Professional Documents
Culture Documents
M.K Group of College Amritsar: Computer Networking
M.K Group of College Amritsar: Computer Networking
1. INTRODUCTION
Network computer devices that originate, route and terminate the data are called
network nodes.[1] Nodes can include hosts such as personal computers, phones, servers
as well as networking hardware. Two such devices can be said to be networked
together when one device is able to exchange information with the other device,
whether or not they have a direct connection to each other.
Computer networks differ in the transmission medium used to carry their signals,
communications protocols to organize network traffic, the network's size, topology and
organizational intent.
IPV4 ADDRESS
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is
one of the core protocols of standards-based internetworking methods in the Internet, and
was the first version deployed for production in the ARPANET in 1983. It still routes most
Internet traffic today,[1] despite the ongoing deployment of a successor protocol, IPv6.
IPv4 is described in IETF publication RFC 791 (September 1981), replacing an earlier
definition (RFC 760, January 1980).
Addressing
Decomposition of the quad-dotted IPv4 address representation to its binary value IPv4
uses 32-bit addresses which limits the address space to 4294967296 (232) addresses.
IPv4 reserves special address blocks for private networks (~18 million addresses) and
multicast addresses (~270 million addresses).
For example, the quad-dotted IP address 192.0.2.235 represents the 32-bit decimal number
3221226219, which in hexadecimal format is 0xC00002EB. This may also be expressed in
dotted hex format as 0xC0.0x00.0x02.0xEB, or with octal byte values as
0300.0000.0002.0353.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Allocation
In the original design of IPv4, an IP address was divided into two parts: the network
identifier was the most significant (highest order) octet of the address, and the host
identifier was the rest of the address. The latter was also called the rest field. This structure
permitted a maximum of 256 network identifiers, which was quickly found to be
inadequate.
Special-use addresses
The Internet Engineering Task Force (IETF) and the Internet Assigned Numbers Authority
(IANA) have restricted from general use various reserved IP addresses for special
purposes. Some are used for maintenance of routing tables, for multicast traffic, operation
under failure modes, or to provide addressing space for public, unrestricted uses on private
networks.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Private networks
Of the approximately four billion addresses defined in IPv4, three ranges are reserved for
use in private networks. Packets addresses in these ranges are not routable in the public
Internet, because they are ignored by all public routers. Therefore, private hosts cannot
directly communicate with public networks, but require network address translation at a
routing gateway for this purpose.
Link-local addressing
RFC 3927 defines the special address block 169.254.0.0/16 for link-local addressing.
These addresses are only valid on links (such as a local network segment or point-to-point
connection) connected to a host. These addresses are not routable. Like private addresses,
these addresses cannot be the source or destination of packets traversing the internet.
These addresses are primarily used for address autoconfiguration (Zeroconf) when a host
cannot obtain an IP address from a DHCP server or other internal configuration methods.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Loopback
Main article: Loopback
The class A network 127.0.0.0 (classless network 127.0.0.0/8) is reserved for loopback. IP
packets whose source addresses belong to this network should never appear outside a host.
The modus operandi of this network expands upon that of a loopback interface:
IP packets whose source and destination addresses belong to the network (or subnetwork)
of the same loopback interface are returned to that interface;
IP packets whose source and destination addresses belong to networks (or subnetworks) of
different interfaces of the same host, one of them being a loopback interface, are forwarded
regularly.
Address resolution
Main article: Domain Name System
Hosts on the Internet are usually known by names, e.g., www.example.com, not primarily
by their IP address, which is used for routing and network interface identification. The use
of domain names requires translating, called resolving, them to addresses and vice versa.
This is analogous to looking up a phone number in a phone book using the recipient's
name.
The translation between addresses and domain names is performed by the Domain Name
System (DNS), a hierarchical, distributed naming system which allows for subdelegation
of name spaces to other DNS servers.
2. PROJECT OVERVIEW
In the network pcs and laptops are connected to each other through switches and
routers. There are three locations in the network, where Gurgaon region is main region
and Noida and Delhi are connected to each other through Gurgaon region. Moreover
there are five server in main region Gurgaon for managing email, dns,ftp,web and tftp
services.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
In the project, a main server i.e. A DNS server and a Web Server is to be created for our
client(organization), which contains DNS and a website for updates, notices, news and
announcements in the company . There are also other servers in head office, FTP server,
TFTP server and SMTP server
There are basically three physical locations. These are Gurgaon, Delhi and Noida.
The main DNS, Web, TFTP, FTP, SMTP servers are located at the Gurgaon region. Both
Delhi and Noida regions are used for the 50 users. Out of 50 users, 25 users can login and
access from the Delhi region and rest of the 25 users can login and access from the Noida
regions.
