You are on page 1of 19

JSPM’S BHIVRABAI SAWANT POLYTECHNIC WAGHOLI

CENTER OF ACADEMIC EXCELLENCE


Approval by AICTE New Delhi, Recognized by the Govt. of Maharashtra and
Affiliated to MSBTE, Mumbai.

Institute Code: 0710

Title of Micro project: Configure TCP protocol using cisco packet tracer
Academic Year: 2023-24 Course: Advance computer Network Course Code:22520

Submitted By:

Roll Student Name Sign of Student


No
26 Nirwal Shital Uddhavrao

27 Dongare Prema Tukaram

28 More Aditya Deepak

29 Bhoivade Pratiksha Yadav

30 Bobade Eshwari Raju

HOD Of Department: Under the guidance of:

Prof. S.G .Gaikwad Mrs.


BHIVRABAI SAWANT POLYTECHNIC, WAGHOLI
PUNE
ANEEXURE II

Evaluation Sheet for the Micro Project

Academic Year: 2023-24 Name of the Faculty: Mrs.


Course : Advance Computer Network course : 22520 Semester : 5th

Cos addressed by Micro Project:

A: ……………………………………………………………………………………………………………

B: …………………………………………………………………………………………………………….

C: ……………………………………………………………………………………………………………..

D: ……………………………………………………………………………………………………………..
Major learning outcomes achieved by students by doing the project

(a) Practical outcome : …………………………………………………………………………………

(b) Unit outcomes in Cognitive domain : …………………………………………………………………

(c) Outcomes in Affective domain : ………………………………………………………………………


Comments/suggestions about team work /leadership/inter-personal communication (if any)

Marks out of 6 for Marks out of 4for


performance in performance in oral/
Student Name Total
Roll group activity presentation out of
No (D5 Col.8) (D5 Col.9) 10
26 Nirwal Shital Uddhavrao

27 Dongare Prema Tukaram

28 More Aditya Deepak

29 Bhoivade Pratiksha Yadav

30 Bobade Eshwari Raju

(Name and Signature of Faculty)


JAYAWANT SHIKSHAN PRASARAK MANDAL’s
Bhivrabai Sawant Polytechnic
(Approved by AICTE, New Delhi, Govt. of Maharashtra, Affiliated to MSBTE Mumbai) Gat No. 720
(1&2), Wagholi, Pune-Nagar Road, Pune-412207)
Phone: 020 – 65335100 Tele fax: - + 91-020-65335100
E-mail: bspoly@rediffmail.com Website: www.jspm.edu.in

Vision and Mission of the Institute

Vision:
To develop globally competent technocrats by imparting quality technical education for socio-
economic

enhancement of the nation

Mission:
M1: To nurture and maintain an environment of high academic standard for diploma students,
encouraging

higher education and entrepreneurial abilities.

M2: To deliver quality education by imparting basic engineering knowledge, interpersonal skills,
critical
thinking and creativity.

M3: To equip students with technical skills, ethical and moral values to meet aspirations of the
society and
industry to contribute sustainable development of the nation.
JAYAWANT SHIKSHAN PRASARAK MANDAL’s

BhivrabaiSawant Polytechnic
(Approved by AICTE, New Delhi, Govt. of Maharashtra, Affiliated to MSBTE Mumbai)
Gat No. 720 (1&2), Wagholi, Pune-Nagar Road, Pune-412207)
Phone: 020 – 67335100 Tele fax: - + 91-020-67335100
E-mail: bspoly@rediffmail.com Website: www.jspm.edu.in

Computer Engineering Department


Academic Year: 2023-2024

Vision

To develop technical manpower in the field of computer engineering to contribute the Socio-industrial
requirement.

Mission

M1: To develop techno-savvy engineers by imparting comprehensive computer engineering knowledge by


innovative teaching and learning process.
M2: To develop professional skills committed for lifelong learning through co-curricular and extracurricular
activities.
M3: To impart Computer Engineering education in order to meet societal and industry needs.

