Professional Documents
Culture Documents
ROUTING
ROUTING
On
“NETWORKING”
AT
Guided by Submitted by
NETWORKING EXPERT
MR. SHYAM MOHIT KUMAR (190091000050)
2
COMPANY PROFILE
Overview
SOLITAIRE INFOSYS is a leading Software and Web Application
Development Company, based in Mohali (Chandigarh), that provides
high quality comprehensive services to enterprises across a wide range
of platforms and technologies. Our major areas of expertise are in
providing quality, cost effective software or web development. Our
focus is on understanding the diverse and mission-critical needs of
each of our clients. To understand is to be able to deliver. The
competence and experience of our company gives us a competitive
edge by making sure we provide the best services and products to our
clients. Our high quality standards enable us to deliver reliable and
error-free software applications, despite their complexity. We
provide Web design/Web development, B2B & B2C E-commerce
solutions, SEO & Web Promotions strategies implementation
consulting services to both domestic as well as international clients at
the most affordable rates less
3
ACKNOWLEDGEMENT
While presenting this report we would like to express my deep sense of gratitude to entire
Solitaire staff that were indispensable part of my training giving me unending guidance,
at Solitaire Infosys Pvt. LTD. The training was an extremely productive & enriching
experience, not only technically but also from providing practical skills.
We are extremely thankful to MR. SHYAM who had devoted a lot of time in guiding and
supervising me during my training. We place our gratitude towards MR. SHYAM for her
valuable advice and guidance in carrying out this enjoyable and productive experience, which
PREFACE
4
Technology has rapidly grown in past two-three decades. An engineer without practical
knowledge and skills cannot survive in this technical area. Theoretical knowledge does
matter but it is the practical knowledge that is the difference between the best and the better.
Routeranizations also prefer experienced engineers than fresher ones due to practical
knowledge and industrial exposure of the former. The practical training is highly conductive
for solid foundation for:-
3. Confidence building.
4. Enhancement of creativity.
5. Practicality
ABSTRACT
5
CONTENTS
6
1. Report Organization
1.1 Hardware Requirements
1.2 Software Requirements
2. Design&List of figures
3. Network Design Encoding
3.1 Interface
3.2 Module Description
4. Project Implementation
4,1 INTRODUCTION OF PROJECT
4,2 MESH TOPOLOGY
4.3 ROUTING (OSPF & EIGRP)
4.4 REDISTRIBUTION (OSPF & EIGRP)
4.5 WEB SERVER
4.6 DNS SERVER
4.7 ACCESS – LIST SECURITY
5.NAT 6.VOIP(VOICE OVER INTERNET PROTCOL)
7.VLAN(VIRTUAL LOCAL AREA NETWORK)
8. Telecommunication Network
9. Secure Shell
10. WiFi server
11. Subnetting
7
Report Organization
1.1 Software Requirements
1.2 Hardware Requirements
To complete the work on network security, I take help from some software requirements.
Software requirements as
Windows 7:
version of Windows NT. Development of 7 occurred as early as 2006 under the codename
"Blackcomb". Windows 7 was released to manufacturing on July 22, 2009, and became
generally available on October 22, 2009, less than three years after the release of its
predecessor, Windows Vista. While retaining a similar appearance to Vista,
7's interface was streamlined, with the addition of a redesigned taskbar that allows
applications to be "pinned" to it, and new window management features. Other new features
were added to the operating system, including libraries, the new file sharing system
HomeGroup, and support for multitouchinput. A new "Action Center" interface was also
added to provide an overview of system security and maintenance information, and tweaks
were made to the User Account Control system to make it less intrusive. 7 also shipped
major success for Microsoft; even prior to its official release, pre-order sales for 7 on the
online retailer Amazon.com had surpassed the record set. In just six months,
over100 million copies had been sold worldwide, increasing to over 630 million licenses by
July 2012, and a market share of 47.49% as of February 2014 according to Net
Removed
Among Windows 7's new features are advances in touch and handwriting recognition,
Center, a Gadget for Windows Media Center, improved media features, XPS Essentials
Pack and Windows PowerShell being included, and a redesigned Calculator with
multiline capabilities including Programmer and Statistics modes along with unit conversion
for length, weight, temperature, and several others. Many new items have been added to
the Control Panel, includingClearType Text Tuner Display Color Calibration
Sensors, Credential Manager, Biometric Devices, System Icons, and Display. Windows
Security Center has been renamed to Windows Action Center (Windows Health
Center and Windows Solution Center in earlier builds), which encompasses
both security and maintenance of the computer. ReadyBoost on 32-bit editions now supports
up to 256 gigabytes of extra allocation. Windows 7 also supports images in RAW image
9
Removed:-
Certain capabilities and programs that were a part of Windows Vista are no longer present
or have been changed, resulting in the removal of certain functionalities. These include the
classic Start Menu user interface, some taskbar features, Windows Explorer
features, Windows Media Player features, Windows Ultimate Extras and InkBall.