In both locations i.e. Delhi and Noida, there are three departments HR department,
Management department and Sales department. Each router in both locations is
configured with dhcp which is providing ip addresses to each machine. Both side’s
network is subnetted and assigned to each department. Separate VLANs are created for
each department, so that different pc’s with same department or you can say that same
VLAN can talk to each other bt can’t with other VLAN’s pc.
Wireless router is used to give access to internet to other pc’s. They can’t communicate
with internal machines.
Physical architecture of the project or we can say the implemented topology of the project
is as follow.
There are basically three physical locations. One is Gurgaon region, second is Delhi region
and third is Noida region.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
At Gurgaon region, there are five servers, a switch and a router. One server is for DNS,
another server is a Web server. Remaining are SMTP, FTP and TFTP servers. A switch is
used to connect these servers with the router situated at this location. The router will help
network on this location to connect with another networks situated at the Delhi and Noida
regions.
At Delhi region, there are basically three departments named as Oil Sales department, Oil
Management department and HR department. Oil sales department contain eight PC.
Which are directly connected to different-different switches. Switches are connected to
each other through TRUNKING. Switch is divided into 3 VLANs. VLAN 100 is for HR
department, 200 for Management department and 300 for Sales department. Concept of
INTERVLAN routing is used to provide communication between different VLANs. In Oil
Management department, there are eight PC’s. These are connected to the different-
different switch through straight wire. And the switches are connected to each other
through cross-over cable and switch-1 is connected to the external router. Now in HR
department, there are eight systems which are PC’s and are connected to the different
switch through straight wire. STP is running to prevent loop in switches.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
The main switch of this network is connected to the router of this region which helps the
network of this region to connect it from the Gurgaon regions or we can say to the main
servers.
At Noida region, there are three departments named as Gas Management department, Gas
Sales department and HR department. Gas Management department contain eight PC’s.
These are connected to different switch through straight wire. In Gas Sales department,
there are eight systems and all three systems are PC’s. These are connected to different
switches through straight wire. And there are three switches connected to each other
through cross wire. Now in HR department, there are six pc’sPC. The main switch of this
network is connected to the router of this region which helps the network of this region to
connect it from the Gurgaon regions or we can say to the main servers.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Routers of both the regions Noida and Delhi are connected to the router of the Gurgaon
region. These two routers are connected through serial interface to the Gurgaon router.
The whole topology will help our client AYBIENERGY PVT. LTD., which is an Oil and
Gas company, to set up a network infrastructure for them and for their employees. This
will give them freedom and flexibility in their working environment.
Now the full physical implementation of this topology is shown in the figure below.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
3. REQUIREMENTS
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Hardware requirements may vary depending on the machine and operating system.
Follow the recommendations for minimum and recommended hardware
specifications.
Recommended configuration
Minimum configuration :
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
OS: Microsoft Windows 7, 8.1, 10, Ubuntu Linux 12.04 LTS or 14.04 LTS
Putty
Packet tracer
MS Office
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
4. ROUTERS
4.1 INTRODUCTION
Routers contain an operating system, ROM, RAM, NVRAM and flash memory. For
parallel processing, some high-end routers also contain application-specific integrated
circuits and multiple processors. Other high-end routers even include multiple ASICs to
allow connectivity of LAN, MAN, WAN or different connections.
Considering a scenario where less terminals would be connected and traffic would be less,
a simple router can be used to cut down expenditure.
ROM: A bootstrap program is located here. It is same as the BIOS of the PC. Bootstrap
program current version is 12.0
Flash: Internetwork Operating System (IOS) is stored here. IOS is Command line
interface.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
NVRAM: Non-volatile RAM, similar to hard disk. It is also known as permanent storage
or start-up configuration. Generally size of NVRAM is 32KB.
The router is known as an intelligent switch since it's the only device that monitors packets
sent from PC to PC on the same network and selects the best path for transferring data.
For example,
If comp A sends a file to comp B, the router takes note of comp A’s addressed and vice
versa. All address are stored in a table known as the routing table. This table also stores
information such as connection priority and rules for handling traffic. Thus the router
ensures that a packet reaches its proper destination.
Another job of a router is that it joins two networks and performs translations of various
protocols between the networks. It also makes sure that packets from one network are not
sent across another work. As more and more PCs are attached to the router, it immediately
saves their address into its routing table. This is done only once for each PC.
For costs saving purpose, multiple PCs can be connected to a single switch and thereafter
the switch can be connected to a router using straight cables.
