Professional Documents
Culture Documents
Ccna Project Report PDF
Ccna Project Report PDF
COMPUTER NETWORKING
Guidance
Of
Prepared By Pawan Sharma
B.Tech. Third Year (Information Tech & Engg.) GHEC Kumarhatti
Solan (shimla)
TABLE OF CONTENT
i %c$now&edgement ii Certificate iii Ta'&e of Content i( %'out the Com!an) *. Introduction to #etwor$ing +efinition e,uirement of #etwor$ing -. T)!e. of #etwor$ /%# (/oca& %rea #etwor$) 0%# (0ide %rea #etwor$) 1. #etwor$ 2ode&. "SI 2ode& 3. Ca'&e. Twi.ted Ca'&e Coa4ia& Ca'&e 5i're "!tic 6. #etwor$ing +e(ice. #etwor$ Interface Card Hu' Switch outer 7. IP %ddre..ing Introduction Pri(ate IP 2a.$ing
Summer Training e!ort "n Com!uter #etwor$ing
Su'netting E4am!&e 8. /%# So&ution e,uirement So&ution S!ecification Sheet 9. outer Interna& Com!onent. #etwor$ Interface. Configuring Configuring u.ing Con.o&e outing Protoco&. IP IG P %cce.. /i.t :. 5irewa&& Introduction Techno&ogie. Configuring *;. 0/%# Standard. To!o&ogie. Infra.tructure #etwor$ %dhoc #etwor$ **. Intru.ion +etection S).tem (I+S) HI+S #I+S Techni,ue. *-. Integrated Ser(ice. +igita& #etwor$ (IS+#) Channe&. Interface. 5unctiona& Grou! eference Point. *1.
*3.
INTRODUCTION TO NETWORKING
Definition :A network is a system that transmits any com ination of !oice" !ideo and#or data etween users. A network can e defined y its $eo$raphical dimensions and y which the user%s P& access it. A network consists of a'
(he net o!" o#e!atin$ %&%te' ()indows *(#+,,,(M#-p) on the user%s P& (client) and ser!er. (he ca)*e% connectin$ all network de!ices (user%s P&" ser!er" peripherals" etc.).
All supportin$ network co'#onent% (hu s" routers and switches" etc.). Computer Network means an interconnected collection of autonomous computers.
T/PE. OF NETWORK.
LAN (LOCAL AREA NETWORK0
(hese are pri!ately owned networks within a sin$le uildin$ or campus of up to a few a kilometers in si2e. 3A*%s are distin$uished from other networks y three characteristics' 4) (heir si2e. +) (heir transmission technolo$y. 5) (heir topolo$y. 3A*%s are restricted in si2e" which means that the worst.case transmission time is ounded and known in ad!ance. 3A*%s often use a transmission technolo$y consistin$ of a sin$le ca le to which all the machines are attached. 3A*s run at speeds of 4, to 4,, M ps" ha!e low delays" and make !ery few errors.
LAN .ETUP
IEEE has produced se!eral standards for 3A*s. (hese standards collecti!ely known as IEEE 123 . 06667,+.5 (6thernet)" 06667,+.8 ((oken Bus)" 06667,+.9 ((oken :in$)
WAN .ETUP <or most )A*s" the lon$ distance andwidth is relati!ely slow' on the order of kilo its per second (k ps) as opposed to me$a its per second (M ps) for local.area networks (3A*s). <or e;ample" an 6thernet 3A* has a 4, M ps andwidth= a )A* usin$ part or all of a (4 carrier has a andwidth of 4.988 M ps . (hree types of approaches are used to connect )A*s' 4) &ircuit switchin$" which pro!ides a fi;ed connection (at least for the duration of a call or session)" so that each packet takes the same path. 6;amples of this approach include 0SD*" Switched 9>" and Switched (4. +) Packet switchin$" which esta lishes connections durin$ the transmission process so that different packets from the same transmission may take different routes and may arri!e out of se/uence at the destination. 6;amples of this approach are -.+9" frame relay" and A(M. 5) 3eased lines" which can pro!ide a dedicated connection for pri!ate use Summer Training e!ort "n Com!uter #etwor$ing
NETWORK MODELS
La&e!in$ Conce#t% and Benefit%
Many enefits can e $ained from the process of reakin$ up the functions or tasks of networkin$ into smaller chunks" called layers, and definin$ standard interfaces etween these layers. (he layers reak a lar$e" comple; set of concepts and protocols into smaller pieces" makin$ it easier to talk a out" to implement with hardware and software" and to trou leshoot. (he followin$ list summari2es the enefits of layered protocol Specifications' ?umans can more easily discuss and learn a out the many details of a protocol specification. Standardi2ed interfaces amon$ layers facilitate modular en$ineerin$. A etter en!ironment for interopera ility is created. @ne !endor can write software that implements hi$her layersAfor e;ample" a )e rowserAand another can write software that implements the lower layersAfor e;ample" Microsoft%s uilt.in (&P#0P software in its operatin$ systems. :educed comple;ity allows easier pro$ram chan$es and faster product e!olution. @ne layer uses the ser!ices of the layer immediately elow it. (herefore" remem erin$ what each layer does is easier. (<or e;ample" the network layer needs to deli!er data from end to end. (o do this" it uses data links to forward data to the ne;t successi!e de!ice alon$ that end.to.end path.)
