Industrial Training Report at Infowiz
Industrial Training Report at Infowiz
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING INFORMATION
TECHNOLOGY
ACKNOWLEDGMENT
1
I am highly grateful to the (Name of HOD) HOD CSE and IT,
(College Name) for providing this opportunity to carry out the six
month industrial training at INFOWIZ.
I would like to express my gratitude to other faculty members of
Computer Science and Engineering department of SGI, for providing
academic inputs, guidance and encouragement throughout the training
period.
The author would like to express a deep sense of gratitude and thank to
Mr. Kamaljot Kansal, Director of company, without whose permission,
wise counsel and able guidance, it would have not been possible to
pursue my training in this manner.
’INFOWIZ
2
INFOWIZ was formed in 2011 with the mission to provide Industrial training to
aspiring Engineers and technical support to industries. Within a short span of 9
years “Infowiz” has become one of the leading organizations which offer state of art
professional IT solutions, Industrial trainings, technical support and consultancy to
software companies in India and abroad. Due to quality assurance and high level of
commitments in our services, we have won quite a few accolades and are associated
with reputed universities and popular corporates, in the field. We strive to impart
personalized, professional and contemporary experiential trainings on all the
engineering streams that are necessary for the career, success and growth for both
students & industry respectively.
Business overview
Company Strategy
Vision: To provide unique & high quality trainings that exceeds the
expectations of our esteemed Students and Clients.
Purpose: To be a leader in the Industrial training industry by providing
enhanced relationship and profitability.
Mission statement: To build long term relationships with our students and
clients and provide exceptional customer services by pursuing business
through innovation and advanced technology.
Core values:
We believe in treating our students & customers with respect and faith,
We grow through creativity, research and innovation,
We integrate honesty, integrity and business ethics into all aspects of our business
functioning
Goals:
3
Regional & National expansion in the field of trainings/software consultancy and
develop a strong base of students & corporates.
Increase the assets and investments of the company to support the development of
services.
To build good reputation in the field of Industrial trainings & software consultancy
and become a key player in the industry.
Accolades
Project Portfolio
Business Information
4
Business Type: Industrial Training on Engineering courses, IT Solutions,
Implementation
ABSTRACT
5
Security has been a pivotal issue in the design and deployment of an enterprise
network. With the innovation and diffusion of new technology such as Universal
computing, Enterprise mobility, E-commerce and Cloud computing, the network
security has still remained as an ever increasing challenge. A Campus network is an
important part of campus life and network security is essential for a campus.
Campus network faces challenges to address core issues of security which are
governed by network architecture. Secured network protects an institution from
security attacks associated with network. A university network has a number of
uses, such as teaching, learning, research, management, e-library, result publishing
and connection with the external users. Network security will prevent the university
network from different types of threats and attacks. The theoretical contribution of
this study is a reference model architecture of the university campus network that
can be followed or adapted to build a robust yet flexible network that responds to
the next generation requirements. A hierarchical architecture of the campus network
is configured with different types of security issues for ensuring the quality of
service. In this project, a tested and secure network design is proposed based on the
practical requirements and this proposed network infrastructure is realizable with
adaptable infrastructure.
6
List of Figures
7
Table of Contents
Sr. No. Topic Page No.
1. Introduction 7-17
8
Chapter 1
Introduction
1.1 Open System interconnection model:
OSI model is not network architecture because it does not specify the exact services
and protocols for each layer. It simply tells what each layer should do by defining its
input and output data. It is up to network architects to implement the layers according
to their needs and resources available.
Physical layer −It is the first layer that physically connects the two systems that
need to communicate. It transmits data in bits and manages simplex or duplex
transmission by modem. It also manages Network Interface Card’s hardware interface
to the network, like cabling, cable terminators, topography, voltage levels, etc.
Data link layer − It is the firmware layer of Network Interface Card. It assembles
datagram’s into frames and adds start and stop flags to each frame. It also resolves
problems caused by damaged, lost or duplicate frames.
Transport layer − Till the session layer, file is in its own form. Transport layer
breaks it down into data frames, provides error checking at network segment level
and prevents a fast host from overrunning a slower one. Transport layer isolates the
upper layers from network hardware.
Session layer − this layer is responsible for establishing a session between two
workstations that want to exchange data.
9
Fig.1.1.1 OSI Model
1.2 Networking
10
1.3Modes Of Networking:
Fig. 1.3.1
Fig.1.3.2
DOMAIN MODEL
One or more computers are servers. Network administrators use servers to control the
security and permissions for all computers on the domain.
This makes it easy to make changes because the changes are automatically made to all
computers.
If you have a user account on the domain, you can log on to any computer on the domain
without needing an account on that computer.
1.4Types Of Networking:
PAN
PAN is the acronym for Personal Area Network. PAN is the interconnection between devices
within the range of a person’s private space, typically within a range of 10 metres. If you
have transferred images or songs from your laptop to mobile or from mobile to your friend’s
mobile using Bluetooth, you have set up and used a personal area network.
