Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 55

1

EIGHT WEEKS INDUSTRIAL


TRAINING REPORT

On
“NETWORKING”

In partial fulfillment of the Diploma of Technology in ELECTRONICS &


COMMUNICATION Engineering

AT

G.B.N. GOVT. POLY. NILOKHERI

Guided by Submitted by
NETWORKING EXPERT
MR. SHYAM MOHIT KUMAR (190091000050)
2

COMPANY PROFILE

Solitaire Infosys Pvt. Ltd.


Complete IT Solution Provider

Overview
SOLITAIRE INFOSYS is a leading Software and Web Application
Development Company, based in Mohali (Chandigarh), that provides
high quality comprehensive services to enterprises across a wide range
of platforms and technologies. Our major areas of expertise are in
providing quality, cost effective software or web development. Our
focus is on understanding the diverse and mission-critical needs of
each of our clients. To understand is to be able to deliver. The
competence and experience of our company gives us a competitive
edge by making sure we provide the best services and products to our
clients. Our high quality standards enable us to deliver reliable and
error-free software applications, despite their complexity. We
provide Web design/Web development, B2B & B2C E-commerce
solutions, SEO & Web Promotions strategies implementation
consulting services to both domestic as well as international clients at
the most affordable rates less
3

ACKNOWLEDGEMENT

While presenting this report we would like to express my deep sense of gratitude to entire

Solitaire staff that were indispensable part of my training giving me unending guidance,

inspiration, encouragement and providing me excellent environment throughout my training

at Solitaire Infosys Pvt. LTD. The training was an extremely productive & enriching

experience, not only technically but also from providing practical skills.

We are extremely thankful to MR. SHYAM who had devoted a lot of time in guiding and

supervising me during my training. We place our gratitude towards MR. SHYAM for her

valuable advice and guidance in carrying out this enjoyable and productive experience, which

provided me a great opportunity to search new horizons.

PREFACE
4

Technology has rapidly grown in past two-three decades. An engineer without practical
knowledge and skills cannot survive in this technical area. Theoretical knowledge does
matter but it is the practical knowledge that is the difference between the best and the better.
Routeranizations also prefer experienced engineers than fresher ones due to practical
knowledge and industrial exposure of the former. The practical training is highly conductive
for solid foundation for:-

1. Knowledge and personality

2. Exposure to industrial environment.

3. Confidence building.

4. Enhancement of creativity.

5. Practicality

ABSTRACT
5

The networking course is designed to provide participants with a solid foundation


in networking principles, protocols, and technologies. Over the duration of the
course, participants will be introduced to key concepts such as network
architecture and network design. Through a combination of theoretical instruction
and practical hands-on exercises, participants will gain the necessary skills to
configure, manage, and maintain computer networks effectively.

The course begins with an introduction to networking fundamentals, including


an overview of network models such as the OSI and TCP/IP models.
Participants will learn about different network topologies, protocols, cabling
and the functions of network devices. As the course progresses, participants
will delve into the intricacies of routing protocols such as RIP, OSPF, EIGRP.

Network security is a crucial aspect of the course, covering areas


such as virtual private networks (VPNs), DNS server, Email server,
NAT, VOIP. Participants will also gain insights into network design
methodologies, IP addressing, redistribution and subnetting.

By the end of the course, participants will have developed a


comprehensive understanding of networking fundamentals and
acquired practical skills to design, configure computer networks. This
knowledge and expertise will enable them to pursue careers in
network administration, engineering, or security, contributing to the
efficient and secure functioning of modern digital infrastructures.

CONTENTS
6

1. Report Organization
1.1 Hardware Requirements
1.2 Software Requirements

2. Design&List of figures
3. Network Design Encoding
3.1 Interface
3.2 Module Description
4. Project Implementation
4,1 INTRODUCTION OF PROJECT
4,2 MESH TOPOLOGY
4.3 ROUTING (OSPF & EIGRP)
4.4 REDISTRIBUTION (OSPF & EIGRP)
4.5 WEB SERVER
4.6 DNS SERVER
4.7 ACCESS – LIST SECURITY
5.NAT 6.VOIP(VOICE OVER INTERNET PROTCOL)
7.VLAN(VIRTUAL LOCAL AREA NETWORK)
8. Telecommunication Network
9. Secure Shell
10. WiFi server
11. Subnetting
7

Report Organization
1.1 Software Requirements
1.2 Hardware Requirements

1.1 SOFTWARE REQUIREMENTS

To complete the work on network security, I take help from some software requirements.
Software requirements as

 Operating System : Windows7 ultimate,


 Front end tools : Cisco Packet Tracer,GNS 3.