Course Coordinator Module Coordinator HOD


Micro Project Plan

Week Date Work or activity Performed Sign of the


Duration
No. Guide
in hours

1 One hour
Group Discussion on Topic

2 One hour
Assign task to group

3 One hour
Giving Particular Information

4 One hour
Got Course and Practical Outcomes

5 One hour
Taking Review about collected Data

6 One hour
Verify Material in Sequence

7 One hour
Discussion on Suggestions

8 One hour
Arrange Data in Sequence

9 One hour
Prepare proposal of the project

One hour
Verify the Draft from Teacher
10
One hour
Rearrange the data
11
One hour
Share Data among Group
12
One hour
Prepare the report
13
One hour
Work on Data
14
One hour
Prepare soft copy
15
One hour
Submission
16
ACKNOWLEDGEMENT

"I would like to express my sincere gratitude to all those who contributed to the successful
design of the configuration of TCP protocol using sisco packet tracer. Your dedication and hard work have
been instrumental in bringing this project to fruition.
Special thanks to them, whose expertise and guidance were invaluable throughout the design
process.
I would also like to extend my appreciation to the entire project team for their tireless efforts.
Furthermore, I want to acknowledge the support and encouragement provided by Sanjivani mam during this
project. Their insights and feedback greatly enhanced the quality of our design.
Finally, I want to thank my family and friends for their unwavering support and understanding during
this project. Your encouragement kept me motivated throughout.
This project would not have been possible without the collective effort and commitment of everyone
involved. Thank you all for your contributions."
ABSTRACT

Title: configure TCP protocol using sisco packet tracer.

The Transmission Control Protocol (TCP) is a fundamental communication protocol in computer networks,
widely used for reliable and ordered data transmission. This abstract provides an overview of TCP,
highlighting its key features, functions, and importance in modern networking.
TCP operates at the transport layer of the OSI model and ensures reliable, error-checked, and in-order delivery
of data between devices over IP networks. It achieves this through a combination of techniques, including
connection establishment, flow control, congestion control, and error detection and correction.
One of TCP's notable features is its three-way handshake mechanism, which establishes a connection between
sender and receiver before data transfer begins. It also implements flow control to prevent overwhelming the
receiver with data, and congestion control to avoid network congestion and ensure fair bandwidth usage.
TCP's reliability is achieved through acknowledgment mechanisms, retransmissions of lost packets, and
sequencing of data. This ensures that data is received exactly as it was sent, making TCP suitable for
applications where data integrity is critical, such as web browsing, email, file transfer, and more.
In summary, TCP plays a vital role in modern networking by providing a dependable and ordered data
delivery service. Its robustness and widespread adoption make it a cornerstone protocol for the internet and
various applications, contributing to the seamless exchange of information in our digital world.
INTRODUCTION

In the realm of computer networking, where data travels across vast and complex networks, the Transmission
Control Protocol, or TCP, stands as a pillar of reliability and order. This protocol, nestled within the layers of
the OSI model, plays a fundamental role in ensuring that the digital information we send and receive reaches
its destination intact and in the correct sequence.

TCP, often referred to as one of the core protocols of the internet, is the glue that holds together our
interconnected world. It provides a robust and predictable framework for communication over IP networks,
guaranteeing that data arrives at its intended endpoint without errors and in the order in which it was
transmitted. This level of assurance is paramount in applications ranging from web browsing and email to file
transfers and video streaming.

At the heart of TCP's operation is a fascinating dance known as the three-way handshake, which establishes a
connection between sender and receiver, paving the way for data transmission. Once this connection is
formed, TCP's suite of mechanisms comes into play, including flow control to prevent data overload,
congestion control to keep networks from becoming overwhelmed, and error detection and correction to
ensure the integrity of the data.

This introduction sets the stage for an exploration of TCP, a protocol that quietly but powerfully underpins our
digital interactions. As we delve deeper into its workings, we will uncover the intricate mechanisms that make
TCP a cornerstone of modern networking, enabling the seamless flow of information across the vast expanse
of the internet.
OBJECTIVES

The objective of the Transmission Control Protocol (TCP) is to provide a reliable, connection-oriented, and
ordered data transmission service in computer networks. TCP achieves this by implementing a set of key
mechanisms and functionalities to ensure that data sent from a source reaches its intended destination
intact and in the correct order. Here are the primary objectives of the TCP protocol:

Reliability: TCP aims to guarantee that data sent over a network arrives without errors and is
acknowledged by the receiver. It accomplishes this by using acknowledgment mechanisms and
retransmission of lost packets.

Ordered Delivery: TCP ensures that data is delivered in the same order in which it was sent. This is crucial
for applications where the sequence of data packets matters, such as file transfers or streaming media.

Connection Establishment and Termination: TCP employs a three-way handshake to establish a connection
between sender and receiver and a four-way handshake to gracefully terminate the connection when data
exchange is complete.

