Upload
jasmine-smith
View
229
Download
1
Embed Size (px)
Citation preview
7/24/2019 six weeks it training on ccna
1/69
TRAINING REPORT
OF
SIX WEEK INDUSTRIAL TRAINING, UNDERTAKEN
AT
NETMAX TECHNOLOGIES PVT.LTD.
IN
NETWORKING DEPARTMENT
ON
INTRANET ENTERPRISE CONNECTION
SUBMITTED IN PARTIAL FULFILLMENT OF THE DEGREE
OF
BE (electr!"c# $!% c&&'!"c$t"!
U!%er t)e G'"%$!ce *+ S'&"tte% B-+
N$&e+ Mr. R$/"!%er S"!0) N$&e+ S'#)"l T)$1'r
De#"0!$t"!+ C"#c Tr$"!er I% 2 B344
CCIE(567787
De9$rt&e!t+ Net/r1"!0
Page | 1
7/24/2019 six weeks it training on ccna
2/69
.
ACKNOWLEDGEMENT
I express my sincere gratitude to Mr. R$/"!%er S"!0) *rgiving me opportunity of
undergoing SIX WEEKS INDUSTRIAL TRAINING AT NETMAX
TECHNOLOG: PVT. LTD., Chandigarh. I would lie to than Mr. R$/"!%er S"!0),
and all executives for their valua!le guidance, support and encouragement. "ithout their
encouragement and moral !oosting, it would not have !een possi!le to accomplish this
tas successfully. I would lie than Mr.H$r#)$r$! Se)0$l#training and placement
officer$ for giving me an opportunity of undergoing this training.
I am extremely grateful to all technical staff of NETMAX TECHNOLOG: PVT.
LTD, Chandigarh for their Co%&peration and guidance that has helped me a lot during
the course of training. I will always !e thanful to them for this valua!le guidance to me.
'ame ( Sushil )haur
*niversity +oll 'o ( 1----/0
2ear ( 3 #3C3$ 4)52ear #IX Semester$
College ( CS&3) #addi 5.P$
Page |
7/24/2019 six weeks it training on ccna
3/69
PREFACE
6 lot of effort has !een made to mae this pro7ect report interesting and a learning experience for us.
)he report has !een explained with the help of diagrams and figures. )he su!7ect matter has !een
compiled in a simple, illustrative and lucid manner.
)his pro7ect report contains the description a!out integration of various networ devices with / rdparty
software which is Pacet )racer. 8irst we done the feasi!ility study of that, then we have made the
technical specifications for this tas and get done with the help of networing technical team.
9y pro7ect is a!out connecting different offices of an enterprise spanned over wide area networ. "e
will use pu!lic infrastructure to fulfill this purpose. 3nterprise will !e running ipv: routed protocols
and wide area networ will have ipv4 protocol. In "ide 6rea 'etwor we will have a com!ination of
routing protocols eigrp and ospf and redistri!ution will !e used to allow route exchange !etween them.'at technology is also used to convert private ip;s into pu!lic ip;s.
"e will also configure dhcp server in ipv4 domain to assign ip addresses dynamically to end devices.
Some policies will !e used to restrict access among devices of different offices.
Page | /
7/24/2019 six weeks it training on ccna
4/69
INDEX
1. About
Company.................................................................................................
............... 72. Networking
Basics
8-
;. Prect Re;44 N R'ter 6
;.;C"#c WS>C;?=4 86PS ?
;.6C"#c WS>C8@?4 86PS ?
;.? Serer =
;.= L$9t9 De#1t9 Pc =
Page | 4
7/24/2019 six weeks it training on ccna
5/69
6. M%el U#e%........................................................................................................................... 7
6.3)hePrce##A99l"c$t"! L$-er Prtcl#
6.3.3 Tel!et
6.3.8 F"le Tr$!#*er Prtcl (FTP @
6.3.; S"&9le M$"l Tr$!#*er Prtcl (SMTP @
6.3.6 P#t O**"ce Prtcl (POP @
6.3.? Sec're S)ell (SSH @
6.3.= H-9ertet Tr$!#*er Prtcl (HTTP @
6.3.7 S"&9le Net/r1 M$!$0e&e!t Prtcl (SNMP @
6.3. D&$"! N$&e Ser"ce (DNS 34
6.3.@ D-!$&"c H#t C!*"0'r$t"! Prtcl (DHCP
Bt#tr$9 Prtcl (BtP 34
6.8 T)e H#t>t>H#t L$-er Prtcl 33
6.8.3 Tr$!#&"##"! C!trl Prtcl (TCP 38
6.8.8 U#er D$t$0r$& Prtcl (UDP 3;
6.; T)e I!ter!et L$-er Prtcl 3?
6.;.3 I!ter!et Prtcl 3?
6.;.8 I!ter!et C!trl Me##$0e Prtcl (ICMP 37
6.;.; A%%re## Re#l't"! Prtcl (ARP 37
?. S*t/$re Re
7/24/2019 six weeks it training on ccna
6/69
7 Cre$t"!0 Vl$!# ;4
7.3 A##"0!"!0 Prt *r P$rt"c'l$r Vl$! ;8
7.8 Cre$t"!0 I!ter$l ;8
7.; Cre$t"!0 STP (S9$!!"!0 Tree Prtcl Fr Vl$! ;6
7.6 Sett"!0 Fr$&e Rel$- C!!ect"! ;?
7.? E!$l"!0 R't"!0 T C!!ect Re&te Are$# ;=
7.= N$t I&9le&e!t$t"! ;
. Serer#................................................................................................................
COMPAN: PROFILE
'etmax )echnologies Pvt =td was set up in --1 !y young Indian entrepreneurs. It haspioneered the concept of high >uality I) education in 'orth India and has trained over 1-,--- plus
networing, em!edded systems ? software professionals in the country. In --1, 'etmax)echnologies set up education centre in Chandigarh #Pun7a!$ and followed them with centers in
Patiala, @alandhar, =udhiana ? hatinda in the years that followed.'etmax )echnologies introduced
corporate training programs which as an initiative were highly appreciated !y the industry andcorporate alie.NETMAX TECHNOLOGY provides Corporate )raining according to theirre>uirements and standards. &ur faculties are well versed with technologies so they can deliver
according to live envoiment
. "e are a group of highly motivated I) professionals with an a!ility to innovate a strong desire toexcel.
Page | :
7/24/2019 six weeks it training on ccna
7/69
NETMAX TECHNOLOG: PVT LTD is a customer focused company woring to provide
software solutions, which are delivered with +elia!ility, )imeliness, 8lexi!ility and low cost
customer satisfaction as the primary aim. )he designing solutions are purely !ased on !usiness andtechnical re>uirements of the pro7ect in hand. Software Aevelopment =ife Cycle is strictly followed
to ensure the timely delivery of the pro7ect without compromising on >uality.
NETMAX TECHNOLOG: provides a !road range of offshore outsourcing services including6pplication and Systems =evel Programming on =eading )echnologies. It also provides wide rangeof 'etworing Solutions for Corporate, Industries and Software Aevelopment 8irms.
NETMAX TECHNOLOG: has a niche in providing training to 3ngineering ? 9C6 Students.
)housands of engineering students from Chandigarh, Pun7a!, 5aryana, and +a7asthan ? 5imachal
have successfully completed their Industrial and Summer )raining. )he focus of the Industrial)raining is to facilitate students with =ive Pro7ects on latest technologies lie VB.NET, ASP.NET,ORACLE DBADEVELOPER, 8EE, DO, STRUTS, LINUX, Net/r1"!0 under the strict
guidance of Industry 3xperts.