PRE.ENTATION LA/ER
(ranslates from application to network format and !ice.!ersa All different formats from all sources are made into a common uniform format that the rest of the @S0 model can understand :esponsi le for protocol con!ersion" character con!ersion" data encryption # decryption" e;pandin$ $raphics commands" data compression Sets standards for different systems to pro!ide seamless communication from multiple protocol stacks *ot always implemented in a network protocol
.E..ION LA/ER
6sta lishes" maintains and ends sessions across the network :esponsi le for name reco$nition (identification) so only the desi$nated parties can participate in the session Pro!ides synchroni2ation ser!ices y plannin$ check points in the data stream BC if session fails" only data after the most recent checkpoint need e transmitted Mana$es who can transmit data at a certain time and for how lon$ 6;amples are interacti!e lo$in and file transfer connections" the session would connect and re.connect if there was an interruption= reco$ni2e names in sessions and re$ister names in history
TRAN.PORT LA/ER
Additional connection elow the session layer Mana$es the flow control of data etween parties across the network Di!ides streams of data into chunks or packets= the transport layer of the recei!in$ computer reassem les the messa$e from packets D(rainD is a $ood analo$y BC the data is di!ided into identical units Pro!ides error.checkin$ to $uarantee error.free data deli!ery" with on losses or duplications Pro!ides acknowled$ment of successful transmissions= re/uests retransmission if some packets don%t arri!e error.free Pro!ides flow control and error.handlin$ (&P" A:P" :A:P=
NETWORK LA/ER
(ranslates lo$ical network address and names to their physical address (e.$. computer name BBC MA& address) :esponsi le for addressin$ and determinin$ routes for sendin$ Mana$in$ network pro lems such as packet switchin$" data con$estion and routin$ 0f router can%t send data frame as lar$e as the source computer sends" the network layer compensates y reakin$ the data into smaller units. At the recei!in$ end" the network layer reassem les the data (hink of this layer stampin$ the addresses on each train car IP= A:P= :A:P" 0&MP= :0P= @S<P<
P-/.ICAL LA/ER
(ransmits raw it stream o!er physical ca le Defines ca les" cards" and physical aspects Defines *0& attachments to hardware" how ca le is attached to *0& +efine. techni,ue. to tran.fer 'it .tream to ca'&e
IP ADDRESSING 6!ery machine on the internet has a uni/ue identifyin$ num er" called an 0P Address. A typical= 0P address looks like this' +4>.+E.>4.89 0P ADD:6SS is a 5+. it num er" usually written in dotted decimal form" that uni/uely identifies an interface of some computer. (his 5+. it num er is di!ided into 8 octets each separated y a decimal. @ut so many !alues certain !alues are restricted for use as typical 0P address. <or e;ample" the 0P address ,.,.,., is reser!ed for the default network and the address +99.+99.+99.+99is used for roadcast. 6ach 0P address is split into + sections' 4) *etwork address +) ?ost address
0ndi!idual 0P address in same network all ha!e a different !alue in the host part of address" ut they ha!e identical !alue in network part" 1ust as in town there are different street address ut same F0P code. (here are fi!e 0P classes' C*a%% A G (his class is for !ery lar$e networks" such as a ma1or international company. 0P addresses with a first octet from 4 to 4+> are part of this class. (he other three octets are each used to identify each host. *et 98. ?ost or *ode +8.98.85
Loo#)ac". (he 0P address 4+E.,.,.4 is used as the loop ack address. (his means that it is used y the host computer to send a messa$e ack to itself. 0t is commonly used for trou leshootin$ and network testin$. C*a%% B. &lass B is used for medium.si2ed networks. A $ood e;ample is a lar$e colle$e campus. 0P addresses with a first octet from 4+7 to4H4 are part of this class. &lass B addresses also include the second octet as part of the *et identifier. (he other two octets are used to identify each host. *et 489.+8 ?ost or *ode 95.4H7
C*a%% C. &lass & addresses are commonly used for small to mid.si2e usiness. 0P addresses with a first octet from4H+ to ++5 are part of this class. &lass & addresses also include the second and third octets as part of *et identifier. (he last octet is used to identify each host. *et 4H>.98.58 ?ost or *ode 7>
C*a%% D. 0t is used for multicast. 0t has first it !alue of 4" second it !alue of 4" third it !alue of 4 and fourth it !alue of ,. (he other +7 its are used to identify the $roup of computers the multicast messa$es is intended for. *et ++8 C*a%% E. 0t is used for e;perimental purpose only. *et +8,. Summer Training e!ort "n Com!uter #etwor$ing ?ost or *ode +5.89.4,9 ?ost or *ode +8.98.489
P!i4ate IP
0t is not necessary that e!ery time we make a network we are connected to some 0SP (0nternet Ser!ice Pro!ider). So in that case we re/uire some pri!ate 0P also which can e used in indi$enous networks .0n each class a ran$e of 0P addresses ha!e een defined for this purpose &3ASS A &3ASS B &3ASS & 4,.,.,.4 to 4,.+99.+99.+88 4E+.4>.,.4 to 4E+.58.+99.+98 4H+.4>7.,.,#4>
MA.KING
&omputers use a mask to define si2e of network and host part of an address. Mask is a 5+. it num er written in dotted decimal form. 0t pro!ides us the network address when we perform a Boolean A*D of mask with the 0P address. 0t also define num er of host its in an address. &lass of addres s A B & Si2e of network Part of address" in its 7 4> +8 Si2e of ?ost Part of address" in its +8 4> 7 Default Mask for 6ach &lass of *etwork +99.,.,., +99.+99.,., -66.-66.-66.;
.UBNETTING
Basically it is a process of su di!idin$ networks into smaller su nets. 0n case we ha!e +.5 small networks ut we cant uy 0P address for each and e!ery network. So here we use the asic concept of SUB*6((0*G i.e usin$ one pu lic 0P address we will $i!e them 0P address and make them independent networks. <or this we take some its of host address and use them for network address so we ha!e different independent networks Address <ormat when Su nettin$ 0s Used (class A"B"& resp.)' 7 *etwork +8.; Su net ; ?ost
4> 4>.; ; *etwork Su net ?ost +8 7.; ; *etwork Su net ?ost And due to this mask chan$es to su net mask and now the network address also includes su net address. Summer Training e!ort "n Com!uter #etwor$ing
E5a'#*e 0f su net mask is +99.+99.+8,., And an 0P address for a computer is $i!en as 48+.4>.9+.8 48+.4>.,., is network address ,.,.87., is the su net address ,.,.8.8 is the host address of the computer 4,,,444,.,,,4,,,,.,,44,4,,.,,,,,4,, is A*Ded with 44444444.44444444.4444,,,,.,,,,,,,, and output is 4,,,444,.,,,4,,,,.,,44,,,,.,,,,,,,, here first two octets represents *etwork address and third octet represents su net address. 0t can e compared with a postal address as there is only one F0P code (*etwork address)" different streets (Su net address)" and different house num er (?ost address).
t,o%e
a!e
u%ed
it,
#o$$ision Do%ain& It i. the grou! of PC=. in which co&&i.ion wi&& occur when two PC wi&& tran.mit data .imu&taneou.&). !roa'cast Do%ain& It i. the grou! of PC=. tho.e wi&& recei(e .ame 'roadca.t me..age. #SMA(#D )#arrier Sense Mu$ti*$e Access( #o$$ision Detection+& In thi. !rotoco& when a PC want. to tran.mit an) !ac$et it .en.e the carrier i.e the !ath >if no other PC i. u.ing the carrier then on&) it .end.. If two PC. .tart. .ending data .imu&taneou.&) co&&i.ion wi&& occur. Both PC. wi&& wait for .ome random time and then initiate the .ame !roce... MAC (Media Access Control) . The I 8!".# ( thernet) and 8!".$ (Token %ing) are the MAC s&b la'ers of these two (AN data) link protocols. Burned-in address: The *)b'te address assigned b' the +endor ,aking the card. It is &s&all' b&rned in to a %-M or .%-M on the (AN card and begins with a #)b'te organi/ationall' &ni0&e identifier (-1I) assigned b'
Summer Training e!ort "n Com!uter #etwor$ing
the I
Locally administered address: Thro&gh config&ration2 an address that is &sed instead of the b&rned)in address. Unicast address: 3anc' ter, for a MAC that represents a single (AN interface.