Routers are network devices which transfer the data packets along networks by
determining the paths of the networks. Routers determine path to many networks such as
Electronic networks, Transportation networks and telephone networks. Routers mainly
operate in two ways using either control plane or forwarding plane. In control plane the
router acts in a more neat and smart way. It sends the precise data packets to their specific
location. While following a forwarding plane, a router does not need to remember the
sending or receiving information about the packets. The ultimate objective of the router is
to deliver the data packets. The forwarding decision takes place at the data link layer of the
OSI model.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
FIXED-ROUTER:
These are just like a branded PC where modification of interfaces is not possible.
Access Layer Routers are example of fixes Router except 1600and 1700 series
MODULAR ROUTER:
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Hostname
We use the hostname command to set the identity of the router. This is only locally
significant, meaning it doesn’t affect how the router performs name lookups or how the
device actually works on the internetwork. But the hostname is still important because it’s
often used for authentication in many wide area networks (WANs).
Banners
A very good reason for having a banner is to give any and all who dare attempt to telnet or
sneak into your internetwork a little security notice. And they’re very cool because you can
create and customize them so that they’ll greet anyone who shows up on the router with
exactly the information you want them to have! Here are the three types of banners you
need to be sure you’re familiar with: uu Exec process creation banner uu Login banner uu
Message of the day banner
IP addresses are given to each interface of router. These identifies each router in network.
Following configurations are done on each router
Router(config)#hostname GURGAON
GURGAON(config)#banner motd #
Enter TEXT message. End with the character '#'.
***********
GURGAON(config)#exit
GURGAON#
GURGAON(config)#interface s0/0/0
GURGAON(config-if)#ip address 12.0.0.2 255.0.0.0
GURGAON(config-if)#no shutdown
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
DELHI(config)#banner motd #
Enter TEXT message. End with the character '#'.
********
WELCOME TO DELHI REGION(GAS)
********#
DELHI(config)#exit
DELHI#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#no ip domain-lookup
Router(config)#hostname NOIDA
NOIDA(config)#banner motd #
Enter TEXT message. End with the character '#'.
********
WELCOME TO NOIDA REGION(OIL)
********#
NOIDA(config)#exit
NOIDA#
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Subnetting
Following configurations are done on each router of the network, that are subnetting and
intervlan routing:
DELHI(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
DELHI(config-if)#interface fa 0/0.10
DELHI(config-subif)# encapsulation dot1Q 100
DELHI(config-subif)# ip address 192.168.10.33 255.255.255.224
%LINK-5-CHANGED: Interface FastEthernet0/0.10, changed state to up
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
DELHI(config-if)#interface fa 0/0.20
DELHI(config-subif)# encapsulation dot1Q 200
DELHI(config-subif)# ip address 192.168.10.65 255.255.255.224
%LINK-5-CHANGED: Interface FastEthernet0/0.20, changed state to up
DELHI(config-if)#interface fa 0/0.30
DELHI(config-subif)# encapsulation dot1Q 300
DELHI(config-subif)# ip address 192.168.10.97 255.255.255.224
%LINK-5-CHANGED: Interface FastEthernet0/0.30, changed state to up
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
NOIDA(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
NOIDA(config-if)#interface fa 0/0.10
NOIDA(config-subif)# encapsulation dot1Q 100
NOIDA(config-subif)# ip address 192.168.20.33 255.255.255.224
%LINK-5-CHANGED: Interface FastEthernet0/0.10, changed state to up
NOIDA(config-if)#interface fa 0/0.20
NOIDA(config-subif)# encapsulation dot1Q 200
NOIDA(config-subif)# ip address 192.168.20.65 255.255.255.224
%LINK-5-CHANGED: Interface FastEthernet0/0.20, changed state to up
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
To configure a DHCP server for your hosts, you need the following information at
minimum: Network and mask for each LAN Network ID, also called a scope. All
addresses in a subnet can be leased to hosts by default. Reserved/excluded addresses
Reserved addresses for printers, servers, routers, etc. These addresses will not be handed
out to hosts. I usually reserve the first address of each subnet for the router, but you don’t
have to do this. Default router.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
DELHI(dhcp-config)#default-router 192.168.10.33
DELHI(dhcp-config)#dns-server 20.0.0.5
DELHI(dhcp-config)#exit
NOIDA(config)#
EIGRP routing protocol is used on each router in this project. EIGRP is a classless,
distance-vector protocol that uses the concept of an autonomous system to describe a set of
contiguous routers that run the same routing protocol and share routing information, which
also includes the subnet mask in its route updates. This is a very big deal because by
advertising subnet information, this robust protocol enables us to use VLSM and permits
summarization to be included within the design of EIGRP networks. EIGRP is sometimes
referred to as a hybrid routing protocol or an advanced distancevector protocol because it
has characteristics of both distance-vector and some link-state protocols. For example,
EIGRP doesn’t send link-state packets like OSPF does. Instead, it sends traditional
distance-vector updates that include information about networks plus the cost of reaching
them from the perspective of the advertising router. EIGRP has link-state characteristics as
well—it synchronizes network topology information between neighbors at startup and then
sends specific updates only when topology changes occur (bounded updates). This
particular feature is a huge advancement over RIP and is a big reason that EIGRP works so
well in very large networks.
