Top Banner

of 44

chirag kalra

Apr 07, 2018

Download

Documents

Chirag Kalra
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/6/2019 chirag kalra

    1/44

    P a g e | 1

    1 Department of Computer Science BMIT-JAIPUR

    A

    PRACTICAL TRAINING REPORT

    ON

    CISCO CERTIFIED NETWORK ASSOCIATES

    TAKEN AT

    INDIAN INSTITUTE OF HARDWARE TRAINING

    SUBMITTED IN PARTIAL FULFILLMENT OF BACHELOR OF ENGINEERING

    DEGREE

    RAJASTHAN TECHNICAL UNIVERSITY

    Session 2010-2011

    SUBMITTED TO SUBMITTED BY

    Mrs. Kuntal Gaur KALRA CHIRAG

    Seminar Coordinator Computer Engg

    VII SEM CS VII SEM CS C

    BMIT-JAIPUR 07EC024

    BMIT-JAIPUR

    DEPARTMENT OF CS & IT

    BALDEV RAM MIRDHA INSTITUTE OF TECHNOLOGY

  • 8/6/2019 chirag kalra

    2/44

    P a g e | 2

    2 Department of Computer Science BMIT-JAIPUR

  • 8/6/2019 chirag kalra

    3/44

    P a g e | 3

    3 Department of Computer Science BMIT-JAIPUR

    PREFACE

    Summer training is an important part of the engineering curriculum. The B.Tech. coursesummer training helps a student in getting acquainted with the manner in which his/her

    knowledge is being practically used outside his/her institute and this is normally different

    from what he/she has learnt from books. Hence, when the student switches from the process

    of learning to that of implementing his/her knowledge, he/she finds an abrupt change. This is

    exactly why summer training session during the B.Tech. curriculum becomes all the more

    important. Summer training is prescribed for the student of Technical College as a part of the

    four year degree course of engineering by the AICTE. We are required to undergo summer

    training for a period of 30 days in our 6th

    sem before the commencement of final exams. The

    main objectives of summer training are:

    Correlate courses of study with the way industry or potential workplace operates Its business or work using technology.

    Work on implementing what has been learned in school, especially true for Computer

    Science under-graduates.

  • 8/6/2019 chirag kalra

    4/44

    P a g e | 4

    4 Department of Computer Science BMIT-JAIPUR

    ACKNOWLEDGEMENTS

    I am over whelmed in all humbleness and gratefulness to acknowledge my depth to all those

    who have helped me to put these ideas, well above the level of simplicity and into something

    concrete.

    I am very thankful to my guide Mrs. KUNTAL GAUR (project coordinator) for her valuable

    help. She was always there to show me the right track when i needed her help. With the help

    of her valuable suggestions, guidance and encouragement, i was able to perform this project

    work.

    I would also like to thank Mr. Rajeev(ccna faculty) and Mr. Aarif Sheikh(IIHT Manager)

    who helped me In every way I wanted.

    I would also like to thank my colleagues, who often helped and gave me support at critical

    junctures during the making to this project.

    KALRA CHIRAG

    VII SEM CS

  • 8/6/2019 chirag kalra

    5/44

    P a g e | 5

    5 Department of Computer Science BMIT-JAIPUR

    INDEX

    S.NO TOPIC PAGE NO.

    1. CERTIFICATE..2

    2. PREFACE..3

    3. ACKNOWLEDGEMENTS...4

    4. LOCAL AREA NETWORK..6

    5. WIDE AREA NETWORKING OVERVIEW .....10

    6. OSI MODEL..12

    7. DEVICES AT DIFFERENT LAYERS.16

    8. LAN TECHNOLOGIES ...16

    9. ROUTER ADMINISTRATION ...19

    10. THE TCP/IP PROTOCOL SUITE.24

    11. IP SUBNETTING ..........26

    12. IP ROUTING .....27

    13. LAN SWITCHING....3514. VLAN.36

    15. ACL.36

    16. CONCLUSION ..38

    17. REFRENCES..39

  • 8/6/2019 chirag kalra

    6/44

    P a g e | 6

    6 Department of Computer Science BMIT-JAIPUR

    BRIEF ABOUT CCNA:-

    LOCAL AREA NETWORK

    A local area network (LAN) connects personal computers, printers, and other computer

    resources together within a building or campus. Many schools, offices, and even homes now

    have LANs. These networks allow printers, as well as documents and projects, to be shared.

    LANs also enable computers to talk to one another and are often used to share Internet access

    across all of the computers in a building or school. Most LANs use wires, or cables, to

    connect computers and other peripheral devices. Inmost networks, a network cable (which

    generally looks like an oversized telephone cord) connects a computer to a network jack in

    the wall. Sometimes, in classrooms or business offices, many computers are connected to an

    intermediate hub or switch, not directly to the network jack. The hub or switch into which all

    of the computers are plugged is the device that is connected to the network jack. In both

    cases, the network jack is connected to a small router by another cable. Printers are also often

    shared using this method of hubs and switches. Some LANs are now wireless. Wireless

    LANs are fundamentally the same as wired LANs, but the cabling is replaced by small

    "radios" that are contained inside the computers. Wireless LANs are generally somewhat

    slower than the wired networks, but they are much easier to set up and allow users to move

    their machines around without having to reconnect network cables. Wireless LANs have

    moved into the mainstream in schools and classrooms during the last few years; however, it is

    important to note that security is much more difficult when using a wireless network.

    Additionally, the adoption of competing protocols is creating some confusion in the

    marketplace. Agencies need to select a wireless protocol with care, considering how the

    network can be upgraded and whether it is compatible with existing wireless protocols.

