ST Patrick's International College: IPv4 to IPv6 Migration Project
VerifiedAdded on  2020/04/07
|44
|7216
|67
Project
AI Summary
This project, submitted by Meledje Akpro Joseph from ST Patrick's International College, details the migration from IPv4 to IPv6 in network engineering and telecommunication systems. The project addresses the challenges of IPv6 implementation, including hardware compatibility and network configuration, while exploring solutions like dual-stacking and VLAN management. It includes an introduction, literature review, analysis, design, implementation, testing, and evaluation. The project also covers network traffic routing, the use of Layer 3 switches, and IPv6 configuration. The student analyzes the issues with existing IPv4 networks, proposes solutions, and presents the benefits of the IPv6 migration, including enhanced security and scalability. The report includes diagrams, configurations, and test results to validate the proposed solutions, offering a comprehensive overview of the IPv4 to IPv6 migration process and its practical application within a network environment. This project is a valuable resource for students studying network engineering and related fields.

NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Migrating From IPv4 to IPv6
Name of the Student
Meledje Akpro Joseph
Name of the University
ST PATRICK’S INTERNATIONAL COLLEGE
Author’s Note
Migrating From IPv4 to IPv6
Name of the Student
Meledje Akpro Joseph
Name of the University
ST PATRICK’S INTERNATIONAL COLLEGE
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Acknowledgement
I predominantly obliged to express my gratitude and acknowledge to ST Patrick’s
International College, and our tutors for providing us valuable resources that helped us to
gain more knowledge in network engineering course. This project helped us to research on
the new available technology and protocol that helped us to gain practical knowledge. The
access of the college library helped us to solve the problem that we faced during the
development of the project.
I am thankful to our project supervisor Kamran Ali, and want to thank them heartily for
guiding us at every stage of development and helping us providing valuable resources and
inspiration for the final term.
I would also like to thank the principal of our college and for providing us the opportunity to
continue with the project and encourage us for the last two years of, ‘Person’s HND
Diploma’.
By Meledje Akpro Joseph
College Name: ST Patrick’s International College
Year 2
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Acknowledgement
I predominantly obliged to express my gratitude and acknowledge to ST Patrick’s
International College, and our tutors for providing us valuable resources that helped us to
gain more knowledge in network engineering course. This project helped us to research on
the new available technology and protocol that helped us to gain practical knowledge. The
access of the college library helped us to solve the problem that we faced during the
development of the project.
I am thankful to our project supervisor Kamran Ali, and want to thank them heartily for
guiding us at every stage of development and helping us providing valuable resources and
inspiration for the final term.
I would also like to thank the principal of our college and for providing us the opportunity to
continue with the project and encourage us for the last two years of, ‘Person’s HND
Diploma’.
By Meledje Akpro Joseph
College Name: ST Patrick’s International College
Year 2

2
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Table of Contents
CHAPTER 1 – INTRODUCTION............................................................................................6
1.1. Chapter Introduction.......................................................................................................6
1.2. Traffic Routing in VLAN................................................................................................6
1.3. Inspiration of the Project.................................................................................................6
1.4. Identification of the problem...........................................................................................7
1.5. Solution of the Problem..................................................................................................7
1.6. Aims................................................................................................................................8
1.7. Objectives........................................................................................................................8
1.8. Records of risk, constraints and assumptions.................................................................9
1.9. Project Plan and deliverables........................................................................................10
1.10. Report Layout..............................................................................................................10
1.11. Summary.....................................................................................................................11
CHAPTER 2 – LITERATURE REVIEW...............................................................................12
2.6. Problems of the current system.....................................................................................12
2.7. Equipment’s required for the transition from IPv4 to IPv6..........................................13
2.8. Technology analyzed from the review..........................................................................13
2.8.1. Inter vlan routing....................................................................................................13
2.8.2. VLAN Pruning.......................................................................................................14
2.8.3. Concept of spanning tree protocol.........................................................................14
2.8.4. Limitation of the spanning tree protocol................................................................15
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Table of Contents
CHAPTER 1 – INTRODUCTION............................................................................................6
1.1. Chapter Introduction.......................................................................................................6
1.2. Traffic Routing in VLAN................................................................................................6
1.3. Inspiration of the Project.................................................................................................6
1.4. Identification of the problem...........................................................................................7
1.5. Solution of the Problem..................................................................................................7
1.6. Aims................................................................................................................................8
1.7. Objectives........................................................................................................................8
1.8. Records of risk, constraints and assumptions.................................................................9
1.9. Project Plan and deliverables........................................................................................10
1.10. Report Layout..............................................................................................................10
1.11. Summary.....................................................................................................................11
CHAPTER 2 – LITERATURE REVIEW...............................................................................12
2.6. Problems of the current system.....................................................................................12
2.7. Equipment’s required for the transition from IPv4 to IPv6..........................................13
2.8. Technology analyzed from the review..........................................................................13
2.8.1. Inter vlan routing....................................................................................................13
2.8.2. VLAN Pruning.......................................................................................................14
2.8.3. Concept of spanning tree protocol.........................................................................14
2.8.4. Limitation of the spanning tree protocol................................................................15

3
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.9. Drawback of the current proposed solution..................................................................15
2.9.1. Solution..................................................................................................................15
2.10. Benefits of the network...............................................................................................15
2.11. Development tools and review techniques..................................................................16
2.11.1. Network Designing software................................................................................16
2.11.2. Simulation software.............................................................................................17
2.11.4. Summary..............................................................................................................18
CHAPTER 3 – ANALYSIS AND DESIGN...........................................................................19
3.1. Chapter introduction......................................................................................................19
3.2. Discussion of the analysis.............................................................................................19
3.3. Discussion of the design................................................................................................19
3.4. Development Methodology...........................................................................................20
CHAPTER 4 – IMPLEMENTATION.....................................................................................20
4.1. Introduction...................................................................................................................20
4.2. Implementation.............................................................................................................21
4.2.1. Challenges faced during the implementation.........................................................21
4.2.2. Solution of the problem..........................................................................................21
4.2.3. Layer 3 switch configuration.................................................................................22
4.3. Demonstration of the Artifacts......................................................................................24
4.3.1. Auto Ipv6 configuration.........................................................................................24
4.4. Summary.......................................................................................................................25
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.9. Drawback of the current proposed solution..................................................................15
2.9.1. Solution..................................................................................................................15
2.10. Benefits of the network...............................................................................................15
2.11. Development tools and review techniques..................................................................16
2.11.1. Network Designing software................................................................................16
2.11.2. Simulation software.............................................................................................17
2.11.4. Summary..............................................................................................................18
CHAPTER 3 – ANALYSIS AND DESIGN...........................................................................19
3.1. Chapter introduction......................................................................................................19
3.2. Discussion of the analysis.............................................................................................19
3.3. Discussion of the design................................................................................................19
3.4. Development Methodology...........................................................................................20
CHAPTER 4 – IMPLEMENTATION.....................................................................................20
4.1. Introduction...................................................................................................................20
4.2. Implementation.............................................................................................................21
4.2.1. Challenges faced during the implementation.........................................................21
4.2.2. Solution of the problem..........................................................................................21
4.2.3. Layer 3 switch configuration.................................................................................22
4.3. Demonstration of the Artifacts......................................................................................24
4.3.1. Auto Ipv6 configuration.........................................................................................24
4.4. Summary.......................................................................................................................25
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 5 – TESTING........................................................................................................25
5.1. Testing techniques.........................................................................................................25
5.2. Testing plan...................................................................................................................26
5.2.1. Show Run Configuration........................................................................................26
5.3. Discussion.....................................................................................................................30
CHAPTER 6 – EVALUATION AND CONCLUSION..........................................................31
OVERALL CONCLUSION SUMMARY...............................................................................31
Future development..................................................................................................................32
Appendix - A............................................................................................................................33
HND PROJECT PRESENTATION....................................................................................33
Appendix – B...........................................................................................................................36
PROJECT SPECIFICATION DOCUMENT.......................................................................36
Bibliography.............................................................................................................................41
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 5 – TESTING........................................................................................................25
5.1. Testing techniques.........................................................................................................25
5.2. Testing plan...................................................................................................................26
5.2.1. Show Run Configuration........................................................................................26
5.3. Discussion.....................................................................................................................30
CHAPTER 6 – EVALUATION AND CONCLUSION..........................................................31
OVERALL CONCLUSION SUMMARY...............................................................................31
Future development..................................................................................................................32
Appendix - A............................................................................................................................33
HND PROJECT PRESENTATION....................................................................................33
Appendix – B...........................................................................................................................36
PROJECT SPECIFICATION DOCUMENT.......................................................................36
Bibliography.............................................................................................................................41

