Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Interstate Banking Application on CISCO Packet Tracer using
Transcript of Interstate Banking Application on CISCO Packet Tracer using
EIGRP is an enhanced version of IGRP. The same distance vector technology found in IGRP is also used in EIGRP, and the underlying distance information remains unchanged.
Domain Name System
Computers and other network devices on the Internet use an IP address to route our request to the site we're trying to reach.
This is similar to dialing a phone number to connect to the person we're trying to call. This is done through DNS, though, we don't have to keep our own address book of IP addresses.
Voice over Internet Protocol
It continuously samples audio.
Converts each sample to digital form.
Sends the resulting digitized stream accross an IP network in packets.
Converts the stream back to analog for playback.
Interstate Banking Application on CISCO Packet Tracer using VOIP
The main objective of this project is to create a real life scenario on Interstate banks using packet tracer, implementing VOIP in it, to show the various operations performed in between the various branches of a bank. This development can be deployed further in many fields like Hospitals, Colleges and Schools etc.
File Transfer Protocol (FTP)
FTP is a reliable, connection-oriented tool used to copy files from one computer to another over a TCP/IP network, such as the Internet of an intranet.
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.
All computers that belong to a subnet are addressed with a common, identical, most-significant bit-group in their IP address. This results in the logical division of an IP address into two fields, a network or routing prefix and the rest field or host identifier. The rest field is an identifier for a specific host or network interface.
Benefits of subnetting
Reduced network traffic
Optimized network performance
Facilitated spanning of large geographical distances
In order to configure the routers with EIGRP we type the following commands in the CLI of the routers.
We write all the configuring commands in
the configuration mode.
Router(config)# router eigrp 10
Here 10 is the autonomous number.
Router(config)# network 18.104.22.168
Router(config)# network 22.214.171.124
The above are the two base address networks for a router.
In case of a second and third router,
we give three base address networks,
as they are connected to three networks respectively.
This is the command prompt of a computer connected to one of the routers .We have successfully pinged it to the ip address 126.96.36.199, and also have received a reply from it.From the diagram it’s clear that the average time for EIGRP protocol here is
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols used in networking, in either Real Time or Simulation mode.
Transmission of voice telephone calls using internet infrastructure.
VoIP to VoIP
Encoding-Pulse Code Modulation (PCM)
Transmission-Real-Time Transport Protocol (RTP)
Note: RTP is not a transport-layer protocol.
It is a transfer protocol that operates at Layer 5.
Each RTP message is encapsulated in UDP datagram, which is then encapsulated in an IP datagram for transmission.
Instead, we just connect through a domain name server, also called a DNS server or name server, which manages a massive database that maps domain names to IP addresses.
After a TCP connection is established, an FTP control connection is created. Internal FTP commands are passed over this logical connection based on formatting rules established by the Telnet protocol.
Each command sent by the client receives a reply from the server to indicate whether it succeeded or failed. A data connection is established for each individual data transfer to be performed.
Multiple data types and file types are supported to allow flexibility for various types of transfers.
To ensure that files are sent and received without loss of data that could corrupt them, FTP uses the reliable Transmission Control Protocol (TCP) at the transport layer.
An authentication system is used to ensure that only authorized clients are allowed to access a server