Four applications bundled with Windows Vista— Windows Photo Gallery, Windows
Movie Maker, Windows Calendar and Windows Mail—are not included with
Windows 7, and were replaced by Windows Live-branded versions as part of
Hardware Requirements
SWITCHES:
1 × cisco 2960 series 24 port
8 × Dlink 16 port
CABLES:
cat 5 and cat 6
Console cable, serial cable
Length as per requirement
Clients/Nodes:
Pentium 4
Windows XP Professional
512 MB RAM
80 GB Hard Disk
Switches:- A switch is a device that is used for switching. It forward and filters OSI layer 2
datagrams between ports. Switch has numerous ports. Switches can operate on one or more
layer of OSI model including physical, data link, network or transport. A device which
operate on more than one layer is known as Multilayer switch.
Every port has its own buffer memory. A port has two queues one is input queue and second
is output queue. When switch receives the frame, the frame is received in input queue and
12
forward from output queue. So in case of switch there is no chance or place for collisions. In
case of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/
Collision Avoidance). Switches provide more efficiency, more speed and security.
Types of switch:-
Manageable switch
Unmanageable switch
WORKGROUP SWITCH-
Fig 7: Workgroup
13
(ii) Software Routers is configured with the help of routing and remote access. This feature
is offered by Microsoft. This feature is by default installed, but you have to enable or
configure it.
But in case of software routers, it has less features, slow performance. They are not very
much efficient.
They follow:-
Route Advertisement
Coaxial Cable- Coaxial cable or Coax is a type of cable that has an inner conductor
surrounded by insulating layer and enclosed by conducting shield. It is used as a
transmission line for radio frequency signals. It is difficult too install coaxial cabling.
Types :-
1. Thick coaxial- Thick coaxial cable also referred to as thicknet. 10Base5 is the
specification of coaxial cable carrying ethernet signals. It has extra protective plastic
cover.
2. Thin coaxial- Thin coaxial cable is also referred to as thinnet.10Base2 refers to the
specification for thin coaxial cable carrying ethernet signals. It is popular in school
networks.
Twisted Pair Cable- It is a type of cabling in which conductors of single circuit are
twisted together for cancelling out electromagnetic interference from external source.
Types:-
1. STP(Shielded Twisted Pair Cable)- It is suitable for environments with electrical
interference . STP is used on networks using Token ring Topology.
2. UTP(Unshielded Twisted Pair Cable)- It is most popular and it is best option for
school networks. It contains four twisted-pairs(Orange, Green, Blue, Brown).It is
basically used for networking applications.
2 Orange - Orange
4 Blue - Blue
6 Green - Green
8 Brown - Brown
Network Designing
4.1 Network Designing
4.2 Hardware Using
4.3 Software Us
4.1 Network Designing
19
Network Topologies
Topology refers to the way in which the network of computers
is connected. Each topology is
suited to specific tasks and has its own advantages and
disadvantages. The choice of topology is
dependent upon---
1. BUS
In a bus topology:
2. RING
In a ring topology:
Unidirectional links connect the transmit side of one device
to the receive side of another
device.
Devices transmit frames to the next device (downstream
member) in the ring.