12
LAN or Local Area Network is a wired network spread over a single site like an office,
building or manufacturing unit. LAN is set up to when team members need to share software
and hardware resources with each other but not with the outside world. Typical software
resources include official documents, user manuals, employee handbook, etc. Hardware
resources that can be easily shared over the network include printer, fax machines, modems,
memory space, etc. This decreases infrastructure costs for the organization drastically. It is
basically a set of devices connecting within the same location.
MAN
MAN is the acronym for Metropolitan Area Network. It is a network spread over a city,
college campus or a small region. MAN is larger than a LAN and typically spread over
several kilometres. Objective of MAN is to share hardware and software resources, thereby
decreasing infrastructure costs. MAN can be built by connecting several LANs. It is a set of
devices connecting within the same city limits.
WAN
13
WAN or Wide Area Network is spread over a country or many countries. WAN is
typically a network of many LANs, MANs and WANs. Network is set up using wired
or wireless connections, depending on availability and reliability. It is a set of devices
connected in two or more different locations.
Fig.1.4.4
The term topology refers to the way a network is laid out, either physically or
logically. Two or more devices connect to a link; two or more links form a topology.
It is the geometric representation of the relationship of all the links and linking
devices.
MESH
In a mesh topology, every device has a dedicated point-to-point link to every other
device. The dedicated means link will carry the traffic between only two devices
where it connects. A fully connected mesh network has n devices, n(n-1)/2 links,
andn-1 input/output ports for each device.
Fig.1.5.1
STAR
14
In star topology, central controller is connected to each device individually. Central
controller can be a hub, switch or router. Any exchange of data between two nodes
must take place through the hub. It is the most popular topology for information and
voice networks as central controller can process data received from source device
before sending it to the destination device.
Fig.1.5.2
TREE
Tree topology has a group of star networks connected to a linear bus backbone cable.
It incorporates features of both star and bus topologies. Tree topology is also called
hierarchical topology. Like a star nodes are linked to a central hub that controls the
traffic to the network. The majority of devices connect to a secondary hub that in turn
connected to the central hub. The central hub in the tree is an active hub. The
secondary hubs may be active or passive hubs. The active hub contains the repeater,
which regenerates the bits pattern it receives before sending them out. A passive
hub provides a simple physical connection between the attached devices.
15
Alternatively referred to as a line topology, a bus topology is a network setup in which
each computer and network device are connected to a single cable or backbone.
Depending on the type of network card used in each computer of the bus topology, a
coaxial cable or a RJ-45 network cable is used to connect computers together.
Backbone is a portion of a computer network that is capable of carrying the majority
of traffic on the network at high speeds. The backbone often connects large networks
or companies together.
HYBRID
16
In this type of topology we integrate two or more different topologies to form a
resultant topology which has good points (as well as weaknesses) of all the
constituent basic topologies rather than having characteristics of one specific
topology. This combination of topologies is done according to the requirements of the
organization. For example, if there exists a ring topology in one office department
while a bus topology in another department, connecting these two will result in
Hybrid topology. Remember connecting two similar topologies cannot be termed as
Hybrid topology. Star-Ring and Star-Bus networks are most common examples of
hybrid network.
17
1. It is also called hardware address or MAC address.MAC stands for media access control.
2. It is present in the chip of a NIC card.
3. It is unique for every NIC card and cannot be changed.
4. It is 48 bits. Out of 48 bits, 24 bits of address is given by the manufacturer of NIC card
and the remaining 24 bits of address is defined as per instructions given by IEEE.
5. IEEE stands for Institute of Electronics and Electrical Engineers.
Logical Address
1. It is also called software address.
2. It is given by the user and can be changed anytime.
3. Several schemes or protocols are used to define logical address in a computer.
4. These protocols are:
TCP/IP (Transmission Control Protocol/Internet Protocol)
IPX/SPX (Internetwork Packet Exchange/Sequential Packet Exchange)
DLC (Data Link Control)
AppleTalk
Protocol
Protocol is a set of rules which in communication between computers.
TCP/IP
1. It has become industry-standard
2. It was developed by DOD (Department of Defence) of USA.
3. It is used both in Internet (public network) and Intranet (private network).
4. It is of 32 bits.
5. Currently used version is IP v4.
6. IP v6 is also available.
7. It has four fields or octets.
8. Each octet is of 8 bits.
9. It can be represented by w.x.y.z
10. Minimum value of octet is 0 and maximum is 255
11. Each octet or field can have decimal values ranging from 0 to 255.
12. According to the value of w or first field, we have five classes of TCP/IP Addresses.
The first three classes are only used for computer addressing in a network.