PA..I6E COMPONENT.
Passi!e components are those de!ices which are used to pro!ide connecti!ity etween different networkin$ de!ices. 0t includes &a les Patch Panel Patch &ord 0#@ o; :acks :I.89 &onnectors
CABLE.
There are different Ca'&ing o!tion. de!ending on the acce.. method ? T i%ted #ai!
(he wires are twisted around each other to minimi2e interference from other twisted pairs in the ca le. (wisted pair ca les are a!aila le unshielded (U(P) or shielded (S(P). U(P is the most common type and uses a :I.89 &onnector. (ypical len$ths are up to 4,,m. (wisted pair network uses a star topolo$y.
Coa5ia*
&oa;ial ca le uses B*& connectors. (he ma;imum ca le len$ths are around 9,,m. &oa;ial networks use a sin$le us topolo$y
Fi)e! O#tic
U(P and &o.a;ial ca les are not capa le for dri!in$ the data si$nals for lon$ distance i.e. U(P is capa le of transmittin$ up to a distance 4,, meters only By usin$ the <i er ca les it is possi le to send the data a out 4, kilometers. <i er optic ca le uses S&" S(" 3& connectors (most common in use is S& connector) 0n fi er ca les the data is con!erted to li$ht si$nals and the si$nal is made to propa$ate throu$h the fi er ca le. (here are two types of <i re optic ca le a!aila le. 4. Sin$le mode' 0n this mode typical len$th is up to 4+km and data rate is 4,,,M ps. (he core diameter is a out H.+9 nm ca le is known as 4,,, ase 3ca le. +. Multi mode' (his mode is further cate$orised in two' 4) S-' (ypical len$th is up to 9,,m and data rate is 4,,,M ps. +) <-' (ypical len$th is up to ++,m and data rate is 4,,M ps.
PATC- PANEL
A patch panel pro!ides a con!enient place to terminate (connect) all of the ca le comin$ from different locations into the wirin$ closet. )e connect the ca les comin$ from !arious locations willin$ to connect to switch throu$h the patch panel.
*66D @< PA(&? PA*63 )e can la el the patch panel so we know that which wire elon$s to which location. Wit,out a #atc, #ane*7 it i% c,aotic8 0f we want to disconnect a station from the switch" itJs a lot easier if thereJs a la el. Most ca lin$ is wired Dstrai$ht.throu$hD from end to end. But sometimes we need to cross.wire some of the pairs etween switch and station" like with a ca le modem" or cross.wire to connect two switches. )ith a patch panel" all of this cross.wirin$ is done in the patch ca le. 0f you ha!e to make any chan$es" like mo!in$ a station or switch" you 1ust mo!e the patch ca le with it" instead of ha!in$ to reterminate the ca le run.
PATC- CORD
RACK
)e ha!e to mount the patch panel somehow. (he est way is to uy a rack. Basically" a rack is a pair of !ertical rails with holes drilled in them so that we can mount patch panels" hu s" and other network e/uipment. Thi. made it ea.) to
acce.. the 'ac$ of the !atch !ane& and other networ$ing com!onent..
Ca)*in$ Guide*ine%
(he :I.89 ports on the switch support automatic MD0#MD0.- operation" so wecan use standard strai$ht.throu$h twisted.pair ca les to connect to any other network de!ice (P&s" ser!ers" switches" routers" or hu s). )e use only twisted.pair ca les with :I.89 connectors that conform to <&& standards. &onnectin$ to P&s" Ser!ers" ?u s and Switches 4. Attach one end of a twisted.pair ca le se$ment to the de!ice%s :I.89 connector. Makin$ (wisted.Pair &onnections
+. (he port where we are connectin$ the :I.89 is a network card" attach the other end of the ca le se$ment to a modular wall outlet that is connected Summer Training e!ort "n Com!uter #etwor$ing
to the wirin$ closet . @therwise" attach the other end to an a!aila le port on the switch. Make sure each twisted pair ca le does not e;ceed 4,, meters (5+7 ft) in len$th. Wi!in$ C*o%et Connection% (oday" the punch.down lock is an inte$ral part of many of the newer e/uipment racks. 0t is actually part of the patch panel. 0nstructions for makin$ connections in the wirin$ closet with this type of e/uipment follow. 4. Attach one end of a patch ca le to an a!aila le port on the switch" and the other end to the patch panel. +. 0f not already in place" attach one end of a ca le se$ment to the ack of the patch panel where the punch.down lock is located" and the other end to a modular wall outlet. 5. 3a el the ca les to simplify future trou leshootin$.
NETWORKING DE,I#ES
Summer Training e!ort "n Com!uter #etwor$ing
*etworkin$ de!ices do !arious kind of 1o s like transferrin$ the data to si$nals" pro!idin$ connecti!ity to different network de!ices" transferrin$ the data in form of packets or frames form one de!ice to other. (hese are the central connections for all the network e/uipments and handles a data type known as frame or packet. Actually frames# packet contain data and the destination address of where it is $oin$. )hen a frame is recei!ed" it is amplified and then transmitted on to port of destination P&. But different networkin$ components do this 1o in diff form at diff layers.
-UB
)hen the need for interconnectin$ more then + de!ices to$ether then a de!ice known as hu comes to picture. Basically hu is a layer one de!ice. i.e. it operates on the physical layer of the @S0 model. 0t is desi$ned to do roadcastin$ i.e when it $ets any frame it roadcasts it to e!ery port irrespecti!e that whether it is destined for that port or not. ?u has no way of distin$uishin$ which port a frame should e sent. Broadcastin$ results in lot of traffic on the network which lead to poor network response. 0f two P& simultaneously transmit there data packets and oth are connected to a ?UB" then collision will occur" so we can say" it creates a sin$le collision domain. @n the other hand all P&s connected to a hu will $et a same messa$e so a sin$le roadcast domain will e created. A 4,,#4,,, M ps hu must share its andwidth with each and e!ery one of its ports. So when only one P& is roadcastin$" it will ha!e access to the ma; a!aila le andwidth. 0f" howe!er" multiple P&%s are roadcastin$" then that andwidth will need to e di!ided etween all of these systems" which will de$rade the performance. (hey are usually ?alf.Duple; in nature.