Windows 7:

Windows 7 is a personal computer operating system developed by Microsoft, a

version of Windows NT. Development of 7 occurred as early as 2006 under the codename
"Blackcomb". Windows 7 was released to manufacturing on July 22, 2009, and became
generally available on October 22, 2009, less than three years after the release of its
predecessor, Windows Vista. While retaining a similar appearance to Vista,

7's interface was streamlined, with the addition of a redesigned taskbar that allows
applications to be "pinned" to it, and new window management features. Other new features
were added to the operating system, including libraries, the new file sharing system
HomeGroup, and support for multitouchinput. A new "Action Center" interface was also
added to provide an overview of system security and maintenance information, and tweaks
were made to the User Account Control system to make it less intrusive. 7 also shipped

with updated versions of several stock applications, including Internet

Explorer, Windows Media Player, and Windows Media Center.Windows 7 was a


8

major success for Microsoft; even prior to its official release, pre-order sales for 7 on the
online retailer Amazon.com had surpassed the record set. In just six months,
over100 million copies had been sold worldwide, increasing to over 630 million licenses by
July 2012, and a market share of 47.49% as of February 2014 according to Net

Applications, making it the most widely used version of Windows.


Features:-

 New and changed

 Removed

New and Changed:-

Among Windows 7's new features are advances in touch and handwriting recognition,

support for virtual hard disks, improved performance on multi-

core processors, improved boot performance, DirectAccess, and kernel improvements.


Windows 7 adds support for systems using multiple heterogeneous graphics cards from
different vendors (Heterogeneous Multi-adapter), a new version of Windows Media

Center, a Gadget for Windows Media Center, improved media features, XPS Essentials
Pack and Windows PowerShell being included, and a redesigned Calculator with
multiline capabilities including Programmer and Statistics modes along with unit conversion
for length, weight, temperature, and several others. Many new items have been added to
the Control Panel, includingClearType Text Tuner Display Color Calibration

Wizard, Gadgets, Recovery, Troubleshooting, Workspaces Center, Location and Other

Sensors, Credential Manager, Biometric Devices, System Icons, and Display. Windows

Security Center has been renamed to Windows Action Center (Windows Health
Center and Windows Solution Center in earlier builds), which encompasses
both security and maintenance of the computer. ReadyBoost on 32-bit editions now supports

up to 256 gigabytes of extra allocation. Windows 7 also supports images in RAW image
9

format through the addition of Windows Imaging Component-enabled image decoders,


which enables raw image thumbnails, previewing and metadata display in Window
Explorer, plus full-size viewing and slideshows in Windows Photo Viewer and Windows
Media Center. And many more changes takes place in it.

Removed:-
Certain capabilities and programs that were a part of Windows Vista are no longer present
or have been changed, resulting in the removal of certain functionalities. These include the
classic Start Menu user interface, some taskbar features, Windows Explorer
features, Windows Media Player features, Windows Ultimate Extras and InkBall.
Four applications bundled with Windows Vista— Windows Photo Gallery, Windows

Movie Maker, Windows Calendar and Windows Mail—are not included with
Windows 7, and were replaced by Windows Live-branded versions as part of

the Windows Live Essentials suite.

Hardware Requirements

Operating system architecture


Component
32-bit 64-bit
Processor 1 GHz IA-32 processor 1 GHz x86-64 processor
Memory (RAM) 1 GB 2 GB
DirectX 9 graphics processor with WDDM driver model 1.0
Graphics card
(Not absolutely necessary; only required for Aero)
Free hard
16 GB 20 GB
drive space
Optical drive DVD-ROM drive[94] (Only to install from DVD-ROM media)

Table 3: Minimum hardware requirements for Windows 7


10

Cisco Packet Tracer:-

Fig 2: Cisco Packet Tracer


Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various
protocols used in networking, in either Real Time or Simulation mode. This includes layer 2
protocols such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer
4 protocols such as TCP and UDP. Routing protocols can also be traced.
Purpose:
The purpose of this lab is to become familiar with the Packet Tracer interface. Learn how to
us
11

Fig 3: Cisco Packet Tracer Lab

Packet Tracer features:-

Fig 4: Features of Packet Tracer

Fig 5: Functionality of Packet Tracer

 1.2 HARDWARE REQUIREMENTS

SWITCHES:
1 × cisco 2960 series 24 port
8 × Dlink 16 port
CABLES:
cat 5 and cat 6
Console cable, serial cable
Length as per requirement
Clients/Nodes:
Pentium 4
Windows XP Professional
512 MB RAM
80 GB Hard Disk

Switches:- A switch is a device that is used for switching. It forward and filters OSI layer 2
datagrams between ports. Switch has numerous ports. Switches can operate on one or more
layer of OSI model including physical, data link, network or transport. A device which
operate on more than one layer is known as Multilayer switch.
Every port has its own buffer memory. A port has two queues one is input queue and second
is output queue. When switch receives the frame, the frame is received in input queue and
12

forward from output queue. So in case of switch there is no chance or place for collisions. In
case of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/
Collision Avoidance). Switches provide more efficiency, more speed and security.

Types of switch:-
 Manageable switch

 Unmanageable switch

Fig 6: Network Switch

WORKGROUP SWITCH-

Workgroup switches add more intelligence to data transfer management.


Switches can determine whether data should remain on a LAN or not, and they can transfer
the data to the connection that needs that data.