5
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
List of Figures
Figure 1: Gantt chart prepared for the project planning...........................................................10
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
List of Figures
Figure 1: Gantt chart prepared for the project planning...........................................................10

6
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 1 – INTRODUCTION
1.1. Chapter Introduction
The report is prepared for configuring the IP address in a network and identification
of the problem that can be found while configuring the network with both the addressing
scheme i.e. IPv4 and IPv6. The main problem found while configuring the IPv6 address on a
router is that the old routers does not supports the IPv6 address and thus the new router is
required to be used. When the network traffic comes from a multiple broadcast domain server
the data packets competes with each other to reach the destination source and reaching the
device which is not configured properly the packets are lost. If the connection between the
router and the switch is configured with trunk protocol the possibility of data loss decreases
and the data packets can be transferred from each of the devices configured with the IPv4 and
IPv6 address.
1.2. Traffic Routing in VLAN
The solution for transformation of the IPv4 to IPv6 address is using different schemes
like tunneling, dual stacking method and NAT proxy translation for communicating with the
devices configured with IPv4 address. The dual stacking method defines that the routers and
the switches are needed to be configured with both the IPv4 and the IPv6 address and the data
packets when sent to the device compares the IP address and forwards it to the destination
host or the next hop address. The tunneling is use for converting the IPv4 address to IPv6
address or vice versa. With the implementation of the IPv6 address scheme the security of the
network increases because it is difficult for the hackers to crack the 128 bit address.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 1 – INTRODUCTION
1.1. Chapter Introduction
The report is prepared for configuring the IP address in a network and identification
of the problem that can be found while configuring the network with both the addressing
scheme i.e. IPv4 and IPv6. The main problem found while configuring the IPv6 address on a
router is that the old routers does not supports the IPv6 address and thus the new router is
required to be used. When the network traffic comes from a multiple broadcast domain server
the data packets competes with each other to reach the destination source and reaching the
device which is not configured properly the packets are lost. If the connection between the
router and the switch is configured with trunk protocol the possibility of data loss decreases
and the data packets can be transferred from each of the devices configured with the IPv4 and
IPv6 address.
1.2. Traffic Routing in VLAN
The solution for transformation of the IPv4 to IPv6 address is using different schemes
like tunneling, dual stacking method and NAT proxy translation for communicating with the
devices configured with IPv4 address. The dual stacking method defines that the routers and
the switches are needed to be configured with both the IPv4 and the IPv6 address and the data
packets when sent to the device compares the IP address and forwards it to the destination
host or the next hop address. The tunneling is use for converting the IPv4 address to IPv6
address or vice versa. With the implementation of the IPv6 address scheme the security of the
network increases because it is difficult for the hackers to crack the 128 bit address.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
1.3. Inspiration of the Project
The inspiration of the project is the recent growth of the network and increased used
of the IPv6 network for connecting with the network configured with the IPv6 address. The
VLAN is an interesting concept of a network and it reduces the cost of cabling of the network
while increasing the security for the single or multiple broadcast domain networks. The use
of DHCP in IPv6 network increases the efficiency of the network and a layer three switch can
be used for allocation of Ipv6 address to the different VLANs connected in the network. This
helps in creation of a dual stack network configuration for communicating with IPv4 as well
as IPv6 network devices.
1.4. Identification of the problem
The main problem identified in the configuration of the Ipv6 network is the regarding the
hardware because all the hardware device installed in the network does not support Ipv6
network configuration. Thus a change is required to be made in the current network solution
and new hardware should be installed for accommodation of the changes in the
organizational network. The cost of the network also increases and identification of the
broadcast domain for reconfiguration of the network acts as a barrier for the development of
the network. The interface and the sub interface of the router should be configured with the
IPv6 address for enabling the broadcast domain to communicate with the trunk line and send
and receive data packets in the network.
1.5. Solution of the Problem
The main solution for the problem is the analysis of the addressing scheme used in the current
network and creation of an IPv6 address scheme for the network for configuring the network
with dual stack mechanism. The bottleneck situation are also analyzed and a proper network
cabling plan is used for reducing the chances of packet loss or congestion in the network. The
traditional method are used for the configuration if the network and a network simulator is
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
1.3. Inspiration of the Project
The inspiration of the project is the recent growth of the network and increased used
of the IPv6 network for connecting with the network configured with the IPv6 address. The
VLAN is an interesting concept of a network and it reduces the cost of cabling of the network
while increasing the security for the single or multiple broadcast domain networks. The use
of DHCP in IPv6 network increases the efficiency of the network and a layer three switch can
be used for allocation of Ipv6 address to the different VLANs connected in the network. This
helps in creation of a dual stack network configuration for communicating with IPv4 as well
as IPv6 network devices.
1.4. Identification of the problem
The main problem identified in the configuration of the Ipv6 network is the regarding the
hardware because all the hardware device installed in the network does not support Ipv6
network configuration. Thus a change is required to be made in the current network solution
and new hardware should be installed for accommodation of the changes in the
organizational network. The cost of the network also increases and identification of the
broadcast domain for reconfiguration of the network acts as a barrier for the development of
the network. The interface and the sub interface of the router should be configured with the
IPv6 address for enabling the broadcast domain to communicate with the trunk line and send
and receive data packets in the network.
1.5. Solution of the Problem
The main solution for the problem is the analysis of the addressing scheme used in the current
network and creation of an IPv6 address scheme for the network for configuring the network
with dual stack mechanism. The bottleneck situation are also analyzed and a proper network
cabling plan is used for reducing the chances of packet loss or congestion in the network. The
traditional method are used for the configuration if the network and a network simulator is

8
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
use for creation of a prototype of the network before implementation in the real life
environment. Separate channels are used for the connection of the different VLANS and the
unused ports are blocked for reducing the risk of unauthorized access of the network.
1.6. Aims
The aim of this project is to understand crucial implementation steps required when migrating
from IPV4 to IPV6 to ensure an effective approach and successful outcome. There is no
doubt that migrating from IPV4 to IPV6 present many benefits but equally many challenges
and issues causing delay and reluctance. Therefore, this project aim to help elaborate and
explore effective planning to overcome those challenges to deliver seamless integration and
transition as possible.
Additionally although IPV6 protocol has been around for sometimes now, there are still
knowledge gap of it, lack of skills and effective communication channel to allow businesses
and users to fully embrace it. In this project, relevant details information of IPV6 will be
provided to enhance the knowledge of it. And overview few practical deployment scenarios
and solutions to reduce misconception. Finally, at the end of this project the audience would
have gain greater confidence, substantial information, and tailored solutions to specific cases
to carry out IPV6 migration.
1.7. Objectives
The objectives of the project are aligned during the development of the project. The different
network components are analyzed and the network design is created using the cisco packet
tracer. The devices are configured with appropriate protocol and all the devices are connected
with a central server and the IPs are provided to the hosts connected to it. The network is
tested and the more devices are added with IPv6 address without changing the structure of the
network or changing the cabling plan. A power point poster and slides are created for the
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
use for creation of a prototype of the network before implementation in the real life
environment. Separate channels are used for the connection of the different VLANS and the
unused ports are blocked for reducing the risk of unauthorized access of the network.
1.6. Aims
The aim of this project is to understand crucial implementation steps required when migrating
from IPV4 to IPV6 to ensure an effective approach and successful outcome. There is no
doubt that migrating from IPV4 to IPV6 present many benefits but equally many challenges
and issues causing delay and reluctance. Therefore, this project aim to help elaborate and
explore effective planning to overcome those challenges to deliver seamless integration and
transition as possible.
Additionally although IPV6 protocol has been around for sometimes now, there are still
knowledge gap of it, lack of skills and effective communication channel to allow businesses
and users to fully embrace it. In this project, relevant details information of IPV6 will be
provided to enhance the knowledge of it. And overview few practical deployment scenarios
and solutions to reduce misconception. Finally, at the end of this project the audience would
have gain greater confidence, substantial information, and tailored solutions to specific cases
to carry out IPV6 migration.
1.7. Objectives
The objectives of the project are aligned during the development of the project. The different
network components are analyzed and the network design is created using the cisco packet
tracer. The devices are configured with appropriate protocol and all the devices are connected
with a central server and the IPs are provided to the hosts connected to it. The network is
tested and the more devices are added with IPv6 address without changing the structure of the
network or changing the cabling plan. A power point poster and slides are created for the