1.7 IP ADDRESSING
IP (INTERNET PROTOCOL) is a 32 bit. It is divided in 4 octet each octet contain 8 bit. It
is numerical identification of computer on network. It is divided in to two parts one is
18
network and second is host. We use private ip address in LAN which is provided by IANA
(INTERNET ASSIGNING NUMBERING AUTHOURTIY). The minimum value (per
octet) is 0 and the maximum value is 255. IP address are divided in five classes.
1. Network ID: it represent the no. of on bit that is (1).
2. Host ID: it represent the no. of off bit that is (0).
IP ADDRESS RANGES
Early network design, when global end to end connectivity was envisioned for all internet
hosts, intended that IP addresses be uniquely assigned to a particular computer or device.
However, it was found that it was not always necessary as private networks developed and
addresses space needed to be conserved (IPv4 address exhaustion).
Computer not connected to the internet, such as factory machines that communicate only with
each other via TCP/IP, need not have globally – unique IP addresses.
Three ranges of IPv4 addresses for private networks, one range for each class (A,B,C) were
reserved. These addresses are not routed on the Internet, and thus their use need not be
coordinated with an IP address registry.
Public IP – It is used on public network i.e. internet and recognized on network. It is given
by the service provider IANA. Public IP is globally unique.
19
Private IP – It is used within the LAN or within the organization. But it is not
recognized on internet. It is given by the administrator. It is unique within the network
or organization. We don’t need to pay to service provider i.e. free and it is an
unregistered IP.
There are certain addresses in each class of IP address that are reserved for Private
networks. These are called private addresses.
Subnet Mask is also 32 bit address,which tell us how many bits are used for network and
how many bits are used for host address. In subnet mask network bits are always 1 and host
bits are always 0.
This command is used to check the connectivity with other computer. Ping is performed with
in network or outside the network. In this process four packets are send to destination
address and four packets received from the destination address. Internet control massage
protocol is used for this process. Used for testing connectivity between two devices.
1.9 SUBNETTING
It is the process of dividing a single network into multiple smaller networks. It helps in
minimizing the wastage of IP address.
There are loads of reasons in favor of sub netting, including the following benefits:
20
Reduced Network Traffic – We all appreciate less traffic of any kind. Networks are no
different. Without trusty routers, packet traffic could grind the entire network down to a near
standstill. With routers most traffic will stay on the local network; only packets destined for
other networks will pass through the router. Routers create broadcast domains.
21
Chapter 2
Cisco Packet Tracer
The simulator that we have used to create a simulation of the network design of the Project is
CISCO PACKET TRACER version 7.2.1. Packet Tracer is an integrated simulation,
visualization, collaboration, and assessment environment. Packet Tracer supports student and
instructor creation of simulations, visualizations, and animations of networking phenomena.
Like any simulation, Packet Tracer relies on a simplified model of networking devices and
protocols. Real computer networks, experienced both in-person/hands-on and remotely,
remain the benchmark for understanding network behavior and developing networking skills.
Packet Tracer was created to help address the Digital Divide in networking education, where
many students and teachers lack access to equipment, bandwidth, and interactive modes of
learning networking.
Fig.2.1.1
22
Fig.2.1.2 Interface Overview
23
Chapter 3
Design Flow
Description: This project is based upon the networking on (Project Name). In this, we
configure networks ids i.e. internet protocols on routers with wired and wireless. In
academics block, there is wired routers i.e. the communication is done through the wires with
the help of routers and switches. We use three protocols there, namely, RIP, EIGRP and
OSPF. The network is secure because of telnet and secure socket shell. Also the
communication can be done from one side to another through dial- peer. On the other side,
there is wireless network i.e. all the home appliances are accessed through wireless router and
all the components are connected through Home Gateway.
Project is based on Big-Bazaar networking model architecture. In this networking model we
use some networking devices and cables to set a working project,
A one main router which is connected to the whole network, they pass the all
communication signals in the form of IP packages to other devices. And after the carrying the
signals they send the feedback IP Packages.
Whole networking divided in to sub units or sub branches then they easily handle their
own branch network.
24
A server is a computer program that provides services to other computer program (and their
users), in the same or other computer. The physical computer that runs a server program is
also often referred to as server. Services can be supplied centrally by the use of a server; in
other cases all the machines on a network have the same status with no dedicated server, and
services are supplied peer -to- peer.
Server used as an adjective, as in server operating system, refers to the product’s ability to
handle multiple requests, and is said to be “ server- grade”. A server operating system is
intended or better enabled to run server applications. The differences between the server and
workstation versions of a product can vary from the removal of an arbitrary software limits
due to licensing, as in the case of window 2000, or the addition of bundled applications as in
Mac OS X Server.
A server can also refer to a computer that has been set aside to run a specific server
application. Server application can be divided among server computers over an extreme
range, depending upon the workload.
In this project we also provided the remote access for routers to control and accessing the
other branch routers.In this cloud the router is configure with redistribution means the
configuration from rip to eigrp and rip to ospf and vice versa.
