Professional Documents
Culture Documents
ON
Introduction to Networks
(ITN)
BY
Student's Name: KHYATI DHAWAN
Roll No.21CSU047
To
12 June 2023
pg. 1
©2022 NCU Sector 23-A HUDA Gurgaon
All rights reserved. No part of this report may be produced in any form or by any any means without
permission in writing publisher.
pg. 2
FORWARDING LETTER
Dear Ma'am/Sir
Yours sincerely,
Khyati Dhawan
pg. 3
PREFACE
I want you to take interest in my e-Library Management System
Project and my learnings. As it will help you to get an insight into the
technical world. The full process starting from idea conceptualization
and till implementation will be very helpful especially if you are a
fresher.
pg. 4
CONTENTS
pg. 5
Problem Statement
Implementation
Network
Analysis
Conclusion
pg. 6
ACKNOWLEDGMENT
pg. 7
Abstract
World changers aren't born. They are made.
pg. 8
Introduction
Course Overview:
This course introduces the architecture, structure, functions,
components, and models of the Internet and other computer
networks. The principles and structure of IP addressing and
the fundamentals of Ethernet concepts, media, and operations
are introduced to provide a foundation for the curriculum. By
the end of the course, students will be able to build simple
local area networks (LAN), perform basic configurations for
routers and switches, and implement IP addressing schemes.
In the course
module 1-3: connectivity and communication
module 4-7: ethernet
module 8-10: communication between networks
module 11-13: ip addressing basic concepts
module 14-15: network application communications
module 16-17: Building and securing a small network
pg. 9
Student Resources
pg. 10
Networking As A Whole
Networking Connect us
Communication is almost as important to us as our reliance on
air, water ,food and shelter .In today’s world, through the use
of networks, we are connected like never before.
Network Components
Host Roles
Every computer on a network is called a host or end
device.
pg. 11
Web page form a web server
Email form an email server
pg. 12
Intermediary Network Devices:
An intermediary device interconnects end devices.
Examples include switches, wireless access points,
routers, and firewalls.
pg. 13
Network Media:
Communication across a network is carried through a
medium which allows a message to travel from source to
destination.
pg. 14
Topology Diagrams:
Physical topology diagrams illustrate the physical
location of intermediary devices and cable installation.
pg. 15
Logical topology diagrams illustrate devices, ports, and
the addressing scheme of the network.
pg. 16
Networks of many Sizes:
pg. 17
World Wide Networks - connects hundreds of millions
of computers world- wide such as the internet.
pg. 18
Wide Area Network (WAN).
A WAN is a network infrastructure that spans a
wide geographical area.
The Internet:
The internet is a worldwide collection of interconnected
LANS and WANs.
pg. 19
LANs are connected to each other using WANs.
WANS may use copper wires, Fiber optic cables,
and wireless transmissions.
The internet is not owned by any individual or group.
The following groups were developed to help maintain
structure on the internet:
IETF
ICANN
IAB
pg. 20
An organization might use an extranet to provide secure
access to their network for individuals who work for a
different organization that need access to their data on
their network.
pg. 21
Step 2: Scroll down and on the basis of the device select to
download.
pg. 22
Step 4: Check the location and Proceed.
pg. 23
Step 6: Check on the icon creation Option and proceed.
pg. 24
pg. 25
Packet Tracer -Network Representation:
Cisco Packet Tracer is a network simulation tool
developed by Cisco Systems. It is widely used for
educational and training purposes to learn and practice
networking concepts, design, and configuration. The
software provides a virtual environment where users can
pg. 26
simulate and experiment with network configurations,
topology, and devices without the need for physical
hardware.
Key features of Cisco Packet Tracer include:
Users can create virtual networks, connect devices
and configure them.
Packet Tracer offers a user-friendly interface that
allows users to drag and drop devices and
connections.
Simulation of Real Cisco Devices.
Users can capture and analyse network traffic.
Collaboration and Multi-User Support.
Reliable Networks
Network Architecture:
Network Architecture refers to the technologies that
support the infrastructure that moves data across the
network.
There are four basic characteristics that the underlying
architectures need to address to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
pg. 27
Fault Tolerance:
pg. 28
A fault tolerant network limits the impact of a failure by
limiting the number of affected devices. Multiple paths
are required for fault tolerance.
Scalability:
pg. 29
A scalable network can expand quickly and easily to
support new users and applications without impacting the
performance of services to existing users.
Quality of Service:
Voice and live video transmissions require higher
expectations for those services being delivered.
pg. 30
Quality of Service (QoS) is the primary mechanism
used to ensure reliable delivery of content for all
users.
With a QoS policy in place, the router can more
easily manage the flow of data and voice traffic.