Tec)!l0- E9ert"#e
C"#c Tr$"!"!0
CC'6,CC'6 Security, CC'6 Boice, CC'P +?S, CC'P Security, CC'P Boice, CCI3
$$ Tec)!l0"e#
INTRODUCTION OF ASSIGNED OB
9y 7o! is a!out connecting different offices of an enterprise spanned over wide area networ. "e use
pu!lic infrastructure to fulfill this purpose.)o fulfill this purpose we have used ip addressing and
various type of protocols lie ripv,eigrp,ospf.9y 7o! is to solve the networ related pro!lems and
connectivity issues.In "ide 6rea 'etwor we will have a com!ination of routing protocols eigrp and
ospf and redistri!ution will !e used to allow route exchange !etween them.'at technology is also used
to convert private ip;s into pu!lic ip;s."e will also configure dhcp server in ipv4 domain to assign ip addresses dynamically to end
devices.Some policies will !e used to restrict access among devices of different offices.
NETWORKING BASICS
W)$t "# $ C&9'ter Net/r1
Page | 0
7/24/2019 six weeks it training on ccna
8/69
A c&9'ter !et/r1 allows sharing of resources and information among interconnected devices. In
the 1:-s, the 6dvanced +esearch Pro7ects 6gency #6+P6$ started funding the design of the 6dvanced
+esearch Pro7ects 6gency 'etwor #6+P6'3)$ for the *nited States Aepartment of Aefense. It wasthe first computer networ in the world.D1E Aevelopment of the networ !egan in 1:, !ased on
designs developed during the 1:-s.
Computer networs can !e used for a variety of purposes( 8acilitating communications. *sing a networ, people can communicate efficiently and easily
via email, instant messaging, chat rooms, telephone, video telephone calls, and video
conferencing.
Sharing hardware. In a networed environment, each computer on a networ may access and
use hardware resources on the networ, such as printing a document on a shared networ
printer.
Sharing files, data, and information. In a networ environment, authoriFed user may access data
and information stored on other computers on the networ. )he capa!ility of providing access to
data and information on shared storage devices is an important feature of many networs.
Sharing software. *sers connected to a networ may run application programs on remote
computers.
Information preservation.
Security.
Speed up.
W)$t "# $ Net/r1"!0
'etworing is a common synonym for developing and maintaining contacts and personal connections
with a variety of people who might !e helpful to you and your career.
'etworing is the practice of lining two or more computing devices together for the purpose ofsharing data. 'etwors are !uilt with a mix of computer hardware and computer software. It is an
especially important aspect of career management in the financial services industry, since it is helps you
eep a!reast of(
T-9e# * !et/r1#
Lc$l $re$ !et/r1
6 local area networ #=6'$ is a networ that connects computers and devices in a limited geographical
area such as home, school, computer la!oratory, office !uilding, or closely positioned group of
!uildings. 3ach computer or device on the networ is a node. Current wired =6's are most liely to !e
Page |
7/24/2019 six weeks it training on ccna
9/69
!ased on 3thernet technology, although new standards lie I)*%) G.hn also provide a way to create a
wired =6' using existing home wires #coaxial ca!les, phone lines and power lines$
Per#!$l $re$ !et/r16 personal area networ #P6'$ is a computer networ used for communication among computer and
different information technological devices close to one person. Some examples of devices that areused in a P6' are personal computers, printers, fax machines, telephones, PA6s, scanners, and even
video game consoles. 6 P6' may include wired and wireless devices. )he reach of a P6' typically
extends to 1- meters.D4E 6 wired P6' is usually constructed with *S and 8irewire connections whiletechnologies such as luetooth and infrared communication typically form a wireless P6'.
H&e $re$ !et/r16 home area networ #56'$ is a residential =6' which is used for communication !etween digitaldevices typically deployed in the home, usually a small num!er of personal computers and accessories,
such as printers and mo!ile computing devices. 6n important function is the sharing of Internet access,
often a !road!and service through a C6)B or Aigital Su!scri!er =ine #AS=$ provider. It can also !e
referred to as an office area networ #&6'$.
W"%e $re$ !et/r16 wide area networ #"6'$ is a computer networ that covers a large geographic area such as a city,
country, or spans even intercontinental distances, using a communications channel that com!ines manytypes of media such as telephone lines, ca!les, and air waves. 6 "6' often uses transmission facilities
provided !y common carriers, such as telephone companies. "6' technologies generally function at
the lower three layers of the &SI reference model( the physical layer, the data lin layer, and thenetwor layer.
C$&9'# Net/r16 campus networ is a computer networ made up of an interconnection of local area networs
#=6'Hs$ within a limited geographical area. )he networing e>uipments #switches, routers$ and
transmission media #optical fi!er, copper plant, Cat< ca!ling etc.$ are almost entirely owned #!y thecampus tenant owner( an enterprise, university, government etc.$.
In the case of a university campus%!ased campus networ, the networ is liely to lin a variety of
campus !uildings includingJ academic departments, the university li!rary and student residence halls.
Metr9l"t$! $re$ !et/r16 9etropolitan area networ is a large computer networ that usually spans a city or a large campus.
V"rt'$l 9r"$te !et/r16 virtual private networ #BP'$ is a computer networ in which some of the lins !etween nodes are
carried !y open connections or virtual circuits in some larger networ #e.g., the Internet$ instead of !y
physical wires. )he data lin layer protocols of the virtual networ are said to !e tunneled through the
larger networ when this is the case. &ne common application is secure communications through thepu!lic Internet, !ut a BP' need not have explicit security features, such as authentication or content
encryption. BP's, for example, can !e used to separate the traffic of different user communities over an
underlying networ with strong security features.
W)$t "# !et/r1 t9l0-
Page |
7/24/2019 six weeks it training on ccna
10/69
'etwor topology is the layout pattern of interconnections of the various elements #lins, nodes, etc.$
of a computer networ.D1EDE 'etwor topologies may !e physical or logical. Physical topology means
the physical design of a networ including the devices, location and ca!le installation. =ogical topologyrefers to how data is actually transferred in a networ as opposed to its physical design.
V$r"'# t9l0"e# ++
B'# t9l0-
9any devices connect to a single ca!le K!ac!oneK. If the !ac!one is !roen, the entire segment fails.us topologies are relatively easy to install and donHt re>uire much ca!ling compared to the
alternatives.
R"!0 T9l0-
Page | 1-
7/24/2019 six weeks it training on ccna
11/69
In a ring networ, every device has exactly two neigh!ours for communication purposes. 6ll messages
travel through a ring in the same direction. =ie the !us topology, a failure in any ca!le or device
!reas the loop and will tae down the entire segment. 6 disadvantage of the ring is that if any device isadded to or removed from the ring, the ring is !roen and the segment fails until it is KreforgedK #!y
dwarfish goldsmithsL$ It is also considera!ly more expensive than other topologies.
St$r T9l0-
6 star networ has a central connection point % lie a hu! or switch. "hile it taes more ca!le, the
!enefit is that if a ca!le fails, only one node will !e !rought down.
6ll traffic emanates from the hu! of the star. )he central site is in control of all the nodes attached to it.
)he central hu! is usually a fast, self contained computer and is responsi!le for routing all traffic toother nodes. )he main advantages of a star networ is that one malfunctioning node does not affect the
rest of the networ. 5owever this type of networ can !e prone to !ottlenec and failure pro!lems at
the central site.