Networking Cables:
RJ45 CONNECTOR
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack used by devices
to physically connect to Ethernet based local area networks .Ethernet is a technology that
defines protocols for establishing a LAN. The cable used for Ethernet LANs are twisted pair
ones and have RJ45 connector pins at both ends. These pins go into the corresponding socket
on devices and connect the device to the network.
Fig.3.2.1 RJ 45 Connector
25
TWISTED PAIR CABLE
Copper wires are the most common wires used for transmitting signals because of good
performance at low costs. They are most commonly used in telephone lines. However, if two
or more wires are lying together, they can interfere with each other’s signals. To reduce this
electromagnetic interference, pair of copper wires are twisted together in helical shape like a
DNA molecule. Such twisted copper wires are called twisted pair. To reduce interference
between nearby twisted pairs, the twist rates are different for each pair.
COAXIAL CABLE
Coaxial cables are copper cables with better shielding than twisted pair cables, so that
transmitted signals may travel longer distances at higher speeds.
Fig.3.2.3
Crossover Cable
26
A crossover cable connects two devices of the same type, for example DTE-DTE or
DCE-DCE, usually connected asymmetrically ,by a modified cable called a crosslink.
Such distinction of devices was introduced by IBM Sometimes you will use crossover
cable, it's usually used to connect same type of devices. A crossover cable can be used
to:
Connect 2 computers directly.
Network Devices:
ROUTER
A router is a network layer hardware device that transmits data from one LAN to another if
both networks support the same set of protocols. So a router is typically connected to at least
two LANs and the internet service provider .It receives its data in the form of packets, which
are data frames with their destination address added. Router also strengthens the signals
before transmitting them. That is why it is also called repeater. A router is a
communication device that is used to connect two logically and physically different
networks, two LANs, two WANs and a LAN with WAN. The main function of the router is
to sorting and the distribution of the data packets to their destinations based on their IP
addresses.
Fig.3.2.5 Router
SWITCH
27
Like the router, a switch is an intelligent device that maps the IP address with the MAC
address of the LAN card. Unlike the hubs, a switch does not broadcast the data to all the
computers; it sends the data packets only to the destined computer. Switches are used in the
LAN, MAN and WAN.
Fig.3.2.6
GATEWAY
Gateway is a network device used to connect two or more dissimilar networks. In
networking parlance, networks that use different protocols are dissimilar networks. A
gateway usually is a computer with multiple NICs connected to different networks. A
gateway can also be configured completely using software.
HUB
The central connecting device in a computer network is known as a hub. There are two types
of a hub i.e. active hub and passive hub. Every computer is directly connected with the hub.
Fig.3.2.7
BRIDGE
28
It is a device which is used to connect two different networks or locations together. It is a half
duplex device. Bridge can read the Ethernet data which gives the hardware address of the
destination address, not the IP address. Bridges forward all broadcast messages. Bridges and
switches basically do the same thing – break up collision domains on a network.
REPEATER
A repeater receives a signal and before it becomes too weak or corrupted regenerators the
original bit pattern. The repeater then sends the refreshed signal.
SERVER
A server is a running instance of an application capable of accepting requests from the client
and giving responses accordingly. Servers can run on any computer including dedicated
computers, which individually are also often referred to as "the server". Servers operate
within a client-server architecture. Servers are computer programs running to serve the
requests of other programs, the clients. Thus, the server performs some tasks on behalf of
clients. It facilitates the clients to share data, information or any hardware and software
resources Internet. Typical computing servers are database server, file server, mail server,
print server, web server, gaming server, and application server. Numerous systems use this
client server networking model including Web sites and email services. An alternative
model, peer-to-peer networking enables all computers to act as either a server or client as
needed.
LAPTOP
A laptop or a notebook is a portable personal computer with a clamshell form factor, suitable
for mobile use. There was a difference between laptops and notebooks in the past, but
29
nowadays it has gradually died away. Laptops are commonly used in a variety of settings,
including at work, in education, and for personal multimedia.
A laptop combines the components and inputs of a desktop computer, including display,
speakers, keyboard and pointing device (such as a touchpad) into a single device
Fig.3.2.9 Laptop
Chapter 4
Network Protocols
30
4.1 DYNAMIC ROUTING
In dynamic routing, we will enable a routing protocol on router. This protocol will send its
routing information to the neighbor router. The neighbors will analyze the information and
write new routes to the routing table. The routers will pass routing information receive from
one router to other router also. If there are more than one path available then routes are
compared and best path is selected.
Fig.4.1
The Routing Information Protocol (RIP) is one of the oldest distance-vector routing
protocols, which employs the hop count as a routing metric. RIP prevents routing loops by
implementing a limit on the number of hops allowed in a path from the source to a
31
destination. The maximum number of hops allowed for RIP is 15. This hop limit, however,
also limits the size of networks that RIP can support. A hop count of 16 is considered an
infinite distance, in other words the route is considered unreachable.