.WITC?u s are capa le of 1oinin$ more than two P& ut ha!in$ some demerits like if two P& would want to communicate at a time then there would e a collision and the oth P& would ha!e to send the data once a$ain. (his shortcomin$ of ?u is o!ercame y Switches. Switches are intelli$ent de!ices which work on the 3ayer+ of the @S0 model. Basically a switch keeps a record of MA& addresses of all the de!ices connected to it. Usin$ this information" it uilds a MA& address ta le. So when a frame is recei!ed" it knows e;actly which port to send it to" which increases the network response time. Basic )orkin$ Principle of Switch. 4. At the time of initiali2in$ the switch the MA& address ta le is yet to e uilt up. )hen a frame is send y some of the P&" it reco$nises the source MA& address and update the MA& address ta le. +. 0f the destination is a!aila le in the MA& ta le then forward to the correspondin$ P&. 5. 0f the destination MA& address is not present in the ta le then forwards in all the port a!aila le e;pect the incomin$ one. (he desi$nated P& will respond for the data and it will send the acknowled$e for the data recei!ed. (his acknowled$ed data will e e;amined y the switch and the MA& address ta le would e up dated accordin$ly. 0f two P& simultaneously transmit there data packets and oth are connected to a S)0(&?" then collision will not occur" so we can say" it creates a multiple collision domain. (he switch supports roadcast. ?ence we can call switches create sin$le roadcast domain and multiple collision domains. A 4,,#4,,,M ps switch will allocate a full 4,,#4,,, M ps to each of its ports. So re$ardless of the no of P&%s transmittin$ user will always ha!e access to ma; amt of andwidth. (hey are usually <ull.Duple; in nature.
Switches are of two types 4) Mana$ed +) Unmana$ed Mana$ed switch supports S*MP (Simple *etwork Mana$ement Protocol) Summer Training e!ort "n Com!uter #etwor$ing
Different switchin$ Principles'. 4. .to!e-and-fo! a!d:- (he switch fully recei!es all its in the frame (store) efore forwardin$ the frame (forward). (his allows the switch to check the <&S efore forwardin$ the frame. (<&S is in the 6thernet trailer.) +. Cut-t,!ou$,'. (he switch performs the address ta le lookup as soon as the destination address field in the header is recei!ed. (he first its in the frame can e sent out the out ound port efore the final its in the incomin$ frame are recei!ed. (his does not allow the switch to discard frames that fail the <&S check. (<&S is in the 6thernet trailer.) 5. F!a$'ent F!ee'. (his performs like cut.throu$h switchin$" ut the switch waits for >8 ytes to e recei!ed efore forwardin$ the first ytes of the out$oin$ frame. Accordin$ to 6thernet specifications" collisions should e detected durin$ the first >8 ytes of the frame= frames in error ecause of a collision will not e forwarded. (he <&S still cannot e checked. Brid$e is another de!ice like switch which also operates asin$ on the MA& address. But the Basic difference etween the rid$e and the switch is that rid$e works on software ases" ut the switch works on hardware asic. (he Switch works on AS0&s ( Application Specific 0nte$rated &ircuits)
ROUTER
Switch and the ?u can only interconnect de!ices in a sin$le 3A*. <or interconnectin$ two 3A* or two or more different networks anther de!ice known as router is used. 0ts main 1o is to route ( sends ) packets to other networks and to do the routin$ ( esta lishin$ paths etween networks ) it uses the 0P address. A router is typically connected to at least two networks" commonly two 3A*%s or )A*%s or a 3A* and its 0SP%s network. :outers are located at $ateways" the places where two or more networks connect. :outers to determine the est path for forwardin$ the packet are usin$ forwardin$ ta les. 0t is a layer 5 de!ice i.e it operates at network layer of @S0 model. (he workin$ principle of the router is totally different from a switch. :outer makes a ta le known as !outin$ ta)*e7 which contains all the 0P address in the network" the information for 0P address router o tains directly ( all confi$ured 0P address on it ) or indirectly ( from nei$h our routers ). )hen a packet is recei!ed it compares the destination 0P address of the packet with the a!aila le 0P addresses in its :outin$ ta le. 0f the 0P address is not a!aila le in the routin$ ta le then it simply discard the packet instead of floodin$ in all the ports like a switch.(Detailed 0nformation a out router in chap )
Co'#a!i%on )et een -u)7 B!id$e7 . itc, 9 Route! Featu!e Nu')e! of )!oadca%t do'ain% Nu')e! of co**i%ion do'ain% Fo! a!d% LAN )!oadca%t%: Fo! a!d% LAN 'u*tica%t% O.I *a&e! u%ed ,en 'a"in$ fo! a!din$ deci%ion Inte!na* #!oce%%in$ 4a!iant% F!a'e;#ac"et f!a$'entation a**o ed: Mu*ti#*e concu!!ent e+ua*-co%t #at,% to %a'e de%tination a**o ed: -u) Se$ment 4 4 B!id$e 4 4 per rid$e port Mes . itc, 4 4 per switch port Mes Mes= can e optimi2ed for less forwardin$ Route! 4 per router interface 4 per router interface *o
*#A
Mes
*o
*#A
*#A *#A
*#A
*o
*o
Mes
LAN .OLUTION
CU.TOMER RE<UIREMENT
(here is a company" which has + offices. And the offices are +,, meters apart. (he connecti!ity etween these two offices is the main re/uirement to e fulfilled. 0n each office there are three different departments each department at different floor. 0n uildin$ 0st At each floor there are +, users and also at 5rd floor there are 3 .e!4e!%8 0n uildin$ 00nd At floor 4st and +nd there are +, users each. And at 5rd floor there are 8, users. (he andwidth re/uirement of each user is 4,, M ps while the re/uirement for the ser!er is 4 G ps. andwidth
All floors must e connected to a central switch to e placed at 00nd floor in office +nd. And connecti!ity should e !ia optical fi er. 6!erywhere there should e structured ca lin$. 6!ery switch should e pro!ide with one GB0& slot for future connecti!ity of ser!er. 6!ery where smart and mana$ed switch should e used.
.OLUTION
By lookin$ at the re/uirement it is clear that we re/uire a switch that has $ot +, ports and also + GB0& slots (one for optical fi er connecti!ity and one free slot is demanded for future use). Neepin$ this point into consideration we can use ?&3 +8 Port Mana$ed Stacka le Switch as this switch has $ot +8 ports and + GB0& slots and this switch is mana$ed switch also. And with this +8 port switch we will use +8 port ?&3 made Patch Panel And for connecti!ity of patch panel with switch we re/uire 5 ft Patch &ord. As structured ca lin$ is must so we re/uire U(P ca le and 0#@ o; and to connect P&s with 0#@ o; we re/uire Eft Patch &ord. ?ere we will use &at9e U(P ca le ecause andwidth re/uirement is 4,, M ps (his trend of connectin$ the users to the switch will e followed at each and e!ery floor ut at floor 5rd of uildin$ 00nd there are 8, user so here instead of 4 switch we re/uire + switches. At 5rd floor of uildin$ 4st + ser!ers are also present whose andwidth re/uirement is 4G ps. So now we ha!e two options either to connect with U(P ca le or <i er optic ca le. But here we will use fi er optic as we are already usin$ it so thee is no need to waste money on U(P &at > &a le. So here we will simply use the fi er optic patch cord to connect the ser!er to switch. *ow only one thin$ is left i.e. connection of switches to a central switch placed at +nd floor of 00nd uildin$. As the connection re/uirement is !ia optical fi er so we at central location we re/uire a switch ha!in$ all its ports as GB0& slots and no of ports should not e more than 7 as there are only E +8 port switches in use (one optical ca le line from each switch) *ow here as the distance etween the two offices is only +,, meters so here we will use multimode optical fi er and that too <- type and as the ca le is to e laid in open so outdoor armored ca le will e use. Summer Training e!ort "n Com!uter #etwor$ing
(he connecti!ity dia$ram" the ill of material and the specification sheet for the solution is $i!en in the followin$ pa$es.