Fig 7: Workgroup
13

Router:-Routers are networking devices that forward data packets on a network. It is a


WAN link device . It works on Layer-3 i.e. Network layer of OSI model or Internet layer of
TCP/IP model. Files are transfered in the form of packets. It is a manageable device. It
creates internetwork by connecting two different networks.Routers can regenerate signals,
concentrate multiple connections, convert data transmission formats, and manage data
transfers. They can also connect to a WAN, which allows them to connect LANs that are
separated by great distances.

There are two types of routers: -

(i) Hardware Routers are developed by Cisco, HP.

(ii) Software Routers is configured with the help of routing and remote access. This feature
is offered by Microsoft. This feature is by default installed, but you have to enable or
configure it.

Hardware routers are dedicated routers. They are more efficient.

But in case of software routers, it has less features, slow performance. They are not very
much efficient.

They follow:-
 Route Advertisement

 Best Path Selection


14

Fig 8: Example of Router


Cables- These are used to connect computers or other devices in a network. There are many
types of cables used with LAN as :-

 Coaxial Cable- Coaxial cable or Coax is a type of cable that has an inner conductor
surrounded by insulating layer and enclosed by conducting shield. It is used as a
transmission line for radio frequency signals. It is difficult too install coaxial cabling.

Types :-
1. Thick coaxial- Thick coaxial cable also referred to as thicknet. 10Base5 is the
specification of coaxial cable carrying ethernet signals. It has extra protective plastic
cover.
2. Thin coaxial- Thin coaxial cable is also referred to as thinnet.10Base2 refers to the
specification for thin coaxial cable carrying ethernet signals. It is popular in school
networks.

BNC Connector is used with coaxial cables.


15

Fig 9: Coaxial Cable

 Twisted Pair Cable- It is a type of cabling in which conductors of single circuit are
twisted together for cancelling out electromagnetic interference from external source.

Types:-
1. STP(Shielded Twisted Pair Cable)- It is suitable for environments with electrical
interference . STP is used on networks using Token ring Topology.

2. UTP(Unshielded Twisted Pair Cable)- It is most popular and it is best option for
school networks. It contains four twisted-pairs(Orange, Green, Blue, Brown).It is
basically used for networking applications.

The standard connector for UTP cabling is an RJ-45.


16

Fig 10: Twisted Pair Cable

 Crossover Cable- It is used to connect same type of devices as:

Connect 2 computers directly


Connect 2 routers/switches
Both sides of a cable have different wire arrangement.
1 Orange white - Green white
2 Orange - Green
3 Green white - Orange white
4 Blue - Blue
5 Blue white - Blue white
6 Green - Orange
7 Brown white - Brown white
8 Brown - Brown

Fig 11: Crossover Cable


17

 Straight Cable- It is used to connect different type of devices as

Connect a computer to switch/hub


Connect a router to a switch/hub
Straight Cable is mainly used in networking.
Both sides of a cable have wire arrangement with same color.
1 Orange white - Orange white

2 Orange - Orange

3 Green white - Green white

4 Blue - Blue

5 Blue white - Blue white

6 Green - Green

7 Brown white - Brown white

8 Brown - Brown

Fig 12: Straight through Cable


18

 Rollover cable- It is used to connect a computer terminal to a router’s console port. It


gets name rollover as pinouts on one end are reserved from the other.

This cable is not used in these days.

Fig 13: Rollover Cable

Network Designing
4.1 Network Designing
4.2 Hardware Using
4.3 Software Us
4.1 Network Designing
19

Fig: Front end

Network Topologies
Topology refers to the way in which the network of computers
is connected. Each topology is
suited to specific tasks and has its own advantages and
disadvantages. The choice of topology is
dependent upon---

Type and number of equipment being used


Planned applications and rate of data transfers
Required response times
Cost

Types of Network Topologies

Physical Topology: Physical topology defines how devices


are connected to the network
through the actual cables that transmit data ( physical
structure of the network)
Logical Topology: Logical Topology (also referred to as
Signal Topology) is a network
20

computing term used to describe the arrangement of devices


on a network and how they
communicate with one another.

Common LAN Topologies (Physical)

1. BUS

In a bus topology:

A single cable connects each workstation in a linear, daisy-


chained fashion.
Signals are broadcasted to all stations, but stations only act
on the frames addressed to
them.
21

2. RING

In a ring topology:
Unidirectional links connect the transmit side of one device
to the receive side of another
device.
Devices transmit frames to the next device (downstream
member) in the ring.

LAN Transmission Methods


Unicast Transmission: In unicast transmissions, a single data
packet is sent from a
source to a single destination on the network.

In Unicast Method:
22

o The source addresses the packet with the destination


address.
o The packet is sent into the network.
o The network delivers the packet to the destination.

Multicast Transmission: In multicast transmissions, a single


data packet is copied and
sent to specific destinations on the network
In Multicast Process:

o The source addresses the packet using a multicast address.


o The packet is sent into the network.
o The network copies the packet.
o A copy is delivered to each destination that is included in the
multicast address.