EIGRP has a default hop count of 100, with a maximum of 255, but don’t let this confuse
you because EIGRP doesn’t rely on hop count as a metric like RIP does. In EIGRP-speak,
hop count refers to how many routers an EIGRP route update packet can go through before
it will be discarded, which limits the size of the autonomous system (AS).
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
GURGAON(config-router)#no auto-summary
GURGAON(config-router)#network 13.0.0.0
GURGAON(config-router)#no auto-summary
GURGAON(config-router)#exit
GURGAON(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
GURGAON#write
Building configuration...
[OK]
2. GURGAON#show ip protocols
3. GURGAON#show ip route
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Building configuration...
[OK]
2. DELHI#show ip protocols
3. DELHI#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
2. NOIDA#show ip protocols
Routing Protocol is "eigrp 10 "
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Default networks flagged in outgoing updates
Default networks accepted from incoming updates
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
3. NOIDA#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
5. NETWORK SWITCH
5.1 INTRODUCTION
A Network switch is a device that filters, forwards, or floods frames based on the
destination address of each frame. A switch is a very adaptable Layer 2 device; it replaces
a hub as the central point of connection for multiple hosts. In a more complex role, a
switch may be connected to one or more other switches to create, manage, and maintain
redundant links and VLAN connectivity. A switch processes all types of traffic in the same
way, regardless of how it is used.
As mentioned earlier, switches operates at the data-link layer of the OSI model, switch
function is to create a different collision domain per switch port. Let take an example, Four
computers PC 1, PC 2, PC 3, PC 4 attached to switch ports, then PC 1 and PC 2 can
transfer data between them so as PC 3 and PC 4, simultaneously without interfering with
each other's conversations. Unlike a hub, which allows the sharing of bandwidth by all
port, run in half-duplex and is prone to collisions of frames and retransmissions?
With some ISPs and other networking environments where there is a need for much
analysis of network performance and security, switches may be connected between WAN
routers as places for analytic modules. Some switches provide in built firewall, network
intrusion detection and performance analysis modules that can plug into switch ports.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
LAN switch types decide how a frame is handled when it’s received on a switch port.
Latency- the time it takes for a frame to be sent out an exit port once the switch receives
the frame- depends on the chosen switching mode. There are three switching modes:
Cut-through (Fast-forward) - When in this mode, the switch only waits for the
destination hardware address to be received before it looks up the destination
address in the MAC filter table. Cisco sometimes calls this the Fast-Forward
method.
Fragment-Free (modified cut-through) - This is the default mode for the Catalyst
1900 switch, and it’s sometimes referred to as modified cut-through. In Fragment-
Free mode, the switch checks the first 64 bytes of a frame before forwarding it for
fragmentation, thus guarding against forwarding runts, which are caused by
collisions.
Basic switch configurations include giving hostname to switches, which is almost same as
router. Whenever a new system is connected to the switch, switch write it in its mac table.
Mac table of each switch is shown in the configurations. Following are the basic
configurations of switches in each switch of network.
Switch>en
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Switch(config)#hostname G-SW1
D-SW1:
1. Command to name the switch
Switch>en
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname D-SW1
D-SW1(config)#no ip domain lookup
D-SW2:
1. Commands to name the switch
Switch>en
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname D-SW2
D-SW2(config)#no ip domain lookup
D-SW3
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname D-SW3
D-SW3(config)#no ip domain lookup
N-SW1:
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
-------------------------------------------
N-SW2:
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW3
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
virtual local area networks (VLANs). A VLAN is a logical grouping of network users
and resources connected to administratively defined ports on a switch. When you create
VLANs, you’re given the ability to create smaller broadcast domains within a layer 2
switched internetwork by assigning different ports on the switch to service different
subnetworks. A VLAN is treated like its own subnet or broadcast domain, meaning that
frames broadcast onto the network are only switched between the ports logically grouped
within the same VLAN. So, does this mean we no longer need routers? Maybe yes;
maybe no. It really depends on what your particular networking needs and goals are. By
default, hosts in a specific VLAN can’t communicate with hosts that are members of
another VLAN, so if you want interVLAN communication, the answer is that you still
need a router or Inter-VLAN Routing (IVR). In this chapter, you’re going to
comprehensively learn exactly what a VLAN is and how VLAN memberships are used in
a switched network. You’ll also become well-versed in what a trunk link is and how to
configure and verify them.