    Where a LAN may connect all of the computers within a building or campus, a wide area

    network (WAN) connects multiple LANs. Many districts now have WANs connecting all ofthe schools within the district for the sharing of Internet access, selected files, or other

    resources.

    What Are Servers, Routers, and Firewalls?

    LANs often involve a number of different components, including a dizzying variety of

    servers, switches, routers, firewalls, and the like. This section provides descriptions of many

    of these items.

    Servers

    While servers often are spoken of in almost mystical tones, they are really just powerful

    computers running specialized software designed to share files, manage printers, or perform

    any other specialized task assigned. Most of these computers are powerful enough to do more

    than one thing at a time; for example, a single network server might be a file server, a print

    server, and a mail server simultaneously.

  • 8/6/2019 chirag kalra

    7/44

    P a g e | 7

    7 Department of Computer Science BMIT-JAIPUR

    File server.

    A file server is essentially the computer equivalent of a filing cabinet. Documents,

    spreadsheets, and other (computer) files are stored on a file server, just as paper documents

    are stored in a filing cabinet. The file server's job is to make those files available to computer

    users on the LAN and, when appropriate, allow the users to update the files.

    Print server.

    A print server is a piece of software or hardware that manages print jobs submitted by users.

    When a document is sent to a networked printer, the print server receives the job and queues

    it (puts it in line behind previously submitted jobs). When a job gets to the front of the queue,

    the print server sends it to the printer. It is not necessary to buy an individual printer for each

    personal computer. Users in classrooms or offices often share printers, since not everyone is

    typically printing at the same time. This option can save an agency a great deal of money.

    Mail server.

    The third common type of server is a mail server. The mail server acts as the conduit to the

    outside world as messages are sent and received. Some servers are set up so that all of the

    mail stays on the mail server until a user actively deletes it. In other configurations, the user

    is able to move the mail from the server to the desktop computer. This process, called

    "downloading," uses less space on the mail server.

    Router

    A router is a piece of equipment that acts as the interface between a local network and the

    Internet, by routing traffic from one to the other. A router may be a computer dedicated to

    managing the traffic of a WAN, or it may be a piece of software running on a computer that

    is configured for other tasks as well. Routers also may be used in LANs to route internal

    traffic.

    Firewall

    A critical component of any network is a firewall. A firewall in layman's terms is a wall that

    acts as a firebreakit keeps a fire from spreading. In this sense, a computer firewall keeps a

    network secure from hackers (the "arsonists" of the Internet) by denying access to all or part

    of the network. Management of firewalls requires a great deal of expertise. While the network

    administrator must ensure that no unwanted traffic can enter the network from outside, a level

    of access to and from the Internet must be created that will permit authorized users to conduct

    their business safely and efficiently. A solid, well-designed firewall is critical to ensure that

    only authorized users have access to a restricted network. Like routers and servers, firewalls

    are available as either hardware or software. Choosing a firewall for a particular network is

    an issue best addressed at the local level, after reviewing the options available.

  • 8/6/2019 chirag kalra

    8/44

    P a g e | 8

    8 Department of Computer Science BMIT-JAIPUR

    Server vs Desktop Computer

    Advances in technology have blurred the distinctions between the computer on thedesktop

    and a network server. Computing power has continued to growexponentiallyin fact, most

    users do not need all the computing power available tothem (at least for now). The same is

    true of network servers, which have become sopowerful that some network administratorsrun applications, in addition to the server software, from the network server, rather than

    installing applications directly on eachof the computers connected to the network. Servers

    are capable of managing a much greater workload today than they were in past years.

    Running applications from a server has a number of advantages. One key advantage is in

    licensing, since it is much easier to track usage. Another is that local users areprevented from

    altering the configuration of applications, which can create software failure and cause

    problems for other users. In addition, it is much easier to upgrade software since only one

    copy needs to be upgraded, instead of upgrading one copy for each personal computer.

    Applications run from a network server, however, are often comparatively slower than

    applications running directly on a desktop computer. Another benefit to server-run

    applications is the cost-saving use of thin clients. Thinclients are basic, low-cost computers

    with insufficient power to run sophisticatedsoftware applications, but with enough power to

    access applications installed on theserver.

    Connecting to the Internet

    There are many different ways to connect to the Internet. Agencies can generally purchase

    several different kinds of on-ramps to the information superhighway based on their particular

    need. Depending on the kind of connection to the Internet, access to information may be fast

    or slow. The key to Internet speed is bandwidth. Bandwidth refers to the amount of data

    transferred within a specified time. Greater bandwidth increases the speed of data transfer. A

    general overview of the various types of Internet connections is listed below, starting with the

    slowest (smallest bandwidth) and moving up to the faster (greater bandwidth) technologies.

    Cost and service quality can vary widely. Use of a competitive bid process, with an

    appropriate Request for Proposal (RFP), can better enable agencies to obtain needed service

    while controlling cost. In other words, the agency should not commit to service from a

    provider based on advertisements. Acronyms and abbreviations referenced in this appendix

    are defined in the glossary. A reference table is provided at the end of this appendix for quick

    comparison of the various Internet connection options discussed below.

    Internet Service Providers

    Internet Service Providers (ISPs) provide the portals, or access, that allow computer users to

    connect to the Internet. There are numerous ways for education agencies to connect with an

    ISP. Before selecting an ISP, the agency should determine its needs for bandwidth, speed,

    and services. The agency should secure the services of an ISP through the RFP process.