INTERNET i.e. so many ISPs (INTERNET SERVICE PROVIDERS :-


 A google server, a yahoo server, a facebook server, Guru Nanak Dev University
server, twitter server, hcl server and a domain name server are inter-connected via
cross-over cables

Fig: Back End(ISP)


23

4.2 Hardware Used


 Routers : Cisco 2811 Series.
 Switches : Cisco 2960 Series.
 Devices : Computers, Servers, Wireless Routers.
 Other Media : Console cables, Ethernet cables, Serial cable etc.

4.3 Software Used:


 Operating System : Windows 2012SERVER,Windows7 etc.
 Front end tools : Cisco Packet Tracer.

List of Figures
of
Network routing of OSPF & EIGRP with different autonomus
system
1. Internet topologies
2. Configuration view of internet topologies
3. Routing OSPF with different autonomus system
4. IP configuration
5. Routing EIGRP with different autonomus system
6. Redistribution of EIGRP 10 & 20
7. Redistribution of OSPF & EIGRP
8. Web server
9. DNS server
10.Exchange server
11.Access list security
12.Standard access list security
13.Exstandard access list security
24

Network encoding
3.1 Interface
3.2 Module Description

3.1 Interface

A server is a system (software and suitable computer hardware) that responds to requests
across a computer network to provide, or help to provide, a network service. Servers can be
run on a dedicated computer, which is also often referred to as "the server", but many
networked computers are capable of hosting servers. In many cases, a computer can provide
several services and have several servers running. Many servers do not have a graphical user
interface (GUI) as it is unnecessary and consumes resources that could be allocated
elsewhere. Similarly, audio and USB interfaces may be omitted. With the help of
GUI(Graphic User Interface), server works and perform multitasks.

3.2 Module Description


3.2.1 Server
3.2.2 Domain Name System
3.2.3 Dynamic Host Control Protocol
3.2.4 Network Switch
3.2.5 Internet Information Services
25

3.2.1 SERVER

A server is a computer program that provides services to other computer program (and their
users), in the same or other computer. The physical computer that runs a server program is
also often referred to as server.Services can be supplied centrally by the use of a server; in
other cases all the machines on a network have the same status with no dedicated server, and
services are supplied peer -to- peer.
Server used as an adjective, as in server operating system, refers to the product’s ability to
handle multiple requests, and is said to be “ server- grade”. A server operating system is
intended or better enabled to run server applications. The differences between the server and
workstation versions of a product can vary from the removal of an arbitrary software limits
due to licensing, as in the case of window 2000, or the addition of bundled applications as in
Mac OS X Server.

A server can also refer to a computer that has been set aside to run a specific server
application. Server application can be divided among server computers over an extreme
range, depending upon the workload. A web server application (such as
the multiplatform "Apache HTTP Server"). This web server software can be run on any
capable computer. For example, while a laptop or personal computer is not typically known
as a server, they can in these situations fulfill the role of one, and hence be labelled as one. It
is, in this case, the machine's role that places it in the category of server.

In the hardware sense, the word server typically designates computer models intended for
hosting software applications under the heavy demand of a network environment. In
this client–server configuration, one or more machines, either a computer or a computer
appliance, share information with each other with one acting as a host for the other.

While nearly any personal computer is capable of acting as a network server, a dedicated
server will contain features making it more suitable for production environments. These
features may include a faster CPU, increased high-performance RAM, and increased storage
capacity in the form of a larger or multiple hard drives. Servers also typically have reliability,
availability and serviceability (RAS) and fault tolerance features, such
asredundancy in power supplies, storage (as in RAID), and network connections.
26

Modern operating systems such as Microsoft Windows or Linux distributions seem to be


designed with a client–server architecture in mind. These operating systems attempt
to abstract hardware, allowing a wide variety of software to work with components of the
computer. In a sense, the operating system can be seen as serving hardware to the software,
which in all but low-level programming languages must interact using an API.

The INTERNET itself is also a forest of servers and clients. Merely requesting a web
page from a few kilometers away involves satisfying a stack of protocols that involve many
examples of hardware and software servers. The least of these are
the routers, modems, domain name servers, and various other servers necessary to provide us
the world wide web.

The introduction of Cloud computing allows server storage and other resources to be shared
in a pool and provides servers with a higher degree of fault tolerance.
27

WEB SERVER- The term web server can refer to either the hardware (the computer) or
the software (the computer application) that helps to deliver web content that can be accessed
through the Internet.The most common use of web servers is to host websites, but there are
other uses such as gaming, data storage or running enterprise applications.

Web servers are able to map the path component of a Uniform Resource Locator (URL) into:

 A local file system resource (for static requests)


 An internal or external program name (for dynamic requests)

3.2.2 Domain Name System

The Domain Name System (DNS) is a hierarchical distributed naming system for
computers, services, or any resource connected to the Internet or a private network. It
associates various information with domain names assigned to each of the participating
entities. Most prominently, it translates easily memorized domain names to the numerical IP
28

addresses needed for the purpose of locating computer services and devices worldwide. The
Domain Name System is an essential component of the functionality of the Internet.