In Unicast Method:
22
List of Figures
of
Network routing of OSPF & EIGRP with different autonomus
system
1. Internet topologies
2. Configuration view of internet topologies
3. Routing OSPF with different autonomus system
4. IP configuration
5. Routing EIGRP with different autonomus system
6. Redistribution of EIGRP 10 & 20
7. Redistribution of OSPF & EIGRP
8. Web server
9. DNS server
10.Exchange server
11.Access list security
12.Standard access list security
13.Exstandard access list security
24
Network encoding
3.1 Interface
3.2 Module Description
3.1 Interface
A server is a system (software and suitable computer hardware) that responds to requests
across a computer network to provide, or help to provide, a network service. Servers can be
run on a dedicated computer, which is also often referred to as "the server", but many
networked computers are capable of hosting servers. In many cases, a computer can provide
several services and have several servers running. Many servers do not have a graphical user
interface (GUI) as it is unnecessary and consumes resources that could be allocated
elsewhere. Similarly, audio and USB interfaces may be omitted. With the help of
GUI(Graphic User Interface), server works and perform multitasks.
3.2.1 SERVER
A server is a computer program that provides services to other computer program (and their
users), in the same or other computer. The physical computer that runs a server program is
also often referred to as server.Services can be supplied centrally by the use of a server; in
other cases all the machines on a network have the same status with no dedicated server, and
services are supplied peer -to- peer.
Server used as an adjective, as in server operating system, refers to the product’s ability to
handle multiple requests, and is said to be “ server- grade”. A server operating system is
intended or better enabled to run server applications. The differences between the server and
workstation versions of a product can vary from the removal of an arbitrary software limits
due to licensing, as in the case of window 2000, or the addition of bundled applications as in
Mac OS X Server.
A server can also refer to a computer that has been set aside to run a specific server
application. Server application can be divided among server computers over an extreme
range, depending upon the workload. A web server application (such as
the multiplatform "Apache HTTP Server"). This web server software can be run on any
capable computer. For example, while a laptop or personal computer is not typically known
as a server, they can in these situations fulfill the role of one, and hence be labelled as one. It
is, in this case, the machine's role that places it in the category of server.
In the hardware sense, the word server typically designates computer models intended for
hosting software applications under the heavy demand of a network environment. In
this client–server configuration, one or more machines, either a computer or a computer
appliance, share information with each other with one acting as a host for the other.
While nearly any personal computer is capable of acting as a network server, a dedicated
server will contain features making it more suitable for production environments. These
features may include a faster CPU, increased high-performance RAM, and increased storage
capacity in the form of a larger or multiple hard drives. Servers also typically have reliability,
availability and serviceability (RAS) and fault tolerance features, such
asredundancy in power supplies, storage (as in RAID), and network connections.
26
The INTERNET itself is also a forest of servers and clients. Merely requesting a web
page from a few kilometers away involves satisfying a stack of protocols that involve many
examples of hardware and software servers. The least of these are
the routers, modems, domain name servers, and various other servers necessary to provide us
the world wide web.
The introduction of Cloud computing allows server storage and other resources to be shared
in a pool and provides servers with a higher degree of fault tolerance.
27
WEB SERVER- The term web server can refer to either the hardware (the computer) or
the software (the computer application) that helps to deliver web content that can be accessed
through the Internet.The most common use of web servers is to host websites, but there are
other uses such as gaming, data storage or running enterprise applications.
Web servers are able to map the path component of a Uniform Resource Locator (URL) into:
The Domain Name System (DNS) is a hierarchical distributed naming system for
computers, services, or any resource connected to the Internet or a private network. It
associates various information with domain names assigned to each of the participating
entities. Most prominently, it translates easily memorized domain names to the numerical IP
28
addresses needed for the purpose of locating computer services and devices worldwide. The
Domain Name System is an essential component of the functionality of the Internet.
An often-used analogy to explain the Domain Name System is that it serves as the phone
book for the Internet by translating human-friendly computer hostnames into IP addresses.
Unlike a phone book, the DNS can be quickly updated, allowing a service's location on the
network to change without affecting the end users, who continue to use the same host name.
Users take advantage of this when they use meaningful Uniform Resource Locators (URLs),
and e-mail addresses without having to know how the computer actually locates the services.
