Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

INDUSTRIAL TRAINING

(PHASE-I)
Undergone at

CETPA INFOTECH PVT LTD


NOIDA

A PRESENTATION REPORT

On

CCNA

Submitted by

CHIRAG YADAV
RA1711008010126

in partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY

IN

INFORMATION TECHNOLOGY

AUGUST, 2019

1
BONAFIDE CERTIFICATE

Certified that the report on CCNA is a proof of successful completion of Industrial Training

Phase–I programme undergone by CHIRAG YADAV (RA1711008010126) in the company

CETPA INFOTECH PVT LTD located at NOIDA during the period 1st JUNE, 2019 to 28th

JUNE, 2019

Date Signature of the


Industrial Training In-charge

2
DECLARATION

I hereby declare that the presentation report submitted titled CCNA, is a record of my

industrial training programme which I had undergone in the company CETPA INFOTECH

PVT LTD, NOIDA during the end of the fourth semester between the period 1st JUNE, 2019 to

28th JUNE, 2019

Date : 23rd August,2019

Name : CHIRAG YADAV

Register Number : RA1711008010126

Signature of the Student

3
RUBRICS FOR EVALUATION

S. No Marks Split up Maximum marks Marks Obtained

1 Report Preparation 50

2 Presentation 25

3 Quiz and Viva 25

Total 100

Signature of the Staff

4
TABLE OF CONTENT

S.No. TOPIC PAGE NO.


1. INDUSTRIAL TRAINING CERTIFICATE 6
2. COMPANY INFORMATION 7
3. PROJECT : MEDIUM SIZE ORGANIZATION NETWORK 9
4. CCNA : Introduction To Networking 10
5. Types Of Network 11
6. Network Model 13
7. IP Addressing 17
8. Subnetting 19
9. Router 20
10. Access Control List 21
11. Summary 25
12. Conclusion 26

5
6
CETPA InfoTech PVT LTD established in the year 2002, is North India’s one of the best Software and
Embedded development company.
CETPA Technologies which now stands at a stage from where it is delivering Software Development
Solutions, Mobile Application, Digital Marketing Solutions, Mechanical Design solutions and Chip
Development Solutions to businesses around the globe.
CETPA has offices and development centers in Germany, India and Ukraine.

Company Profile

• Name: CETPA INFOTECH PVT LTD

• Industry: TRAINING, DEVELOPMENT and CONSULTANCY

• Founded: Dec,2002

• CEO: Vikas Kalra

• Headquarters: Noida, Uttar Pradesh

INFRASTRUCTURE
CETPA Technologies is now a leading business and information technology service company that leverages
deep industry and functional expertise, leading technology practices, and an advanced, global delivery model
to help the clients to transform their highest-value business processes and improve their business performance.
CETPA Technologies has been successfully empowering its customers with innovative end-to-end technology
solutions. CETPA Technologies provides Strategic Outsourcing services that includes enterprise solutions,
supply chain management, client relationship management, business intelligence, business process quality,
engineering and product lifecycle management, and infrastructure services, among other key capabilities and
end-to-end product engineering services, enterprise solutions, and packaged application implementations.

7
BUSINESS MODEL
CETPA has specialization in 3 important domains namely: TRAINING, DEVELOPMENT and
CONSULTANCY. The company provides specialized training in 50+ leading technologies like .NET, Java,
PHP, Ethical Hacking, ANDROID, CCNA, AUTOCAD, VHDL, MATLAB, EMBEDDED SYSTEM, HVAC
and many more. CETPA has a very committed team consisting of technical trainers who are continuously
guiding, mentoring, admonish and coaching the students by providing them with exclusive personalized
attention, which helps them to develop solid industry oriented knowledge.

Getting a post is as difficult as defeat the crew because being in the associate world need a lot from the
candidate because of which the candidates are putting their perfect effort, which results process of hardship
level. Student can see each business is connect but resolve this problem is either consuming years to reach to a
crave place or come to CETPA. CETPA gives the entire essential computer training which helps the beginner
and the experienced employees so that they can have better identification in this competitive globe.