An often-used analogy to explain the Domain Name System is that it serves as the phone
book for the Internet by translating human-friendly computer hostnames into IP addresses.

For example, the domain name www.example.com translates to the addresses

 93.184.216.119 (IPv4) and


 2606:2800:220:6d:26bf:1447:1097:aa7 (IPv6).

Unlike a phone book, the DNS can be quickly updated, allowing a service's location on the
network to change without affecting the end users, who continue to use the same host name.
Users take advantage of this when they use meaningful Uniform Resource Locators (URLs),
and e-mail addresses without having to know how the computer actually locates the services.

The Domain Name System distributes the responsibility of assigning domain names and
mapping those names to IP addresses by designating authoritative name serversfor each
domain. Authoritative name servers are assigned to be responsible for their supported
domains, and may delegate authority over sub-domains to other name servers. This
mechanism provides distributed and fault tolerant service and was designed to avoid the need
for a single central database.

The Domain Name System also specifies the technical functionality of this database service.
It defines the DNS protocol, a detailed specification of the data structures and data
communication exchanges used in DNS, as part of the Internet Protocol Suite.

The Internet maintains two principal namespaces, the domain name hierarchy[1] and
the Internet Protocol (IP) address spaces.[2] The Domain Name System maintains the domain
name hierarchy and provides translation services between it and the address spaces. Internet
name servers and a communication protocol implement the Domain Name System.[3] A DNS
name server is a server that stores the DNS records for a domain name, such as address (A or
AAAA) records, name server (NS) records, and mail exchanger (MX) records (see also list of
DNS record types); a DNS name server responds with answers to queries against its database.
29

Operation:
 Address resolution mechanism- Domain name resolvers determine the appropriate
domain name servers responsible for the domain name in question by a sequence of
queries starting with the right-most (top-level) domain label.

 DNS resolver-The client-side of the DNS is called a DNS resolver. It is responsible


for initiating and sequencing the queries that ultimately lead to a full resolution
(translation) of the resource sought, e.g., translation of a domain name into an IP
address.

A DNS query may be either a non-recursive query or a recursive query:

 A non-recursive query is one in which the DNS server provides a record for a domain
for which it is authoritative itself, or it provides a partial result without querying other
servers.
 A recursive query is one for which the DNS server will fully answer the query (or
give an error) by querying other name servers as needed. DNS servers are not
required to support recursive queries.

 Circular dependencies and glue records- Name servers in delegations are identified by
30

name, rather than by IP address. This means that a resolving name server must issue
another DNS request to find out the IP address of the server to which it has been
referred. If the name given in the delegation is a sub-domain of the domain for which
the delegation is being provided, there is a circular dependency. In this case the
name server providing the delegation must also provide one or more IP addresses for
the authoritative name server mentioned in the delegation. This information is
called glue. The delegating name server provides this glue in the form of records in
the additional section of the DNS response, and provides the delegation in the answer
section of the response.

 Record caching-The DNS Resolution Process reduces the load on individual servers
by caching DNS request records for a period of time after a response. This entails the
local recording and subsequent consultation of the copy instead of initiating a new
request upstream. The time for which a resolver caches a DNS response is determined
by a value called the time to live (TTL) associated with every record. The TTL is
set by the administrator of the DNS server handing out the authoritative response. The
period of validity may vary from just seconds to days or even weeks.

DOMAIN NAME IP Address

Reverse- Lukup- Zone :

DOMAIN NAME
IP Address

3.2.3 Dynamic Host Control Protocol


31

The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for
hosts on Internet Protocol (IP) networks. Computers that are connected to IP networks must
be configured before they can communicate with other hosts. The most essential information
needed is an IP address, and a default route and routing prefix. DHCP eliminates the manual
task by a network administrator. It also provides a central database of devices that are
connected to the network and eliminates duplicate resource assignments.
In addition to IP addresses, DHCP also provides other configuration information, particularly
the IP addresses of local caching DNS resolvers, network boot servers, or other service hosts.
DHCP is used for IPv4 as well as IPv6. While both versions perform much the same purpose,
the details of the protocol for IPv4 and IPv6 are sufficiently different that they may be
considered separate protocols.
Hosts that do not use DHCP for address configuration may still use it to obtain other
configuration information. Alternatively, IPv6 hosts may use stateless address auto
configuration. IPv4 hosts may use link-local addressing to achieve limited local connectivity

Depending on implementation, the DHCP server may have three methods of allocating IP-
addresses:

 Dynamic allocation: A network administrator reserves a range of IP addresses for


DHCP, and each client computer on the LAN is configured to request an IP address
from the DHCP server during network initialization. The request-and-grant process
uses a lease concept with a controllable time period, allowing the DHCP server to
reclaim (and then reallocate) IP addresses that are not renewed.
32

 Automatic allocation: The DHCP server permanently assigns an IP address to a


requesting client from the range defined by the administrator. This is like dynamic
allocation, but the DHCP server keeps a table of past IP address assignments, so that
it can preferentially assign to a client the same IP address that the client previously
had.
 Static allocation: The DHCP server allocates an IP address based on a preconfigured
mapping to each client's MAC address. This feature is variously calledstatic DHCP
assignment by DD-WRT, fixed-address by the dhcp documentation, address
reservation by Netgear, DHCP reservation or static DHCP byCisco and Linksys,
and IP address reservation or MAC/IP address binding by various other router
manufacturers.

