OF DIJKSTRA’S ALGORITHM

17
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

6.2.NETWORK

6.2.1.Problem Statement

To build a communication network consisting of routers at the nodes, forwarding packets


to intended destination. To configure Open Shortest Path First (OSPF) routing protocol
on the network routers. VLSM IP addressing scheme. The network needs to be password
protected and encrypted. Setting of CTY, TTY, AUX and VTY password, create
interface loopbacks to test the advertisement by OSPF routing protocol configured on
each router. Telnet protocol to remotely access the target router(s).

We have considered a network as shown in figure 1. OSPF area 0 is configured within


the AS. Now each router communicates with each other by sending packets based on
Link-state routing protocol and Dijkstra algorithm to find the shortest path from source to
a specific destination. In the above network,the routers R1, R2, R3, R5, R6 and R7 is
connected in star topology to router R4 which is the central router and the most powerful
router.A central router is selected in such a way that it is physically equidistant from all
other routers. Further R3 is connected to R1 and R7, R6 to R5 and R1 to R2. These
connections may be wired or wireless, CTY or TTY or AUX or VTY lines or
underground. Figure 2 shows the router at Bhopal and all its serial port interfaces. Figure
3 shows the router at Kolkata and all its serial port interfaces. 3.3.3.3/24 and
33.33.33.33/24 are the interface loopback 0 and interface loopback 1 of router at Kolkata
respectively.

18
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Fig 7. NETWORK OF INTEREST

6.2.2.Setting CTY ,TTY,AUX and VTY passwords:

19
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

 CTY line- The CTY line-type is the console port. On any router, it appears in the router
configuration as line con 0 and in the output of the show line as cty. It is mainly used for
local system access using a console terminal.

 TTY lines - TTY lines are asynchronous lines used for inbound or outbound modem and
terminal connections and can be seen in a router or access server configuration as line x.
The specific line numbers are a function of the hardware built into or installed on the
router or access server.

 VTY lines -VTY line called the Virtual Terminal Lines of the router, used solely to
control inbound telnet connections. There is no hardware associated with them.

 AUX line -It is the auxiliary port. Figure 4 shows line con 0, line aux 0 and line vty 0 4
and password protection on CTY and VTY lines. B. Telnet and ping Figure 5 shows the
effort to ping to IP address 10.1.56.5 from Chennai and was successful. It also shows an
effort by router at Chennai to telnet IP address 10.1.47.4 to get remote access to router at
Bhopal through VTY lines protected using password. After telnet an access to configure
the router at Bhopal is obtained. Ping is done to check the connectivity in a network by
sending 5 packets. If the ping is successful, meaning all 5 packets were successfully
echoed. There is proper network connection else there will be connection error and needs
to be taken care of. C. OSPF routing protocol [4] Figure 6 shows the router at Bhopal
configured with OSPF routing protocol using show run command. Similarlyall other
routers are configured in the same manner. Interface loopbacks are created to test the
advertisement by OSPF routing protocol configured on each router. Figure 7 shows an
effort by router at Bhopal to ping to interface loopback 0 (3.3.3.3/24) at R3 (Kolkata) to
check proper OSPF routing and route advertisement. We were successful in our attempt.
All 5 packets successfully sent and received with an average round trip time of 374ms
and with a 2 second timeout.

20
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Fig 3. BHOPAL AS ROUTER AND ALL ITS INTERFACES

Fig 4. KOLKATA AS ROUTER AND ALL ITS INTERFACES

21
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Fig 5. LINE CON 0, LINE AUX 0 AND LINE VTY 0 4 AND PASSWORD
PROTECTION ON CTY AND VTY LINES.

Fig 6. EFFORT TO PING TO IP ADDRESS 10.1.56.5 FROM CHENNAI AND WAS


SUCCESSFUL

22
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL

Self Evaluation:

After the completion of my internship at Konigtronics Pvt Ltd, I’ve


identified several strengths and accomplishments as well as a few areas I
believe I can implement and improve my performance. We worked in a team
of four, and my project's domain was Networking. We implemented a OSPF
on a Network using GNS 3 tool to build a situation.
We were first trained to use the GNS-3 software. From configuring various
CISCO routers, to using various protocols, we learnt networking and later on
we worked on improving the efficiency of our network during the course of
my six-week internship.
I also learnt how to manage time, and effectively utilise all the resources at
my disposal. We split the work among ourselves and worked together as a
team to finish the project on time, thus imbibing the qualities of team work
within us.
This is helpful in finding a shortest path in the communication system. My
role in the team was to build a communication network and run various
protocols on that network to check the most efficient path. I also referred to
various research papers, books, blogs and websites to do some research on
the latest new protocols in networking.
After the initial success we published a paper in International Journal of
Advanced Research in Computer and Communication Engineering,
Vol. 8, Issue 5, May 2019, and the title of our paper was “Implementation
of OSPF on a Network Using GNS3 Tool” under effective guidance from
our guide, Mr. Vishesh S.

23
DEPARTMENT OF TCE, DSCE.

You might also like