Tree T9l0-
Page | 11
7/24/2019 six weeks it training on ccna
12/69
6lso nown as the H5ierarchical topologyH, the tree topology is a com!ination of !us and startopologies. )hey are very common in larger networs. 6 typical scenario is( a file server is connected to
a !ac!one ca!le #e.g. coaxial$ that runs through the !uilding, from which switches are connected,
!ranching out to worstations.
Me#) t9l0-
Page | 1
7/24/2019 six weeks it training on ccna
13/69
In the topologies shown a!ove, there is only one possi!le path from one node to another node. If any
ca!le in that path is !roen, the nodes cannot communicate.9esh topology uses lots of ca!les to connect every node with every other node. It is very expensive to
wire up, !ut if any ca!le fails, there are many other ways for two nodes to communicate. Some "6's,lie the Internet, employ mesh routing. In fact the Internet was deli!erately designed lie this to allowsites to communicate even during a nuclear war.
H-r"% T9l0-5y!rid networ is the com!ination of different topologies such as star, +ing, 9esh, us etc. 8or
example, if a department uses a us networ, second department uses the ring networ, third
department uses the 9esh networ and fourth department uses the star networ. 6ll the networs of
different types #of four departments$ can !e connected together through a central hu! #in the form ofstar networ$ as shown in the figure !elow.
B$#"c !et/r1"!0 %e"ce#
Page | 1/
7/24/2019 six weeks it training on ccna
14/69
Computer networing devices are units that mediate data in a computer networ. Computer networing
devices are also called networ e>uipment, Intermediate Systems #IS$ or Inter"oring *nit #I"*$.
*nits which are the last receiver or generate data are called hosts or data terminal e>uipment.
R'ter#6 router is a communication device that is used to connect two logically and physically different
networs, two =6's, two "6's and a =6' with "6'. )he main function of the router is to sortingand the distri!ution of the data pacets to their destinations !ased on their IP addresses. +outers
provides the connectivity !etween the enterprise !usinesses, ISPs and in the internet infrastructure,
router is a main device. Cisco routers are widely used in the world. 3very router has routing software,which is nown as I&S. +outer operates at the networ layer of the &SI model. +outer does not
!roadcast the data pacets.
We )$e t/ t-9e# * r'ter(1.5ardware
.software. M this router is provided !y ++6S S3+BIC3.
S/"tc)e#
=ie the router, a switch is an intelligent device that maps the IP address with the 96C address of the
=6' card. *nlie the hu!s, a switch does not !roadcast the data to all the computers, it sends the datapacets only to the destined computer. Switches are used in the =6', 96' and "6'. In an 3thernet
networ, computers are directly connected with the switch via twisted pair ca!les. In a networ,
switches use the three methods to transmit the data i.e. store and forward, cut through and fragmentfree.
We )$e t/ t-9e# * #/"tc).
3.M$!0e$le #/"tc)+ it has console port !y using this we can mange this switch according to ournee% .
8.!!>&$!0e$le + it ha no console port we use this switch as we purc)$#e "t.
H'#
Page | 14
7/24/2019 six weeks it training on ccna
15/69
)he central connecting device in a computer networ is nown as a hu!. )here are two types of a hu!
i.e. active hu! and passive hu!. 3very computer is directly connected with the hu!. "hen data pacetsarrives at hu!, it !roadcast them to all the =6' cards in a networ and the destined recipient pics them
and all other computers discard the data pacets. 5u! has five, eight, sixteen and more ports and one
port is nown as uplin port, which is used to connect with the next hu!.
M%e
6 modem is a communication device that is used to provide the connectivity with the internet. 9odem
wors in two ways i.e. 9odulation and Aemodulation. It converts the digital data into the analogue and
analogue to digital.
LAN C$r%#
Page | 1
7/24/2019 six weeks it training on ccna
16/69
=6' cards or networ adapters are the !uilding !locs of a computer networ. 'o computer can
communicate without a properly installed and configured =6' card. 3very =6' card is provided witha uni>ue IP address, su!net mas, gateway and A'S #if applica!le$. 6n *)PS)P ca!le connects a
computer with the hu! or switch. oth ends of the ca!le have the +@%4< connectors one is inserted into
the =6' card and one in the hu!switch. =6' cards are inserted into the expansion slots inside thecomputer. Aifferent =6' cards support different speed from 1-1-- to 1-1---.
3thernet N speed 1-m!ps
8ast 3thernet N 1--m!psGiga 3thernet N 1---m!ps
8astgiga 3thernet N 1----m!ps
Net/r1 Re9e$ter
6 repeater connects two segments of your networ ca!le. It retimes and regenerates the signals to
proper amplitudes and sends them to the other segments. "hen taling a!out, ethernet topology, youare pro!a!ly taling a!out using a hu! as a repeater. +epeaters re>uire a small amount of time to
regenerate the signal. )his can cause a propagation delay which can affect networ communication
when there are several repeaters in a row. 9any networ architectures limit the num!er of repeaters thatcan !e used in a row. +epeaters wor only at the physical layer of the &SI networ model.
Page | 1:
7/24/2019 six weeks it training on ccna
17/69
Br"%0e
6 !ridge reads the outermost section of data on the data pacet, to tell where the message is going. It
reduces the traffic on other networ segments, since it does not send all pacets. ridges can !e
programmed to re7ect pacets from particular networs. ridging occurs at the data lin layer of the&SI model, which means the !ridge cannot read IP addresses, !ut only the outermost hardware address
of the pacet. In our case the !ridge can read the ethernet data which gives the hardware address of the
destination address, not the IP address. ridges forward all !roadcast messages. &nly a special !ridge
called a translation !ridge will allow two networs of different architectures to !e connected. ridgesdo not normally allow connection of networs with different architectures.
)he hardware address is also called the 96C #media access control$ address. )o determine the
networ segment a 96C address !elongs to, !ridges use one of(
Page | 10
7/24/2019 six weeks it training on ccna
18/69
)ransparent ridging % )hey !uild a ta!le of addresses #!ridging ta!le$ as they receive pacets. If the
address is not in the !ridging ta!le, the pacet is forwarded to all segments other than the one it camefrom. )his type of !ridge is used on ethernet networs.
Source route !ridging % )he source computer provides path information inside the pacet. )his is used
on )oen +ing networs.G$te/$-
6 gateway can translate information !etween different networ data formats or networ architectures. Itcan translate )CPIP to 6pple)al so computers supporting )CPIP can communicate with 6pple !rand
computers. 9ost gateways operate at the application layer, !ut can operate at the networ or session
layer of the &SI model. Gateways will start at the lower level and strip information until it gets to there>uired level and repacage the information and wor its way !ac toward the hardware layer of the
&SI model. )o confuse issues, when taling a!out a router that is used to interface to another networ,
the word gateway is often used. )his does not mean the routing machine is a gateway as defined here,
although it could !e.
Net/r1 M%el#
"hen dealing with networing, you may hear the terms Knetwor modelK and Knetwor layerK used
often. 'etwor models define a set of networ layers and how they interact. )here are several different
networ models depending on what organiFation or company started them. )he most important two are(
T)e TCPIP M%el % )his model is sometimes called the A&A model since it was designed for thedepartment of defense It is also called the internet model !ecause )CPIP is the protocol used on theinternet.
OSI Net/r1 M%el % )he International Standards &rganiFation #IS&$ has defined a standard
called the &pen Systems Interconnection #&SI$ reference model. )his is a seven layer architecturelisted in the next section.
Page | 1
7/24/2019 six weeks it training on ccna
19/69
L$-er# "! t)e TCPIP &%elA99l"c$t"! L$-er (9rce##>t>9rce##+ )his is the scope within which applications create user data
and communicate this data to other processes or applications on another or the same host. )hecommunications partners are often called peers. )his is where the Khigher levelK protocols such as
S9)P, 8)P, SS5, 5))P, etc. operate.