    Using the RFP process, the ISP should be required to identify the available connection speed

    and the reliability of the system, sometimes measured by the amount of time the ISP's

    services were down during the previous 6 months. Although most ISPs will advertise a high

    connection speed, the agency should determine whether the full bandwidth is available at

  • 8/6/2019 chirag kalra

    9/44

    P a g e | 9

    9 Department of Computer Science BMIT-JAIPUR

    all times by requesting an assessment of the provider's typical bandwidth and connection

    speed at different times of the day and on different days of the week.

    Cable Modems

    Cable modems have become, in recent years, the most popular broadband technology for

    home computer users. The cable modem uses the same coaxial cable that carries cable TV

    signals for high-speed data transmission. While not as robust as fiber optic connections, cable

    modems can provide similar quality service at a fraction of the cost. The quality of a cable

    modem connection, however, is dependent on the overall quality of the cable modem

    provider's network, and the more people accessing the provider's network at the same time,

    the slower each individual's connection to the Internet will be. Speed ranges from under 1 to

    8 Mbps; costs are generally $100 to $250 per month for commercial users. Because of the

    historically strong connection between education and the cable television community, many

    schools are using cable modems. When contracting to provide cable service to a city or

    county, the cable company typically makes the commitment to provide one cable connection

    and one modem to each school within the service area of the cable company. There are cases,however, in which cable companies have provided additional services.

    Satellite

    Some larger agencies have considered buying space on a satellite to upload and download

    files. While the cost of transmitting information over wires would be removed, satellite

    reliability is debatable. Weather (such as rain) or even sunspots can affect satellite

    transmission.

    Cellular Wireless

    Traditionally, Internet access over cellular telephone networks has been slow and somewhat

    unreliable. Wireless technology, however, is coming of age, and new, significantly faster

    Internet connection services are offered throughout the United States. While these "third

    generation wireless" services (generally referred to as 3G services) are not necessarily

    suitable for building use, they may suit the needs of individuals within the agency as they

    maintain contact with each other during the work day. Already, cellular phones are replacing

    "walkie-talkies" in many secondary schools. It is still too soon to tell how much t hese

    services will cost, but they will probably be metered, with cost depending upon the amount of

    usage.

    Fixed Wireless

    Fixed wireless refers to the operation of wireless devices in a fixed location. Unlike mobile

    wireless devices, which are battery powered, fixed wireless devices are electrically powered.

    The basic idea behind fixed wireless is that the traditional wired connection (e.g., fiber optic,

    telephone line, or cable TV line) is replaced by a high speed wireless connection. Depending

    on the technology, bad weather (such as rain) can significantly interfere with fixed wireless

    services. This service is usually most attractive in communities where traditional wired

    connections are not available; however, the technology is also suitable for urban areas.

  • 8/6/2019 chirag kalra

    10/44

    P a g e | 10

    10 Department of Computer Science BMIT-JAIPUR

    Fixed wireless speed varies considerably, from under 1 Mbps to upwards of 15 Mbps. Cost

    also varies widely

    Wide-Area Networking Overview

    Cisco IOS software provides a range of wide-area networking capabilities to fit almost every

    network environment need. Cisco offers cell relay via the Switched Multimegabit Data

    Service (SMDS), circuit switching via ISDN, packet switching via Frame Relay, and the

    benefits of both circuit and packet switching via Asynchronous Transfer Mode (ATM). LAN

    emulation (LANE) provides connectivity between ATM and other LAN types.

    Objectives

    The Cisco IOS Wide-Area Networking Configuration Guide presents a set of general

    guidelines for configuring the following software components:

    ATM

    Broadband Access: PPP and Routed Bridge Encapsulation

    Frame Relay

    Frame Relay-ATM Internetworking

    SMDS

    Link Access Procedure, Balanced and X.25

    Organization

    The Cisco IOS Wide-Area Networking Configuration Guide includes the following chapters:

    Configuring ATM

    Configuring Broadband Access: PPP and Routed Bridge Encapsulation

    Configuring Frame Relay

    Configuring Frame Relay-ATM Interworking

    Introduction to NETWORKING

    Network is the method to share hardware resources and software resources. We can share the

    resources with the help of operating system like windows, Linux, UNIX etc. To connect

    multiple networks we have to use internetworking devices like router, bridge, layer 3,

    switches etc.

  • 8/6/2019 chirag kalra

    11/44

    P a g e | 11

    11 Department of Computer Science BMIT-JAIPUR

    Administrator model for NetworksWe can say that there are four components which are required to create networks

    1. Software2. Protocol Stack3. Network Interface Card

    4. Media

    Software

    Networking software can be divided in two categories:

    Server software: - The software used to provide a particular service.

    Client software: - The software which is used to access service provided by server.

    IIS, Outlook

    Exchange 2003, Yahoo messenger,

    FTP Server, Cute FTP

    Send Mail

    TCP/IP, TCP/IP

    IPX/SPX,

    AppleTalk,

    Netbeui

    Design Considerations

    Server software and Client software should be compatible.

    Server

    Software

    Client

    Software

    Media Media

    P

    R O

    T O

    C O

    L

    Stack

    P

    R O

    T O

    C O

    L

    Stack

    NICNIC

  • 8/6/2019 chirag kalra

    12/44

    P a g e | 12

    12 Department of Computer Science BMIT-JAIPUR

    Protocol stack must be same.

    Connectivity can be performed via switch/hub etc.

    If NIC standards are different then translational bridge is required.

    If media is different then Trans-Receiver is required.