Like other academic and training company, at CETPA learner will be offer assortments programs but the
trainers differs and make CETPA stand out from leftovers. CETPA has variety of knowledgeable and
experienced trainers whose accession is different which learners can see everywhere. CETPA try its level best
to boost their trainee’s capability so that they stand out from others and whatever they grant to the corporate
world inevitably becomes fruitful. Not only the fresher but also the professionals who are not adequate to deal
with the upcoming technology and software are also helped here. CETPA try its aligned best to convey its
services to every edge of the globe with the help of tailored education. CETPA’s motto is to distribute the best
utility to student and professionals and that is why CETPA have taken the personalized approach because
CETPA does not want learners to adjust with their education.

Address:

D-58, Red FM Road, Sector 2, D Block, Sector 2,


Noida, Uttar Pradesh 201301

Website:

www.cetpainfotech.com

8
PROJECT : MEDIUM SIZE ORGANIZATION NETWORK

This subsection of Project Report should provide an overview of entire system.


The medium size organization network is developed to show how system will
connect and able to communicate in an organization consisting of different
departments and buildings.This project show three departments in an organization
that are able to communicate with each other and share data to each other.

9
CCNA

INTRODUCTION TO NETWORKING

A network is a system that transmits any combination of voice, video and/or data between users.
A network can be defined by its geographical dimensions and by which the user’s PC access it.

A network consists of a:
 The network operating system (Windows NT/2000TM/Xp) on the user’s PC (client) and
server.
 The cables connecting all network devices (user’s PC, server, peripherals, etc.).
 All supporting network components (hubs, routers and switches, etc.).
Computer Network means an interconnected collection of autonomous computers.

Requirement of Networking
Resource sharing- To make all programs, equipment, and especially data available to anyone on
the network without regard to the physical location of the resource and the user.

High reliability- As all files could be replicated on two or three machines, so if one of them is
unavailable (due to hardware failure), the other copies could be used.

Scalability- It is the ability to increase system performance gradually as the workload grows just
by adding more processors.
A computer network can provide a powerful communication medium along widely separated
employees.
The use of networks to enhance human-to-human communication will probably prove more
important than technical goals such as improved reliability.
These are the requirement with respect to companies but computer networking is required even
in the normal day to day life as we have to access the internet to get information about what all
new happening in the world, to have communication with people staying far away using the e
mail service.

These are the reasons that forced the inventerors to invent the networking devices, models and
protocols etc.

And the birth of Networking took place in 1844 when for the first time Samuel Morse send the
first telegraph message.

10
TYPES OF NETWORKS

LAN (LOCAL AREA NETWORK)


These are privately owned networks within a single building or campus of up to a few a
kilometers in size.
LAN’s are distinguished from other networks by three characteristics:
1) Their size.
2) Their transmission technology.
3) Their topology.

LAN’s are restricted in size, which means that the worst-case transmission time is bounded and
known in advance.
LAN’s often use a transmission technology consisting of a single cable to which all the machines
are attached.
LANs run at speeds of 10 to 100 Mbps, have low delays, and make very few errors.

LAN SETUP

IEEE has produced several standards for LANs. These standards collectively known as IEEE
802 .
IEEE802.3 (Ethernet), IEEE802.4 (Token Bus), IEEE802.5 (Token Ring)

11
WAN (WIDE AREA NETWORK)

It is a Computer network that spans a relatively large geographical area, often a country or
continent. Typically a WAN consists of two or more Local Area Network.
Computers connected to WAN are often connected through public networks such as telephone
systems. They can also be connected through leased lines or satellites. The largest WAN in
existence is Internet.
WANs run at speed of maximum 2 to 10 Mbps.

WAN SETUP

For most WANs, the long distance bandwidth is relatively slow: on the order of kilobits per
second (kbps) as opposed to megabits per second (Mbps) for
local-area networks (LANs). For example, an Ethernet LAN has a 10 Mbps bandwidth; a WAN
using part or all of a T1 carrier has a bandwidth of 1.544 Mbps .