Tr$!#9rt L$-er ()#t>t>)#t+ )he )ransport =ayer constitutes the networing regime !etween twonetwor hosts, either on the local networ or on remote networs separated !y routers.
I!ter!et L$-er ("!ter!et/r1"!0+ )he Internet =ayer has the tas of exchanging datagrams across
networ !oundaries. It is therefore also referred to as the layer that esta!lishes internetworing, indeed,it defines and esta!lishes the Internet. )his layer defines the addressing and routing structures used for
the )CPIP protocol suite.
L"!1 L$-er( )his layer defines the networing methods with the scope of the local networ lin onwhich hosts communicate without intervening routers. )his layer descri!es the protocols used to
descri!e the local networ topology and the interfaces needed to affect transmission of Internet =ayer
datagrams to next%neigh!or hosts.
Page | 1
7/24/2019 six weeks it training on ccna
20/69
OSI M%el)he &SI, or &pen System Interconnection, model defines a networing framewor for implementing
protocols in seven layers. Control is passed from one layer to the next, starting at the application layerin one station, and proceeding to the !ottom layer, over the channel to the next station and !ac up the
hierarchy.
A99l"c$t"! (L$-er 7
)his layer supports application and end%user processes. Communication partners are identified, >uality
of service is identified, user authentication and privacy are considered, and any constraints on data
syntax are identified.
Pre#e!t$t"! (L$-er =
)his layer provides independence from differences in data representation #e.g., encryption$ !y
translating from application to networ format, and vice versa.
Se##"! (L$-er ?
)his layer esta!lishes, manages and terminates connections !etween applications. )he session layer sets
up, coordinates, and terminates conversations, exchanges, and dialogues !etween the applications ateach end. It deals with session and connection coordination.
Tr$!#9rt (L$-er 6
)his layer provides transparent transfer of data !etween end systems, or hosts, and is responsi!le for
end%to%end error recovery and flow control. It ensures complete data transfer.
Net/r1 (L$-er ;
)his layer provides switching and routing technologies, creating logical paths, nown as virtual
circuits, for transmitting data from node to node.
D$t$ L"!1 (L$-er 8
6t this layer, data pacets are encoded and decoded into !its. It furnishes transmission protocol
nowledge and management and handles errors in the physical layer, flow control and frame
synchroniFation. )he data lin layer is divided into two su! layers( )he 9edia 6ccess Control #96C$layer and the =ogical =in Control #==C$ layer.
P)-#"c$l (L$-er 3
)his layer conveys the !it stream % electrical impulse, light or radio signal %% through the networ at theelectrical and mechanical level. .
TCPIP M%el # OSI M%el
Sr.
N.TCPIP Re*ere!ce M%el OSI Re*ere!ce M%el
1 Aefined after the advent of Internet. Aefined !efore advent of internet.
Service interface and protocols were not clearly distinguished
!efore
Service interface and protocols are clearly
distinguished
/ )CPIP supports Internet woring Internet woring not supported
4 =oosely layered Strict layering
Page | -
7/24/2019 six weeks it training on ccna
21/69
< Protocol Aependant standard Protocol independent standard
: 9ore Credi!le =ess Credi!le
0)CP relia!ly delivers pacets, IP does not relia!ly deliver
pacets6ll pacets are relia!ly delivered
B$#"c Net/r1"!0 C$le#
Net/r1"!0 C$le#are used to connect one networ device to other or to connect two or more computers
to share printer, scanner etc. Aifferent types of networ ca!les lie Coaxial ca!le, &ptical fi!er
ca!le, )wisted Pair ca!les are used depending on the networHs topology, protocol and siFe. )he devices
can !e separated !y a few meters #e.g. via 3thernet$ or nearly unlimited distances #e.g. via the
interconnections of the Internet$.
"hile wireless may !e the wave of the future, most computer networ today still utiliFe ca!les to
transfer signals from one point to another
)wisted pair
)wisted pair ca!ling is a type of wiring in which two conductors #the forward and return conductors of a single circuit$ are
twisted together for the purposes of canceling out electromagnetic interference #39I$ from external sourcesJ for
instance, electromagnetic radiation from unshielded twisted pair #*)P$ ca!les, and crosstal !etween neigh!oring pairs. Itwas invented !y 6lexander Graham ell.
*nshielded twisted pair ca!le with different twist rates Shieldedtwisted pair
6dvantages
It is a thin, flexi!le ca!le that is easy to string !etween walls.
9ore lines can !e run through the same wiring ducts.
*)P costs less per meterfoot than any other type of =6' ca!le.
Page | 1
7/24/2019 six weeks it training on ccna
22/69
Aisadvantages
)wisted pair;s suscepti!ility to electromagnetic interferencegreatly depends on the pair twisting schemes #usually
patented !y the manufacturers$ staying intact during the installation. 6s a result, twisted pair ca!les usually have
stringent re>uirements for maximum pulling tension as well as minimum !end radius. )his relative fragility of twisted
pair ca!les maes the installation practices an important part of ensuring the ca!le;s performance.
In video applications that send information across multiple parallel signal wires, twisted pair ca!ling can introduce
signaling delays nown assewwhich results in su!tle color defects and ghosting due to the image components not
aligning correctly when recom!ined in the display device
&ptical fi!er ca!le
6n optical fi!er ca!le is a ca!lecontaining one or moreoptical fi!ers. )he optical fi!er elements are typically individually
coated with plastic layers and contained in a protective tu!e suita!le for the environment where the ca!le will !e deployed.
Page |
http://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Skewhttp://en.wikipedia.org/wiki/Skewhttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Skewhttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Electromagnetic_interference7/24/2019 six weeks it training on ccna
23/69
An optical fiber is a single, hair-fine filament drawn from molten silica glass. These fibers arereplacing metal wire as the transmission medium in high-speed, high-capacity
communications systems that convert information into light, which is then transmitted viafiber optic cable. Currently, American telephone companies represent the largest users of fiberoptic cables, but the technology is also used for power lines, local access computer networks,
and video transmission.
Coaxial cable
C$"$l c$le, or c$, is anelectrical ca!lewith an inner conductor surrounded !y a flexi!le, tu!ular insulating layer,
surrounded !y a tu!ular conducting shield. )he term coaxialcomes from the inner conductor and the outer shield sharing the
same geometric axis. Coaxial ca!le was invented !y 3nglish engineer and mathematician&liver 5eaviside,who first
patented the design in 1-.D1E
Coaxial ca!le is used as atransmission lineforradio fre>uencysignals, in applications such as connectingradio
transmittersandreceiverswith their antennas, computer networ #Internet$ connections, and distri!utingca!le
televisionsignals. &ne advantage of coax over other types of radio transmission lineis that in an ideal coaxial ca!le
theelectromagnetic fieldcarrying the signal exists only in the space !etween the inner and outerconductors.)his allows
coaxial ca!le runs to !e installed next to metal o!7ects such as gutters without the power losses that occur in other types of
transmission lines, and provides protection of the signal from externalelectromagnetic interference.