    OSI ModelOSI model is the layer approach to design, develop and implement networks. OSI model

    provides following advantages: -

    (i) Designing of network will be standards based.(ii)Development time of new technologies will be reduced.(iii)Devices from multiple vendors can communicate with each other.(iv)Implementation and troubleshooting of network will be easier.

    Application layer accepts data and forward into the protocol stack. It creates user

    interface between application software and protocol stack.

  • 8/6/2019 chirag kalra

    13/44

    P a g e | 13

    13 Department of Computer Science BMIT-JAIPUR

    y Presentation Layer: -This layer decides presentation format of the data. It also able to performs other

    function like compression/decompression and encryption/decryption.

    Jpg file

    Online song

    y Session Layer: -This layer initiate, maintain and terminate sessions between different applications.

    Due to this layer multiple application software can be executed at the same time.

    Telephone trunk

    y Transport Layer: -Transport layer is responsible for connection oriented and connection less

    communication. Transport layer also performs other functions like

    Positive Acknowledgement & Response

    Error checking Flow Control

    Buffering Windowing

    Multiplexing Sequencing

    Connection Oriented Communication

  • 8/6/2019 chirag kalra

    14/44

    P a g e | 14

    14 Department of Computer Science BMIT-JAIPUR

    Connection less CommunicationSend data

    (i) Error checkingTransport layer generates cyclic redundancy check (CRC) and forward the

    CRC value to destination along with data. The other end will generate CRC

    according to data and match the CRC value with received value. If both are

    same, then data is accepted otherwise discarded.

    (ii) Flow ControlFlow control is used to control the flow of data during communication. For

    this purpose following methods are used: -

    (a) BufferingBuffer is the temporary storage area. All the data is stored in the buffer

    memory and when communication ability is available the data is forward

    to another.

    (b) WindowingWindowing is the maximum amounts of the data that can be send to

    destination without receiving Acknowledgement. It is limit for buffer to

    send data without getting Acknowledgement.

    (c) MultiplexingMultiplexing is used for multiple application on same IP.

    (iii) Sequencing

    Transport layer add sequence number to data, so that out of sequence data can

    be detected and rearranged in proper manner

    (vi) Positive Acknowledgement and Response When data is send to destination, the destination will reply with Acknowledgement to

    indicate the positive reception of data. If Acknowledgement is not received within a

    specified time then the data is resend from buffer memory.

    Network Layer

    This layer performs function like logical addressing and path determination. Each

    networking device has a physical address that is MAC address. But logical addressing

    is easier to communicate on large size network.

    Its other responsibilities are:

    Fragmentation Quality of Service

    Header checksum Protocol Identification

    Sender Receiver

  • 8/6/2019 chirag kalra

    15/44

    P a g e | 15

    15 Department of Computer Science BMIT-JAIPUR

    Logical addressing defines network address and host address. This type of addressing

    is used to simplify implementation of large network. Some examples of logical

    addressing are: - IP addresses, IPX addresses etc.

    Path determination

    Network layer has different routing protocols like RIP, EIGRP, BGP, and ARP etc. to

    perform the path determination for different routing protocol.

    Data Link Layer

    The functions of Data Link layer are divided into two sub layers

    y Logical Link Control

    y Media Access Control

    y Logical Link Control defines the encapsulation that will be used by the NIC todelivered data to destination. Some examples of Logical Link Control are ARPA(Ethernet), 802.11 wi-fi.

    y Media Access Controldefines methods to access the shared media and establish theidentity with the help of MAC address. Some examples of Media Access Control areCSMA/CD, Token Passing.

    Physical Layer

    Physical Layer is responsible to communicate bits over the media this layer deals with

    the standard defined for media and signals. This layer may also perform modulation

    and demodulation as required.

  • 8/6/2019 chirag kalra

    16/44

    P a g e | 16

    16 Department of Computer Science BMIT-JAIPUR

    Data Encapsulation

    Data => Segment => Packet => Frames => Bits

    Devices at different Layers

    Physical Layer Devices

    Hub, Modem, Media, DCE (Data comm. Equipment)

    CSU/DSU, Repeater, Media converter

    Data Link Layer

    NIC, Switch, Bridge

    Network Layer DeviceRouter, Layer 3 Switch

    All Layers Device

    PC, Firewall

    DCE: - DCE convert the bits into signal & send them on media.

    FDDI Fiber Distributed Data Interface

    Switch forwards frames on the base of MAC address.

    Router forwards packets on the base of IP address.

    LAN TECHNOLOGIES

    ETHERNET

    In these days, we use Ethernet with switches and in switches the technology is made

    CSMA/CA (Collision Avoidance). So this reason Ethernet is best compare with Token Ring,

    FDDI & Wi-Fi.

  • 8/6/2019 chirag kalra

    17/44

    P a g e | 17

    17

    e artme t of Computer Sc e ceB

    -

    PUR

    C M /C

    i l it lli i t

    Detect the

    Collision

    Stop transmitting receiving

    data

    Generate a random Number

    Try to communicate after delay in

    multiple of random no.

  • 8/6/2019 chirag kalra

    18/44

    P a g e | 18

    18 Department of Computer Science BMIT-JAIPUR

    LAN segmentation using bridge.

    Existing

    Collision domain

    A group of pc, in which collision can occur, is called a collision domain.