RIPv1- It is a class ful routing protocol that does not support sub netting. It uses
255.255.255.0 subnet mask for creating routing table.
Open Shortest Path First is a link-state routing protocol for Internet Protocol networks. It
uses a link state routing algorithm and falls into the group of interior routing protocols,
operating within a single autonomous system. It is defined as OSPF Version 2 for IPv4. The
updates for IPv6 are specified as OSPF Version 3.Area 0 is a backbone area number. It is
used in OSPF to connect two networks. An OSPF area is a grouping of contiguous networks
and routers. All routers in the same area share a common Area ID. Because a router can be a
member of more than one area at a time, the Area ID is associated with specific interfaces on
the router.
4.2 REDISTRIBUTION
Most networks you encounter will probably only run a single routing protocol like OSPF or
EIGRP. Maybe you find some old small networks that are still running RIP that need
32
migration to OSPF or EIGRP. What if you have a company that is running OSPF and you
just bought another company and their network is running EIGRP? It’s possible that we have
multiple routing protocols on our network and we’ll need some method to exchange routing
information between the different protocols. This is called redistribution. We’ll look into
some of the issues that we encounter. What are we going to do with our metrics? OSPF uses
cost and EIGRP uses K-values and they are not compatible with each other….RIP uses hop
count.
VTP server
VTP server is a switch in which we can create, delete or modify Vlans. The server will send
periodic updates for VTP clients.
VTP client
On VTP client, we are not able to create, modify or delete Vlans. The client will receive and
forward vtp updates. The client will create same Vlans as defined in vtp update. But we put
are switch in client mode having the same domain and password as the server has. Domain
name must match or case sensitive.
VTP Transparent
Transparent is a switch, which will receive and forward VTP update. It is able to create,
delete and modify Vlans locally. A transparent will not send its own VTP updates and will
not learn any information from received vtp update. It can only forward the Vlan information
but not synchronize the vlan information. Domain and password are same as that of server
and client.
VoIP Short Of "Voice Over Internet Protocol". VoIP is Also Called An "Internet
Telephone", "IP Telephony" And "Internet Calling". VoIP Is A Methodology Or Technology
For The Delivery Of Voice Communication Over Internet Protocol (IP) Network, Local Area
33
Network Or Wide Area Network. The Data Is Sent Digitally, Using The Internet Protocol
(IP) Instead Of Analog Telephone Lines. VoIP Allow People To Talk To One Another
Long-Distance And Around The World Without Having To Pay International Phone Charge.
VoIP Is An Alternative Way Of Making Phone Calls That Can Be Very Cheap Or
Completely Free.
Skype Is A Example Of VoIP Services, We Can Skype For Share Message, Voice And
Video Calls For Free Worldwide.
Require Only Good Internet Connectionand VoIP Phone For Use VoIP Service
Step1
Configure DHCP (Dynamic Host Configuration Server) on Router, DHCP Used For
Dynamically Provide IP Address in The Network. It Works on Port Number 67 and
68.
Configure DHCP on Router:-
Router(Config)# IP DHCP Pool VoIP
(VoIP Is DHCP Pool Name)
Router(Dhcp-Config)# Network 192.168.1.0 255.255.255.0
(DHCP Network Address 192.168.1.0 and Mask is /24)
Router(Dhcp-Config)# Default-Router 192.168.1.1
(192.168.1.1 Router Default Gateway Address)
Routera(Dhcp-Config)# Option 150 IP 192.168.1.1
(150 Mandatory for VoIP Configuration)
Step2
Configure The Call Manager Express Telephony Service On Router To Enable VoIP
Service.
Router(Config)#Telephony-Service
(Enable Telephony Service on Router)
Router(Config-Telephony)# Max-Dn N (Where N= 1,2,3,.....)
(Maximum Number Of Directory Numbers)
Router(Config-Telephony)# Max-Ephones N (Where N= 1,2,3,....)
(Maximum Number Of Ephones)
Step3
Configure A Voice Vlan On Switch
Switch>Enable
Switch#ConfigureTerminal
Switch(Config) #Interface Range Fa0/1 - 4
Switch(Config-If-Range)# Switchport Mode Access
Switch(Config-If-Range)# Switchport Voice Vlan 1
Step4
Router(Config)#Ephone-Dn3
(Define The First Directory Entry)
Router(Config-Ephone-Dn)#Number0003
(Assign Phone Number To IP Phone 1)
Step5
Verify The Configuration
Ensure That The IP Phone Receives An IP Address And A The Phone Number 0001,
0002,0003.