.PECIFICATION .-EET
-CL-3=TM.-3.-W
-CL 3= Po!t Mana$ed .tac"a)*e . itc, .TANDARD.- 06667,+.5 (6thernet) " 06667,+.5a (<ast 6thernet)" 06667,+.+a (Gi$a it 6thernet)" 06667,+.52 (4,,,Base S-#3-) PORT.- +8 port auto ne$otiation 4, ase (#4,, ase (+optional modular e;pansion ports (4,,, ase.(" 4,,, ase 3-#S-#<-) MAC Add!e%%e%. 8N BANDWIDT-- 4+G ps .WITC-ING RATE- >.>M ps .NMP(.i'#*e Net o!" Mana$e'ent P!otoco*0- Mes" and supports :<&449E WEB MANAGEABLE- Mes
PC-C>2?-E
CAT ? e CABLE 6nhanced &A( 9 59, M?2 U(P Bulk &a le 8 Pairs Solid Grey 3en$th' 5,9 Meters
PC-@P3=-E
Summer Training e!ort "n Com!uter #etwor$ing
PATC- PANEL Unshielded +8 Port :I.89 1ack for performance O rated 4,, M ps <ully &omplied to e &A( 9 (9>7A#B standards 4.>mm metallic Patch Panel 4HJJ :ack Mount frame 4U <ully powder coated Black
PC-MC>-GE
> ft8 #atc, co!d 5 ft. 6nhance &A(.9 59, M?2 Grey Patch &ord U(P twisted pair with Black Sna$less <lan$e Boot
PC-MCA-GE
A ft8 #atc, co!d E ft. 6nhance &A(.9 59, M?2 Grey Patch &ord U(P twisted pair with Black Sna$less <lan$e Boot.
PF-CMB-A-OM3
outdoo! a!'ou!ed Fi)e! o#tic ca)*e - Mu*ti'ode Con%t!uction: &orru$ated steel tape armoured ca le construction Multimode G >+.9#4+9Pm ca le No of Co!e% G > fi re core ca les. Len$t,. 4 meter
PF-PM.C-.C->D-?2
.C-.C Du#*e5 Patc, co!d Mu*ti'ode Patc, Co!d% ca)*e C 9,#4+9Pm Multi mode Patc, Co!d% connecto!% CS&#S( &onnectors MM patch cords Summer Training e!ort "n Com!uter #etwor$ing
PF-CO.C-M
.C Connecto! Mu*ti 'ode Ea%& connection 9 di%connection C Pull .. Push type
PF-CP.C-M
.C Cou#*e! C '' (Inc*uded in t,e Fi)e! Patc, Pane*0 Lo In%e!tion *o%% T&#e G S& . S& type
PF-LIU-D3U
D3 Co!e LIU ( Line In%e!tion Unit 0 )all mount 4+ way <i re Iack Panel Base Unit Q 4+ MM S& couplers with panel
PF-LIU-BU
B Co!e LIU (Line In%e!tion Unit0 )all mount > way <i re Iack Panel Base Unit Q > MM S& couplers with panel.
ROUTER
:@U(6: 0*(6:*A3 &@MP@*6*(S
3ike a computer" a router has a &PU that !aries in performance and capa ilities dependin$ upon router platform. 0t has typically 8 types of memory in it.' ROM. 0t is used to store the router%s ootstrap startup pro$ram" operatin$ system software" and power.on dia$nostic tests pro$rams. )e can also up$rade our :@M FLA.- MEMOR/. 0t holds operatin$ systems ima$e(s). <lash memory is erasa le" repro$ramma le :@M. @ur 0@S software is present in this memory and we can up$rade it also. <lash content is retained e!en when we switch off or restart the router. RAM . 0t is used to store operational information such as routin$ ta les" router%s runnin$ confi$uration file. :AM also pro!ides cachin$ and packet ufferin$ capa ilities. 0ts content is lost when we switch off or restart the router. )hen we confi$ure the router at that time actually we are writin$ in :AM. N6RAM . 0t is used to store the router%s startup confi$uration file. 0t does not lose data when power is switched off. So the contents of startup confi$uration files are maintained e!en when we switch off or restart the router.
Et,e!net o! To"en Rin$ inte!face are confi$ured to allow connection to a 3A*. .&nc,!onou% %e!ia* inte!face% are confi$ured to allow connections to )A*s. I.DN BRI inte!face% are confi$ured to allow connection to an 0SD* )A*. All cisco routers ha!e a con%o*e #o!t that pro!ides an 60A#(0A.+5+ asynchronous serial connection. &onsole port can e connected to computers serial connection to $ain terminal access to router. Most routers also ha!e an au5i*ia!& #o!t that is !ery similar to console port ut" is typically used for modem connection for remote router mana$ement.
(here are three methods for confi$urin$ the router' 4) (hrou$h console port'. (he console port is used for confi$urin$ a router locally with the help of a P& or a 3aptop. (he console port of the router is connected to the serial i.e &@M port of the router. (he detailed confi$uration is $i!en in the section. +) (hrou$h the AU- port'. (he au; ( au;iliary ) port is accessed from a modem located faraway from a router throu$h the PS(* ( Pu lic Switched (elephone *etwork ) and the confi$uration is done.
