Network

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Project Describing Presentation

In the partial fulfilment for the award of


Bachelor of engineering
In
Computer science & engineering
Faculty Advisor : Team Members:
Dr. Damanpreet Singh Ashutosh GCS/1731055
Utkrisht GCS/1730957
 To design a network for a software development
company based on using Cisco Packet Tracer. The
company has three departments, development,
testing and trainee and a server room. They are
connected with each other using network. The
company has development department in Delhi & it
trains its employees in Mumbai (Trainee Department
is in Mumbai) and testing department of the company
is in Hyderabad.
 The trainee department should not have access to
web server, but all other communication should be
allowed on the network. The network will have basic
security using switch port security feature. Firewall is
used in network to further block IP address of the
attacker.
Software Requirements :

 Microsoft Windows 7,8,10 or Ubuntu 16.04 LTS or higher.


 Latest video card drivers and operating system updates
 Cisco Packet Tracer should be installed on the machine

Other Requirements :

 Good knowledge of networking


 How to use Cisco Packet Tracer.
 Basic Knowledge of networking security
Packet tracer is a cross-platform visual simulation tool
designed by Cisco System that allows users to create
network topologies and imitate modern computer
networks. The software allows users to simulate the
configuration of Cisco routers and switches using a
simulated command line interface. Packet Tracer makes
use of a drag and drop user interface, allowing users to
add and remove simulated network devices as they see
fit. A physical connection between devices is represented
by a “Cable” item. Packet Tracer supports routing
protocols such as RIP, OSPF, EIGRP, BGP.
 Different routing protocols.
 Redistribution or default routing to be used to connect two
different router using different protocols.
 Establish various servers in network like Mail, FTP, Web, DNS
 Provide inter-access to each department.
 Use of port security to bind mac- address of machine to each
interface.
 Use of Password on router & switches to prevent
unauthorized access to the network.
 Use of Access Control List to restrict access of trainee
department to Web server.
Different network protocols have been created for supporting communication between computers and
other types of electronic devices. So-called routing protocols are the family of network protocols
that enable computer routers to communicate with each other and in turn to intelligently forward traffic
between their respective networks. The protocols described below each enable this critical function of
routers and computer networking.

How Routing Protocols Works :


Every network routing protocol performs three basic functions:

 Discovery – identify other routers on the network

 Route management – keep track of all the possible destinations (for network messages) along with
some data describing the pathway of each

 Path determination – make dynamic decisions for where to send each network message

A few routing protocols (called link-state protocols) enable a router to build and track a full map of all
network links in a region while others (called distance-vector protocols) allow routers to work with less
information about the network area.
Anyone can access unsecure network resources
by simply plugging his host into one of our
available switch ports. A user can also change
his physical location in LAN network without
telling the admin. You can secure layer two
accesses by using port security feature.
 Access Control Lists “ACLs” are network traffic filters that can control
incoming or outgoing traffic.
 ACLs work on a set of rules that define how to forward or block a packet at
the router’s interface. An ACL is the same as a Stateless Firewall, which only
restricts, blocks, or allows the packets that are flowing from source to
destination.
 When you define an ACL on a routing device for a specific interface, all the
traffic flowing through will be compared with the ACL statement which will
either block it or allow it.
 The criteria for defining the ACL rules could be the source, the destination, a
specific protocol, or more information.
 ACLs are common in routers or firewalls, but they can also configure them in
any device that runs in the network, network devices, servers, etc.
A server is a computer program or a device
that provides functionality for other programs
or devices, called "clients". This architecture is
called the client–server model, and a single
overall computation is distributed across
multiple processes or devices.
 Mail Server
Almost as crucial as Web servers, mail servers move and store mail over corporate
networks (via LANs and WANs) and across the Internet.

 Web Server
At its core, a Web server serves static content to a Web browser by loading a file from
a disk and serving it across the network to a user's Web browser. This entire
exchange is mediated by the browser and server talking to each other using HTTP.

 FTP Server
One of the oldest of the Internet services, File Transfer Protocol makes it possible to
move one or more files securely between computers while providing file security and
organization as well as transfer control.

 DNS Server
A DNS server is a computer server that contains a database of public IP addresses
and their associated hostnames, and in most cases serves to resolve, or translate,
those names to IP addresses as requested.

You might also like