Page | /
http://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Coaxialhttp://en.wikipedia.org/wiki/Oliver_Heavisidehttp://en.wikipedia.org/wiki/Oliver_Heavisidehttp://en.wikipedia.org/wiki/Oliver_Heavisidehttp://en.wikipedia.org/wiki/Coaxial_cable#cite_note-0http://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Radio_transmitterhttp://en.wikipedia.org/wiki/Radio_transmitterhttp://en.wikipedia.org/wiki/Radio_receiverhttp://en.wikipedia.org/wiki/Radio_receiverhttp://en.wikipedia.org/wiki/Radio_receiverhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Electrical_conductorhttp://en.wikipedia.org/wiki/Electrical_conductorhttp://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Coaxialhttp://en.wikipedia.org/wiki/Oliver_Heavisidehttp://en.wikipedia.org/wiki/Coaxial_cable#cite_note-0http://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Radio_transmitterhttp://en.wikipedia.org/wiki/Radio_transmitterhttp://en.wikipedia.org/wiki/Radio_receiverhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Electrical_conductorhttp://en.wikipedia.org/wiki/Electromagnetic_interference7/24/2019 six weeks it training on ccna
24/69
Str$"0)t C$le
2ou usually use straight ca!le to connect different type of devices. )his type of ca!le will !e used most of the time and can
!e used to(
1$ Connect a computer to a switchhu!Hs normal port.
$ Connect a computer to a ca!leAS= modemHs =6' port./$ Connect a routerHs "6' port to a ca!leAS= modemHs =6' port.
4$ Connect a routerHs =6' port to a switchhu!Hs uplin port. #normally used for expanding networ$
7/24/2019 six weeks it training on ccna
25/69
:. green :. orange0. !rown white 0. !rown white
. !rown . rown
Cl'r c%"!0 *r c$le#
T>?=B Str$"0)t>T)r'0) Et)er!et C$le
R>6? Cr##er Et)er!et C$le
INSTALLING CABLESIn today networs, *)P C6=3S are commonly used to connect computers in a networ.
Aepending on the colorcodings, we have different ca!les lie straight ca!le, cross ca!le and roll%overca!le.
Page |
7/24/2019 six weeks it training on ccna
26/69
STRAIGHT CABLE
)he ca!le used !etween the PC and the hu!switch is called straight ca!le.
Straight ca!le can !e used !etweenPC % S"I)C5
PC% 5*
5*#*P=I'O P&+)$ % 5*6ccording to )I63I6#)elecommunications industry standard3lectronics industry standard$,we have
the following
two standards for maing straight ca!le(
CROSS>OVER CABLE
)he ca!le used to connect two PCs is called cross%over ca!le.
Cross ca!le can !e used !etween(
PC % PC5* % 5*
S"I)C5 % S"I)C5
+&*)3+ % PC
ROLL>OVER CABLE)he ca!le used !etween a hardware router and a PC is called roll%over ca!le.
In this ca!le,thecolor coding used in one end is reversed in the other end.A6)6 )+6B3== &'=2 G+33' &+ &+6'G3 P6I+ &8 C6=3.
ADDRESSING IN COMPUTER NETWORKING
)here are two inds of addresses used in networs(1.Physical address
.=ogical addressPH:SICAL ADDRESS
1.It is also called hardware address or 96C address.96C stands for media access control..It is present in the chip of a 'IC card./.It is uni>ue for every 'IC card and cannot !e changed.
4.It is 4 !its.&ut of 4 !its,4 !its of address is given !y the manufacturer of 'IC card and the
remaining 4 !its of address is defined as per instructions given !y I333.
7/24/2019 six weeks it training on ccna
27/69
.It was developed !y A&A#Aepartment of Aefence$ of *S6.
/.It is used !oth in Internet#pu!lic networ$ and Intranet#private networ$.
4.It is of / !its.
7/24/2019 six weeks it training on ccna
28/69
ut in case of your computer has no IP address then IP address is assigned to the computer from 6PIP6
+ange . !ut communication is not possi!le when computer has IP address from 6PIP6.
387.4.4.3 it is the loop !ac address it is used for self communication and for trou!leshooting purpose.
S'!et &$#1+ su!net mas is also / !it address, which tell us how many !its are used for networ and
how many !its are used for host address.In su!net mas networ !its are always 1 and host !its are always -.
IP A%%re## "!$l"% r re#ere IP A%%re##+
"hen we are going to assign IP 6ddress to our computer interface then we have to follow some rules(
R'le#+ >
1. 6ll 5ost !its cannot !e - #1-.-.-.-$, !ecause it represent networ address which is reserved for
router.
. 6ll 5ost !it cannot !e 1 #1-.
7/24/2019 six weeks it training on ccna
29/69
1 9inimum N -ms, 9aximum N -ms, 6verage N -ms
)his massage appear when destination computer properly configured and connected with same netwo
ip address.
8.Re )his massage appear when Aestination computer has some pro!lem .8or
e.g ( IP address does not exit, networ ca!le unplugged, computer shutdown, interconnection firewall
ena!le.;.De#t"!$t"! )#t '!re$c)$le +> )his massage appear when our computer desire to communicate
with another nw !ut our computer has no gateway IP address.
6.Re9l- *r& 0$te/$- 't De#t"!$t"! )#t '!re$c)$le+>)his massage appear when computerdesire to communicate with another networ computer !ut our router has no route information in its
routing ta!le for Aestination nw.
?.H$r%/$re errr+> )his massage appears when during communication our networ goes unplugged.
=.Ne0#)$t"!0 IP #e
7/24/2019 six weeks it training on ccna
30/69
FIGURE3+ CISCO ROUTER 8=83
)he physical interfaces include power plug for the power supply and a power switch. )he router has
two 8ast 3thernet #1-1-- +@%4
7/24/2019 six weeks it training on ccna
31/69
)he "ireless%' road!and +outer will allow you to networ wirelessly !etter than ever, sharing
Internet access, files and fun, easily and securely and with greater range of up to three times farther
than standard "ireless%G. 6 router is a device that allows access to an Internet connection over anetwor. "ith the "ireless%' road!and +outer, this access can !e shared over the four switched ports
or via the wireless !roadcast.
*se wireless security to secure your wireless networ while the whole networ is protected through aStateful Pacet Inspection #SPI$ firewall and 'etwor 6ddress )ranslation #'6)$ technology. )he
+outer also offers BP' pass%through and other features, which can !e configured through the easy%to%
use, !rowser%!ased utilityFIGURE ;+ WRT>;44NP a g e |6
8.; CISCO WS>C;?=4 86PS
)he Cisco Catalyst /uality of service #VoS$, and resiliency to deliver intelligent services for the networ edge. It
don;t operate on layer / it operates on =ayer it is used to learn 9ac address in =an networ and for
providing path selection according to spanning tree selection .
Page | /1
7/24/2019 six weeks it training on ccna
32/69
FIGURE ?+ 8@44 SERIES SWICH
8.? SERVER
6 #ereris a computer program running to serve the re>uests of other programs, the KclientsK. )hus, the
KserverK performs some computational tas on !ehalf of KclientsK. )he clients either run on the same
computer or connect through the networ.
In most common use, #ereris a physical computer #a computer hardware system$ dedicated to runningone or more such services #as a host$,to serve the needs of users of the other computers on the networ.
Aepending on the computing service that it offers it could !e a data!ase server, file server, mail server,
print server, we! server, or some other ind of server.
FIGURE=+ SERVER OVERIEW
8.= LAPTOP AND DESKTOP PC
)he destop pc should normal in operation has the facilities of we! !rowsing, command prompt,
minimum storage memory and =aptop should have wireless connection option .
Page | /
7/24/2019 six weeks it training on ccna
33/69
;. MODEL USED
)CPIP is so central to woring with the Interne so in the woring of the pro7ect we mae use of
)CPIP model. )he Transmission Control Protocol/Internet Protocol (TCP/IP) suite was created !y theAepartment of Aefense #AoA$ to ensure and preserve data integrity as well as maintain
communications in the event of catastrophic war. So it follows that if designed and implemented
correctly, a)CPIP networ can !e a truly dependa!le and resilient one.