5) (hrou$h (elnet'. 3ine !ty ( !irtual terminal ) , to 8 are used for the confi$urin$ the router y telnet. Summer Training e!ort "n Com!uter #etwor$ing
(he <ollowin$ steps are adopted to access a router throu$h the console port with a )indows ased P&. Access ?yper terminal'. Start Menu Pro$rams Accessories &ommunication ?yperterminal &onnect to the de!ice of the P&
C"2 * Setting
Afte! connectin$ t,e !oute! t,at #!ocedu!e% i** )e ado#ted8 Route!E ena)*e
*ow automatically prompt askin$ for password will appear on the screen like this' Pa%% o!d: *ow write password o!er here. (his is done to secure access to router. After this Route!F will appear on the screen this shows that we are in pri!ile$ed mode and now we try to enter in confi$uration mode. Route!F confi$u!e te!'ina* (his is done to enter confi$uration mode. *ow starts the confi$uration of router *ow we will assi$n 0P address to each and !ery interface connected to router. Su net mask should e $i!en with a proper care. <ollowin$ steps are to e followed' <or confi$urin$ et,e!net inte!face' Route!F confi$ terminal Route! (confi$0F interface ethernet , Summer Training e!ort "n Com!uter #etwor$ing
Route! (confi$-if0F ip address ++5.7.494.4 +99.+99.+99., Route! (confi$-if0F no shutdown Route! (confi$-if0Fe;it <or confi$urin$ %e!ia* inte!face' Route! (confi$0F interface serial , Route! (confi$-if0F ip address +,8.+,8.E.4 +99.+99.+99., Route! (confi$-if0F no shutdown Route! (confi$-if0Fe;it Route! (confi$0F interface serial 4 Route! (confi$-if0F ip address 4HH.>.45.+ +99.+99.+99., Route! (confi$-if0F no shutdown Route!(confi$-if0F e;it
ROUTING PROTOCOL.
ROUTING INFORMATION PROTOCOL (RIP0 :0P is a dynamic" distance !ector routin$ protocol. :0P uses UDP port 9+, for route updates. :0P calculates the est route ased on hop count. (his makes :0P !ery fast to con!er$e :0P sends full ta le updates at re$ular inter!als specified y the route.update timer (5, seconds is the default). (his means that a :0P router summari2es all routes it knows alon$ classful oundaries and sends the summary information to all other :0P routin$ de!ices. :0P updates can contain up to +9 messa$es. :0P (0M6:S (0M6: u#date ti'eout F*u%, D6<AU3( &@*(:@3S 5, sec. 0nter!al etween route update ad!ertisements 47, sec. 0nter!al a route should stay Jli!eJ in the routin$ ta le. (his counter is reset e!ery time the router hears an update for this route. +8, sec. ?ow lon$ to wait from the time the route was recei!ed to delete a route (>, seconds after timeout).
(he routin$.update timer controls the time etween routin$ updates. Default is usually 5, seconds" plus a small random delay to pre!ent all :0P routers from sendin$ updates simultaneously. (he route.timeout timer controls when a route is no lon$er a!aila le. (he default is usually 47, seconds. 0f a router has not seen the route in an update durin$ this specified inter!al" it is dropped from the routerJs announcements. (he route is maintained lon$ enou$h for the router to ad!ertise the route as down (hop count of 4>). (he route.flush timer controls how lon$ efore a route is completely flushed from the routin$ ta le. (he default settin$ is usually 4+, seconds. Summer Training e!ort "n Com!uter #etwor$ing
BA.IC RIP CONFIGURATION Accordin$ to the recollection of 0netDaemon" confi$urin$ a &isco router for a asic :0P confi$uration would look somethin$ like this' routerC ena le Password' routerR conf t router(confi$)Rinterface ethernet , router(confi$.if)R ip address 4H+.4>7.8+.4 router(confi$.if)R interface ethernet 4 router(confi$.if)R ip address 4H+.4>7.85.4 router(confi$.if)R e;it router(confi$)R router rip router(confi$.router)R network 4H+.4>7.8+., router(confi$.router)R network 4H+.4>7.85., router(confi$.router)R e;it router(confi$.router)R S2 routerR (he e;ample a o!e assumes that the interfaces that will e runnin$ :0P ha!e 0P addresses on them that fall within the 4H+.4>7.8+.," and 4H+.4>7.85., class & ran$es. IGRP 0G:P is a distance.!ector routin$ protocol that considers a composite metric which" y default" uses andwidth and delay as parameters instead of hop count. 0G:P is not limited to the 49.hop limit of :0P. 0G:P has a ma;imum hop limit of 4,," y default" and can e confi$ured to support a network diameter of +99. )ith 0G:P" routers usually select paths with a lar$er minimum.link andwidth o!er paths with a smaller hop count. 3inks do not ha!e a hop count. (hey are e;actly one hop. 0G:P is a!aila le only on &isco routers 0G:P will load. alance traffic if there are se!eral paths with e/ual cost to the destination 0G:P sends its routin$ ta le to its nei$h ors e!ery H, seconds. 0G:PJs default update period of H, seconds is a enefit compared to :0P" which can consume e;cessi!e andwidth when sendin$ updates e!ery 5, seconds. 0G:P uses an in!alid timer to mark a route as in!alid after +E, seconds (three times the update timer). As with :0P" 0G:P uses a flush timer to remo!e a route from the routin$ ta le= the default flush timer is set to >5, seconds (se!en times the update period and more than 4, minutes). 0f a network $oes down or the metric for the network increases" the route is placed in holddown. (he router accepts no new chan$es for the route until the holddown timer e;pires. (his setup pre!ents routin$ loops in the network. (he default holddown timer is +7, seconds (three times the update timer plus 4, seconds). Summer Training e!ort "n Com!uter #etwor$ing
IP ACCE.. LI.T
0P access lists cause a router to discard some packets ased on criteria defined y the network en$ineer. (he $oal of these filters is to pre!ent unwanted traffic in the networkAwhether to pre!ent hackers from penetratin$ the network" or 1ust to pre!ent employees from usin$ systems that they should not e usin$. Ney features of access lists' T Packets can e filtered as they enter an interface" efore the routin$ decision. T Packets can e filtered efore they e;it an interface" after the routin$ decision. T Deny is the term used in &isco 0@S software to imply that the packet will e filtered. T Permit is the term used in &isco 0@S software to imply that the packet will not e filtered. T (he filterin$ lo$ic is confi$ured in the access list. T At the end of e!ery access list is an implied Kdeny all trafficL statement. (herefore" if a packet does not match any of your access list statements" it is locked. Access lists ha!e two ma1or steps in their lo$ic' matchin$ and action. Matchin$ lo$ic e;amines each packet and determines whether it matches the acce%%-*i%t statement. As soon as an acce%%-*i%t statement is matched" there are two actions to choose from' deny and permit. Deny means to discard the packet" and permit implies that the packet should continue on its way.