Network Security:
There are two main types of network security that must
be addressed:
Network infrastructure security
1. Physical security of network devices
2. Preventing unauthorized access to the
devices
Information Security
1. Protection of the information or data
transmitted over the network.
pg. 31
Three goals of network security:
Confidentiality - only intended recipients can read
the data
Integrity assurance that the data has not be altered
with during transmission
Availability – assurance of timely and reliable
access to data for authorized users
Network Trends
Recent Trends:
pg. 32
The role of the network must adjust and continually
transform in order to be able to keep up with new
technologies and end user devices as they constantly
come to the market.
Network Security
Security Threats:
pg. 33
Network security is an integral part of networking
regardless of the size of the network.
The network security that is implemented must take
into account the environment while securing the
data, but still allowing for quality of service that is
expected of the network.
Securing a network involves many protocols,
technologies, devices, tools, and techniques in order
to secure data and mitigate threats.
pg. 34
Security Solutions:
pg. 35
Firewall filtering used to block unauthorized access
to the network.
Larger networks have additional security
requirements:
Dedicated firewall system
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual private networks (VPN)
The study of network security starts with a clear
understanding of the underlying switching and routing
infrastructure.
pg. 36
Basic Switch and End Device
Configuration in a nut shell
pg. 37
GUI:
A GUI allows the user to interact with the system
using an environment of graphical icons, menus,
and windows.
A GUI is more user-friendly and requires less
knowledge of the underlying command structure
that controls the system.
Examples of these are: Windows, macOS, Linux
KDE, Apple iOS and Android.
GUIs can fail, crash, or simply not operate as
specified. For these reasons, network devices are
typically accessed through a CLI.
Purpose of an OS:
pg. 38
Cisco IOS Navigation
pg. 39
Identified by the CLI prompt that ends with the #
symbol
pg. 40
Privileged EXEC Mode:
To move from user EXEC mode to privilege EXEC
mode, use the enabled command.
Sub-configuration Modes:
To move out of any sub-configuration mode to get
back to global configuration mode, use the exit
command. To return to privilege EXEC mode, use
the end command or key combination Ctrl +Z.
pg. 41
To move directly from one sub-configuration mode
to another, type in the desired sub-configuration
mode command. In the example, the command
prompt changes from (config-line)# to (config-if)#.
pg. 42
Italic text indicates an argument for which the user
provides the value.
pg. 43
IOS Help Features
The IOS has two forms of help available: context-
sensitive help and command syntax check.
pg. 44
Hot Keys and Shortcuts
The IOS CLI provides hot keys and shortcuts that
make configuring, monitoring, and troubleshooting
easier.
pg. 45
The table below lists commands that can be used to
exit out of an operation.
pg. 46
o Contain no spaces
o End with a letter or digit
o Use only letters, digits, and dashes
o Be less than 64 characters in length
Password Guidelines:
The use of weak or easily guessed passwords are a
security concern.
All networking devices should limit administrative
access by securing privileged EXEC, user EXEC, and
remote Telnet access with passwords. In addition, all
passwords should be encrypted and legal notifications
provided.
Password Guidelines:
1) Use passwords that are more than eight characters
in length.
2) Use a combination of upper and lowercase letters,
numbers, special characters, and/or numeric
sequences.
3) Avoid using the same password for all devices.
4) Do not use common words because they are
easily guessed.
pg. 47
Configure Passwords:
Securing user EXEC mode access:
First enter line console configuration mode using
the line console 0 command in global configuration
mode.
Next, specify the user EXEC mode password using
the password password command.
Finally, enable user EXEC access using the Login
command.
pg. 48
Next. Use the enable secret password command.
Encrypt Passwords:
The startup-config and running-config files display most
passwords in plaintext.
To encrypt all plaintext passwords, use the service
password-encryption global config command.
Banner Messages:
pg. 49
A banner message is important to warn unauthorized
personnel from attempting to access the device.
Save Configurations:
Configuration Files:
There are two system files that store the device
configuration:
startup-config - This is the saved configuration file
that is stored in NVRAM. It contains all the
commands that will be used by the device upon
pg. 50
startup or reboot. Flash does not lose its contents
when the device is powered off.
pg. 51
Switch Interface Configuration for end devices:
To access the switch remotely, an IP address and a subnet
mask must be configured on the SVI.
To configure an SVI on a switch:
Enter the interface vlan 1 command in global
configuration mode.
Next assign an IPv4 address using the ip address ip-
address subnet-mask command.