Step 1 -)
36
Fig.4.4.2
Step 2 -)
Fig.4.4.3
R1(config-dial)#destination-pattern 1…
37
(here we give number of opposite networks IP phone and gateway of that
R1(config-dial)#destination-pattern 2…
R1(config-dial)#exit
Chapter 5
Working and Simulation
38
Router#confter
Router(config)#router rip
Router(config-router)#network <net address>
Router(config-router)#network <net address>
Router(config-router)#exit
Fig.5.1.1
Router(config)#Router RIP
Router(config-router)#version 2
Router(config-router)#network 10.0.0.0
Router(config-router)# network
192.168.13.0 Router(config-router)#exit
39
Router(config-router)#network <net address><wild mask>
Router(config-router)#exit
Example
255.255.255.255
- 255.255.192.0 subnet mask
Fig.5.3.1
40
5.4 REDISTRIBUTION
User mode
In this mode, we can display basic parameter and status of the router we can test
connectivity and perform telnet to other devices. In this mode we are not enable to
manage & configure router.
Privileged mode
In this mode, we can display all information, configuration, perform administration
task, debugging, testing and connectivity with other devices. We are not able to
perform here configuration editing of the router. The command to enter in this mode
is ‘enable’. We have to enter enable password or enable secret password to enter in
this mode. Enable secret has more priority than enable password. If both passwords
are configured then only enable secret will work.
Global configuration
This mode is used for the configuration of global parameters in the router. Global
parameters applied to the entire router. The command enter in this mode is ‘configure
terminal’.
(ii) Auxiliary
router(config)#line aux 0
Configuring Password
There are five types of password available in a router
(1) Console Password router#configure
terminal router(config)#line console 0
router(config-line)#password <word>
router(config-line)#login router(config-
line)#exit
The port no. of SSH is 22 and telnet is at 23. It is same as telnet but information is
encrypted. It is used for username password.
1(config)#line vty 0 4
1(config-line)#transport input ssh
1(config-line)#exit
43
AT PC’s Command prompt
Layer 2 switch create table i.e. (CAM)(Forwarding Table) CAM stands for Content Address
Management. Switch broadcast the hello packet to all ports where pcs are connected and then
in reply PC’s send their identity to switch i.e. their IP and MAC and switch creates table and
maintained it. Table is saved until the switch is plugged. Layer 2 switch works on frame.
Switch first multicast the data then uncast the data. By default all ports are in vlan 1. There is
only one difference between layer 2 and layer 3 switches. L3 has one feature which includes
routing. We can enable routing on
L3 i.e. RIP, STATIC, OSPF, EIGRP, EIGRP. But it is only for LAN to LAN. It doesn’t have
serial ports and not used for WAN to WAN.
44
On each layer there are some rules which we have to follow
(1) Highest performance devices are connected on Core layer
(2) Resources should be placed on Core layer
(3) Polices should not be applied on core layer
(4) On distribution layer, we can implement policies
(5) Distribution and Core devices should be connected with high-speed links.
(6) Access layer devices are basic devices and may be non-manageable.
46
5.8 TRUNKING
When there are multiple switches then we have to use trunk links to connect one switch with
other. If we are not using trunk links then we have to connect one cable from each vlan to the
corresponding vlan of the other switch. Traffic of multiple vlans are carried by trunk port.
Same vlan traffic is passed between switches using single link.
Fig.5.8.1
5.9 INTERVLAN
After creating Vlans, each Vlan has own broadcast domain. If we want communication from
one Vlan to another Vlan then we need to perform routing. There are three methods for inter
vlan communication.
(1) Inter Vlan using multi-interface router
(2) Inter Vlan using router on a stick method
(3) Inter Vlan using layer 3 switch
1751, 2621 routers supports Vlan
47
Fig.5.9.1
ABOVE NETWORK At switch
interface FastEthernet0/1
switchport access vlan 2
switchport mode access
!
interface FastEthernet0/2
switchport access vlan 2
switchport mode access
!
interface FastEthernet0/3
switchport access vlan 2
switchport mode access
!
interface FastEthernet0/4
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/5
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/6
switchport access vlan 3
switchport mode access
!
interface FastEthernet0/7
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/8
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/9
switchport access vlan 4
switchport mode access
!
interface FastEthernet0/10
switchport access vlan 2
switchport mode access
!
interface FastEthernet0/11
switchport access vlan 3
switchport mode access
interface FastEthernet0/12
switchport access vlan 4
switchport mode access
48
At router
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
interface FastEthernet0/1
ip address 192.168.2.1 255.255.255.0
interface FastEthernet1/0
ip address 192.168.3.1 255.255.255.0
interface FastEthernet1/1
no ip address
In this method a special router is used for Inter Vlan. In this router, we can create one
interface for each Vlan. The physical interface of router will be connected on trunk
port switch. This router will route traffic on the same interface by swapping vlan id
information with the help of frame tagging protocol. Here we need only single cable
for carry multiple vlan traffic.
We virtually divide the interface of router for vlans into subinterfaces.