    Broadcast domain

    A group of pc in which broadcast message is delivered is called broadcast domain

    LAN segmentation using Switches

    Advantages of Switches: -

    1.Bandwidth will not be shared and overall throughput will depend onwire speed of the switch. Wire speed is also called switching capacitymeasured in mbps or gbps.Minimum port on switches = 4Maximum port on switches = 48

    2. Any time access technology.3. One to one communication so that network will be more secures.

    4.Switches will perform micro segmentation and no collision will occurin network

  • 8/6/2019 chirag kalra

    19/44

    P a g e |19

    19 Department of Computer ScienceB T-

    PUR

    Lan segmentati n using router

    Router Administration

    Router Architecture

    IO

    Components ofR R

    Router operation

    When a pc has to send data to a different net ork address, then data willbe forwarded to the

    router. It will anal sis IP address of the data and obtain a route from the routing table.

    According to the route data will be dropped, If route not available.

    (1) ProcessorSpeed: - 20 M to 1GHz

    Architecture: - RISC

    Reduce Instruction set computer

    Manufacturers: - Motorola, IBM, Power PC, Texas, Dallis, Intel.

    Processor

    Memory

    Controller

    B

    S

    ROM

    RAM

    I/O

    Controller

    LAN

    WAN

    Ports

    NVRAM

    Flash RAM

    O/S

  • 8/6/2019 chirag kalra

    20/44

    P a g e | 20

    20 Department of Computer Science BMIT-JAIPUR

    (2) Flash RAMFlash Ram is the permanent read/write memory. This memory is usedto store one or more copies of router o/s. Router o/s is also called IOS(Internetwork Operating System).

    Flash Ram stores the only o/s.The size of flash ram in the router is 4mb to 128mb. The flash ram may

    be available in one of the following three packages: -

    SIMM Flash: - Single In-Line Memory Module

    PCMCIA Flash: - Personal Computer Memory Card Interface Architecture

    Compact Flash: - (Small Memory)

    (3) NVRAMNVRAM is a Non Volatile Random Access Memory. It is used to

    store the configuration of the Router. The size of NVRAM is 8 KB to

    512 KB.

    (4) RAMRam of the router is divided into two logical parts.

    (i) Primary RAM(ii) Shared RAM

    Primary RAM

    Primary RAM is used for: -

    (a)Running copy of IOS.(b)Running configuration(c) Routing table(d)ARP table (IP address to MAC address)(e)Processor & other data structure

    Shared RAMShared RAM is used as a buffer memory to shared the data received from different

    interfaces. Size of ram in a router may vary from 2 mb to 512 mb. The types of

    memory that may be present in a ram are: -

    (a)DRAM Dynamic RAM(b)EDORAM Extended Data Out RAM(c)SDRAM Synchronous Dynamic RAM

  • 8/6/2019 chirag kalra

    21/44

    P a g e | 21

    21 Department of Computer Science BMIT-JAIPUR

    (5) BIOS ROMThe BIOS ROM is the permanent ROM. This memory is used to store

    following program & Routines: -

    (i) Boot strap loader (doing booting)(ii) Power on self test routines

    (iii) Incomplete IOS(iv) ROM Monitor (ROM-MON)

    Types of routers:-

    (1) Fixed configuration router

    (2) Modular router

    (3) Chassis based router

    Access Router using console

    Connect PC serial port to router Console using console cable.

    Click the Start button on the Windows Taskbar, and select Programs > Accessories >

    Communications > HyperTerminal. HyperTerminal launches and displays the Connection

    Description dialog box. Type any name

    Router Access Modes

    When we access router command prompt the router will display different modes. According

    to the modes, privileges and rights are assigned to the user.

  • 8/6/2019 chirag kalra

    22/44

    P a g e | 22

    22 Department of Computer Science BMIT-JAIPUR

    User mode

    Privileged mode

    Global configuration

    Line configuration mode

    Interface configuration mode

    Routing configuration mode

    Configuring Passwords

    There are five types of password available in a router

    1)Console Password

    router#configure terminal

    router(config)#line console 0

    router(config-line)#password

    router(config-line)#login

    router(config-line)#exit

    (2) Vty Password

    router#configure terminal

    router(config)#line vty 0 4

    router(config-line)#password

    router(config-line)#login

    router(config-line)#exit

    (3)Auxiliary Password

    router#configure terminal

    router(config)#line Aux 0

    router(config-line)#password

    router(config-line)#login

    router(config-line)#exit

    (4)Enable Password

    router>enable

    router#configure terminal

    router(config)#enable password

    router(config)#exit

  • 8/6/2019 chirag kalra

    23/44

    P a g e | 23

    23 Department of Computer Science BMIT-JAIPUR

    (5)Enable Secret Password

    Enable Password is the clear text password. It is stored as clear text in configuration where as

    enable secret password is the encrypted password with MD5 (Media Digest 5) algorithm.

    Router#configure terminal

    Router(config)#enable secret Router(config)#exit

    Encryption all passwords

    All passwords other than enable secret password are clear text password. We can encrypt all

    passwords using level 7 algorithm. The command to encrypt all passwords are:

    Router#configure terminal

    Router(config)#service password-encryption

    Managing ConfigurationThere are two types of configurations present in a router

    (1) Startup Configuration (2) Running Configuration

    Startup configuration is stored in the NVRAM. Startup configuration is used to save

    settings in a router. Startup configuration is loaded at the time of booting in to the Primary

    RAM.

    Running Configuration is present in the Primary RAM wherever we run a command for

    configuration, this command is written in the running configuration.