FIREWALL
As the limits of networkin$ is increasin$ unfolded so the dan$er of information leakin$ in and leakin$ out increases. So a mechanism is re/uired to keep $ood its in and ad its out. And for this we use <0:6)A33. A firewall is a de!ice of some kind that separates and protects our network . in most cases" from the 0nternet. 0t restricts traffic to only what is accepta le" and monitors that what is happenin$. 6!ery firewall has at least two network interfaces" one for the network it is intended to protect" and one for the network it is e;posed to. A firewall sits at the 1unction point or $ateway etween the two networks" usually a pri!ate network and a pu lic network such as the 0nternet. 0t may e a ,a!d a!e de4ice or a %oft a!e #!o$!a' runnin$ on a secure host computer. ?ardware de!ice means a physical de!ise connected at the $ateway which checks e!ery incomin$ or out$oin$ packet. Software pro$ram means that software is loaded in computer that determines as what to allow and what to re1ect. A firewall e;amines all traffic routed etween the two networks to see if it meets certain criteria. A firewall filters oth in ound and out ound traffic.
Tec,no*o$ie%
(here are three different types of firewall technolo$ies' 4) Packet <ilterin$ +) Pro;y 5) Stateful 0nspection
Pac"et Fi*te!in$ A packet filterin$ firewall simply inspects incomin$ traffic at the transport layer of the @S0 model. (he packet filterin$ firewall analy2es (&P or UDP packets and compare them to a set of esta lished rules called as Access &ontrol 3ist (A&3). Packet filterin$ inspects packet nly for followin$ elements Source 0P address Source Port Destination 0P address Destination Port Protocol
)hen a firewall is installed then no P& makes direct connection to the outside world. 0n that case they use pro;y i.e each P& first of all sends re/uest to pro;y which then forwards the re/uest to the internet or outside world for connection or data transfer. .tatefu* In%#ection 0t is a com ination of Packet filterin$ and pro;y ser!ices. (his is the most secure technolo$y and pro!ides the most functionality ecause connections are not only applied to A&3" ut are lo$$ed into a static ta le. After a connection is esta lished" all session data is compared to the static ta le. 0f the session data does not match the state ta le information for that connection" then connection is dropped.
nameif ethernet4 inside security4,, nameif ethernet+ dm2 security+, )e can see the confi$uration y usin$ %,o
na'eif command.
i# add!e%% Co''and All the interfaces must e confi$ured with an 0P address. (he i# add!e%% command is used to confi$ure 0P addresses on the interfaces. (he i# add!e%% command inds a lo$ical address (0P address) to the hardware 0D. SM*(A-' ip address if_name ip_address [netmaskU if_name (he interface name that was confi$ured usin$ the na'eif command. ip_address (he interface%s 0P address. net'a%" (he appropriate network mask. 0f the mask !alue is not entered" the firewall assi$ns a classful network mask. 6;ample' ip address inside 4,.4,.4,.48 +99.+99.+99., )e can see the confi$uration y usin$ %,o i# command. nat Co''and (he nat (*etwork Address (ranslation) command translates a set of 0P addresses to another set of 0P addresses. SM*(A-' nat ( if_name nat_id local_ip [netmask] (if_name (he internal network interface name. nat_id (he 0D num er to match with the $lo al address pool. local_ip (he 0P address that is translated. (his is usually the inside network 0P address. net'a%" *etwork mask for the local 0P address. (here are two types of *A(in$' *) Static' <or e;. (here is a $oo$le ser!er and we don%t want to make its 0P address pu lic so we chan$e its 0P address usin$ nat command in firewall and now user will lo$on to this new 0P . (his results in more security as e!ery time it has to pass throu$h firewall. +) Dynamic' 0f there are lots of P&%s in a network and all want to access the internet " it is not easy that e!ery P& is ein$ pro!ided with independent pu lic 0P so at firewall le!el we chan$e e!ery P&%s p!t 0p with pu lic 0P. 6;amples' nat (inside) 4 4,.4,.4,., +99.+99.+99., nat (inside) 4 4E+.4>.4., +99.+99.+99.,
(he $*o)a* command is used to define the address or ran$e of addresses that the addresses defined y the nat command are translated into. 0t is important that the nat_id e identical to the nat_id used in the nat command. (he nat_id pairs the 0P address defined y the $*o)a* and nat commands so that network translation can take place. SM*(A-' !lo"al ( if_name nat_id !lo"al_ip # !lo"al_ip$!lo"al_ip [netmask] (if_name (he e;ternal network where you use these $lo al addresses. nat_id 0dentifies the $lo al address and matches it with the nat command it is pairin$ with. !lo"al_ip A sin$le 0P address. )hen a sin$le 0P address is specified" the firewall automatically performs Port Address (ranslation (PA(). $*o)a*Gi#-$*o)a*Gi# Defines a ran$e of $lo al 0P addresses to e used y the firewall to *A(. net'a%" (he network mask for the $lo al 0P address(es).
-ID.
?ost 0ntrusion Detection Systems run on indi!idual hosts or de!ices on the network. A ?0DS monitors the in ound and out ound packets from the de!ice only and will alert the user or administrator of suspicious acti!ity if detected
NID.
*etwork 0ntrusion Detection Systems are placed at a strate$ic point or points within the network to monitor traffic to and from all de!ices on the network. 0deally you would scan all in ound and out ound traffic" howe!er doin$ so mi$ht create a ottleneck that would impair the o!erall speed of the network. )hen an unauthori2ed user lo$s in successfully" or attempts to lo$ in" they are est tracked with host. ased 0DS. ?owe!er" detectin$ the unauthori2ed user efore their lo$ on attempt is est accomplished with network. ased 0DS. (here are four asic techni/ues used to detect intruders' 4) Anomaly detection +) misuse detection (si$nature detection) 5) tar$et monitorin$ Summer Training e!ort "n Com!uter #etwor$ing
Ano'a*& Detection Desi$ned to unco!er a normal patterns of eha!ior the 0DS esta lishes a aseline of normal usa$e patterns" and anythin$ that widely de!iates from it $ets fla$$ed as a possi le intrusion. An e;ample of this would e if a user lo$s on and off of a machine +, times a day instead of the normal 4 or +. Also" if a computer is used at +',, AM when normally no one outside of usiness hours should ha!e access" this should raise some suspicions. At another le!el" anomaly detection can in!esti$ate user patterns" such as profilin$ the pro$rams e;ecuted daily. 0f a user in the $raphics department suddenly starts accessin$ accountin$ pro$rams or compilin$ code" the system can properly alert its administrators.