After creating vlans and assigning ports to that vlan, pcs in the same vlan can
communicate with other pcs in the same vlan. To enable communication between
different vlans, intervlan routing is implemented which is described in the router section.
Following is creation of vlans in each switch of the network:
D-SW1:
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
D-SW1(config-vlan)#interface fa 0/6
D-SW1(config-if)#switchport access vlan 100
D-SW1(config-vlan)#interface fastethernet 0/10
D-SW1(config-if)#switchport access vlan 100
D-SW1(config-if)#exit
D-SW1(config)#vlan 200
D-SW1(config-vlan)#name MANAGEMENT
D-SW1(config-vlan)#interface range fastethernet 0/3-4
D-SW1(config-if)#switchport access vlan 200
D-SW1(config-vlan)#interface fastethernet 0/11
D-SW1(config-if)#switchport access vlan 200
D-SW1(config-if)#exit
D-SW1(config)#vlan 300
D-SW1(config-vlan)#name SALES
D-SW1(config-vlan)#interface range fastethernet 0/7-9
D-SW1(config-if)#switchport access vlan 300
D-SW1(config-if)#exit
D-SW1#show vlan
D-SW2:
D-SW2(config-vlan)#vlan 100
D-SW2(config-vlan)#name HR
D-SW2(config-vlan)#interface fa 0/5
D-SW2(config-if)#switchport access vlan 100
D-SW2(config-vlan)#interface fastethernet 0/9
D-SW2(config-if)#switchport access vlan 100
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
D-SW2(config-if)#exit
D-SW2(config)#vlan 200
D-SW2(config-vlan)#name MANAGEMENT
D-SW2(config-vlan)#interface range fastethernet 0/6-8
D-SW2(config-if)#switchport access vlan 200
D-SW2(config-if)#exit
D-SW2(config)#vlan 300
D-SW2(config-vlan)#name SALES
D-SW2(config-vlan)#interface range fastethernet 0/2-4
D-SW2(config-if)#switchport access vlan 300
D-SW2(config-if)#exit
D-SW2#show vlan
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0
0
100 enet 100100 1500 - - - - - 0
0
200 enet 100200 1500 - - - - - 0
0
300 enet 100300 1500 - - - - - 0
0
1002 fddi 101002 1500 - - - - - 0
0
1003 tr 101003 1500 - - - - - 0
0
1004 fdnet 101004 1500 - - - ieee - 0
0
1005 trnet 101005 1500 - - - ibm - 0
0
D-SW3:
1. Creating vlans :
Here i am going to create 3 vlans:
• 100 for HR department
• 200 for Management department
• 300 for Sales department
D-SW3(config-vlan)#vlan 100
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
D-SW3(config-vlan)#name HR
D-SW3(config-vlan)#interface range fa 0/3-4
D-SW3(config-if)#switchport access vlan 100
D-SW3(config-if)#exit
D-SW3(config)#vlan 200
D-SW3(config-vlan)#name MANAGEMENT
D-SW3(config-vlan)#interface range fastethernet 0/5-6
D-SW3(config-if)#switchport access vlan 200
D-SW3(config-if)#exit
D-SW3(config)#vlan 300
D-SW3(config-vlan)#name SALES
D-SW3(config-vlan)#interface range fastethernet 0/7-8
D-SW3(config-if)#switchport access vlan 300
D-SW3(config-if)#exit
D-SW3#show vlan
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1
Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
100 enet 100100 1500 - - - - - 0 0
200 enet 100200 1500 - - - - - 0 0
300 enet 100300 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
N-SW1
1. Creating vlans :
Here i am going to create 3 vlans:
100 for HR department
200 for Management department
300 for Sales department
N-SW1(config-vlan)#vlan 100
N-SW1(config-vlan)#name HR
N-SW1(config-vlan)#interface fa 0/3
N-SW1(config-if)#switchport access vlan 100
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW1(config)#vlan 200
N-SW1(config-vlan)#name MANAGEMENT
N-SW1(config-vlan)#interface range fastethernet 0/7-8
N-SW1(config-if)#switchport access vlan 200
N-SW1(config-if)#exit
N-SW1(config)#vlan 300
N-SW1(config-vlan)#name SALES
N-SW1(config-vlan)#interface range fastethernet 0/4-6
N-SW1(config-if)#switchport access vlan 300
N-SW1(config-if)#exit
N-SW1#show vlan
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1
Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
100 enet 100100 1500 - - - - - 0 0
200 enet 100200 1500 - - - - - 0 0
300 enet 100300 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW2:
1. Creating vlans :
Here i am going to create 3 vlans:
100 for HR department
200 for Management department
300 for Sales department
N-SW2(config-vlan)#vlan 100
N-SW2(config-vlan)#name HR
N-SW2(config-vlan)#interface fa 0/8
N-SW2(config-if)#switchport access vlan 100
N-SW2(config-vlan)#interface fastethernet 0/11
N-SW2(config-if)#switchport access vlan 100
N-SW2(config-if)#exit
N-SW2(config)#vlan 200
N-SW2(config-vlan)#name MANAGEMENT
N-SW2(config-vlan)#interface range fastethernet 0/2-5
N-SW2(config-if)#switchport access vlan 200
N-SW2(config-if)#exit
N-SW2(config)#vlan 300
N-SW2(config-vlan)#name SALES