Three types of approaches are used to connect WANs:


1) Circuit switching, which provides a fixed connection (at least for the duration of a call or
session), so that each packet takes the same path. Examples of this approach include ISDN,
Switched 56, and Switched T1.

2) Packet switching, which establishes connections during the transmission


process so that different packets from the same transmission may take different routes and may
arrive out of sequence at the destination. Examples
of this approach are X.25, frame relay, and ATM.

3) Leased lines, which can provide a dedicated connection for private use

12
NETWORK MODELS

Layering Concepts and Benefits

Many benefits can be gained from the process of breaking up the functions or tasks of
networking into smaller chunks, called layers, and defining standard interfaces between these
layers. The layers break a large, complex set of concepts and protocols into smaller pieces,
making it easier to talk about, to implement with hardware and software, and to troubleshoot.
The following list summarizes the benefits of layered protocol Specifications:

Humans can more easily discuss and learn about the many details of a protocol specification.

Standardized interfaces among layers facilitate modular engineering.

A better environment for interoperability is created. One vendor can write software that
implements higher layers—for example, a Web browser—and another can write software that
implements the lower layers—for example, Microsoft’s built-in TCP/IP software in its operating
systems.

Reduced complexity allows easier program changes and faster product evolution.

One layer uses the services of the layer immediately below it. Therefore, remembering what each
layer does is easier. (For example, the network layer needs to deliver data from end to end. To do
this, it uses data links to forward data to the next successive device along that end-to-end path.)

OSI NETWORK MODEL


The OSI model describes how information makes its way from application programs through a
network medium to another application program in other computer. It divides one big problem in
to seven smaller problems . Each problem is addressed by one of the seven layers of the OSI
model.

13
Functions of Network Layers in Brief:
APPLICATION LAYER

 Used for applications specifically written to run over the network


 Allows access to network services that support applications;
 Directly represents the services that directly support user applications
 Handles network access, flow control and error recovery
 Example apps are file transfer, e-mail, Net BIOS-based applications

PRESENTATION LAYER

 Translates from application to network format and vice-versa


 All different formats from all sources are made into a common uniform format that the
rest of the OSI model can understand
 Responsible for protocol conversion, character conversion, data encryption / decryption,
expanding graphics commands, data compression
 Sets standards for different systems to provide seamless communication from multiple
protocol stacks
 Not always implemented in a network protocol

14
SESSION LAYER

 Establishes, maintains and ends sessions across the network


 Responsible for name recognition (identification) so only the designated parties can
participate in the session
 Provides synchronization services by planning check points in the data stream => if
session fails, only data after the most recent checkpoint need be transmitted
 Manages who can transmit data at a certain time and for how long
 Examples are interactive login and file transfer connections, the session would connect
and re-connect if there was an interruption; recognize names in sessions and register
names in history

TRANSPORT LAYER

 Additional connection below the session layer


 Manages the flow control of data between parties across the network
 Divides streams of data into chunks or packets; the transport layer of the receiving
computer reassembles the message from packets
 "Train" is a good analogy => the data is divided into identical units
 Provides error-checking to guarantee error-free data delivery, with on losses or
duplications
 Provides acknowledgment of successful transmissions; requests retransmission if some
packets don’t arrive error-free
 Provides flow control and error-handling
TCP, ARP, RARP;

NETWORK LAYER

 Translates logical network address and names to their physical address (e.g. computer
name ==> MAC address)
 Responsible for addressing and determining routes for sending
 Managing network problems such as packet switching, data congestion and routing
 If router can’t send data frame as large as the source computer sends, the network layer
compensates by breaking the data into smaller units. At the receiving end, the network
layer reassembles the data
 Think of this layer stamping the addresses on each train car
IP; ARP; RARP, ICMP; RIP; OSFP;

15
DATA LINK LAYER

 Turns packets into raw bits 100101 and at the receiving end turns bits into packets.
 Handles data frames between the Network and Physical layers
 The receiving end packages raw data from the Physical layer into data frames for delivery
to the Network layer
 Responsible for error-free transfer of frames to other computer via the Physical Layer
 This layer defines the methods used to transmit and receive data on the network. It
consists of the wiring, the devices use to connect the NIC to the wiring, the signaling
involved to transmit / receive data and the ability to detect signaling errors on the
network media