The Domain Name System distributes the responsibility of assigning domain names and
mapping those names to IP addresses by designating authoritative name serversfor each
domain. Authoritative name servers are assigned to be responsible for their supported
domains, and may delegate authority over sub-domains to other name servers. This
mechanism provides distributed and fault tolerant service and was designed to avoid the need
for a single central database.
The Domain Name System also specifies the technical functionality of this database service.
It defines the DNS protocol, a detailed specification of the data structures and data
communication exchanges used in DNS, as part of the Internet Protocol Suite.
The Internet maintains two principal namespaces, the domain name hierarchy[1] and
the Internet Protocol (IP) address spaces.[2] The Domain Name System maintains the domain
name hierarchy and provides translation services between it and the address spaces. Internet
name servers and a communication protocol implement the Domain Name System.[3] A DNS
name server is a server that stores the DNS records for a domain name, such as address (A or
AAAA) records, name server (NS) records, and mail exchanger (MX) records (see also list of
DNS record types); a DNS name server responds with answers to queries against its database.
29
Operation:
Address resolution mechanism- Domain name resolvers determine the appropriate
domain name servers responsible for the domain name in question by a sequence of
queries starting with the right-most (top-level) domain label.
A non-recursive query is one in which the DNS server provides a record for a domain
for which it is authoritative itself, or it provides a partial result without querying other
servers.
A recursive query is one for which the DNS server will fully answer the query (or
give an error) by querying other name servers as needed. DNS servers are not
required to support recursive queries.
Circular dependencies and glue records- Name servers in delegations are identified by
30
name, rather than by IP address. This means that a resolving name server must issue
another DNS request to find out the IP address of the server to which it has been
referred. If the name given in the delegation is a sub-domain of the domain for which
the delegation is being provided, there is a circular dependency. In this case the
name server providing the delegation must also provide one or more IP addresses for
the authoritative name server mentioned in the delegation. This information is
called glue. The delegating name server provides this glue in the form of records in
the additional section of the DNS response, and provides the delegation in the answer
section of the response.
Record caching-The DNS Resolution Process reduces the load on individual servers
by caching DNS request records for a period of time after a response. This entails the
local recording and subsequent consultation of the copy instead of initiating a new
request upstream. The time for which a resolver caches a DNS response is determined
by a value called the time to live (TTL) associated with every record. The TTL is
set by the administrator of the DNS server handing out the authoritative response. The
period of validity may vary from just seconds to days or even weeks.
DOMAIN NAME
IP Address
The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for
hosts on Internet Protocol (IP) networks. Computers that are connected to IP networks must
be configured before they can communicate with other hosts. The most essential information
needed is an IP address, and a default route and routing prefix. DHCP eliminates the manual
task by a network administrator. It also provides a central database of devices that are
connected to the network and eliminates duplicate resource assignments.
In addition to IP addresses, DHCP also provides other configuration information, particularly
the IP addresses of local caching DNS resolvers, network boot servers, or other service hosts.
DHCP is used for IPv4 as well as IPv6. While both versions perform much the same purpose,
the details of the protocol for IPv4 and IPv6 are sufficiently different that they may be
considered separate protocols.
Hosts that do not use DHCP for address configuration may still use it to obtain other
configuration information. Alternatively, IPv6 hosts may use stateless address auto
configuration. IPv4 hosts may use link-local addressing to achieve limited local connectivity
Depending on implementation, the DHCP server may have three methods of allocating IP-
addresses:
DHCP is used for Internet Protocol version 4 (IPv4), as well as IPv6. While both
versions serve the same purpose, the details of the protocol for IPv4 and IPv6 are
sufficiently different that they may be considered separate protocols.
Operations
1. DHCP discovery
2. DHCP offer
3. DHCP request
4. DHCP acknowledgement
5. DHCP information
6. DHCP releasing
(layer 2) of the OSI model. Switches that additionally process data at the network layer (layer
3 and above) are often referred to as layer 3 switches or multilayer switches.
The term network switch does not generally encompass unintelligent or passive network
devices such as hubs and repeaters.