Mi%u%e Detection o! .i$natu!e Detection this method uses specifically known patterns of unauthori2ed eha!ior to predict and detect su se/uent similar attempts. (hese specific patterns are called si$natures. <or host. ased intrusion detection" one e;ample of a si$nature is Dthree failed lo$ins.D Ta!$et Monito!in$ (hese systems do not acti!ely search for anomalies or misuse" ut instead look for the modification of specified files. (his is more of a correcti!e control" desi$ned to unco!er an unauthori2ed action after it occurs in order to re!erse it. @ne way to check for the co!ert editin$ of files is y computin$ a crypto$raphic hash eforehand and comparin$ this to new hashes of the file at re$ular inter!als. (his type of system is the easiest to implement" ecause it does not re/uire constant monitorin$ y the administrator. 0nte$rity checksum hashes can e computed at whate!er inter!als you wish" and on either all files or 1ust the mission#system critical files Pa%%i4e ID. A passi!e 0DS simply detects and alerts. )hen suspicious or malicious traffic is detected an alert is $enerated and sent to the administrator or user and it is up to them to take action to lock the acti!ity or respond in some way. Reacti4e ID. A reacti!e 0DS will not only detect suspicious or malicious traffic and alert the administrator" ut will take pre.defined proacti!e actions to respond to the threat. (ypically this means lockin$ any further network traffic from the source 0P address or user. 0DS is re/uired to e properly confi$ured to reco$ni2e what is normal traffic on your network !s. what mi$ht e malicious traffic and you" or the administrators responsi le for respondin$ to 0DS alerts" need to understand what the alerts mean and how to effecti!ely respond. Summer Training e!ort "n Com!uter #etwor$ing
WAN .OLUTION
RE<UIREMENT
(here is one &B& (&entral Billin$ &enter) which is re/uired to e connected with +7 BG& (Bill Generation &enter). As with each BG& location further locations are connected so it is re/uired to use a router at each location. &B& :outer must ha!e these specifications' 8 num ers of4,#4,, fast 6thernet interfaces. +, num er of V.59 interface to recei!e the data from comin$ BG& Via optical fi er# 3ease line + num ers of 0SD* B:0 ports. <our num ers of synchronous serial interfaces for >8 k ps lease line connecti!ity. BG& :outer must ha!e these specifications' + port 4,#4,, M ps 6thernet 0nterface. Sufficient port Serial )A* 0nterfaces. Al the BG& locations are to e connected to the central location ha!in$ a point to point connecti!ity. (he BG& location are ha!in$ a leased line connecti!ity of 4+7 N ps which can e up $rada le to + M ps. (he leased 3ine connecti!ity is to e pro!ided BM a 0SP.
.OLUTION
As per the re/uirement the proposed solution is to ha!e point to point connecti!ity etween the central location and the +7 BG& locations. (here is a &isco 4784 :outer at each of the BG& location. (hey are connected to a + M ps 3eased 3ine Modem Pair." ?&3.Gateway G+M.+)" throu$h the serial port. (he modem at the customer end is connected to a modem at the 0SP side. 3ike this way the central location ha!in$ a &isco 5789 :outer is connected to +7 nos of + M ps 3eased 3ine modem pair. (he connecti!ity dia$ram and the ill of material re/uired for the solution is $i!en in the followin$ pa$es.
.TANDARD.
0666 de!eloped the 7,+.44 standards to pro!ide wireless networkin$ technolo$y. )ith time.to.time de!elopment in the field of technolo$y three standards has een finali2ed. 7,+.44(a)" 7,+.44( )" 7,+.44($) 7,+.44( ) 44M #s 9.9M #s +.8 G?F 9E m 4,,W 4,,W 5 7,+.44(a) 98 M #s ++.+> M #s 9 G?F 4+m 4+,W +,,,W 7 7,+.44($) 98 M #s 4E.++ M #s +.8 G?F 4Hm 44,W 9,,W 8
Ma;. it rate#:aw net <re/uency Band :an$e O Ma;. rate Unit &ost &o!era$e &ost *o. of channels
0666 7,+.44a standard is the most widely adopted one ecause it operates at licensed 9 G?F and while other are unlicensed and also it pro!ides ma;. nof channels and ma;. it rate than any other standards.
TOPOLOGIE.
(here are two topolo$ies on which )3A* works' 4) 0nfrastructure *etwork +) Ad hoc *etwork 0*<:AS(:U&(U:6 *6()@:N Summer Training e!ort "n Com!uter #etwor$ing
0t is useful for pro!idin$ wireless co!era$e of uildin$ or campus areas. (his is a topolo$y used when there are many access points in a sin$le location. By deployin$ multiple Access Points (APs) with o!erlappin$ co!era$e areas" or$ani2ations can achie!e road network co!era$e. . A laptop or other mo ile de!ice may mo!e from AP to AP while maintainin$ access to the resources of the 3A*. 6ach client is e/uipped with wireless network interface card (*0&) that consists of the radio transcei!er and the lo$ic to interact with the client machine and software. )hile the AP is essentially a radio transcei!er on one side and the wired ack one on the other.
(his topolo$y is used when we ha!e to interconnect mo ile de!ices that are in the same area (e.$." in the same room). 0n this architecture" client stations are $rouped into a sin$le $eo$raphic area and can e 0nternet.worked without access to the wired 3A* (infrastructure network). (he ad hoc confi$uration is similar to a peer.to.peer office network in which no node is re/uired to function as a ser!er. 0n ad hoc there is no need of any AP as all de!ices are wirelessly connected to each other.
I.DN INTERFACE.
(ypes of 0SD* interfaces' 4) Basic :ate 0nterface (B:0) +) Primary :ate 0nterface (P:0). Both B:0 and P:0 pro!ide multiple di$ital earer channels o!er which temporary connections can e made and data can e sent. BRI: %SD& 'asic (ate %nterface (B:0" also known as +BQ4D) ser!ice pro!ides two B channels and one D channel. (he B:0 B.channel ser!ice operates at >8N ps and carries data" while the B:0 D.channel ser!ice operates at 4>N ps and usually carries control and si$nalin$ information. PRI: Accordin$ to American standards " the 0SD* Primary (ate %nterface (P:0" also known as +5BQD4) ser!ice deli!ers +5 >8N ps B channels and one >8N ps D channel for a total it rate of up to 4.988M ps. And accordin$ to 6uropean standards" 0SD* pro!ides 5, >8N ps B channels and one >8N ps D channel for a total it rate of up to +.,87M ps.
:outer A is ordered with an 0SD* B:0 U reference point" referrin$ to the 0.85, reference point definin$ the interface etween the customer premises and the 0SP. :outer B is ou$ht with an 0SD* B:0 S#( interface" implyin$ that it must e ca led to a function $roup *(4 de!ice. An *(4 function $roup de!ice must e connected to the 0SP line throu$h a U reference point= the S#( interface defines the connection to :outer B. :outer B is called a (64 ((erminal 6/uipment 4) function $roup de!ice. *on.0SD* e/uipment is called a (6+ ((erminal 6/uipment +) de!ice and is attached usin$ the : reference point to a terminal adapter ((A) function $roup de!ice. Alternati!ely" a (64 can connect usin$ an S reference point to an *(+ function $roup"
Refe!ence Point%:
R . T U . etween (6+ and (A. etween (64 or (A and *(+. etween *(+ and *(4. etween *(4 and 0SP.