9
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
demonstration of the proper working of the project. The main objective of the project are as
follows:
1. Analyse the difference between IPV4 and IPV6
2. Understand IPV6 Protocols and standards
3. Explore potential challenges and issues during migration
4. Understand crucial implementation steps
5. Elaborate appropriate strategies and planning approach
6. Provide deployment scenario and practical tailored solutions
1.8. Records of risk, constraints and assumptions
It is assumed that for the development of the project different barriers would arise and
it should be overcome for making the project a success. The risk should be identified in the
early stages of the development of the project for creation of a risk mitigation strategy and
simulation is done for the configuration of the network and identify the errors in the network.
The hardware used in the network should be available and it should be compatible with the
other hardware device connected in the network. The constraint acting for the development of
the network solution the inefficient knowledge about the IPv6 address and it should be
improved for developing the network accordingly. The time also acts as a risk and the project
should be completed within the given time for the success of the project. The IPv6 uses 128
bit addressing whereas IPv4 uses 32 bit address and thus have the limitation to accommodate
the growing number of devices in the network. Different protocols and techniques are used
for the transformation of the Ipv4 with the IPv6 address without affecting the network and for
increasing the efficiency of the network. The proper configuration of the router and the end
devices are necessary for the implementation of the IPv6 address scheme in an old network
currently running using the IPv4 addressing. The implementation of the IPv6 helps to
increase the address space of the network but there is as requirement of proper sub netting for
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
demonstration of the proper working of the project. The main objective of the project are as
follows:
1. Analyse the difference between IPV4 and IPV6
2. Understand IPV6 Protocols and standards
3. Explore potential challenges and issues during migration
4. Understand crucial implementation steps
5. Elaborate appropriate strategies and planning approach
6. Provide deployment scenario and practical tailored solutions
1.8. Records of risk, constraints and assumptions
It is assumed that for the development of the project different barriers would arise and
it should be overcome for making the project a success. The risk should be identified in the
early stages of the development of the project for creation of a risk mitigation strategy and
simulation is done for the configuration of the network and identify the errors in the network.
The hardware used in the network should be available and it should be compatible with the
other hardware device connected in the network. The constraint acting for the development of
the network solution the inefficient knowledge about the IPv6 address and it should be
improved for developing the network accordingly. The time also acts as a risk and the project
should be completed within the given time for the success of the project. The IPv6 uses 128
bit addressing whereas IPv4 uses 32 bit address and thus have the limitation to accommodate
the growing number of devices in the network. Different protocols and techniques are used
for the transformation of the Ipv4 with the IPv6 address without affecting the network and for
increasing the efficiency of the network. The proper configuration of the router and the end
devices are necessary for the implementation of the IPv6 address scheme in an old network
currently running using the IPv4 addressing. The implementation of the IPv6 helps to
increase the address space of the network but there is as requirement of proper sub netting for
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
reducing the wastage of the IP address. A verification must be done on the network where the
IPv6 addressing is required to be implemented because all the devices are not capable to run
using the IPv6 address as they were designed for IPv4 address.
1.9. Project Plan and deliverables
For the preparation of a project plan a gnat chart is prepared that describes the phases
of the project and its estimated completion dates.
Figure 1: Gantt chart prepared for the project planning
(Source: Created by author)
1.10. Report Layout
Chapter 1: It is created for introducing the project and a detailed explanation is given about
the scenario for which the project is developed. The details are discussed about the
configuration of the different VLANs for different departments and the problems are
identified for the creation of the network solution. The aims and objectives of the project are
aligned for the development of the project.
Chapter 2: It consists of the literature review of different articles and journals that are
required for the development of the network project. Knowledge is gained regarding the
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
reducing the wastage of the IP address. A verification must be done on the network where the
IPv6 addressing is required to be implemented because all the devices are not capable to run
using the IPv6 address as they were designed for IPv4 address.
1.9. Project Plan and deliverables
For the preparation of a project plan a gnat chart is prepared that describes the phases
of the project and its estimated completion dates.
Figure 1: Gantt chart prepared for the project planning
(Source: Created by author)
1.10. Report Layout
Chapter 1: It is created for introducing the project and a detailed explanation is given about
the scenario for which the project is developed. The details are discussed about the
configuration of the different VLANs for different departments and the problems are
identified for the creation of the network solution. The aims and objectives of the project are
aligned for the development of the project.
Chapter 2: It consists of the literature review of different articles and journals that are
required for the development of the network project. Knowledge is gained regarding the

11
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
concept of VLAN and the advantage or disadvantage of using different networking protocols
for the security of the network is discussed.
Chapter 3: The main focus of the chapter is on the designing and analysis of the different
network components for the development of the network infrastructure. The selection of the
hardware components and the coverage area of the network is discussed for the development
of the network.
Chapter 4: This chapter discusses about the stage involved in the implementation of the
project and configuring the network according to the aims and objectives of the project. The
network configuration and the hardware used are listed.
Chapter 5: In this chapter the details of the test cases and the test performed on the network
are given.
Chapter 6: Here the project is concluded after a detailed evaluation of the working of the
project.
1.11. Summary
The project of ‘IPV6 – Migration Study from IPv4 and IPv6’ started with the creation of the
project proposal and the project plan. A literature review is done for understanding the
working principle of IPV6 protocol and standards to allow the implementation IPV6 address
in a network. The use of the hardware devices, software version, as well as license are
essential for configuring the IPV6 and implement its full benefits. Layer 2 and the layer 3
switches are also analyzed for creation of the report and performing the practical operation.
Cisco packet tracer is used for configuring the devices and finding the flaws in the network
when more data is generated in the network. The routers and the switches are configured with
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
concept of VLAN and the advantage or disadvantage of using different networking protocols
for the security of the network is discussed.
Chapter 3: The main focus of the chapter is on the designing and analysis of the different
network components for the development of the network infrastructure. The selection of the
hardware components and the coverage area of the network is discussed for the development
of the network.
Chapter 4: This chapter discusses about the stage involved in the implementation of the
project and configuring the network according to the aims and objectives of the project. The
network configuration and the hardware used are listed.
Chapter 5: In this chapter the details of the test cases and the test performed on the network
are given.
Chapter 6: Here the project is concluded after a detailed evaluation of the working of the
project.
1.11. Summary
The project of ‘IPV6 – Migration Study from IPv4 and IPv6’ started with the creation of the
project proposal and the project plan. A literature review is done for understanding the
working principle of IPV6 protocol and standards to allow the implementation IPV6 address
in a network. The use of the hardware devices, software version, as well as license are
essential for configuring the IPV6 and implement its full benefits. Layer 2 and the layer 3
switches are also analyzed for creation of the report and performing the practical operation.
Cisco packet tracer is used for configuring the devices and finding the flaws in the network
when more data is generated in the network. The routers and the switches are configured with

12
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
the tunneling protocol such that the old devices that are configured with IPv4 configuration
can operate with the IPv6 configured devices.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
the tunneling protocol such that the old devices that are configured with IPv4 configuration
can operate with the IPv6 configured devices.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 2 – LITERATURE REVIEW
2.6. Problems of the current system
The router for broadcasting the address requires more time and thus the
implementation of the VLAN becomes the alternative solution for the segmentation of the
network and increases the performance. The switch and the bridge faster than the router send
the broadcast message and this is the main reason for the deployment of the VLAN network
(Feldkamp, Bergmann and Strassburger 2015). For example, in case of a network with LAN
configuration, the broadcast message is sent to all the connected nodes and the network
configured with VLAN connection sends broadcast message to the specified broadcast
domain and thus generating less network traffic in the network. There are different VLAN
configuration for the intranet such as inter-VLAN used for sending the data packets from a
layer of the VLAN to another layer of the router (Goransson, Black and Culver 2016). The
VLAN can be distinguished from their IP address and the sub net mask and it also facilitates
the routing process for the connected VLAN.
VLAN tagging protocol 802.1q can be used for the aggregation of the link. This are
specially used in the trunk lines and the closed frame is tagged with the crossing of the data
frames. The tag consists of the ID of the VLAN and other information that can be used to
detect the source VLAN from where the data is sent (Hanuliak and Hanuliak 2013). The
trunk line is used for tunneling of the data and the data can be sent from any address using the
VPN service and would not check the configuration of the host either configured with IPv4 or
IPv6 address scheme. On passing the trunk the data frame is tagged and on reaching the next
hop address the tag is removed and packet is forwarded to the destination address. The
devices that are configured with VLAN can only process the tag. If there is more than one
switch in the network the switches are required to be configured with trunk.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 2 – LITERATURE REVIEW
2.6. Problems of the current system
The router for broadcasting the address requires more time and thus the
implementation of the VLAN becomes the alternative solution for the segmentation of the
network and increases the performance. The switch and the bridge faster than the router send
the broadcast message and this is the main reason for the deployment of the VLAN network
(Feldkamp, Bergmann and Strassburger 2015). For example, in case of a network with LAN
configuration, the broadcast message is sent to all the connected nodes and the network
configured with VLAN connection sends broadcast message to the specified broadcast
domain and thus generating less network traffic in the network. There are different VLAN
configuration for the intranet such as inter-VLAN used for sending the data packets from a
layer of the VLAN to another layer of the router (Goransson, Black and Culver 2016). The
VLAN can be distinguished from their IP address and the sub net mask and it also facilitates
the routing process for the connected VLAN.
VLAN tagging protocol 802.1q can be used for the aggregation of the link. This are
specially used in the trunk lines and the closed frame is tagged with the crossing of the data
frames. The tag consists of the ID of the VLAN and other information that can be used to
detect the source VLAN from where the data is sent (Hanuliak and Hanuliak 2013). The
trunk line is used for tunneling of the data and the data can be sent from any address using the
VPN service and would not check the configuration of the host either configured with IPv4 or
IPv6 address scheme. On passing the trunk the data frame is tagged and on reaching the next
hop address the tag is removed and packet is forwarded to the destination address. The
devices that are configured with VLAN can only process the tag. If there is more than one
switch in the network the switches are required to be configured with trunk.