    To display running-configuration

    Router#show running-configuration

    To display startup configuration

    Router#show startup-configuration

    To erase old configuration

    Router#erase startup-configuration

    Router#reload

  • 8/6/2019 chirag kalra

    24/44

    P a g e | 24

    24 Department of Computer Science BMIT-JAIPUR

    Save[y/n]:n

    To save configuration

    Router#copy running-config startup-config

    Or

    Router#write

    To abort configuration

    Router#copy startup-config running-config

    Telnet access :

    Telnet is a virtual port through which we can access router command line using interfaces

    Switch Router

    To accept telnet connection we have to configure following options on router:

    Configure IP on interface

    Configure VTY, enable secret password

    On client PC test connectivity with router & use commandtelnet

    THE TCP/IP PROTOCOL SUITE

    Application Layer

    This layer contains a large no. of protocols. Each protocol is designed to act as server

    & client. Some of protocol will need connection oriented. TCP and others may need

    connection less UDP for data transfer.

    Application layer use port nos to identity each application at Transport layer. This

    layer performs most of functions, which are specified by the Application, Presentation, andSession layer of OSI model.

    Transport Layer

    Two protocols are available on Transport layer

    Transmission Control Protocol User Datagram Protocol

    1)Transmission Control Protocol:

    PC

  • 8/6/2019 chirag kalra

    25/44

    P a g e | 25

    25 Department of Computer Science BMIT-JAIPUR

    TCP performs connection-oriented communication. Its responsibilities are: -

    Error Checking Acknowledgement

    Sequencing Flow Control

    Windowing

    y Source Port and Destination Port fields together identify the two local end points of theparticular connection. A port plus its hosts IP address forms a unique end point. Ports areused to communicate with the upper layer and distinguish different application sessions on the

    host.y The Sequence Number and Acknowledgment Number fields specify bytes in the byte stream.

    The sequence number is used for segment differentiation and is useful for reordering orretransmitting lost segments. The Acknowledgment number is set to the next segmentexpected.

    y Data offset or TCP header length indicates how many 4-byte words are contained in the TCPheader.

    y The Windowfield indicates how many bytes can be transmitted before an acknowledgment isreceived.

    y The Checksum field is used to provide extra reliability and security to the TCP segment.

    y The actual user data are included after the end of the header.

    2)User Datagram Protocol

    UDP is considered to be a connectionless protocol. It leaves reliability to be handled by the

    application layer. All it cares about is fast transmission.

    UDP header is responsible for error checking and identifying applications using port numbers.

  • 8/6/2019 chirag kalra

    26/44

    P a g e | 26

    26 Department of Computer Science BMIT-JAIPUR

    Internet Layer

    The main function of Internet layer is routing and providing a single network interface to the upper

    layers protocols. Upper or lower protocols have not any functions relating to routing. To prevent this,

    IP provides one single network interface for the upper layer protocols. After that it is the job of IP and

    the various Network Access protocols to get along and work together. The main protocols are used in

    Internet layer:-

    1) Internet Protocol (IP)

    2) Internet Control Message Protocol (ICMP)

    3) Address Resolution Protocol (ARP)

    4) Reverse Address Resolution Protocol (RARP)

    5) Proxy ARP

    Internet Protocol

    This protocol works at internet layer. It is responsible for logical addressing, defining type of

    service and fragmentation.

  • 8/6/2019 chirag kalra

    27/44

    P a g e | 27

    27 Department of Computer Science BMIT-JAIPUR

    y Source Port and Destination Port fields together identify the two local end points of theparticular connection. A port plus its hosts IP address forms a unique end point. Ports are usedto communicate with the upper layer and distinguish different application sessions on thehost.

    y

    The Sequence Number and Acknowledgment Number fields specify bytes in the byte stream.The sequence number is used for segment differentiation and is useful for reordering orretransmitting lost segments. The Acknowledgment number is set to the next segmentexpected.

    y Data offsetor TCP header length indicates how many 4-byte words are contained in the TCPheader.

    y Window indicates how many bytes can be transmitted before an acknowledgment is received.y Checksum is used to provide extra reliability and security to the TCP segment.

    y User data represents the actual data which are always included at end of the header.

    IP SubnetIn TCP/IP by default three sizes of networks are available: -

    (1) Class A -224 PC -> 16777216

    (2) Class B - 216

    PC-> 65536

    (3) Class C 28 PC -> 256

    In subneting, we will divide class A,B & C network into small size sub networks. This

    procedure is called subneting.

    Subneting is performed with the help of subnet mask. There are two types of subneting that

    we performed: -

    (1) FLSM Fixed Length Subnet Mask(2) VLSM Variable Length Subnet Mask

    IP RoutingWhen we want to connect two or more networks using different n/w addresses then we have

    to use IP Routing technique. The router will be used to perform routing between the

    networks. A router will perform following functions for routing.

    (1) Path determination(2) Packet forwarding

    (1)Path determination

    The process of obtaining path in routing table is called path determination. There are three

    different methods to which router can learn path.

    i) Automatic detection of directly connected n/w.

    ii) Static & Default routing

  • 8/6/2019 chirag kalra

    28/44

    P a g e | 28

    28 Department of Computer Science BMIT-JAIPUR

    iii) Dynamic routing

    (2)Packet forwarding

    It is a process that is by default enable in router. The router will perform packet

    forwarding only if route is available in the routing table.