DHCP is used for Internet Protocol version 4 (IPv4), as well as IPv6. While both
versions serve the same purpose, the details of the protocol for IPv4 and IPv6 are
sufficiently different that they may be considered separate protocols.

 Operations

1. DHCP discovery

2. DHCP offer

3. DHCP request

4. DHCP acknowledgement

5. DHCP information

6. DHCP releasing

3.2.4 Network Switches


A network switch is a computer networking device that connects network segments. The term
commonly refers to a network bridge that processes and routes data at the Data Link layer
33

(layer 2) of the OSI model. Switches that additionally process data at the network layer (layer
3 and above) are often referred to as layer 3 switches or multilayer switches.
The term network switch does not generally encompass unintelligent or passive network
devices such as hubs and repeaters.

Functions:
 Learning
 Forward and filtering
 Loop Avoidance
34

PROJECT IMPLEMENTATIONS

NETWORKING:

A Network can consist of as few as two computers connected with the cables
millions of computers that are spread over a large geographical area and are
connected by Telephone lines, Fiberoptic cables, Radio waves.

An example of a network in a school comprising of a local area network or LAN


connecting computers with each other, the internet, and various servers.

A Network, is a collection of computers and other hardware components


interconnected by communication channels that allow sharing of resources and
information.Today, computer networks are the core of modern communication.

Most LAN’s connect workstations and personal computers.Each node


(individual computer) in a LAN has its own, but it also able to access data and
devices anywhere on the LAN.

TYPES OF NETWORKING:

* LAN (Local Area Network)


* WAN (Wide Area Network)
* MAN (Metropolitan Area Network)

1. LAN(Local Area Network):A local Area Network is a group of


computers and network communications devices within a limited
graphic area such as an office building.This network is used for
sharing of many resources or information. For e.g: A library will
have a wired or wireless LAN for users to interconnect local
devices as printers and severs.

2. WAN(Wide Area Network): A wide Area Network is that network


which covers unlimited graphic area. In this network we connect
multiple networks. Routes are used to connect them. It is very large
35

geographic area spreads up to many countries. In this network


telephone lines, satellite, microwave etc media are used. For e.g:
Internet

3. MAN(Metropolitan Area Network): A Metropolitan area


network is a network that connects two or more Local Area
Networks. A WAN can create within 50 km of range. It is
distributed to a city or large area just like cable TV network
it is also single. One may be running MAN while others use it.

ROUTING PROTOCOL

1. EIGRP (Enhanced Interior Gateway Routing Protocol) -Advanced version of IGRP


developed by Cisco. Provides superior convergence properties and operating
efficiency, and combines the advantages of link state protocols with those of distance
vector protocols.

Features: -

* Cisco proprietary

* Hybrid protocol

Link State

Distance Vector

* Multicast Updates using

Address 224.0.0.10

* Support VLSM

* Automatic Route Summarization

* Unequal path cost load balancing


36

* Metric (32 bit composite)

Bandwidth

Delay

Load

Reliability

MTU

* Neighbor Recovery

* Triggered updates

* Backup Route

 Configuring EIGRP

Router(config)#router eigrp<as no>

Router(config-router)#network <net addr.>

Router(config-router)#network <net addr.>

Router(config-router)#exit
37

2. OSPF (Open Shortest Path First) - Link-state, hierarchical IGP routing protocol
proposed as a successor to RIP in the Internet community. OSPF features include
least-cost routing, multipath routing, and load balancing. OSPF was derived from an
early version of the ISIS protocol.
38

 Commands to configure OSPF

Router#conf t

Router(config)#router ospf<process no>

Router(config-router)#network <net address><wild mask> area <area id>

Router(config-router)#network <net address><wild mask> area <area id>

Router(config-router)#exit

R1

Router(config)#router ospf 33

Router(config-router)#network 200.100.100.32 0.0.0.3 area 0

Router(config-router)#network 200.100.100.64 0.0.0.31 area 0

Router(config-router)#exit

R2

Router(config)#router ospf 2

Router(config-router)#network 200.100.100.32 0.0.0.3 area 0

Router(config-router)#network 200.100.100.128 0.0.0.63 area 0

Router(config-router)
39

ROUTING WITH OSPF

ACCESS LISTS:

A Brief Overview of Access List


An access list is essentially a list of conditions that categorize
packets. They can be reallyhelpful when you need to exercise
control over network traffic. An access list would beyour tool
ofchoice for decision making in these situations.