49
At Switch
Switch#sh vl
At router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
!
interface FastEthernet0/0.1
encapsulation dot1Q 10
ip address 10.0.0.1 255.0.0.0
!
interface FastEthernet0/0.2
encapsulation dot1Q 20
ip address 20.0.0.1 255.0.0.0
By default, all interfaces on a Cisco switch are turned on. That means that an attacker could
connect to your network through a wall socket and potentially threaten your network. If you
know which devices will be connected to which ports, you can use the Cisco security feature
called port security. By using port security, a network administrator can associate specific
MAC addresses with the interface, which can prevent an attacker to connect his device. This
way you can restrict access to an interface so that only the authorized devices can use it. If an
unathorized device is connected, you can decide what action the switch will take, for example
discarding the traffic and shutting down the port.
50
Configuration on switch
Switch#conf ter
Switch(config)#interface <type> <no>
Switch(config-if)#switchport port-security Switch(config-if)#switchport port-
security maximum <no. of mac> Switch(config-if)#switchport port-security
violation <shutdown|restrict|reject> Switch(config-if)#switchport port-security mac-
address sticky Switch(config-if)#switchport port-security mac-address sticky <mac
address> Switch(config-if)#exit
Switch#conf t
Switch(config)#h sw1
Sw1(config)#line console 0
Swi(config-line)#password abc
Sw1(config-line)#login
Sw1(Config)#enable secret______
Sw1(config)#line vty 0 4
Sw1(config)#password ccna
Sw1(config)#login
Commands
Switch#conf ter
Switch(config)#vtp domain <name> Switch(config)#vtp
password <word> Switch(config)#vtp mode <server|
client|transparent> Switch(config)#exit
By default in cisco switches the VTP mode is set as VTP server with no domain and no
password.
51
To display VTP status
Switch#sh vtp status
For VTP all links must be configured with trunks. Information will only be passed if
switches are connected to fast Ethernet or higher interfaces.
Revision number for switches in the transparent mode are always set to zero.
To configure Cisco IOS DHCP, follow these steps, which include sample commands:
1. Configure an IP address on the router's Ethernet port, and bring up the interface. (On
an existing router, you would have already done this.)
Router(config-if)# no shutdown
2. Create a DHCP IP address pool for the IP addresses you want to use.
3. Specify the network and subnet for the addresses you want to use from the pool.
Router(dhcp-config)#domain-name mydomain.com
Router(dhcp-config)#default-router 1.1.1.1
52
7. Specify the lease duration for the addresses you're using from the pool.
Router(dhcp-config)#lease 7
Router(dhcp-config)#exit
Step1
Configure Interface FastEthernet0/0 and DHCP Server on Router.
Router(Config-If)# No Shutdown
Configure DHCP on Router, DHCP Used For Dynamically Provide IP Address in The
Network. It Works on Port Number 67 and 68.
53
Fig.5.15.1
Step2
Configure The Call Manager Express Telephony Service On Router To Enable VoIP
Service.
Router(Config)#Telephony-Service
(Enable Telephony Service on Router)
Fig.5.15.2
Step3
Switch>Enable
54
Switch#ConfigureTerminal
Switch(Config) #Interface Range Fa0/1 - 4
Fig.5.15.3
Step 4
Configure The Phone Directory For IP Phone 1
Router(Config)#Ephone-Dn1
(Define The First Directory Entry)
Router(Config-Ephone-Dn)#Number0001
(Assign Phone Number To IP Phone 1)
Step5
Ensure That The IP Phone Receives An IP Address And A The Phone Number 0001,
0002,0003.
It is basically forms a virtual private network over internet. It provides connectivity between
two more sites over internet. Customer builds his own WAN over internet. It is a cost
effective solution.
55
GRE allows to have virtually point-to-point tunnel. It is used when packets need to be sent
from one network to another over the internet or an insecure network. It provides tunneling
protocol developed by Cisco. Gre tunnel is not encrypted, but they are much easier to
configure. Encapsulation is supported by variety of protocols inside point to point links.
It creates vpn on router. VPN tunneling involves establishing and maintaining a logical
network connection. It will count on starting and ending addresses and it will not show other
addresses through which data passed. It shows only temporary IP not permanent. Though
VPN we can access any site if it is block/banned in India. So it will help to change the ip to
other countries ip.
COMMANDS AT ROUTER
interface Tunnel1
ip address 50.0.0.1 255.0.0.0
mtu 1476
tunnel source Serial0/2/0
tunnel destination 13.0.0.2
interface Serial0/2/0
ip address 10.0.0.1 255.0.0.0
!
interface Serial0/2/1
no ip address
clock rate 2000000
shutdown
!
interface Vlan1
no ip address
shutdown
!
router rip
network 10.0.0.0
Router# traceroute 50.0.0.2
Type escape sequence to abort.
Tracing the route to 50.0.0.2
Always check through traceroute because all networks are not going to shown.
56
COMMANDS AT ANOTHRT ROUETR
interface Tunnel2
ip address 50.0.0.2 255.0.0.0
mtu 1476
tunnel source Serial0/0/0
tunnel destination 10.0.0.1
!