Flow Control: TCP implements flow control mechanisms to prevent the sender from overwhelming the
receiver with data. This helps ensure efficient and fair data transfer across networks with varying speeds
and capacities.

Congestion Control: TCP monitors network congestion and adjusts its transmission rate to avoid
overloading the network. This helps maintain stable network performance and prevents congestion-related
issues.

Error Detection and Correction: TCP includes error-checking mechanisms to detect and correct errors that
may occur during data transmission. This contributes to the high level of data integrity that TCP provides.

Full-Duplex Communication: TCP supports full-duplex communication, allowing data to flow in both
directions simultaneously. This bidirectional capability is essential for real-time interactive applications and
many other network services.

In summary, the primary objective of TCP is to ensure the reliable and orderly exchange of data between
devices over IP networks. By fulfilling these objectives, TCP has become a foundational protocol that
underpins various internet services and applications, contributing to the seamless communication and
sharing of information in the digital age.
Project name: configure TCP protocol using cisco packet tracer

The Transmission Control Protocol (TCP) is one of the main protocols used in computer networking
and the Internet. It is part of the Internet Protocol suite, and its primary purpose is to provide
reliable, connection-oriented communication between two devices over a network.
TCP is widely used for applications that require reliable and ordered data delivery, such as web
browsing, email, file transfer (e.g., FTP), and more. It is part of the transport layer of the OSI model
and is complemented by the Internet Protocol (IP) at the network layer to enable end-to-end
communication across the internet.
Some of the examples for them are TCP/IP, HTTP, HTTPS and FTP. Even if you have an unreliable
network, the TCP has the capability to offer reliable and end-to-end byte stream.
TCP has its own services which are as follows:
1. Process -to- process communication
TCP provides process to process communication using port numbers.

2. Stream-oriented communication
Stream-oriented communication is a form of communication in which timing plays an
important role. Stream-oriented communication is also referred to as continuous streams of data.
Advantages of TCP protocol over UDP

 Data Re-transmission
During every handshake, TCP segments are being transmitted from sender to receiver.
Sometimes in between the transport, the segments may get lost failing to reach its
destination. Due to this an acknowledgement will be sent to the sender from the receiver, so
that the sender can re transmit the segment back again.

 Congestion Control
In order for avoiding congestions, TCP uses a separate congestion control policy. Basically
congestion happens when the sender send out too many data packets in a given time. For
preventing these the receiver sends signals to the sender in order for slowing the process
down or delaying the transmission. Right amount of data is being transmitted to keep the
network saturated.

 Unique identification
In TCP each computer on the network has been assigned with an unique IP address making it
identifiable over the network. Besides that each domain is assigned with a name. Therefore,
ultimately TCP provides benefits of name and address resolution services.

 In Order Delivery
Whenever a packet is sent, it cannot be guaranteed that it will be in order once it reaches its
host. The order might get lost in between. Therefore, before reaching the application, TCP
takes necessary steps to rearrange them in order.

 Error Detection
Error in the TCP can negatively impact on performance and connectivity services. Detecting
errors like corrupted and missing segments is relatively easy in TCP. It is generally done
through 3 steps. Those are the checksum, re transmission and acknowledgement.
Disadvantages of TCP protocols

 Slow Start
The process of TCP is always slow at the beginning. Only after a certain period of time the
speed will get accelerated. This can be especially disadvantageous when downloading larger
streams of data. Always you cannot acquire the full speed once you try to download larger
files, the process will be slow at the beginning and eventually the speed will get increased until
the download process is finished.

 Image Blockings
If there are more than one image present in a webpage and in case one of them is lost. TCP
will not be able to deliver other parts of the stream. Which means that other images will not
load if there are problems in one of them (The data will not be delivered to the browser until
all the images are loaded). These types of similar problems can be especially noticeable when
watching online videos. Once the connection is lost, the TCP will be retrieving even if other
parts of the video is watchable.

 Loss result of Congestion


Whenever there is a data congestion, TCP will be slowing down so that it can send traffic in a
steady rate. Although this can be beneficial for wired networking, it is not advantageous in the
case of a wireless connection. Even if there is a connection drop in a wireless network, the TCP
has to assume that the connection is unreliable and keep sending traffic at the same rate.