TCPIP $!% t)e DD M%el
)he AoA model is !asically a condensed version of the &SI modelWit;s composed of four, instead ofseven, layers(
Process6pplication layer
5ost%to%5ost layerInternet layer
'etwor 6ccess layer
Page | //
7/24/2019 six weeks it training on ccna
34/69
FIGURE7+SHOWS A COMPARISON OF DOD AND OSI MODEL.
6 vast array of protocols com!ine at the AoA model;sProcess/Application layer to integrate the
various activities and duties spanning the focusof the &SI;s corresponding top three layers
#6pplication, Presentation, and Session$.
)he Process6pplication layer defines protocols for node%to%node application communication and also
controls user%interfacespecifications.
)heHost-to-Host layerparallels the functions of the &SI;s )ransport layer, defining protocols for
setting up the level of transmission service forapplications. It tacles issues such as creating relia!leend%to%end communication and ensuring the error%free delivery of data. It handles pacetse>uencing
and maintains data integrity.
)heInternet layer corresponds to the &SI;s 'etwor layer, designating the protocols relating to thelogical transmission of pacets over theentire networ. It taes care of the addressing of hosts !y giving
them an IP #Internet Protocol$ address, and it handles the routing of pacets amongmultiple networs.
6t the !ottom of the AoA model, theNetwork Access layer implements the data exchange !etween the
host and the networ. )he e>uivalent of
the Aata =in and Physical layers of the &SI model, the 'etwor 6ccess layer oversees hardwareaddressing and defines protocols for the
physical transmission of data
.)he AoA and &SI models are alie in design and concept and have similar functions in similar layers.
;.3)he Prce##A99l"c$t"! L$-er Prtcl#
In this layer we will discuss the protocols that are used for communication and their utility.
;.3.3 Tel!et
Telnet is the chameleon of protocolsWits specialty is terminal emulation. It allows a user on a remoteclient machine, called the )elnet client, toaccess the resources of another machine, the )elnet server.
)elnet achieves this !y pulling a fast one on the )elnet server and maing the clientmachine appears as
though it were a terminal directly attached to the local networ. )his pro7ection is actually a softwareimageWa virtual terminalthat can interact with the chosen remote host.
)hese emulated terminals are of the text%mode type and can execute defined procedures such as
displaying menus that give users theopportunity to choose options and access the applications on theduped server. *sers !egin a )elnet session !y running the )elnet client softwareand then logging into
the )elnet server.
Page | /4
7/24/2019 six weeks it training on ccna
35/69
;.3.8 F"le Tr$!#*er Prtcl (FTP
File Transfer Protocol (FTP) is the protocol that actually lets us transfer files, and it can accomplish
this !etween any two machines using it. ut8)P isn;t 7ust a protocolJ it;s also a program.
;.3.; S"&9le M$"l Tr$!#*er Prtcl (SMTP
Simple Mail Transfer Protocol (SMTP), answering our u!i>uitous call to email, uses a spooled, or
>ueued, method of mail delivery. &nce a message has !een sent to a destination, the message is spooled
to a deviceWusually a dis. )he server software at the destination posts a vigil, regularly checing the
>ueue for messages. "hen it detects them, it proceeds to deliver them to their destination. S9)P isused to send mailJP&P/ or I96P is used to receive mail.
;.3.6 P#t O**"ce Prtcl (POP
Post ffice Protocol (PP) gives us a storage facility for incoming mail, and the latest version is calledP&P/. It doesn;t allow messages to !e downloaded selectively, !ut once they are, the clientserver
interaction ends and you can delete and twea your messages locally at will.
;.3.? Sec're S)ell (SSH
Sec!re S"ell (SSH)protocol sets up a secure )elnet session over a standard )CPIP connection and is
employed for doing things lie logging intoSystems, running programs on remote systems, and moving files from one system to another. 6nd it
does all of this while maintaining a nice, strong, encrypted connection. 2ou can thin of it as the new%
generation protocol that;s now used in place of rsh and rloginWeven )elnet.
;.3.= H-9ertet Tr$!#*er Prtcl (HTTP)
6ll those snappy we!sites comprising a mlange of graphics, text, lins, and so onWtheHyperte#tTransfer Protocol (HTTP) is maing it allpossi!le. It;s used to manage communications !etween we!
!rowsers and we! servers and opens the right resource when you clic a lin, wherever that resource
may actually reside.
;.3.7 S"&9le Net/r1 M$!$0e&e!t Prtcl (SNMP
Simple Network Mana$ement Protocol (SNMP) collects and manipulates valua!le networ information.
It gathers data !y polling the devices onthe networ from a management station at fixed or random
intervals, re>uiring them to disclose certain information. "hen all is well, S'9Preceives something
Page | /
7/24/2019 six weeks it training on ccna
36/69
called a %aselineWa report delimiting the operational traits of a healthy networ. )his protocol can also
stand as a watchdogover the networ, >uicly notifying managers of any sudden turn of events.
;.3. D&$"! N$&e Ser"ce (DNS
&omain Name Ser'ice (&NS) resolves hostnamesWspecifically, Internet names, such as
www.google.com."e don;t have to use A'SJ we can 7ust type in the IP address of any device you wantto communicate with. 6n IP address identifies hosts on a networ and the Internet as well.5owever,
A'S was designed to mae our lives easier.
;.3.@Dynamic Host Configuration Protocol (DHCP)/Bootstrap Protocol (BootP)
&ynamic Host Confi$!ration Protocol (&HCP) assigns IP addresses to hosts. It allows easier
administration and wors well in small to even verylarge networ environments. 6ll types of hardware can !e used as a A5CP server, including a Cisco
router.
ut there is a lot of information a A5CP server can provide to a host when the host is re>uesting an IP
address from the A5CP server. 5ere;s alist of the information a A5CP server can provide(
IP address
Su!net mas
Aomain name
Aefault gateway #routers$
A'S server address
"I'S server address
)he following is the four%step process a client taes to receive an IP address from a A5CP server(
)he A5CP client !roadcasts a A5CP Aiscover message looing for a A5CP server #Port :0$.
)he A5CP server that received the A5CP Aiscover message sends a unicast A5CP &ffer
message !ac to the host
)he client then !roadcasts to the server a A5CP +e>uest message asing for the offered IP
address and possi!ly other information.
)he server finaliFes the exchange with a unicast A5CP 6cnowledgment message
Page | /:
7/24/2019 six weeks it training on ccna
37/69
FIGURE + SHOWS THE PROCESS OF A CLIENTSERVER RELATIONSHIP
;.8 T)e H#t>t>H#t L$-er Prtcl#.
)he main purpose of the 5ost%to%5ost layer is to shield the upper%layer applications from thecomplexities of the networ. )his layer says to the upper layer, Y@ust give me your data stream, with
any instructions, and I;ll !egin the process of getting your information ready to send.Z
)he following sections descri!e the two protocols at this layer(
)ransmission Control Protocol #)CP$
*ser Aatagram Protocol #*AP$
In addition, we;ll loo at some of the ey host%to%host protocol concepts, as well as the port num!ers.
;.8.3 Tr$!#&"##"! C!trl Prtcl (TCP
Page | /0
7/24/2019 six weeks it training on ccna
38/69
Transmission Control Protocol (TCP) taes large !locs of information from an application and !reas
them into segments. It num!ers andse>uences each segment so that the destination;s )CP stac can putthe segments !ac into the order the application intended. 6fter thesesegments are sent, )CP #on the
transmitting host$ waits for an acnowledgment of the receiving end;s )CP virtual circuit session,
retransmittingthose that aren;t acnowledged.