14
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.7. Equipment’s required for the transition from IPv4 to IPv6
The required elements for the development of the project are listed as follows:
ï‚· Layer 3 switches
ï‚· Compatible hardware
ï‚· DHCP, FTP, Email and DNS Servers
ï‚· Spanning tree protocol support
ï‚· Network Cables
ï‚· IPv6 Address scheme
ï‚· Router
2.8. Technology analyzed from the review
More time is taken by the router for processing the broadcast message in a single network and
thus the network is segmented into different vlans for increasing the performance of the
network. A layer three switch is used because it have much faster processing speed of the
broadcast message than the router. The VLANs are configured with dhcp and Ipv6 addressing
for automatically assign the IPv6 address to the interface of the nodes connected in the
network and increase the efficiency of the network solution. Each of the vlan is assigned with
an IP address of different subnet for increasing the security of the network and protect it from
unauthorized access.
2.8.1. Inter vlan routing
Inter vlan routing is necessary for communicating with the deferent department connected in
the network and an IP address is set for the vlan and it is used as the gateway address for
communicating with the vlans. The vlans are created at an interval of 100 and the network
traffic are forwarded from the layer three switch installed in the network for facilitating the
routing process of the data packets and reach the destination node in the network. The switch
is configured with trunk command such that the packet is not rejected or dropped.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.7. Equipment’s required for the transition from IPv4 to IPv6
The required elements for the development of the project are listed as follows:
ï‚· Layer 3 switches
ï‚· Compatible hardware
ï‚· DHCP, FTP, Email and DNS Servers
ï‚· Spanning tree protocol support
ï‚· Network Cables
ï‚· IPv6 Address scheme
ï‚· Router
2.8. Technology analyzed from the review
More time is taken by the router for processing the broadcast message in a single network and
thus the network is segmented into different vlans for increasing the performance of the
network. A layer three switch is used because it have much faster processing speed of the
broadcast message than the router. The VLANs are configured with dhcp and Ipv6 addressing
for automatically assign the IPv6 address to the interface of the nodes connected in the
network and increase the efficiency of the network solution. Each of the vlan is assigned with
an IP address of different subnet for increasing the security of the network and protect it from
unauthorized access.
2.8.1. Inter vlan routing
Inter vlan routing is necessary for communicating with the deferent department connected in
the network and an IP address is set for the vlan and it is used as the gateway address for
communicating with the vlans. The vlans are created at an interval of 100 and the network
traffic are forwarded from the layer three switch installed in the network for facilitating the
routing process of the data packets and reach the destination node in the network. The switch
is configured with trunk command such that the packet is not rejected or dropped.

15
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
For the sub interface in the network the cisco 2900 series switch is used and each of the
switch is used for the different departments the switch is connected on the fast Ethernet 1 port
with the trunk protocol enabled on both of the switches. The unused ports of the layer three
switch is blocked such that it cannot be used for illegal activity and increase the security of
the prepared network solution. The DHCP pool is created for each of the vlan for the
allocation of the IPv6 address and automatically assign the IPv6 address to the nodes
connected in each of the vlan.
2.8.2. VLAN Pruning
VTP pruning is used for reducing the traffic in the network solution and increasing the
efficiency of the network. The unnecessary broadcast traffic can be stopped by the
configuration of the switch and the router with VTP pruning and the data packets are sent to
the destination host without broadcasting it to the other devices connected in the network.
The congestion can be avoided with the implementation of the protocol and reduces the
waiting time.
2.8.3. Concept of spanning tree protocol
It is used for limiting the traffic flow in the trunk lines configured in the switch and for the
management of the vlans created in the network. It creates redundancy in the paths and
prevents bridging of the loops for development of the optimal path in the network and
communicate with the nodes connected in the network. It is used for handling multiple switch
because redundant path are created in the network and can cause link to fail. The part fast
command can be used for management of the dhcp connection and restrict the time out of the
switch. The layer three switch is used as a single root switch and all the other switch
connected in the network communicate using the central switch.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
For the sub interface in the network the cisco 2900 series switch is used and each of the
switch is used for the different departments the switch is connected on the fast Ethernet 1 port
with the trunk protocol enabled on both of the switches. The unused ports of the layer three
switch is blocked such that it cannot be used for illegal activity and increase the security of
the prepared network solution. The DHCP pool is created for each of the vlan for the
allocation of the IPv6 address and automatically assign the IPv6 address to the nodes
connected in each of the vlan.
2.8.2. VLAN Pruning
VTP pruning is used for reducing the traffic in the network solution and increasing the
efficiency of the network. The unnecessary broadcast traffic can be stopped by the
configuration of the switch and the router with VTP pruning and the data packets are sent to
the destination host without broadcasting it to the other devices connected in the network.
The congestion can be avoided with the implementation of the protocol and reduces the
waiting time.
2.8.3. Concept of spanning tree protocol
It is used for limiting the traffic flow in the trunk lines configured in the switch and for the
management of the vlans created in the network. It creates redundancy in the paths and
prevents bridging of the loops for development of the optimal path in the network and
communicate with the nodes connected in the network. It is used for handling multiple switch
because redundant path are created in the network and can cause link to fail. The part fast
command can be used for management of the dhcp connection and restrict the time out of the
switch. The layer three switch is used as a single root switch and all the other switch
connected in the network communicate using the central switch.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.8.4. Limitation of the spanning tree protocol
The main limitation identified for the implementation of the spanning tree protocol is that the
instance is not maintained for the created vlan sin the network. If the switch installed in the
network are non cisco then a single instance is maintained and all the vlans are permitted
using the trunk lines and thus it requires to manually configure the network ports.
2.9. Drawback of the current proposed solution
The solution is expensive because gigabyte Ethernet is used for the management of the client
interface. Some of the network device needs to be upgraded and it should be compatible with
the other devices used for the configuration of the network and thus an evaluation is made for
the device that can be configured with IPv6 protocol. It is inappropriate for smaller network
because more cables are required for connecting with the switches and the thus it cannot
handle the cost of the network.
2.9.1. Solution
For reduction of the cost of the cable the backbone of the network is replaced with a high
speed fiber optics link and the stp protocol is replaced with the access control list protocol for
enabling or disabling the data traffic in the network. The use of the IP helper address helps to
broadcast the correct path and the risk of bottle neck is reduced because the traffic in the
network is reduced. The multiple interconnecting paths can also be eliminated and priority
values can be set for the elimination of the time out for allocation off the Ipv6 address. The
switchport trunk allowed vlan followed by the vlan number is used for allowing the layer
three switch to assign the IPv6 address to the nodes connected in the vlan and it also reduce
the data traffic in the network.
2.10. Benefits of the network
The ipv6 network have several advantage and the advantages are describes as follows:
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.8.4. Limitation of the spanning tree protocol
The main limitation identified for the implementation of the spanning tree protocol is that the
instance is not maintained for the created vlan sin the network. If the switch installed in the
network are non cisco then a single instance is maintained and all the vlans are permitted
using the trunk lines and thus it requires to manually configure the network ports.
2.9. Drawback of the current proposed solution
The solution is expensive because gigabyte Ethernet is used for the management of the client
interface. Some of the network device needs to be upgraded and it should be compatible with
the other devices used for the configuration of the network and thus an evaluation is made for
the device that can be configured with IPv6 protocol. It is inappropriate for smaller network
because more cables are required for connecting with the switches and the thus it cannot
handle the cost of the network.
2.9.1. Solution
For reduction of the cost of the cable the backbone of the network is replaced with a high
speed fiber optics link and the stp protocol is replaced with the access control list protocol for
enabling or disabling the data traffic in the network. The use of the IP helper address helps to
broadcast the correct path and the risk of bottle neck is reduced because the traffic in the
network is reduced. The multiple interconnecting paths can also be eliminated and priority
values can be set for the elimination of the time out for allocation off the Ipv6 address. The
switchport trunk allowed vlan followed by the vlan number is used for allowing the layer
three switch to assign the IPv6 address to the nodes connected in the vlan and it also reduce
the data traffic in the network.
2.10. Benefits of the network
The ipv6 network have several advantage and the advantages are describes as follows:

17
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
ï‚· Reduction of the bottleneck and reduction of the packet drop in the network
ï‚· Latency in the network would not be a problem
ï‚· The performance of the current network can be improved by segmenting the network
and creation of the multiple vlan for reducing the number of routers installed in the
network. The bandwidth, security and accessibility of the network can be improved
with the configuration of the layer 3 switch.
ï‚· The vlans can be restricted for accessing the servers and protect the network from
external intruders to access the resources in the network.
2.11. Development tools and review techniques
The software development lifecycle methodology is followed for the development of the
network solution and making the project a success. The project is executed through different
stages of the development such as planning, analysis, design and Implementation.
Planning phase- A management plan is created for the reduction of the bottleneck situation
in the network and execution of the project
Analysis – the components in the network are broken down into simple elements and the
interrelation between the elements are identified for application in the project.
Design – the aims and objective of the project is aligned with the design of the network and
the project is developed for transition from Ipv4 to IPv6 addressing scheme.
Implementation – The network solution created for the project is tested multiple times in the
network simulation software for testing the proper working of the network.
2.11.1. Network Designing software
Microsoft visio is used for the creation of the physical topology and the network is designed
according to the preliminary design created in Microsoft visio.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
ï‚· Reduction of the bottleneck and reduction of the packet drop in the network
ï‚· Latency in the network would not be a problem
ï‚· The performance of the current network can be improved by segmenting the network
and creation of the multiple vlan for reducing the number of routers installed in the
network. The bandwidth, security and accessibility of the network can be improved
with the configuration of the layer 3 switch.
ï‚· The vlans can be restricted for accessing the servers and protect the network from
external intruders to access the resources in the network.
2.11. Development tools and review techniques
The software development lifecycle methodology is followed for the development of the
network solution and making the project a success. The project is executed through different
stages of the development such as planning, analysis, design and Implementation.
Planning phase- A management plan is created for the reduction of the bottleneck situation
in the network and execution of the project
Analysis – the components in the network are broken down into simple elements and the
interrelation between the elements are identified for application in the project.
Design – the aims and objective of the project is aligned with the design of the network and
the project is developed for transition from Ipv4 to IPv6 addressing scheme.
Implementation – The network solution created for the project is tested multiple times in the
network simulation software for testing the proper working of the network.
2.11.1. Network Designing software
Microsoft visio is used for the creation of the physical topology and the network is designed
according to the preliminary design created in Microsoft visio.

18
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.11.2. Simulation software
Cisco packet tracer 7.0 is used for creation of the prototype of the network and configuring
the router and the switches with the appropriate networking protocols.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.11.2. Simulation software
Cisco packet tracer 7.0 is used for creation of the prototype of the network and configuring
the router and the switches with the appropriate networking protocols.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.11.4. Summary
The different networking problem are researched and selection of the research methodology
is important for accepting the design of the project and develop the project accordingly. The
configuration and simulation of the network is important and real hardware and the network
device should be configured according to the commands used in the simulation softwared for
the development of the network solution.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
2.11.4. Summary
The different networking problem are researched and selection of the research methodology
is important for accepting the design of the project and develop the project accordingly. The
configuration and simulation of the network is important and real hardware and the network
device should be configured according to the commands used in the simulation softwared for
the development of the network solution.

20
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 3 – ANALYSIS AND DESIGN
3.1. Chapter introduction
For designing the network solution an analysis is made on the requirement for the project and
a study is made of the vlan architecture for the development of the network framework. The
principles used for the development of the project are documented and a literature review is
done for analysis of the functional and the non-functional requirement of the project.
3.2. Discussion of the analysis
The VLAN architecture is analyzed for understanding the networking principles and
create an appropriate technique to transform the IPv4 address to IPv6 address scheme in the
proposed network design. The functional and the non- functional requirement of the project is
analyzed that consists of the functional characteristics and the behavior of the network
components on different situations (Safari 2017). The hardware used in the network and the
device that creates problem and waste time during sending and receiving the data packets are
analyzed. The requirement of the organization is required to be analyzed and the solution that
is deployed should also be analyzed depending and aligned with the requirement (Services et
al. 2017). Layer 2 switches should be used by the organization to avoid deadlock situations,
the switches must be configured with appropriate protocol to permit flex stacking, VLAN
support and inter VLAN layer 3 routing capability, and the router must have the option of
VPN service and gigabit Ethernet for the creation of the VLAN.
3.3. Discussion of the design
The network is required to be designed to protect the inner components from external
attacks like virus or hackers. A firewall should be installed at the entry and the exit point of
the network to block the unknown data packets. The VLAN is required to be configured
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 3 – ANALYSIS AND DESIGN
3.1. Chapter introduction
For designing the network solution an analysis is made on the requirement for the project and
a study is made of the vlan architecture for the development of the network framework. The
principles used for the development of the project are documented and a literature review is
done for analysis of the functional and the non-functional requirement of the project.
3.2. Discussion of the analysis
The VLAN architecture is analyzed for understanding the networking principles and
create an appropriate technique to transform the IPv4 address to IPv6 address scheme in the
proposed network design. The functional and the non- functional requirement of the project is
analyzed that consists of the functional characteristics and the behavior of the network
components on different situations (Safari 2017). The hardware used in the network and the
device that creates problem and waste time during sending and receiving the data packets are
analyzed. The requirement of the organization is required to be analyzed and the solution that
is deployed should also be analyzed depending and aligned with the requirement (Services et
al. 2017). Layer 2 switches should be used by the organization to avoid deadlock situations,
the switches must be configured with appropriate protocol to permit flex stacking, VLAN
support and inter VLAN layer 3 routing capability, and the router must have the option of
VPN service and gigabit Ethernet for the creation of the VLAN.
3.3. Discussion of the design
The network is required to be designed to protect the inner components from external
attacks like virus or hackers. A firewall should be installed at the entry and the exit point of
the network to block the unknown data packets. The VLAN is required to be configured

21
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
properly to handle the request and the different layers such as physical and data link layer
must be secured (Services, Routers and Routers 2017). A VPN service is required to be
configured for the VLAN works using the web server, the name of the website should be
linked with the IP address, and the permission must be set for the user accessing the libraries
of the web server. The email server must be configured with the file transfer protocol and the
DHCP server should be able to provide IP address to the dissimilar VLANs and static IP
address configured with IPv6 address scheme must be provided to the hosts connected to the
network.
3.4. Development Methodology
The network cabling plan is also required to be analyzed and find that the appropriate
cable is used for connecting the devices. The same devices such as the connection between
two switches should be done using a straight copper cable and the connection between the
router and the switch should be done using a cross copper cable (Webopedia.com 2017). The
problem that is causing the IP address translation and causing problem for the communication
with the IPv4 address can be eliminated with the configuration of the network devices with
the dual stacking method and configuring NAT (network address translation) to the router for
sending and receiving the data packets in the network (YouTube 2017). Thus, there is a
requirement of configuring the other hardware devices and there is no requirement to change
the hardware device, the layers of the devices must be configured to prevent the bottleneck
condition.
CHAPTER 4 – IMPLEMENTATION
4.1. Introduction
It is the phase of the creating the design and it requires different software like the
Cisco packet tracer for configuration of the network devices. Different challenges were faced
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
properly to handle the request and the different layers such as physical and data link layer
must be secured (Services, Routers and Routers 2017). A VPN service is required to be
configured for the VLAN works using the web server, the name of the website should be
linked with the IP address, and the permission must be set for the user accessing the libraries
of the web server. The email server must be configured with the file transfer protocol and the
DHCP server should be able to provide IP address to the dissimilar VLANs and static IP
address configured with IPv6 address scheme must be provided to the hosts connected to the
network.
3.4. Development Methodology
The network cabling plan is also required to be analyzed and find that the appropriate
cable is used for connecting the devices. The same devices such as the connection between
two switches should be done using a straight copper cable and the connection between the
router and the switch should be done using a cross copper cable (Webopedia.com 2017). The
problem that is causing the IP address translation and causing problem for the communication
with the IPv4 address can be eliminated with the configuration of the network devices with
the dual stacking method and configuring NAT (network address translation) to the router for
sending and receiving the data packets in the network (YouTube 2017). Thus, there is a
requirement of configuring the other hardware devices and there is no requirement to change
the hardware device, the layers of the devices must be configured to prevent the bottleneck
condition.
CHAPTER 4 – IMPLEMENTATION
4.1. Introduction
It is the phase of the creating the design and it requires different software like the
Cisco packet tracer for configuration of the network devices. Different challenges were faced
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
during the implementation of the VLAN configured with IPv6 in the proposed network
solution. The routers and the layer 3 switches must be configured with tunneling to allow the
devices to remove the tag when passing the packets forward.
4.2. Implementation
4.2.1. Challenges faced during the implementation
The firewalls have no option for the allocation of multiple VLAN in a single interface
connected with the trunk protocol. However different alternative solution were analyzed to
overcome this problem and it is connecting one physical trunk line with the router and
configuration of the sub interface for all the respective hosts connected with the router.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
during the implementation of the VLAN configured with IPv6 in the proposed network
solution. The routers and the layer 3 switches must be configured with tunneling to allow the
devices to remove the tag when passing the packets forward.
4.2. Implementation
4.2.1. Challenges faced during the implementation
The firewalls have no option for the allocation of multiple VLAN in a single interface
connected with the trunk protocol. However different alternative solution were analyzed to
overcome this problem and it is connecting one physical trunk line with the router and
configuration of the sub interface for all the respective hosts connected with the router.