Logical Link Control

 Error correction and flow control


 Manages link control and defines SAPs

PHYSICAL LAYER

 Transmits raw bit stream over physical cable


 Defines cables, cards, and physical aspects
 Defines NIC attachments to hardware, how cable is attached to NIC
 Defines techniques to transfer bit stream to cable

16
IP ADDRESSING

Every machine on the internet has a unique identifying number, called an IP


Address. A typical; IP address looks like this:
216.27.61.45

IP ADDRESS is a 32-bit number, usually written in dotted decimal form, that uniquely identifies
an interface of some computer. This 32-bit number is divided into 4 octets each separated by a
decimal. Out so many values certain values are restricted for use as typical IP address. For
example, the IP address 0.0.0.0 is reserved for the default network and the address
255.255.255.255is used for broadcast.
Each IP address is split into 2 sections:

1) Network address
2) Host address

Individual IP address in same network all have a different value in the host part of address, but
they have identical value in network part, just as in town there are different street address but
same ZIP code.
There are five IP classes:
Class A – This class is for very large networks, such as a major international company. IP
addresses with a first octet from 1 to 126 are part of this class. The other three octets are each
used to identify each host.

Loopback- The IP address 127.0.0.1 is used as the loopback address. This means that it is used
by the host computer to send a message back to itself. It is commonly used for troubleshooting
and network testing.

Class B- Class B is used for medium-sized networks. A good example is a large college campus.
IP addresses with a first octet from 128 to191 are part of this class. Class B addresses also
include the second octet as part of the Net identifier. The other two octets are used to identify
each host.

Class C- Class C addresses are commonly used for small to mid-size business. IP addresses with
a first octet from192 to 223 are part of this class. Class C addresses also include the second and
third octets as part of Net identifier. The last octet is used to identify each host.

17
Class D- It is used for multicast. It has first bit value of 1, second bit value of 1, third bit value of
1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the
multicast messages is intended for.

Class E- It is used for experimental purpose only.

Private IP

It is not necessary that every time we make a network we are connected to some ISP (Internet
Service Provider). So in that case we require some private IP also which can be used in
indigenous networks .In each class a range of IP addresses have been defined for this purpose
CLASS A 10.0.0.1 to 10.255.255.244
CLASS B 172.16.0.1 to 172.34.255.254
CLASS C 192.168.0.0/16

MASKING

Computers use a mask to define size of network and host part of an address. Mask is a 32-bit
number written in dotted decimal form. It provides us the network address when we perform a
Boolean AND of mask with the IP address. It also define number of host bits in an address.

Class of Size of Size of Default Mask


address network Host Part for Each Class
Part of of of Network
address, address,
in bits in bits
A 8 24 255.0.0.0
B 16 16 255.255.0.0
C 24 8 255.255.255.0

18
SUBNETTING

Basically it is a process of subdividing networks into smaller subnets.


In case we have 2-3 small networks but we cant buy IP address for each and every network. So
here we use the basic concept of SUBNETTING i.e using one public IP address we will give
them IP address and make them independent networks. For this we take some bits of host
address and use them for network address so we have different independent networks

Address Format when Subnetting Is Used (class A,B,C resp.):

8 24-x
x
Network Subnet
Host
16 16-x
x
Network Subnet Host
24
8-x x
Network Subnet Host
And due to this mask changes to subnet mask and now the network address also includes subnet
address.

Example

If subnet mask is 255.255.240.0


And an IP address for a computer is given as 142.16.52.4
142.16.0.0 is network address
0.0.48.0 is the subnet address
0.0.4.4 is the host address of the computer

10001110.00010000.00110100.00000100 is ANDed with


11111111.11111111.11110000.00000000
and output is 10001110.00010000.00110000.00000000
here first two octets represents Network address and third octet represents subnet address.
It can be compared with a postal address as there is only one ZIP code (Network address),
different streets (Subnet address), and different house number (Host address).