N-SW2(config-vlan)#interface range fastethernet 0/6
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW2#show vlan
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1
Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
100 enet 100100 1500 - - - - - 0 0
200 enet 100200 1500 - - - - - 0 0
300 enet 100300 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW3:
1. Creating vlans :
Here i am going to create 3 vlans:
100 for HR department
200 for Management department
300 for Sales department
N-SW3(config-vlan)#vlan 100
N-SW3(config-vlan)#name HR
N-SW3(config-vlan)#interface range fa 0/3-4
N-SW3(config-if)#switchport access vlan 100
N-SW3(config-if)#exit
N-SW3(config)#vlan 200
N-SW3(config-vlan)#name MANAGEMENT
N-SW3(config-vlan)#interface range fastethernet 0/5-6
N-SW3(config-if)#switchport access vlan 200
N-SW3(config-if)#exit
N-SW3(config)#vlan 300
N-SW3(config-vlan)#name SALES
N-SW3(config-vlan)#interface range fastethernet 0/7-8
N-SW3(config-if)#switchport access vlan 300
N-SW3(config-if)#exit
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1
Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
100 enet 100100 1500 - - - - - 0 0
200 enet 100200 1500 - - - - - 0 0
300 enet 100300 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible
by a specific switch, a process known as trunking. Trunk ports mark frames with unique
identifying tags – either 802.1Q tags or Inter-Switch Link (ISL) tags – as they move
between switches. Therefore, every single frame can be directed to its designated VLAN.
An Ethernet interface can either function as a trunk port or as an access port, but not both
at the same time. A trunk port is capable of having more than one VLAN set up on the
interface. As a result, it is able to carry traffic for numerous VLANs at the same time.
The 2960 switch only runs the IEEE 802.1q encapsulation method. To configure trunking
on a FastEthernet port, use the interface command switchport mode trunk. It’s a tad
different on the 3560 switch.
G-SW1(config-if)#do write
Building configuration...
[OK]
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
D-SW2
D-SW2(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to
down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to
up
D-SW2#
%SYS-5-CONFIG_I: Configured from console by console
D-SW2(config)#int fastEthernet 0/10
D-SW2(config-if)#switchport mode trunk
D-SW2(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state
to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state
to up
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
D-SW3
N-SW1:
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW2:
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW3:
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
VTP
VLAN Trunk Protocol (VTP) reduces administration in a switched network. When you
configure a new VLAN on one VTP server, the VLAN is distributed through all switches
in the domain. This reduces the need to configure the same VLAN everywhere. VTP is a
Cisco-proprietary protocol that is available on most of the Cisco Catalyst series products.
We have one VTP server which is the switch where you create / modify or delete VLANs.
The other switches are VTP clients. The VTP configuration has a revision number which
will increase when you make a change. Every time you make a change on the VTP server
this will be synchronized to the VTP clients. Oh and by the way you can have multiple
VTP servers since it also functions as a VTP client so you can make changes on multiple
switches in your network. In order to make VTP work you need to setup a VTP domain
name which is something you can just make up, as long as you configure it to be the same
on all your switches.
STP:
Spanning Tree Protocol (STP) achieves its primary objective of preventing network loops
on layer 2 network bridges or switches by monitoring the network to track all links and
shut down the redundant ones. STP uses the spanning-tree algorithm (STA) to first create a
topology database and then search out and disable redundant links. With STP running,
frames will be forwarded on only premium, STP-chosen links. The Spanning Tree
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Protocol is a great protocol to use in networks like the one shown in Figure (a). This is a
switched network with a redundant topology that includes switching loops. Without some
type of layer 2 mechanism in place to prevent a network loop, this network is vulnerable to
nasty issues like broadcast storms, multiple frame copies, and MAC table thrashing!