Finally, enable the virtual interface using the no
shutdown command.
pg. 52
S2 VLAN 1 192.168.1.254 255.255.255.0
PC1 NIC 192.168.1.1 255.255.255.0
PC2 NIC 192.168.1.2 255.255.255.0
Objectives
Part 1: Perform a Basic Configuration on S1 and S2
Part 2: Configure the PCs
Part 3: Configure the Switch Management Interface
Background
In this activity, you will first create a basic switch configuration. Then, you will implement basic
connectivity by configuring IP addressing on switches and PCs. When the IP addressing
configuration is complete, you will use various show commands to verify the configuration and
use the ping command to verify basic connectivity between devices.
pg. 53
Step 2: Configure the console and encrypted privileged EXEC mode passwords.
a. Use cisco for the console password.
(Go to line console 0 to change password of the console)
pg. 54
Step 3: Verify the password configurations for S1.
Question:
How can you verify that both passwords were configured correctly?
pg. 55
Checking by using a short command:
pg. 56
Type your answers here.
Packet Tracer - Implement Basic Connectivity
Authorized access only. Violators will be prosecuted to the full extent of the law.
pg. 57
Step 5: Save the configuration file to NVRAM.
Question:
pg. 58
pg. 59
pg. 60
pg. 61
pg. 62
Part 2: Configure the PCs
Configure PC1 and PC2 with IP addresses.
pg. 63
Step 2: Test connectivity to switches.
a. Click PC1. Close the IP Configuration window if it is still open. In the Desktop tab, click
Command Prompt.
b. Type the ping command and the IP address for S1 and press Enter.
Packet Tracer PC Command
Line 1.0 PC> ping
192.168.1.253
Question:
pg. 64
S1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Packet Tracer - Implement Basic Connectivity
pg. 65
Step 3: Verify the IP address configuration on S1 and S2.
Use the show ip interface brief command to display the IP address and status of all the switch
ports and interfaces. You can also use the show running-config command.
pg. 66
Similarly, Second Switch:
pg. 67
Step 4: Save configurations for S1 and S2 to NVRAM.
Question:
pg. 68
Type your answers here.
pg. 69
d. Ping the IP address for S1.
Note: You can also use the ping command on the switch CLI and on PC2.
All pings should be successful. If your first ping result is 80%, try again. It should now be 100%.
You will learn why a ping may sometimes fail the first time later in your studies. If you are unable
to ping any of the devices, recheck your configuration for errors.
pg. 70
Protocols and Models
The Rules:
Communication Fundamentals:
Networks can vary in size and complexity. It is not enough to
have a connection, devices must agree on "how" to
communicate.
There are three elements to any communication:
There will be a source (sender).
There will be a destination (receiver).
There will be a channel (media) that provides for the path
of communications to Occur.
Communication Protocols:
All communications are governed by protocols.
These rules will vary depending on the protocol.
Protocols are the rules that communications will follow
Rule Establishment:
Individuals must use established rules or agreements to
govern the conversation.
The first message is difficult to read because it is not
formatted properly. The second shows the message
properly formatted.
pg. 71
Protocols must account for the following requirements:
An identified sender and receiver
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledgment requirements
Protocols:
Definition:
Set of rules to ensure successful host-to-host
communication.
Network Protocols Overview:
Network protocols define a common set of rules.
Can be implemented on devices in:
Software
Hardware
Both
Protocols have their own:
Function
Format
Rules
pg. 72
Devices use agreed-upon protocols to communicate.
Protocols may have one or functions.
Model:
The benefits of using Layered Model:
Complex concepts such as how a network operates can be
difficult to explain and understand. For this reason, a layered
model is used.
Two layered models describe network operations:
Open System Interconnection (OSI Reference Model)
TCP/IP Reference Model
These are the benefits of using a layered model:
Assist in protocol design because protocols that operate
at a specific layer have defined information that they act
upon and a defined interface to the layers above and
below
Foster competition because products from different
vendors can work together
Prevent technology or capability changes in one layer
from affecting other layers above and below
pg. 73
Provide a common language to describe networking
functions and capabilities
The OSI Referenced Model:
It is a seven-layer conceptual model
Developed by ISO in 1984
Describes standards for inter- computer communication
Helps you to break down Network Functions –
Troubleshooting
Creates standards for equipment manufacturing
Allows vendors to focus in specialized areas of the
network
pg. 74
The OSI model divides the network access layer and the
application layer of the TCP/IP model into multiple layers.
The TCP/IP protocol suite does not specify which
protocols to use when transmitting over a physical
medium.
OSI Layers 1 and 2 discuss the necessary procedures to
access the media and the physical means to send data
over a network.
Data Encapsulation:
Segmenting Messages:
Segmenting is the process of breaking up messages into
smaller units. Multiplexing is the processes of taking multiple
streams of segmented data and interleaving them together.
Segmenting messages has two primary benefits:
pg. 75
Increases speed - Large amounts of data can be sent over
the network without tying up a communications link.