One of the most common and easiest to understand uses of


access lists is filteringunwanted packets when implementing
40

security policies. For example, you can set them upto make
very specific decisions about regulating traffic patterns so that
they’ll allow onlycertain hosts to access web resources on the
Internet while restricting others. With theright combination of
access lists, network managers arm themselves with the power
toenforce nearly any security policy they can invent.Access lists
can even be used in situations that don’t necessarily involve
blocking packets.

For example, you can use them to control which networks will
or won’t be advertised bydynamic routing protocols. How you
configure the access list is the same. The differencehere is
simply how you apply it—to a routing protocol instead of an
interface. When youapply an access list in this way, it’s called a
distribute list, and it doesn’t stop routingadvertisements, it just
controls their content. You can also use access lists to
categorizepackets for queuing or QoS-type services and for
controlling which types of traffic canactivate a pricey ISDN link.

Creating access lists is really a lot like programming a series of


if-then statements—ifgiven condition is met, and then a given
action is taken. If the specific condition isn’t met, nothing
happens and the next statement is evaluated. Access-list
statements are basically packet filters that packets are
compared against, categorized by, and acted uponaccordingly.
Once the lists are built, they can be applied to either inbound
or outboundtraffic on any interface. Applying an access list
causes the router to analyze every packetcrossing that
interface in the specified direction and take the appropriate
action.

There are a few important rules that a packet follows when it’s
being compared with anaccess list:

_ It’s always compared with each line of the access list in


sequential order—that is,it’ll always start with the first line of
the access list, then go to line 2, then line 3,and so on.

_ It’s compared with lines of the access list only until a match
is made. Once thepacket matches the condition on a line of the
41

access list, the packet is acted uponand no further comparisons


take place.

_ There is an implicit “deny” at the end of each access list—this


means that if apacket doesn’t match the condition on any of
the lines in the access list, the packetwill be discarded.Each of
these rules has some powerful implications when filtering IP
packets with accesslists, so keep in mind that creating effective
access lists truly takes some practice.

Types of Access Lists:

Standard Access Lists:

These use only the source IP address in an IP packet as the


condition test. All decisionsare made based on the source IP
address. This means that standard access lists basicallypermit
or deny an entire suite of protocols. They don’t distingu ish
between any of themany types of IP traffic such as web,Telnet,
UDP, and so on.

Extended Access Lists:

Extended access lists can evaluate many of the other fields in


the layer 3 and layer 4
headers of an IP packet. They can evaluate source and
destination IP addresses, theprotocol field in the Network layer
header, and the port number at the Transport layerheader.
This gives extended access lists the ability to make much more
granular decisionswhen controlling traffic.

Named Access Lists:

Hey, wait a minute—I said there were two types of access lists
but listed three! Well,
technically there really are only two since named access lists
are either standard orOnce you create an access list, it’s not
really going to do anything until you apply it. Yes,
42

they’re there on the router, but they’re inactive until you tell
that router what to do withthem.To use an access list as a
packet filter, you need to apply it to an interface on the router
where you want the traffic filtered. And you’ve got to specify
which direction of traffic youwant the access list applied to.

There’s a good reason for this—you may want differentcontrols


in place for traffic leaving your enterprise destined for the
Internet than you’dwant for traffic coming into your enterprise
from the Internet. So, by specifying thedirection of traffic, you
can—and frequently you’ll need to—use different access lists
forinbound and outbound traffic on a single interface:

Inbound Access Lists:

When an access list is applied to inbound packets on an


interface, those packets areprocessed through the access list
before being routed to the outbound interface. Anypackets that
are denied won’t be routed because they’re discarded before
the routingprocess is invoked.

Outbound Access Lists:

When an access list is applied to outbound packets on an


interface, those packets arerouted to the outbound interface
and then processed through the access list before being
queued.
43

STANDARD & EXTENDED ACCESS LIST :


44

STANDARD & EXTENDED ACCESS LISTS

USING COMMANDS:

interface FastEthernet0/0
ip address 50.0.0.1 255.0.0.0
ip access-group hcl in
ip access-group 10 out
ip nat inside
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 40.0.0.2 255.0.0.0
clock rate 2000000
45

!
interface Serial0/0/1
no ip address
clock rate 2000000
shutdown
!
interface Vlan1
no ip address
shutdown
!
router rip
version 1
network 40.0.0.0
!
ip nat inside source static 50.0.0.2 30.0.0.3
ip nat inside source static 50.0.0.3 30.0.0.4
ip nat inside source static 50.0.0.4 30.0.0.5
ip nat inside source static 50.0.0.2 40.0.0.3
ip nat inside source static 50.0.0.3 40.0.0.4
ip nat inside source static 50.0.0.4 40.0.0.5
ip classless
ip route 10.0.0.0 255.0.0.0 40.0.0.1
ip route 20.0.0.0 255.0.0.0 40.0.0.1
ip route 30.0.0.0 255.0.0.0 40.0.0.1
!
ip flow-export version 9
!
!
access-list 10 deny 10.0.0.0 0.255.255.255
access-list 10 permit any
ip access-list extended hcl
deny tcp host 50.0.0.2 host 30.0.0.4 eq www
permit ip any any
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
46

login
!
!
!
end

DNS (DOMAIN NAME SERVER OR SYSTEM)

Domain Name Server

The most basic task of DNS is to translate hostnames to IP


addresses. In very simple terms, it canbe compared to a phone
book. DNS also has other important uses.