23
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
4.2.2. Solution of the problem
The configuration of the router with the ACL can reduce the problem of transmission
of data packets through different devices in the network configured with IPv4 and IPv6
protocol and allowing the specific traffic on the trunk line to communicate and blocking the
other traffic to not cross the trunk line. During the configuration of the switch another
problem was found that the network switch cannot be configured with the VTP therefore
there is a need to find another technique and implement it for getting an appropriate solution.
4.2.3. Layer 3 switch configuration
interface Vlan99 standby version 2
ipv6 address 2001:DB8:BDCE:99::D1/64 ipv6 address FE80::D1 link-local
standby 1 ipv6 autoconfig standby 1 priority 150 standby 1 preempt
standby 1 timers msec 50 msec 250 ipv6 eigrp 1
Tracking Configurations:
config t
track 100 interface fa0/5 line-protocol
int fa 0/5
standby 1 track 100 decrement 60 exit
R2 conf t
ipv6 dhcp pool OFFICE_IPV6_DHCP domain-name switch.ccnp
dns-server 2001:db8:bdce:120::100 exit
interface s0/0/0
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
4.2.2. Solution of the problem
The configuration of the router with the ACL can reduce the problem of transmission
of data packets through different devices in the network configured with IPv4 and IPv6
protocol and allowing the specific traffic on the trunk line to communicate and blocking the
other traffic to not cross the trunk line. During the configuration of the switch another
problem was found that the network switch cannot be configured with the VTP therefore
there is a need to find another technique and implement it for getting an appropriate solution.
4.2.3. Layer 3 switch configuration
interface Vlan99 standby version 2
ipv6 address 2001:DB8:BDCE:99::D1/64 ipv6 address FE80::D1 link-local
standby 1 ipv6 autoconfig standby 1 priority 150 standby 1 preempt
standby 1 timers msec 50 msec 250 ipv6 eigrp 1
Tracking Configurations:
config t
track 100 interface fa0/5 line-protocol
int fa 0/5
standby 1 track 100 decrement 60 exit
R2 conf t
ipv6 dhcp pool OFFICE_IPV6_DHCP domain-name switch.ccnp
dns-server 2001:db8:bdce:120::100 exit
interface s0/0/0

24
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
ipv6 dhcp server OFFICE_IPV6_DHCP
interface s0/0/1
ipv6 dhcp server OFFICE_IPV6_DHCP
R1:
int fa0/1 ipv6 enable
ipv6 address 2001:db8:bdce:20::1/64 ipv6 address FE80::1 link-local
no shut
int loopback 0 ipv6 enable
ipv6 address 2001:db8:bdce:201::1/64 ipv6 address FE80::1 link-local
no shut
VTP:
vtp primary
config t
vtp domain SWITCHLAB vtp version 3
vtp mode server
vtp password Cisco123 end
interface range fastEthernet 0/3-4 switchport trunk encapsulation dot1q switchport mode
trunk
channel-group 10 mode desirable no shut
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
ipv6 dhcp server OFFICE_IPV6_DHCP
interface s0/0/1
ipv6 dhcp server OFFICE_IPV6_DHCP
R1:
int fa0/1 ipv6 enable
ipv6 address 2001:db8:bdce:20::1/64 ipv6 address FE80::1 link-local
no shut
int loopback 0 ipv6 enable
ipv6 address 2001:db8:bdce:201::1/64 ipv6 address FE80::1 link-local
no shut
VTP:
vtp primary
config t
vtp domain SWITCHLAB vtp version 3
vtp mode server
vtp password Cisco123 end
interface range fastEthernet 0/3-4 switchport trunk encapsulation dot1q switchport mode
trunk
channel-group 10 mode desirable no shut
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

25
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Spanning tree config
spanning-tree vlan 100,200 root primary spanning-tree vlan 99,110,120 root secondary
4.3. Demonstration of the Artifacts
The alternative of tunneling method is pruning and permitting the necessary traffic via
the VLAN, which also reduces the number of broadcast message, and thus flooding of the
switch is eliminated. The Central router is required to be configured with the ACL and
amplifying the network security. It should be configured with dual stacking for the
connecting the IPv4 and the Ipv6 devices.
4.3.1. Auto Ipv6 configuration
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Spanning tree config
spanning-tree vlan 100,200 root primary spanning-tree vlan 99,110,120 root secondary
4.3. Demonstration of the Artifacts
The alternative of tunneling method is pruning and permitting the necessary traffic via
the VLAN, which also reduces the number of broadcast message, and thus flooding of the
switch is eliminated. The Central router is required to be configured with the ACL and
amplifying the network security. It should be configured with dual stacking for the
connecting the IPv4 and the Ipv6 devices.
4.3.1. Auto Ipv6 configuration

26
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
4.4. Summary
The DHCP and DNS server is required to be configured and a pool should be
allocated for each of the configured VLAN with IPv6. The web server must be configured
with an IP address and the Email server is required to be configured with FTP, SMTP
services and different ports must be blocked and allowed for communicate with the different
VLANs connected with the network.
CHAPTER 5 – TESTING
5.1. Testing techniques
For the testing of the network and proper working of the VLAN the servers
configured with the IPv6 address and the network must be tested. The testing can be done
following the white box testing methodology.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
4.4. Summary
The DHCP and DNS server is required to be configured and a pool should be
allocated for each of the configured VLAN with IPv6. The web server must be configured
with an IP address and the Email server is required to be configured with FTP, SMTP
services and different ports must be blocked and allowed for communicate with the different
VLANs connected with the network.
CHAPTER 5 – TESTING
5.1. Testing techniques
For the testing of the network and proper working of the VLAN the servers
configured with the IPv6 address and the network must be tested. The testing can be done
following the white box testing methodology.

27
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
5.2. Testing plan
Different code is used for testing the network and the errors occurring during the test
must be mitigated for preventing hacking and loss of data.
5.2.1. Show Run Configuration
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
5.2. Testing plan
Different code is used for testing the network and the errors occurring during the test
must be mitigated for preventing hacking and loss of data.
5.2.1. Show Run Configuration
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

28
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS

29
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS

30
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

31
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
5.3. Discussion
The network can be tested pinging from different layers of the switch to all the hosts
configured with IPv4 and IPv6 addressing schemes. The host connected with the network
should be pinged with the router and the loss of the data packets must be noted. The VLANs
must also be pinged with each other to find the proper working of the VLANs. The loopback
command can also be used for the testing the working of the DHCP address.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
5.3. Discussion
The network can be tested pinging from different layers of the switch to all the hosts
configured with IPv4 and IPv6 addressing schemes. The host connected with the network
should be pinged with the router and the loss of the data packets must be noted. The VLANs
must also be pinged with each other to find the proper working of the VLANs. The loopback
command can also be used for the testing the working of the DHCP address.