Increases efficiency - Only segments which fail to reach
the destination need to be retransmitted, not the entire
data stream.
Sequencing:
Sequencing messages is the process of numbering the
segments so that the message may be reassembled at the
destination.
TCP is responsible for sequencing the individual segments.
pg. 76
Protocol Data Units:
Encapsulation is the process where protocols add their
information to the data.
At each stage of the process, a PDU has a different name
to reflect its new functions.
There is no universal naming convention for PDUs, in
this course, the PDUs are named according to the
protocols of the TCP/IP suite.
PDUs passing down the stack are as follows:
pg. 77
Basic Router Configuration Steps
pg. 78
pg. 79
Final Project
Problem Statement:
As a part of skill development through CCNA, I did a project
on building a Campus network. The goal of this project was to
understand how different networks work, how messages or
packets flow from one network to another.
Implementation:
To implement the Campus network design, different
networking device were used, those devices are Cisco
PT-Router, 2960 switch, Server-PT (Email, Web, and
DNS), PC-PT, Laptop-PT, Printer-PT. Copper Straight-
Through cable and Serial DTE cable were also included
in this design.
Furthermore, table 1 elaborates more about the devices.
pg. 80
8 Serial DTE cable Connecting routes
Network:
pg. 81
Figure 3: Campus Network (Partial View)
Analysis:
pg. 82
on the project, which increased our effectiveness and
productivity. I want to ask a lot of questions and
concentrate on improving my communication abilities. I
came to understand that being curious and asking
questions enable one to learn a variety of facts about
many subjects. All of these abilities and knowledge will
serve me well in my future job.
Conclusion:
Curious and asking My training internship program was,
all in all, a worthwhile educational opportunity. I was
able to expand my knowledge of networking and acquire
new abilities in the process. It expanded my knowledge
of networking, a few of the technologies employed, as
well as how to carry out specific tasks, work on projects,
etc. It was enjoyable to go through this program, and I
intend to use my experience to the fullest in my future
endeavours.
pg. 83
Syntax Checker
Switching Between Ios Modes
pg. 84
Basic Device Configuration
pg. 85
pg. 86
Verify Windows PC IP Configuration
pg. 87
pg. 88
Configure Interfaces
pg. 89
Configure the Default Gateway
pg. 90
pg. 91
Appendix
26th June 2023 Monday We learnt about Cisco IOS and different end devices
along with their configuration. In this class, we started
working with cisco packet tracer and were made familiar
with how it works.
27th June 2023 Tuesday We went over the configuration commands and modes
again in detail. We started with physical layer of the OSI
pg. 92
model, its characteristics, cabling and wireless media.
28th June 2023 Wednesday We learnt about data link layer of the OSI model and its
importance. We also learnt about topologies used in
LAN and WAN networks. Finally, we learnt about data
link frame.
30th June 2023 Friday We learnt about Ethernet and Ethernet switching. We
learnt in detail about MAC address and MAC address
table.
3th July 2023 Monday We were introduced to address resolution and how IP
addresses of the IP packets in a data flow associated with
the MAC addresses on each link along the path to the
destination. We also learnt about ARP and Neighbour
Discovery.
pg. 93
5th July 2023 Wednesday We learnt about the basic router configuration which
included configuring initial router settings, interfaces and
the default gateway.
7th July 2023 Friday We started with IPv4 addressing. We learnt about the
addressing structure along with IPv4 unicast, broadcast
and multicast. We also learnt about network
segmentation, subnetting, VLSM and structured design.
10th July 2023 Monday We started with IPv6 addressing. We first learn about the
issues with IPv4 and why IPv6 was introduced. We then
learnt the IPv6 Address Representation, IPv6 Address
Types, GUA and LLA Static Configuration, Dynamic
Addressing for IPv6 GUAs, Dynamic Addressing for
IPv6 LLAs, IPv6 Multicast Addresses along with
subnetting in an IPv6 network.
12th July 2023 Wednesday We started with the transport layer of the OSI model. We
learnt about its role and how data is transported. We
were also given an overview of TCP and UDP, how they
use port numbers to manage multiple simultaneous
conversations along with TCP communication process
and UDP communication.
pg. 94
13th July 2023 Thursday We started with the application layer of the OSI model
along with the presentation and session layers. We learnt
about their roles, protocols of application layer, peer to
peer networks, web and email protocols, IP addressing
services and file sharing services.
14th July 2023 Friday We studied about the network security fundamentals.
This included security threats and vulnerabilities,
network attacks, attack mitigations and device security.
We were given the task of experimenting and learning
how to build a small network on our own with the help
of the information given by the last module of the course
and everything that was taught to us so far.
pg. 95
Certificate of Internship
pg. 96
pg. 97
pg. 98
pg. 99