 Slow Handshake
Always when a connection is established, the TCP will be performing a handshake between the
sender and the receiver. This process can ultimately cause the connection establishment to
slowdown. However this won't be problematic until there is a use of devices with high latency.
Generally such devices can experience long time to establish a TCP connection.

 Network Optimization
Originally a TCP connection is optimized only for Wide Area Networks (WAN). It was not
designed for small networks such as Local Area Network (LAN) and Personal Area Network
(PAN). Therefore, the user has to switch to WAN services for acquiring maximum benefits out
of this connection.
Some of the limitations of using TCP are :

 It does not support broadcast or multicast transmission.


 TCP offers several features that we may not want. These features may result in a waste of
bandwidth, time, or effort.
 While establishing a connection, TCP performs a handshake between the sender and the
receiver. This slows down the connection establishment. However, this issue can be solved
using high latency devices.

TCP protocol Simulation output.

Procedure:

Step-1: (Configuring Router0):

1. Select a 2911 Router from Network Devices and drag and drop to the workspace.
2. Select Router0 and Go to Config.
3. Configure the GigabitEthernet0/0 by assigning IP address as 192.168.1.1 and subnet
mask as 255.255.255.0 and turn on the port status
4. Configure the GigabitEthernet0/1 by assigning IP address as 10.0.0.1 and subnet mask as
255.0.0.0 and turn on the port status.

Step-2: (Configuring PCs):

1. Select two PC-PT type PCs from End devices and drag and drop to the workspace.
2. Select PC0 and go to FastEthernet0 in config and assign IP address and subnet mask for the
PC0 as 192.168.1.2, 255.255.255.0
3. Select PC1 and go to FastEthernet0 in config and assign IP address and subnet mask for the
PC1 as 192.168.1.3, 255.255.255.0
4. For both the PCs (PC0, PC1) go to Global settings in config and Assign default gateway as
192.168.1.1
Step-3: (Configuring Server0):

1. Select a server from End devices and drag and drop to the workspace.
2. Go to the global settings in config and assign default gateway as 10.0.0.1
3. Go to FastEthernet0 and assign IP address and subnet mask as 10.0.0.2, 255.0.0.0
4. Go to services and open FTP Service.
5. Go to user setup and create a username and password.
6. Select all the permissions (Write, Read, Delete, Rename, List) and add the user.

User setup:
Step-4: (Configuring Switch and Making connections):

1. Select a 2950-24 Switch from the network devices and drag and drop to the workspace.
2. Connect FastEthernet0 port of PC0 to the FastEthernet0/1 port of switch0 using Copper
Straight- Through cable.
3. Connect FastEthernet0 port of PC1 to the FastEthernet0/2 port of switch0 using Copper
Straight- Through cable.
4. Connect FastEthernet0/3 port of switch0 to the GigabitEthernet0/0 of Router0 using Copper
Straight- Through cable.
5. Connect GigabitEthernet0/1 port of Router0 to the FastEtherner0 of server0 using Copper
Straight- Through cable.

Router Configuration Table:

IP address IP
Device Name Subnet Mask Subnet Mask
GigabitEthernet0/0 AddressGigabitEthernet0/1

2911 Router0 192.168.1.1 255.255.255.0 10.0.0.1 255.0.0 0

PC Configuration Table:

Device
Device Type IP address Subnet Mask Default Gateway
Name

PC 0 PC-PT 192.168.1.2 255.255.255.0 192.168.1.1

PC 1 PC-PT 192.168.1.3 255.255.255.0 192.168.1.1


Designed Network topology:
Conclusion

Transmission Control Protocol (TCP) is a standard protocol for sending data and messages across
networks, offering reliable services and advanced mechanisms 1.
It defines how to connect multiple
computers or application programs and ensures secure data transmission between them 1. TCP is the
default data communication method between different devices over a network 2.
It establishes and maintains a connection between the sender and the receiver during the transferring
process. With its mechanisms, TCP ensures that all packet data arrive unaltered 1.
In conclusion, TCP is an essential protocol for transmitting data over networks. It provides reliable services
and advanced mechanisms to ensure secure data transmission between multiple computers or application
programs .
Reference

1. Youtube - https://youtu.be/gFRux1w3QLk?si=Htsvaol3nZ0vrDK5
2. Cisco.com - https://www.cisco.com/c/en/us/support/docs/smb/switches/cisco-250-series-
smart-switches/smb2009-configure-transmission-control-protocol-tcp-and-user-datagra.html
3.

You might also like