    Static Routing

    In this routing, we have to use IP route commands through which we can specify routes for

    different networks. The administrator will analyze whole internetwork topology and then

    specify the route for each n/w that is not directly connected to the router

    CONFIGURATION FOR ROUTER 0

    Router>en

    Router0#conf t

    Router(config)#int s1/0

    Router(config)#ip ad 192.168.0.1 255.255.255.0

    Router(config)#no shut

    Router(config)#clock rate 64000

    Router(config)#exit

    CONFIGURATION FOR ROUTER 1

  • 8/6/2019 chirag kalra

    29/44

    P a g e | 29

    29 Department of Computer Science BMIT-JAIPUR

    Router>en

    Router1#conf t

    Router(config)#int s 1/0

    Router(config)#ip ad 192.168.0.2 255.255.255.0

    Router(config)#no shut

    Router(config)#exit

    Router#conf t

    Router(config)#int s 1/1

    Router(config)#ip ad 172.168.0.1 255.255.0.0

    Router(config)#no shut

    Router(config)#clock rate 64000

    Router(config)#exit

    CONFIGURATION FOR ROUTER 2

    Router>en

    Router2#conf t

    Router(config)#int s 1/0

    Router(config)#ip ad 172.168.0.2 255.255.0.0

    Router(config)#no shut

    Router(config)#exit

    STATIC ROUTING

    For Router 0

    Router0#ip route 20.0.0.0 255.0.0.0 192.168.0.2

    Router0#ip route 30.0.0.0. 255.0.0.0 192.168.0.2

    Router0#ip route 172.168.0.0 255.255.0.0 192.168.0.2

    For Routert 1

    Router1#ip route 10.0.0.0 255.0.0.0 192.168.0.1

    Router1#ip route 30.0.0.0 255.0.0.0 172.168.0.2

  • 8/6/2019 chirag kalra

    30/44

    P a g e | 30

    30 Department of Computer Science BMIT-JAIPUR

    For Router 2

    Router2#ip route 10.0.0.0 255.0.0.0 172.168.0.1

    Router2#ip route 20.0.0.0. 255.0.0.0 172.168.0.1

    Router2#ip route 192.168.0.1 255.0.0.0 172.168.0.1

    Advantages of static routing

    (1) Fast and efficient.

    (2) More control over selected path.

    (3) Less overhead for router.

    (4) Bandwidth of interfaces is not consumed in routing updates.

    Disadvantages of static routing

    (1) More overheads on administrator.

    (2) Load balancing is not easily possible.

    (3) In case of topology change routing table has to be change manually.

    Routing Information Protocol

    Features of RIP: -

    y Distance Vectory Open standardy Broadcast Updates

    (255.255.255.255)

    y Metric - Hop Count TimersUpdate 30 sec

    Invalid 180 sec

    Hold 180 sec

    Flush 240 sec

    y Loop Control

    Split HorizonTriggered Updates

    Maximum Hop Count

    Hold Down

    y Maximum Hop Count 15

    y Administrative Distance 120

    y Equal Path Cost Load Balancing

    y Maximum Load path 6 Default 4

  • 8/6/2019 chirag kalra

    31/44

    P a g e | 31

    31 Department of Computer Science BMIT-JAIPUR

    y Does not support VLSM

    y Does not support Autonomous system

    RIP CONFIGURATION

    Router 0

    Router(config)#network 10.0.0.0 255.0.0.0

    Router(config)#network 192.168.0.0 255.255.255.0

    Router(config)#network 20.0.0.0 255.0.0.0.

    Router 1

    Router(config)#network 10.0.0.0 255.0.0.0.

    Router(config)#network 30.0.0.0. 255.0.0.0.

    Router(config)#network 172.168.0.0 255.255.0.0.

    Router 2

    Router(config)#network 10.0.0.0. 255.0.0.0

    Router(config)#network 30.0.0.0 255.0.0.0.

    Router 3

  • 8/6/2019 chirag kalra

    32/44

    P a g e | 32

    32 Department of Computer Science BMIT-JAIPUR

    Router(config)#network 10.0.0.0 255.0.0.0

    Router(config)#network 40.0.0.0 255.0.0.0

    Router 4

    Router(config)#network 20.0.0.0 255.0.0.0

    Router(config)#network 40.0.0.0 255.0.0.0

    Router 5

    Router(config)#network 40.0.0.0 255.0.0.0

    Router(config)#network 50.0.0.0. 255.0.0.0

    Link State RoutingThis type of routing is based on link state. Its working is explain as under

    (1) Each router will send Hello packets to all neighbors using all interfaces.

    (2) The router from which Hello reply receive are stored in the neighborship table. Hello

    packets are send periodically to maintain the neighbor table.

    (3) The router will send link state information to the all neighbors. Link state information

    from one neighbor is also forwarded to other neighbor.

    (4) Each router will maintain its link state database created from link state advertisement

    received from different routers.

    (5) The router will use best path algorithm to store the path in routing table.

    Problems of Link State Routing

    The main problems of link state routing are: -

    (1) High bandwidth consumption.

    (2) More hardware resources required that is processor and memory (RAM)

    The routing protocols, which use link state routing are: -

    (1) OSPF (2) EIGRP

    Enhanced Interior Gateway Routing Protocol

    Features: -

    * Cisco proprietary

    * Hybrid protocol

    Link State

  • 8/6/2019 chirag kalra

    33/44

    P a g e | 33

    33 Department of Computer Science BMIT-JAIPUR

    Distance Vector

    * Multicast Updates using

    Address 224.0.0.10

    * Support ASN

    * Support VLSM

    * Automatic Route Summarization* Unequal path cost load balancing

    * Metric (32 bit composite)

    Bandwidth

    Delay

    Load

    Reliability

    MTU

    * Neighbor Recovery

    * Partial updates

    * Triggered updates

    * Backup Route

    * Multi Protocol Routing

    Open Shortest Path FirstFeatures: -

    * Link State

    * Open standard

    * Multicast updates

    224.0.0.5224.0.0.6

    * Support VLSM

    * Support Area similar to AS

    * Manual Route Summarization

    * Hierarchical model

    * Metric Bandwidth

    * Equal path cost load balancing

    * Support authentication

    * Unlimited hop count

  • 8/6/2019 chirag kalra

    34/44

    P a g e | 34

    34 Department of Computer Science BMIT-JAIPUR

    CONFIGURATION OF OSPF ROUTING

  • 8/6/2019 chirag kalra

    35/44

    P a g e | 35

    35 Department of Computer Science BMIT-JAIPUR

    LAN Switching

    Ethernet switches are used in LAN to create Ethernet networks. Switches forward the traffic

    on the basis of MAC address. Switches maintain a switching table in which MAC addresses

    and Port No are used to perform switching decision. Working of bridge and switch is similar

    to each other.