32
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 6 – EVALUATION AND CONCLUSION
Evaluation against objectives-
The components in the report are properly reviewed and some problems were
identified in the implementation part of the report. This describes the challenges faced during
the configuration of the router and the switches connected in the network.
End user perspective-
The network must not face any lag while transmitting the data packets from the source
to the destination. The broadcast message can be reduced with the configuration of the switch
with ACL protocol.
Project Managers perspective-
There is a requirement found at the end of the configuration that the routers and the
switches must be configured with dual stacking and tunneling method and thus priorities are
not required to be set. Some of the STP are used for blocking the port for the DHCP client
and the firewall is not configured because it does not support multiple host connection.
Developer’s perspective-
The testing of the network is done without any problems and thus the project
completed successfully. It can be concluded that the problem occurs in the network due to
mismatch of the IP address configuration and generation of traffic from broadcasting message
from the switches.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
CHAPTER 6 – EVALUATION AND CONCLUSION
Evaluation against objectives-
The components in the report are properly reviewed and some problems were
identified in the implementation part of the report. This describes the challenges faced during
the configuration of the router and the switches connected in the network.
End user perspective-
The network must not face any lag while transmitting the data packets from the source
to the destination. The broadcast message can be reduced with the configuration of the switch
with ACL protocol.
Project Managers perspective-
There is a requirement found at the end of the configuration that the routers and the
switches must be configured with dual stacking and tunneling method and thus priorities are
not required to be set. Some of the STP are used for blocking the port for the DHCP client
and the firewall is not configured because it does not support multiple host connection.
Developer’s perspective-
The testing of the network is done without any problems and thus the project
completed successfully. It can be concluded that the problem occurs in the network due to
mismatch of the IP address configuration and generation of traffic from broadcasting message
from the switches.

33
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
OVERALL CONCLUSION SUMMARY
The report is prepared analyzing the different methodology and configuration
techniques used for configuring an Internet protocol address. The project is developed after a
proper planning and preparation of a gnat chart. A literature review of the project is prepared
for understanding the working principle of Internet protocol. Then the analysis and the design
of the network are done. After the preparation of the design the solution is required to be
tested multiple time for finding errors in the system and mitigate it immediately. The whole
project has been developed on Cisco Packet Tracer and minor complication was faced for
running the commands and different resources were studied for configuring the router and the
switches with IPv6 protocol.
Future development
The configured network with IPv6 has eliminated the risk of data loss in the current
network from the study on the networking concept it has been found that the configuration of
the router with ACL command can be used for removing the bottleneck. Thus there is scope
of future development of the project. I have a keen interest on the network and security the
security in the proposed network can be improved with configuring the firewall and allowing
and blocking request from different terminals. The intrusion attack on the network is required
to be eliminated for increasing the efficiency of the network. Different authentication
methods are required to be applied in the hardware devices for the proper working of the
system.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
OVERALL CONCLUSION SUMMARY
The report is prepared analyzing the different methodology and configuration
techniques used for configuring an Internet protocol address. The project is developed after a
proper planning and preparation of a gnat chart. A literature review of the project is prepared
for understanding the working principle of Internet protocol. Then the analysis and the design
of the network are done. After the preparation of the design the solution is required to be
tested multiple time for finding errors in the system and mitigate it immediately. The whole
project has been developed on Cisco Packet Tracer and minor complication was faced for
running the commands and different resources were studied for configuring the router and the
switches with IPv6 protocol.
Future development
The configured network with IPv6 has eliminated the risk of data loss in the current
network from the study on the networking concept it has been found that the configuration of
the router with ACL command can be used for removing the bottleneck. Thus there is scope
of future development of the project. I have a keen interest on the network and security the
security in the proposed network can be improved with configuring the firewall and allowing
and blocking request from different terminals. The intrusion attack on the network is required
to be eliminated for increasing the efficiency of the network. Different authentication
methods are required to be applied in the hardware devices for the proper working of the
system.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

34
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Appendix - A
HND PROJECT PRESENTATION
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Appendix - A
HND PROJECT PRESENTATION

35
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS

36
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

37
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Appendix – B
PROJECT SPECIFICATION DOCUMENT
Student Name: Student ID:
Project Title: IPV6 – The Next Generation of Internet Protocol
Pathway:
AIM: The main aim of the project is to analyze the internet protocol suite and its
foundation protocol IP versions and highlight the emergence of the IPv6 with the growth of
the internet. The issues associated with the deployment of the IPv6 is also analyzed and
documented in the report.
Objectives:
The main objective of the project are as follows:
1. To analyze the growth of the internet and the needs for the deployment of the IPv6
address
2. To create a gnat chart describing the project plan for the development of the project
3. To realize the aim of the project and proceed with the project plan for further
development of the project
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Appendix – B
PROJECT SPECIFICATION DOCUMENT
Student Name: Student ID:
Project Title: IPV6 – The Next Generation of Internet Protocol
Pathway:
AIM: The main aim of the project is to analyze the internet protocol suite and its
foundation protocol IP versions and highlight the emergence of the IPv6 with the growth of
the internet. The issues associated with the deployment of the IPv6 is also analyzed and
documented in the report.
Objectives:
The main objective of the project are as follows:
1. To analyze the growth of the internet and the needs for the deployment of the IPv6
address
2. To create a gnat chart describing the project plan for the development of the project
3. To realize the aim of the project and proceed with the project plan for further
development of the project

38
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
4. To analyze the scope of the project and the where it can be applied for increasing the
operatibility of the network
Brief Description:
The project of ‘IPV6 – The Next Generation of Internet Protocol’ started with the creation
of the project proposal and the project plan. A literature review is done for understanding
the working principle of the internet protocol and the different protocols used for
configuring the IP address in a network. The use of the hardware devices that is essential
for configuring the IP address such as the layer 2 and the layer 3 switches are also analyzed
for creation of the report and performing the practical operation. Cisco packet tracer is used
for configuring the devices and finding the flaws in the network when more data is
generated in the network. The routers and the switches are configured with the tunneling
protocol such that the old devices that are configured with IPv4 configuration can operate
with the IPv6 configured devices. The IPv6 uses 128 bit addressing whereas IPv4 uses 32
bit address and thus have the limitation to accommodate the growing number of devices in
the network. Different protocols and techniques are used for the transformation of the Ipv4
with the IPv6 address without affecting the network and for increasing the efficiency of the
network. The proper configuration of the router and the end devices are necessary for the
implementation of the IPv6 address scheme in an old network currently running using the
IPv4 addressing. The implementation of the IPv6 helps to increase the address space of the
network but there is as requirement of proper subnetting for reducing the wastage of the IP
address. A verification must be done on the network where the IPv6 addressing is required
to be implemented because all the devices are not capable to run using the IPv6 address as
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
4. To analyze the scope of the project and the where it can be applied for increasing the
operatibility of the network
Brief Description:
The project of ‘IPV6 – The Next Generation of Internet Protocol’ started with the creation
of the project proposal and the project plan. A literature review is done for understanding
the working principle of the internet protocol and the different protocols used for
configuring the IP address in a network. The use of the hardware devices that is essential
for configuring the IP address such as the layer 2 and the layer 3 switches are also analyzed
for creation of the report and performing the practical operation. Cisco packet tracer is used
for configuring the devices and finding the flaws in the network when more data is
generated in the network. The routers and the switches are configured with the tunneling
protocol such that the old devices that are configured with IPv4 configuration can operate
with the IPv6 configured devices. The IPv6 uses 128 bit addressing whereas IPv4 uses 32
bit address and thus have the limitation to accommodate the growing number of devices in
the network. Different protocols and techniques are used for the transformation of the Ipv4
with the IPv6 address without affecting the network and for increasing the efficiency of the
network. The proper configuration of the router and the end devices are necessary for the
implementation of the IPv6 address scheme in an old network currently running using the
IPv4 addressing. The implementation of the IPv6 helps to increase the address space of the
network but there is as requirement of proper subnetting for reducing the wastage of the IP
address. A verification must be done on the network where the IPv6 addressing is required
to be implemented because all the devices are not capable to run using the IPv6 address as