Above all, DNS makes it possible to assign Internet names to


organizations (or concerns theyrepresent) independent of the
physical routing hierarchy represented by the numerical IP
address.

Because of this, hyperlinks and Internet contact information


can remain the same, whatever the current IP routing
arrangements may be, and can take a human-readable form
(such as"example.com"), which is easier to remember than the
IP address 208.77.188.166. People takeadvantage of this when
they recite meaningful URLs and e-mail addresses without
caring how themachine will actually locate them.
47

The Domain Name System distributes the responsibility for


assigning domain names and mappingthem to IP networks by
allowing an authoritative name server for each domain to keep
track of itsown changes, avoiding the need for a central
register to be continually consulted and updated.

DOMAIN NAME SERVER


48

BACKGROUND AREA SERVER

IP CONFIGURATION ON SERVER
49

GOOGLE SERVER

FACEBOOK SERVER
50

GMAIL SERVER
51

TELECOMMUNICATION NETWORK (TELNET)

Telnet (Telecommunication Network) is a network protocol used for remote


access and management of networking devices over a network. It allows a
user to log into a remote device (such as a router, switch, server, or computer)
and interact with its command-line interface (CLI) as if they were physically
connected to it. It establishes a basic, unencrypted, and insecure connection
between the local and remote devices. When a user initiates a TELNET
session, the login credentials and all data transmitted, including passwords
and commands, are sent in clear text. Here are the key points about Telnet:

Protocol: Telnet operates on the Application Layer of the OSI model.


It uses the Transmission Control Protocol (TCP) to establish a
reliable connection between the local and remote devices.
Port Number: Telnet typically uses port number 23 for communication.
Plain Text Communication: Telnet transmits data in plain text, meaning
all the commands and responses are sent in clear text format. This lack
of encryption poses security risks, as sensitive information, including
usernames and passwords, can be intercepted by attackers.
Remote Access: Telnet enables network administrators to
remotely access and manage devices over the network, even
if they are physically located at a different location.
Command-Line Interface (CLI): Once a Telnet connection is
established with a remote device, the user can access its
command-line interface (CLI) and execute commands,
configure settings, and perform various administrative tasks.

In Cisco Packet Tracer, you can use Telnet to remotely access and
manage networking devices such as routers and switches. Here's a
step to use Telnet in Cisco Packet Tracer.

Double-click the router or switch you want to access via


Telnet to open its configuration window.
Go to the CLI tab to access the command-line interface of
the device. Enter the following commands to enable Telnet:
52

Save the configurations on the router


or switch. Test Telnet access:

o Go to the PC or laptop from which you want to access the


router or switch via Telnet.
o Open the command prompt or terminal on the PC.
o Type the following command to initiate the Telnet connection:
53

Once connected via Telnet, you can access the command-line


interface (CLI) of the router or switch. You can then configure and
manage the device remotely as if you were physically connected to it.
54

SECURE SHELL (SSH)

SSH (Secure Shell) is a network protocol that provides secure encrypted


communication and remote access to networking devices and other
systems. It is widely used for secure remote administration, file transfers,
and other network-related tasks. SSH is considered a more secure
alternative to protocols like Telnet, as it encrypts data during transmission,
making it less vulnerable to eavesdropping and other security threats.

Protocol: SSH operates on the Application Layer of the OSI


model. It uses the TCP (Transmission Control Protocol) to
establish a secure and reliable connection between the local
and remote devices. . Here are the key points about SSH:
Port Number: SSH typically uses port number 22 for communication.
Encryption: One of the primary advantages of SSH is its ability
to encrypt data during transmission, ensuring that sensitive
information, including usernames, passwords, and command
data, is secure and protected from unauthorized access.
Public Key Infrastructure: SSH uses a public-key cryptography
system for authentication. The user generates a public-private
key pair, where the private key is stored securely on the user's
local machine, and the public key is placed on the remote
server. This allows for passwordless, yet secure, authentication.
Remote Access: SSH enables network administrators to remotely access
and manage devices over the network, just like Telnet. However, due to its
encryption, it provides a higher level of security compared to Telnet.
Secure File Transfer: SSH also supports secure file transfer protocols,
such as SCP (Secure Copy) and SFTP (Secure File Transfer Protocol),
allowing users to securely transfer files between devices.

The steps for SSH in cisco packet are given below:


Double-click the router or switch you want to access via SSH
to open its configuration window.
Go to the CLI tab to access the command-line interface of
the device. Enter the following commands to enable SSH:
55

We need to change the default router name to generate rsa key.


At the last step of Configuring SSH, we can try to connect via SSH
from PC to the router. To do this, we will open the command line on
the PC and connect to the router with the below command.

You might also like