19
ROUTER

ROUTER INTERNAL COMPONENTS

Like a computer, a router has a CPU that varies in performance and capabilities depending upon
router platform. It has typically 4 types of memory in it.:

ROM- It is used to store the router’s bootstrap startup program, operating system software, and
power-on diagnostic tests programs. We can also upgrade our ROM

FLASH MEMORY- It holds operating systems image(s). Flash memory is erasable,


reprogrammable ROM. Our IOS software is present in this memory and we can upgrade it also.
Flash content is retained even when we switch off or restart the router.

RAM- It is used to store operational information such as routing tables, router’s running
configuration file. RAM also provides caching and packet buffering capabilities. Its content is
lost when we switch off or restart the router. When we configure the router at that time actually
we are writing in RAM.

NVRAM- It is used to store the router’s startup configuration file. It does not lose data when
power is switched off. So the contents of startup configuration files are maintained even when
we switch off or restart the router.

After connecting the router that will boot and after booting the following procedures will
be adopted.
Router> enable

Now automatically prompt asking for password will appear on the screen like this:

Password:
Now write password over here. This is done to secure access to router. After this

Router#
will appear on the screen this shows that we are in privileged mode and now we try to enter in
configuration mode.

Router# configure terminal


This is done to enter configuration mode.
Now starts the configuration of router

20
Now we will assign IP address to each and very interface connected to router. Subnet mask
should be given with a proper care. Following steps are to be followed:

For configuring ethernet interface:

Router# config terminal


Router (config)# interface ethernet 0
Router (config-if)# ip address 223.8.151.1 255.255.255.0
Router (config-if)# no shutdown
Router (config-if)#exit

For configuring serial interface:

Router (config)# interface serial 0


Router (config-if)# ip address 204.204.7.1 255.255.255.0
Router (config-if)# no shutdown
Router (config-if)#exit
Router (config)# interface serial 1
Router (config-if)# ip address 199.6.13.2 255.255.255.0
Router (config-if)# no shutdown
Router(config-if)# exit

IP ACCESS LIST
IP access lists cause a router to discard some packets based on criteria defined by the network
engineer. The goal of these filters is to prevent unwanted traffic in the network—whether to
prevent hackers from penetrating the network, or just to prevent employees from using systems
that they should not be using.

Key features of access lists:


• Packets can be filtered as they enter an interface, before the routing decision.
• Packets can be filtered before they exit an interface, after the routing decision.
• Deny is the term used in Cisco IOS software to imply that the packet will be filtered.
• Permit is the term used in Cisco IOS software to imply that the packet will not be filtered.
• The filtering logic is configured in the access list.
• At the end of every access list is an implied “deny all traffic” statement. Therefore, if a packet
does not match any of your access list statements, it is blocked.

21
22
23
24
SUMMARY

During the course of internship, knowledge was gained about networking and how computer
connect with each other and communicate together.

About Networking

Networking, also known as computer networking, is the practice of transporting and exchanging
data between nodes over a shared medium in an information system. Networking comprises not
only the design, construction and use of a network, but also the management, maintenance and
operation of the network infrastructure, software and policies.

Computer networking enables devices and endpoints to be connected to each other on a local
area network (LAN) or to a larger network, such as the internet or a private wide area network
(WAN). This is an essential function for service providers, businesses and consumers worldwide
to share resources, use or offer services, and communicate. Networking facilitates everything
from telephone calls to text messaging to streaming video to the internet of things (IoT).

The level of skill required to operate a network directly correlates to the complexity of a given
network. For example, a large enterprise may have thousands of nodes and rigorous security
requirements, such as end-to-end encryption, requiring specialized network administrators to
oversee the network.

At the other end of the spectrum, a layperson may set up and perform basic troubleshooting for a
home Wi-Fi network with a short instruction manual. Both examples constitute computer
networking.

25
CONCLUSION

I would like to thank SRM University for providing me with an opportunity to


work with a company as an intern and learn through hands on experience. This
internship helped to add to my technical knowledge. I learned and understand a lot
about Networking. I would also like to thank my teachers for their constant
guidance and support. It was an enriching experience. I am really looking forward
to such opportunities to widen my horizon.

26

You might also like