)CP is a full%duplex, connection%oriented, relia!le, and accurate protocol, !ut esta!lishing all these
terms and conditions, in addition to errorchecing, is no small tas.
TCP Se0&e!t Fr&$t
Since the upper layers 7ust send a data stream to the protocols in the )ransport layers, I;ll demonstratehow )CP segments a data stream andprepares it for the Internet layer. "hen the Internet layer receives
the data stream, it routes the segments as pacets through an internetwor. )hesegments are handed to
the receiving host;s 5ost%to%5ost layer protocol, which re!uilds the data stream to hand to the upper%
layer applications orprotocols. 8igureshows the )CP segment format. )he figure shows thedifferent fields within the )CP header.
)he )CP header is - !ytes long, or up to 4 !ytes with options. 2ou need to understand what eachfield in the )CP segment is(
S'rce 9rt)he port num!er of the application on the host sending the data. #Port num!ers will !eexplained a little later in this section.$
De#t"!$t"! 9rt )he port num!er of the application re>uested on the destination host.
Se
7/24/2019 six weeks it training on ccna
39/69
He$%er le!0t) )he num!er of /%!it words in the )CP header. )his indicates where the data !egins.
)he )CP header #even one includingoptions$ is an integral num!er of / !its in length.
Re#ere% 6lways set to Fero.
C%e "t#*l$0# Control functions used to set up and terminate a session.
W"!%/ )he window siFe the sender is willing to accept, in octets.
C)ec1#'& )he cyclic redundancy chec #C+C$, !ecause )CP doesn;t trust the lower layers and checseverything. )he C+C checs theheader and data fields.
Ur0e!t 6 valid field only if the *rgent pointer in the code !its is set. If so, this value indicates the
offset from the current se>uence num!er, inoctets, where the segment of non%urgent data !egins
.O9t"!# 9ay !e - or a multiple of / !its, if any. "hat this means is that no options have to !e present
#option siFe of -$. 5owever, if anyoptions are used that do not cause the option field to total a multipleof / !its, padding of -s must !e used to mae sure the data !egins on a/%!it !oundary.
D$t$ 5anded down to the )CP protocol at the )ransport layer, which includes the upper%layer headers.
;.8.8 U#er D$t$0r$& Prtcl (UDP
*AP doesn;t offer all the !ells and whistles of )CP either, !ut it does do a fa!ulous 7o! of transportinginformation that doesn;t re>uire relia!le deliveryWand it does so using far fewer networ resources.
)here are some situations in which it would definitely !e wise for developers to opt for *AP rather than)CP. &ne circumstance is when relia!ility is already handled at the Process6pplication layer. 'etwor
8ile System #'8S$ handles its own relia!ility issues, maing the use of )CP !oth impractical and
redundant. ut ultimately, it;s up to the application developer to decide whether to use *AP or )CP, notthe user who wants to transfer data faster.
*AP does not se>uence the segments and does not care in which order the segments arrive at the
destination. +ather, *AP sends the segments off and forgets a!out them. It doesn;t follow through,chec up on them, or even allow for an acnowledgment of safe arrivalWcomplete a!andonment.
ecause of this, it;s referred to as an unrelia!le protocol. )his does not mean that *AP is ineffective,
only that it doesn;t handleissues of relia!ility.
8urther, *AP doesn;t create a virtual circuit, nor does it contact the destination !efore delivering
information to it. ecause of this, it;s alsoconsidered a connectionlessprotocol. Since *AP assumes
that the application will use its own relia!ility method, it doesn;t use any. )his gives anapplication
Page | /
7/24/2019 six weeks it training on ccna
40/69
developer a choice when running the Internet Protocol stac( )CP for relia!ility or *AP for faster
transfers.
UDP Se0&e!t Fr&$t
Source portThe port number of the application on the host sending the data
Destination portThe port number of the application reuested on the destinationhost
FIGURE34+ UDP SEGMENT
engt!TheLength of !"# header and !"# data
C!ecksumTheChec$sum of both the !"# header and !"# data %elds
Data !pper&la'er data
Prt N'&er#
)CP and *AP must useport n!m%ers to communicate with the upper layers !ecause they;re what eep
trac of different conversations crossingthe networ simultaneously. &riginating%source port num!ers
are dynamically assigned !y the source host and will e>ual some num!er starting at1-4.
FIGURE33+ PORT NUMBER FOR PROTOCOLS
;.; T)e I!ter!et L$-er Prtcl#
Page | 4-
7/24/2019 six weeks it training on ccna
41/69
In the AoA model, there are two main reasons for the Internet layer;s existence( routing and providing a
single networ interface to the upper layers. 'one of the other upper% or lower%layer protocols have any
functions relating to routingWthat complex and important tas !elongs entirely to the Internet layer.)he Internet layer;s second duty is to provide a single networ interface to the upper%layer protocols.
"ithout this layer, application programmers would need to write YhoosZ into every one of their
applications for each different 'etwor 6ccess protocol.
)he following sections descri!e the protocols at the Internet layer(
Internet Protocol #IP$
Internet Control 9essage Protocol #IC9P$
6ddress +esolution Protocol #6+P$
;.;.3INTERNET PROTOCOL
Internet Protocol (IP)essentially is the Internet layer. IP loos at each pacet;s address. )hen, using a
routing ta!le, it decides where a pacet is to !e sent next, choosing the !est path.
6n IP header. )his will give you an idea of what the IP protocol has to go through every time user datais sent from the upper layers and is to !e sent to a remote networ
.
)he following fields mae up the IP header(
Ver#"! IP version num!er.
He$%er le!0t) 5eader length #5=3'$ in /%!it words.
Pr"r"t- $!% T-9e * Ser"ce )ype of Service tells how the datagram should !e handled. )he first /!its are the priority !its which is nowcalled the differentiated services !its.
Tt$l le!0t)=ength of the pacet including header and data.
I%e!t"*"c$t"! *ni>ue IP%pacet value used to differentiate fragmented pacets from different
datagrams.
Fl$0# Specifies whether fragmentation should occur.
Page | 41
7/24/2019 six weeks it training on ccna
42/69
FIGURE38+ IP HEADER
Fr$0&e!t **#et Provides fragmentation and reassem!ly if the pacet is too large to put in a frame. It
also allows different maximumtransmission units #9)*s$ on the Internet.
He$%er c)ec1#'& Cyclic redundancy chec #C+C$ on header only.
T"&e T L"e )he time to live is set into a pacet when it is originally generated. If it doesn;t get to
where it wants to go !efore the ))=expires, !oomWit;s gone. )his stops IP pacets from continuouslycircling the networ looing for a home.
Prtcl Port of upper%layer protocol #)CP is port : or *AP is port 10$. 6lso supports 'etwor layer
protocols, lie 6+P and IC9P #this can!e called )ype field in some analyFers$. "e;ll tal a!out this
field in more detail in a minute.
S'rce IP $%%re## /%!it IP address of sending station.
De#t"!$t"! IP $%%re## /%!it IP address of the station this pacet is destined for.
O9t"!# *sed for networ testing, de!ugging, security, and more.
D$t$ 6fter the IP option field will !e the upper%layer data.
;.;.8 I!ter!et C!trl Me##$0e Prtcl (ICMP
Page | 4
7/24/2019 six weeks it training on ccna
43/69
Internet Control Messa$e Protocol (ICMP)wors at the 'etwor layer and is used !y IP for many
different services. IC9P is a management protocol and messaging service provider for IP. Its messages
are carried as IP datagram. +8C 1uest and reply messages to chec the physical
and logical connectivity of machines on an internetwor.