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 13.0.0.2 255.0.0.0
clock rate 64000
router rip
network 13.0.0.0
ACL are the basic security feature that is required in any network to control the flow
of traffic. Most of time our network may have servers and clients for which traffic
control is required. We can also use ACL to classify the traffic. ACLs are used in
features like QOS (Quality of Service), Prioritize traffic and interesting traffic for
ISDN. ACL is a set of rules which will allow or deny the specific traffic moving
through the router. It controls the flow of traffic from one network to other via router.
Standard ACL can be named or numbered. The access-list number range is 1-99 (or
1300-1699). It can block a Network, Host and subnet. All services are blocked. It
filters traffic behalf of IP, subnets and networks. It is near of destination router.
Filtering is done based on only source IP address.
Example: - 172.16.0.16 – 18 should not access Internet; rest of all other pc should
Access Internet.
Fig..5.17.1
Router#conf ter
Router(config)#access-list 30 deny 172.16.0.16
Router(config)#access-list 30 deny 172.16.0.17
Router(config)#access-list 30 deny 172.16.0.18
Router(config)#access-list 30 permit any
Router(config)#exit
58
Applying ACL on interface
Router#conf ter
Router(config)#interface <type> <no>
Router(config-if)#ip access-group <ACL no.> <in|out>
Router(config-if)#exit
Fig.5.17.2
59
IP Standard ACL (Named)
In Numbered ACL editing feature is not available that is we are not able to delete
single
rule from the ACL. In Named ACL editing feature is available.
Router#config ter
Router(config)#ip access-list standard <name>
Router(config-std-nacl)#<deny|permit> <source>
Router(config-std-nacl)#exit
Router#conf ter
Router(config)#ip access-list standard abc
Router(config-std-nacl)#deny 172.16.0.16
Router(config-std-nacl)#deny 172.16.0.17
Router(config-std-nacl)#deny 172.16.0.18
Router(config-std-nacl)#permit any
Router(config-std-nacl)#exit
Router#conf ter
Router(config)#ip access-list standard abc
Router(config-std-nacl)#no deny 172.16.0.17
Router(config-std-nacl)#exit
Router#conf ter
Router(config)#access-list 50 permit 192.168.10.5
Router(config)#access-list 50 permit 192.168.10.30
Router(config)#line vty 0 4
Router(config-line)#access-class 50 in
Router(config)#exit
Extended ACL are advanced ACL. ACL, which can control traffic flow on the basis
of
five different parameters that are: -
(i) Source address
(ii) Destination address
60
(iii) Source port
(iv) Destination port
(v) Protocol (layer 3/layer 4)
It can be named or numbered. The access-list number range is 100-199 ( or 2000-
2699). We can allow or deny a network, host, subnet and service. Selected services
can be blocked. Filtering can be done based on source IP, destination IP, protocol,
port no.. Packet can be filter on behalf of ip, subnet, network, protocol, port (Protocol
Service). It is placed near of source router. By default deny statement is enabled.
Router#conf ter
Router(config)#access-list <no> <deny|permit> <protocol> <source> [<s.port>]
<destination> [<d.port>]
router(config)#exit
<no> -> 100 to 199
<protocol> -> layer ¾
IP
TCP
UDP
ICMP
IGRP
<Source port> no (1 to 65535) or
<Destination port> telnet/www/ftp etc.
<Source> Single pc
<Destination> 192.168.10.4 0.0.0.0
host 192.168.10.4
N/w
200.100.100.0 0.0.0.255
Subnet
172.30.0.32 0.0.0.7
All
Any
Router#show access-lists or
Router#show access-list <no>
Router#show ip interface
Router#show ip interface <type> <no>
Router#show ip interface Ethernet 0
Suppose we want to control inbound traffic for our network. ACL should be
designed according the following policy.
(1) Access to web server (200.100.100.3) is allowed from any source.
(2) FTP server (200.100.100.4) should be accessible only from branch office n/w
(200.100.175.0/24).
(3) ICMP & Telnet should be allowed only from remote pc 200.100.175.80
62
Fig.5.17.3
Fig.5.17.3
63
Chapter 6
Conclusion and Future Scope
The future of networking will stay forever. Without networking we cannot communicate to
each other. The network in this campus is very secure because of the protocols we used. If
there is a chance to access network by any hacker or unauthorized user, it will show the fake
ip address to them because of the advanced virtual private network. Also there is wireless
networking which is of quite low cost and the user can access internet from anywhere in the
campus.
6.2 Advantages:
RELIABILITY
SECURITY
Network security issues include protecting data from unauthorized access and viruses.
64
6.3 APPLICATIONS OF NETWORKS
65
References
https://www.google.com/search?
q=campus+network+design+project&se_es_tkn=etcr1ytz
https://www.google.com/search?q=network+devices+images&se_es_tkn=vtyxjjhm
66