39
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
they were designed for IPv4 address.
The objectives of the project are aligned during the development of the project. The
different network components are analyzed and the network design is created using the
cisco packet tracer. The devices are configured with appropriate protocol and all the
devices are connected with a central server and the IPs are provided to the hosts connected
to it. The network is tested and the more devices are added with IPv6 address without
changing the structure of the network or changing the cabling plan. A power point poster
and slides are created for the demonstration of the proper working of the project.
Special Conditions; eg assumptions, risks
It is assumed that only cisco network devices are used for designing the network. This is
because we are using the cisco packet tracer software and here there is no other device
available. Thus only cisco routers and switches are used for designing and analysis.
Limited numbers of hosts are used for the configuration and they are grouped into two
parts. The first groups of hosts are configured with IPv4 address while the second group is
configured with IPv6 address. The network is created in the cisco layer 3 switch and it is
also assumed that during the implementation phase the cisco devices would have the same
ports and configuration as the other devices available in the market.
There are different risks that may arise during the development of the project such as lack
of expertise for proper configuration of the project. The device chosen for deigning the
network may not have the proper function required for configuration of the device. The
time also acts as a factor because the project is required to be completed with a time of six
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
they were designed for IPv4 address.
The objectives of the project are aligned during the development of the project. The
different network components are analyzed and the network design is created using the
cisco packet tracer. The devices are configured with appropriate protocol and all the
devices are connected with a central server and the IPs are provided to the hosts connected
to it. The network is tested and the more devices are added with IPv6 address without
changing the structure of the network or changing the cabling plan. A power point poster
and slides are created for the demonstration of the proper working of the project.
Special Conditions; eg assumptions, risks
It is assumed that only cisco network devices are used for designing the network. This is
because we are using the cisco packet tracer software and here there is no other device
available. Thus only cisco routers and switches are used for designing and analysis.
Limited numbers of hosts are used for the configuration and they are grouped into two
parts. The first groups of hosts are configured with IPv4 address while the second group is
configured with IPv6 address. The network is created in the cisco layer 3 switch and it is
also assumed that during the implementation phase the cisco devices would have the same
ports and configuration as the other devices available in the market.
There are different risks that may arise during the development of the project such as lack
of expertise for proper configuration of the project. The device chosen for deigning the
network may not have the proper function required for configuration of the device. The
time also acts as a factor because the project is required to be completed with a time of six
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

40
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
months and some of the aims and objectives of the project may remain incomplete and
would be completed in future.
Resources:
The resources for the completion of the project is our supervisor without whom the project
would not been completed. The access of the college library also helped us to get different
articles and study materials for troubleshooting the IP configuration. There are different
internet protocol guides available in the internet which is also accessed for solving the
problem and develop the project successfully. The list of books accessed for the
development of the project are as follows:
Feldkamp, N., Bergmann, S. and Strassburger, S., 2015, December. Visual analytics of
manufacturing simulation data. In Proceedings of the 2015 Winter Simulation
Conference (pp. 779-790). IEEE Press.
Goransson, P., Black, C. and Culver, T., 2016. Software Defined Networks: A
Comprehensive Approach. Morgan Kaufmann.
Grama, C., 2016. Adapting Lean User Experience Process for Enterprise Environment.
Hanuliak, P. and Hanuliak, M., 2013. Performance modeling of parallel computers NOW
and Grid. American Journal of Networks and Communications, 2(5), pp.112-124.
Murray, J., Wettin, P., Pande, P.P. and Shirazi, B., 2016. Sustainable Wireless Network-
on-Chip Architectures. Morgan Kaufmann.
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
months and some of the aims and objectives of the project may remain incomplete and
would be completed in future.
Resources:
The resources for the completion of the project is our supervisor without whom the project
would not been completed. The access of the college library also helped us to get different
articles and study materials for troubleshooting the IP configuration. There are different
internet protocol guides available in the internet which is also accessed for solving the
problem and develop the project successfully. The list of books accessed for the
development of the project are as follows:
Feldkamp, N., Bergmann, S. and Strassburger, S., 2015, December. Visual analytics of
manufacturing simulation data. In Proceedings of the 2015 Winter Simulation
Conference (pp. 779-790). IEEE Press.
Goransson, P., Black, C. and Culver, T., 2016. Software Defined Networks: A
Comprehensive Approach. Morgan Kaufmann.
Grama, C., 2016. Adapting Lean User Experience Process for Enterprise Environment.
Hanuliak, P. and Hanuliak, M., 2013. Performance modeling of parallel computers NOW
and Grid. American Journal of Networks and Communications, 2(5), pp.112-124.
Murray, J., Wettin, P., Pande, P.P. and Shirazi, B., 2016. Sustainable Wireless Network-
on-Chip Architectures. Morgan Kaufmann.

41
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Comments:
SIGNED OFF: STUDENT:
DATE:
Project Supervisor
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Comments:
SIGNED OFF: STUDENT:
DATE:
Project Supervisor

42
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Bibliography
Feldkamp, N., Bergmann, S. and Strassburger, S., 2015, December. Visual analytics of
manufacturing simulation data. In Proceedings of the 2015 Winter Simulation
Conference (pp. 779-790). IEEE Press.
Goransson, P., Black, C. and Culver, T., 2016. Software Defined Networks: A
Comprehensive Approach. Morgan Kaufmann.
Grama, C., 2016. Adapting Lean User Experience Process for Enterprise Environment.
Hanuliak, P. and Hanuliak, M., 2013. Performance modeling of parallel computers NOW and
Grid. American Journal of Networks and Communications, 2(5), pp.112-124.
Murray, J., Wettin, P., Pande, P.P. and Shirazi, B., 2016. Sustainable Wireless Network-on-
Chip Architectures. Morgan Kaufmann.
Safari. (2017). Todd Lammle's CCNA/CCENT IOS Commands Survival Guide: Exams 100-
101, 200-101, and 200-120 [Book]. [online] Available at:
https://www.safaribooksonline.com/library/view/todd-lammles-ccnaccent/9781118820070/
[Accessed 25 Feb. 2017].
Services, P., Management, C., (APIC), C., Literature, D. and Papers, W. (2017). Application
Centric Infrastructure Overview: Implement a Robust Transport Network for Dynamic
Workloads. [online] Cisco. Available at:
http://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/aci-fabric-
controller/white-paper-c11-729587.html [Accessed 25 Feb. 2017].
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Bibliography
Feldkamp, N., Bergmann, S. and Strassburger, S., 2015, December. Visual analytics of
manufacturing simulation data. In Proceedings of the 2015 Winter Simulation
Conference (pp. 779-790). IEEE Press.
Goransson, P., Black, C. and Culver, T., 2016. Software Defined Networks: A
Comprehensive Approach. Morgan Kaufmann.
Grama, C., 2016. Adapting Lean User Experience Process for Enterprise Environment.
Hanuliak, P. and Hanuliak, M., 2013. Performance modeling of parallel computers NOW and
Grid. American Journal of Networks and Communications, 2(5), pp.112-124.
Murray, J., Wettin, P., Pande, P.P. and Shirazi, B., 2016. Sustainable Wireless Network-on-
Chip Architectures. Morgan Kaufmann.
Safari. (2017). Todd Lammle's CCNA/CCENT IOS Commands Survival Guide: Exams 100-
101, 200-101, and 200-120 [Book]. [online] Available at:
https://www.safaribooksonline.com/library/view/todd-lammles-ccnaccent/9781118820070/
[Accessed 25 Feb. 2017].
Services, P., Management, C., (APIC), C., Literature, D. and Papers, W. (2017). Application
Centric Infrastructure Overview: Implement a Robust Transport Network for Dynamic
Workloads. [online] Cisco. Available at:
http://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/aci-fabric-
controller/white-paper-c11-729587.html [Accessed 25 Feb. 2017].
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

43
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Services, P., Routers, B. and Routers, C. (2017). Cisco 2911 Integrated Services Router.
[online] Cisco. Available at: http://www.cisco.com/c/en/us/products/routers/2911-integrated-
services-router-isr/index.html [Accessed 25 Feb. 2017].
Webopedia.com. (2017). What is Black Box Testing? Webopedia Definition. [online]
Available at: http://www.webopedia.com/TERM/B/Black_Box_Testing.html [Accessed 25
Feb. 2017].
Webopedia.com. (2017). What is White Box Testing? Webopedia Definition. [online]
Available at: http://www.webopedia.com/TERM/W/White_Box_Testing.html [Accessed 25
Feb. 2017].
YouTube. (2017). danscourses. [online] Available at:
https://www.youtube.com/user/danscourses [Accessed 25 Feb. 2017].
NETWORK ENGINEERING AND TELECOMMUNICATION SYSTEMS
Services, P., Routers, B. and Routers, C. (2017). Cisco 2911 Integrated Services Router.
[online] Cisco. Available at: http://www.cisco.com/c/en/us/products/routers/2911-integrated-
services-router-isr/index.html [Accessed 25 Feb. 2017].
Webopedia.com. (2017). What is Black Box Testing? Webopedia Definition. [online]
Available at: http://www.webopedia.com/TERM/B/Black_Box_Testing.html [Accessed 25
Feb. 2017].
Webopedia.com. (2017). What is White Box Testing? Webopedia Definition. [online]
Available at: http://www.webopedia.com/TERM/W/White_Box_Testing.html [Accessed 25
Feb. 2017].
YouTube. (2017). danscourses. [online] Available at:
https://www.youtube.com/user/danscourses [Accessed 25 Feb. 2017].
1 out of 44
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.