Figure (b) shows how this network would work with STP working on the switches.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
D-SW1:
VTP
D-SW1(config)#vtp domain DELHI
Changing VTP domain name from NULL to DELHI
D-SW1(config)#vtp mode server
Device mode already VTP SERVER.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
STP
D-SW1#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0030.F20B.D728
Cost 19
Port 2(FastEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0100
Spanning tree enabled protocol ieee
Root ID Priority 32868
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Address 0030.F20B.D728
Cost 19
Port 2(FastEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0200
Spanning tree enabled protocol ieee
Root ID Priority 32968
Address 0030.F20B.D728
Cost 19
Port 2(FastEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0300
Spanning tree enabled protocol ieee
Root ID Priority 33068
Address 0030.F20B.D728
Cost 19
Port 2(FastEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 33068 (priority 32768 sys-id-ext 300)
Address 00E0.8F5D.1506
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 20
D-SW1#write
Building configuration...
[OK]
D-SW1# [OK]
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
D-SW2:
VTP
D-SW2(config)#vtp domain DELHI
Changing VTP domain name from NULL to DELHI
Switch(config)#vtp mode client
Setting device to VTP CLIENT mode.
D-SW2#show vtp status
VTP Version : 2
Configuration Revision : 29
Maximum VLANs supported locally : 255
Number of existing VLANs : 8
VTP Operating Mode : Client
VTP Domain Name : DELHI
VTP Pruning Mode : Disabled
VTP V2 Mode : Enabled
VTP Traps Generation : Disabled
MD5 digest : 0x0E 0xF8 0x71 0x73 0x96 0x4D 0xFB 0xD5
Configuration last modified by 0.0.0.0 at 3-1-93 00:00:00
STP
D-SW2#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0030.F20B.D728
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 20
VLAN0100
Spanning tree enabled protocol ieee
Root ID Priority 32868
Address 0030.F20B.D728
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32868 (priority 32768 sys-id-ext 100)
Address 0030.F20B.D728
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 20
VLAN0200
Spanning tree enabled protocol ieee
Root ID Priority 32968
Address 0030.F20B.D728
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Address 0030.F20B.D728
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 20
VLAN0300
Spanning tree enabled protocol ieee
Root ID Priority 33068
Address 0030.F20B.D728
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
D-SW2#write
Building configuration...
[OK]
D-SW2# [OK]
D-SW3
VTP
D-SW3(config)#vtp domain DELHI
Changing VTP domain name from NULL to DELHI
D-SW3(config)#vtp mode client
Setting device to VTP CLIENT mode.
STP
D-SW3#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0030.F20B.D728
Cost 19
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Port 2(FastEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0200
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
VLAN0300
Spanning tree enabled protocol ieee
Root ID Priority 33068
Address 0030.F20B.D728
Cost 19
Port 2(FastEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
D-SW3#write
Building configuration...
[OK]
D-SW3# [OK]
N-SW1
VTP
N-SW1(config)#vtp domain NOIDA
Changing VTP domain name from NULL to NOIDA
N-SW1(config)#vtp mode server
Device mode already VTP SERVER.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
STP
N-SW1#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0000.0CEA.4E81
Cost 19
Port 10(FastEthernet0/10)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Address 0060.3E83.D75B
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 20
VLAN0100
Spanning tree enabled protocol ieee
Root ID Priority 32868
Address 0000.0CEA.4E81
Cost 19
Port 10(FastEthernet0/10)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 20
VLAN0200
Spanning tree enabled protocol ieee
Root ID Priority 32968
Address 0000.0CEA.4E81
Cost 19
Port 10(FastEthernet0/10)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0300
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW1#write
Building configuration...
[OK]
N-SW1# [OK]
N-SW2
VTP
N-SW2(config)#vtp domain NOIDA
Changing VTP domain name from NULL to NOIDA
Switch(config)#vtp mode client
Setting device to VTP CLIENT mode.
N-SW2#show vtp status
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
VTP Version : 2
Configuration Revision : 6
Maximum VLANs supported locally : 255
Number of existing VLANs : 8
VTP Operating Mode : Client
VTP Domain Name : NOIDA
VTP Pruning Mode : Disabled
VTP V2 Mode : Enabled
VTP Traps Generation : Disabled
MD5 digest : 0xF5 0xAE 0xC8 0xB7 0xE4 0xE7 0xCD 0x9D
Configuration last modified by 0.0.0.0 at 3-1-93 00:12:22
STP
N-SW2#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0000.0CEA.4E81
Cost 19
Port 12(FastEthernet0/12)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0100
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
VLAN0200
Spanning tree enabled protocol ieee
Root ID Priority 32968
Address 0000.0CEA.4E81
Cost 19
Port 12(FastEthernet0/12)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0300
Spanning tree enabled protocol ieee
Root ID Priority 33068
Address 0000.0CEA.4E81
Cost 19
Port 12(FastEthernet0/12)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
N-SW2#write
Building configuration...