Functions:
Learning
Forward and filtering
Loop Avoidance
34
PROJECT IMPLEMENTATIONS
NETWORKING:
A Network can consist of as few as two computers connected with the cables
millions of computers that are spread over a large geographical area and are
connected by Telephone lines, Fiberoptic cables, Radio waves.
TYPES OF NETWORKING:
ROUTING PROTOCOL
Features: -
* Cisco proprietary
* Hybrid protocol
Link State
Distance Vector
Address 224.0.0.10
* Support VLSM
Bandwidth
Delay
Load
Reliability
MTU
* Neighbor Recovery
* Triggered updates
* Backup Route
Configuring EIGRP
Router(config-router)#exit
37
2. OSPF (Open Shortest Path First) - Link-state, hierarchical IGP routing protocol
proposed as a successor to RIP in the Internet community. OSPF features include
least-cost routing, multipath routing, and load balancing. OSPF was derived from an
early version of the ISIS protocol.
38
Router#conf t
Router(config-router)#exit
R1
Router(config)#router ospf 33
Router(config-router)#exit
R2
Router(config)#router ospf 2
Router(config-router)
39
ACCESS LISTS:
security policies. For example, you can set them upto make
very specific decisions about regulating traffic patterns so that
they’ll allow onlycertain hosts to access web resources on the
Internet while restricting others. With theright combination of
access lists, network managers arm themselves with the power
toenforce nearly any security policy they can invent.Access lists
can even be used in situations that don’t necessarily involve
blocking packets.
For example, you can use them to control which networks will
or won’t be advertised bydynamic routing protocols. How you
configure the access list is the same. The differencehere is
simply how you apply it—to a routing protocol instead of an
interface. When youapply an access list in this way, it’s called a
distribute list, and it doesn’t stop routingadvertisements, it just
controls their content. You can also use access lists to
categorizepackets for queuing or QoS-type services and for
controlling which types of traffic canactivate a pricey ISDN link.
There are a few important rules that a packet follows when it’s
being compared with anaccess list:
_ It’s compared with lines of the access list only until a match
is made. Once thepacket matches the condition on a line of the
41
Hey, wait a minute—I said there were two types of access lists
but listed three! Well,
technically there really are only two since named access lists
are either standard orOnce you create an access list, it’s not
really going to do anything until you apply it. Yes,
42
they’re there on the router, but they’re inactive until you tell
that router what to do withthem.To use an access list as a
packet filter, you need to apply it to an interface on the router
where you want the traffic filtered. And you’ve got to specify
which direction of traffic youwant the access list applied to.
USING COMMANDS:
interface FastEthernet0/0
ip address 50.0.0.1 255.0.0.0
ip access-group hcl in
ip access-group 10 out
ip nat inside
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 40.0.0.2 255.0.0.0
clock rate 2000000
45
!
interface Serial0/0/1
no ip address
clock rate 2000000
shutdown
!
interface Vlan1
no ip address
shutdown
!
router rip
version 1
network 40.0.0.0
!
ip nat inside source static 50.0.0.2 30.0.0.3
ip nat inside source static 50.0.0.3 30.0.0.4
ip nat inside source static 50.0.0.4 30.0.0.5
ip nat inside source static 50.0.0.2 40.0.0.3
ip nat inside source static 50.0.0.3 40.0.0.4
ip nat inside source static 50.0.0.4 40.0.0.5
ip classless
ip route 10.0.0.0 255.0.0.0 40.0.0.1
ip route 20.0.0.0 255.0.0.0 40.0.0.1
ip route 30.0.0.0 255.0.0.0 40.0.0.1
!
ip flow-export version 9
!
!
access-list 10 deny 10.0.0.0 0.255.255.255
access-list 10 permit any
ip access-list extended hcl
deny tcp host 50.0.0.2 host 30.0.0.4 eq www
permit ip any any
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
46
login
!
!
!
end
IP CONFIGURATION ON SERVER
49
GOOGLE SERVER
FACEBOOK SERVER
50
GMAIL SERVER
51
In Cisco Packet Tracer, you can use Telnet to remotely access and
manage networking devices such as routers and switches. Here's a
step to use Telnet in Cisco Packet Tracer.