    Classification of switchesSwitches are classified according to the following criteria: -

    Types of switches based onworking(1)Store & Forward

    This switch receives entire frame then perform error checking and start forwarding data to the

    destination.

    (2)Cut through

    This switch starts forwarding frame as soon as first six bytes of the frame are received.

    (3)Fragment-free

    This switch receives 64 bytes of the frame, perform error checking and then start forwarding data.

    (4)Adaptive cut-through

    It changes its mode according the condition. If there are errors in frames then it changes its mode

    to Store & Forward.

    Types of switches based on management

    (1) Manageable switches

    (2) Non-Manageable switches

    (3) Semi-Manageable switches

    Types of switches based on OSI layer

    (1) Layer 2 switches (only switching)

    (2) Layer 3 switches (switching & routing)

    Types of switches based on OSI layer

    (1) Layer 2 switches (only switching)

    (2) Layer 3 switches (switching & routing)

    Switches based on hierarchical model

    (1) Core layer switches

    (2) Distribution layer switches

    (3) Access layer switches

  • 8/6/2019 chirag kalra

    36/44

    P a g e | 36

    36 Department of Computer Science BMIT-JAIPUR

    VLAN (Virtual LAN)

    VLAN provides Virtual Segmentation of Broadcast Domain in the network. The devices,

    which are member of same Vlan, are able to communicate with each other. The devices of

    different Vlan may communicate with each other with routing. So that different Vlan devices

    will use different n/w addresses. Vlan provides following advantages: -

    (1) Logical Segmentation of network (2) Enhance network security

    Vlan Trunking Protocol (VTP)

    With the help of VTP, we can simplify the process of creating Vlan. In multiple switches, we

    can configure one switch as VTP server and all other switches will be configured as VTP

    client. We will create Vlans on VTP server switch. The server will send periodic updates to

    VTP client switches. The clients will create Vlans from the update received from the VTP

    server.

    VTP serverVTP server is a switch in which we can create, delete or modify Vlans. The server will send

    periodic updates for VTP clients.

    VTP client

    On VTP client, we are not able to create, modify or delete Vlans. The client will receive and

    forward vtp updates. The client will create same Vlans as defined in vtp update.

    VTP Transparent

    Transparent is a switch, which will receive and forward VTP update. It is able to create,

    delete and modify Vlans locally. A transparent will not send its own VTP updates and will

    not learn any information from received vtp update.

    Access Control List

    ACL are the basic security feature that is required in any network to control the flow

    of traffic. Most of time our network may have servers and clients for which traffic control is

    required. We can also use ACL to classify the traffic. ACLs are used in features like QOS

    (Quality of Service), Prioritize traffic and interesting traffic for ISDN.

    Types of ACL based on Protocol: -

    (1) IP Access Control List

    (2) IPX Access Control List

    (3) Appletalk Access Control List

    Types of ACL based on Feature: -

    (1) Standard ACL

    (2) Extended ACL

  • 8/6/2019 chirag kalra

    37/44

    P a g e | 37

    37 Department of Computer Science BMIT-JAIPUR

    Types of ACL based on Access mode: -

    (1) Numbered ACL

    (2) Named ACL

    Types of ACL based on Order of rules: -

    (1) Deny, permit

    (2) Permit, deny

    Types of ACL based on direction: -

    (1) Inbound ACL

    (2) Outbound ACL

  • 8/6/2019 chirag kalra

    38/44

    P a g e | 38

    38 Department of Computer Science BMIT-JAIPUR

    CONCLUSION

    So after making my project report and completing my summer training I have concluded

    many new things and now I learnt the importance of summer training, and learnt about the

    experience of working in an industry and how the atmosphere is in an IT industry.

    I also learnt very deeply about networking and all its fundamentals and so I can say that I

    have the potential to withstand in any networks related company and I can survive there with

    my abilities and qualities I have gained during my summer training.

    I also got a very good experience to work with my faculties and my seniors who worked very

    generously and I learnt how to tackle every problem coming between your way to success.

  • 8/6/2019 chirag kalra

    39/44

    P a g e | 39

    39 Department of Computer Science BMIT-JAIPUR

    REFERENCES

    Websites from which I got the reference about my content

    www.Google.com

    www.cisco.com

    www.w3schools.com

    www.docstoc.com

    Reference Books

    Cisco Press

    kross & ross

    Tenenbaum

  • 8/6/2019 chirag kalra

    40/44

    P a g e | 40

    40 Department of Computer Science BMIT-JAIPUR

  • 8/6/2019 chirag kalra

    41/44

    P a g e | 41

    41 Department of Computer Science BMIT-JAIPUR

  • 8/6/2019 chirag kalra

    42/44

    P a g e | 42

    42 Department of Computer Science BMIT-JAIPUR

  • 8/6/2019 chirag kalra

    43/44

    P a g e | 43

    43 Department of Computer Science BMIT-JAIPUR

  • 8/6/2019 chirag kalra

    44/44

    P a g e | 44