[OK]
N-SW2# [OK]
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW3
VTP
N-SW3(config)#vtp domain NOIDA
Changing VTP domain name from NULL to NOIDA
N-SW3(config)#vtp mode client
Setting device to VTP CLIENT mode.
STP
N-SW3#show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0000.0CEA.4E81
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
VLAN0100
Spanning tree enabled protocol ieee
Root ID Priority 32868
Address 0000.0CEA.4E81
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0200
Spanning tree enabled protocol ieee
Root ID Priority 32968
Address 0000.0CEA.4E81
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
N-SW3#write
Building configuration...
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
[OK]
N-SW3#
Wireless router is used in this project for the purpose of communication between new
employees who are under training. They can’t communicate with other employees who are
in vlan 100,200 and 300. They can communicate only with others who are in same
subnetwork i.e. 192.168.20.128. IP address 192.168.20.129 is given to the wireless router
in Delhi Region. And the machines connected to this router are getting their ip addresses
dynamically. Default gateway is set to 192.168.10.129 and dns-server is set to 20.0.0.5.
Router Configuration
SSID of wireless router is set to Noida Wireless Router and WPA-PSK enabled
password is set to 11111111
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
Laptop Configuration
Three laptops are connected to the wireless router. Steps to connect a machine to wireless
router are as follows:
fill SSID as Noida Wireless Router
fill password : 1111111 with WPA-PSK
Click on dynamic option to get ip address dynamically.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
7.3 TELNET
As part of the TCP/IP protocol suite, Telnet is a virtual terminal protocol that allows you to
make connections to remote devices, gather information, and run programs. After your
routers and switches are configured, you can use the Telnet program to reconfigure and/or
check up on them without using a console cable. You run the Telnet program by typing
telnet from any command prompt (Windows or Cisco), but you need to have VTY
passwords set on the IOS devices for this to work
GURGAON(config)#line vty 0 15
GURGAON(config-line)#password telnet
GURGAON(config-line)#login
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
DELHI(config)#line vty 0 15
DELHI(config-line)#password telnet
DELHI(config-line)#login
NOIDA(config)#line vty 0 15
NOIDA(config-line)#password telnet
NOIDA(config-line)#login
GURGAON#telnet 12.0.0.1
Trying 12.0.0.1 ...Open
********
WELCOME TO DELHI REGION(GAS)
********
You can end telnet session by different ways. Typing exit or disconnect are probably the
two quickest and easier
DELHI#exit
[Connection to 12.0.0.1 closed by foreign host]
GURGAON#
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
In this network, i am using a pc with console cable connected to router in gurgaon head
branch. Any router or switch you want to access should have vty password enabled.
Without vty password set, you can’t take access of that router or switch.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
In this network, three routers(delhi, noida and gurgaon) have their vty password set. So we
can access them through console cable, connected to pc.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
In the above snapshot, i taking the access of delhi router through the pc connected to
console of gurgaon router. To enable telnet, you must use the following command:
GURGAON>telnet 12.0.0.1
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
8. CONCLUSION
As the conclusion, this project have successfully reached the aimed and objectives. The
PC based router showed it can do the routing process, as had been discuss above, for
each design completed. Personally, I find building this router somewhat fascinating. By
completing the final stage of the project, I know how to develop, examine and simulate
various security and routing models that might ultimately prove suitable and
economizing for use in a space-networking environment.
All the routers are secured. Nobody can access or change the configuration except the
admin. Routing protocol is used to route packets in the whole network. Vlans add more
security to the network communication. DHCP implemented on routers provide
dynamic IP address to the systems connected to the network. Network is partitioned into
subnetworks. And hence IP address wastage is minimum. Router backup is taken fore
recovery of router in case of failure. Different servers are available for providing
different services.
Finally, altogether with the development of this final year project, I learned many things
such as new software and increased my knowledge in networking. I have become such a
result-orientated person that I cannot stop doing my work and the progress of my project
until I successfully get the desired results.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
9. FUTURE SCOPE
It is clear that the present project might be significantly improved. For the future project,
several modifications should be done such as;
I hope that with the repaired and changes that made as above, the Network for Gas & Oil
Company will operate in wider network, and results to give in a beneficial influence of
networking for campus environment as well as working places.
M.K/C.S.E/Sem-4th/jun-2017/ sign............
M.K Group Of College Amritsar
Department of Computer Science
10. REFERENCES
1. CCNA Routing & Switching COMPLETE STUDY GUIDE 2nd edition, by Todd
Lammle
2. CCNA Routing & Switching by aptron solution.
3. Data communication By Ferozon
4. http://www.cisco.com
5. http://www.networkessential.com
6. http://www.google.com
M.K/C.S.E/Sem-4th/jun-2017/ sign............