;.;.; A%%re## Re#l't"! Prtcl (ARPAress *esol!tion Protocol (A*P) finds the hardware address of a host from a nown IP address.
5ere;s how it wors( "hen IP has a datagram to send, it must inform a 'etwor 6ccess protocol, such
as 3thernet or wireless, of the destination;s hardware address on the local networ. #It has already !een
informed !y upper%layer protocols of the destination;s IP address.$ If IP doesn;t find the destinationhost;s hardware address in the
6+P cache, it uses 6+P to find this information..
6s IP;s detective, 6+P interrogates the local networ !y sending out a !roadcast asing the machine
with the specified IP address to reply withits hardware address. So !asically, 6+P translates the
software #IP$ address into a hardware addressWfor example, the destination machine;s.
3thernet adapter addressWand from it, deduces its wherea!outs on the =6' !y !roadcasting for thisaddress.
6. SOFTWARE REJUIREMENT
Cisco Pacet )racer is a comprehensive, networing technology teaching and learning program thatoffers a uni>ue com!ination of realistic simulation and visualiFation experiences, assessment and
Page | 4/
7/24/2019 six weeks it training on ccna
44/69
activity authoring capa!ilities, and opportunities for multiuser colla!oration and competition.
Innovative features of Pacet )racer will help students and teachers colla!orate, solve pro!lems, and
learn concepts in an engaging and dynamic social environment.Some of the !enefits of Pacet )racer are as follows(
Provides a realistic simulation and visualiFation learning environment that supplementsclassroom e>uipment
3na!les multiuser, real%time colla!oration and competition for dynamic learning
3na!les authoring and localiFation of structured learning activities such as la!s,
demonstrations, >uiFFes, exams, and games
3mpowers students to explore concepts, conduct experiments, and test their
understanding
6llows students and teachers to design, !uild, configure, and trou!leshoot networs
using virtual e>uipment
Supports a variety of teaching and learning opportunities such as lectures, group andindividual la!s, homewor, and competitions
Supports feature expansion through external applications using an 6PI to enhance the
functionality of Cisco Pacet )racer in areas such as curriculum and assessmentdelivery, games, accessi!ility, and interfacing with real e>uipment.
Pacet )racer uivalent
&S( 9icrosoft "indows ---, "indows XP, Bista 5ome asic, Bista 5ome Premium,
8edora 0, or *!untu 0.1-
1
/
4
uirements
Shortest path computations re>uire many CP* circles
If networ is sta!le little !andwidth is usedJ react >uicly to topology changes
6nnouncements cannot !e YfilteredZ. 6ll items in the data!ase must !e sent to neigh!ors
6ll neigh!ors must !e trusted
6uthentication mechanisms can !e used to avoid undesired ad7acencies
'o split horiFon techni>ues are possi!le
O9e! S)rte#t P$t) F"r#t (OSPF R't"!0 Prtcl
&pen Shortest Path 8irst #&SP8$ is a routing protocol developed for Internet Protocol #IP$ networs !y the interior
gateway protocol #IGP$ woring group of the Internet 3ngineering )as 8orce #I3)8$. )he woring group wasformed in 1 to design an IGP !ased on the shortest path first #SP8$ algorithm for use in the Internet. Similar to
the Interior Gateway +outing Protocol #IG+P$, &SP8 was created !ecause in the mid%1-s, the +outing
Information Protocol #+IP$ was increasingly una!le to serve large, heterogeneous internetwors.
&SP8 is a classlessrouting protocol, which means that in its updates, it includes the su!net of each route it nows
a!out, thus, ena!ling varia!le%length su!net mass. "ith varia!le%length su!net mass, an IP networ can !e!roen into many su!nets of various siFes. )his provides networ administrators with extra networ%configuration
flexi!ility. )hese updates are multicasts at specific addresses #4.-.-.< and 4.-.-.:$.
&SP8 has two primary characteristics(
1$ )he protocol is open #non proprietary$, which means that its specification is in the pu!lic domain.
)he &SP8 specification is pu!lished as +e>uest 8or Comments #+8C$ 140.
$ )he second principal characteristic is that &SP8 is !ased on the SP8 algorithm, which sometimes is referred to
as the Ai7stra algorithm, named for the person credited with its creation.
Page |
7/24/2019 six weeks it training on ccna
52/69
COMMANDS+>
+outer\config terminal
+outer#config$\router ospf process%id
+outer#config%router$\networ networ%num!er mas area area%id
3xample(
+outer#config%router$\networ 1.1:.1-.-
7/24/2019 six weeks it training on ccna
53/69
)he 3IG+P metric is a can !e a complex calculation, !ut !y default it only uses !andwidth and delay to
determine the !est path.
COMMANDS+>
+outer\config terminal
+outer #config$\r'ter e"0r9 AS
+outer #config%router$\!et/r1 X.X.X.X
?.3.8FRAME RELA:
It has the concept of 7oining remote areas through the single interface with the help of 8rame +elay
Switches.
It )$# c!ce9t *+
Birtual Circuits
8rame +elay 3ncapsulation
?.3.;NAT IMPLEMENTATION
Page |
7/24/2019 six weeks it training on ccna
54/69
It is use for translating private to pu!lic IP address. So we can connect our private networ running in
the department to connect to the glo!al networ .It converts the private IP to Pu!lic IP in order to
communicate
It )$# c!ce9t * +
Static '6)
Aynamic '6)
P6) #Port 6ddress )ranslation$
?.3.6SWITCHING
Switching is the process of using the hardware address of devices on a =an to communicate with the
external networ. It is used to carry data pacets from different vlan to the main router. It provides
Spanning )ree Protocol to choose the !est path for carrying the data pacets with minimum cost and
less transmission loss in the networ.
It )$# t)e c!ce9t *(
Port Security
Creating Blans
W)$t "# $ VLAN
6s I said, a B=6' is a virtual =6'. In technical terms, a B=6' is a !roadcast domain created !y switches. 'ormally, it is a router
creating that !roadcast domain. "ith B=6';s, a switch can create the !roadcast domain.
)his wors !y, you, the administrator, putting some switch ports in a B=6' other than 1, the default B=6'. 6ll ports in a single B=6'are in a single !roadcast domain.
ecause switches can tal to each other, some ports on switch 6 can !e in B=6' 1- and other ports on switch can !e in B=6' 1-.
roadcasts !etween these devices will not !e seen on any other port in any other B=6', other than 1-. 5owever, these devices can all
communicate !ecause they are on the same B=6'. "ithout additional configuration, they would not !e a!le to communicate with any
other devices, not in their B=6'.
H/ c$! %e"ce# ! %"**ere!t VLAN# c&&'!"c$te
Aevices on different B=6';s can communicate with a router or a =ayer / switch. 6s each B=6' is its own su!net, a router or =ayer /
switch must !e used to route !etween the su!nets.
W)$t "# $ tr'!1 9rt
"hen there is a lin !etween two switches or a router and a switch that carries the traffic of more than one B=6', that port is a trun
port.
6 trun port must run a special truning protocol. )he protocol used would !e Cisco;s proprietary Inter%switch lin #IS=$ or the I333
standard -.1>.
Page |
7/24/2019 six weeks it training on ccna
55/69
H/ % I cre$te $ VLAN
Configuring B=6';s can vary even !etween different models of Cisco switches. 2our goals, no matter what the commands are, is to(
Create the new B=6';s
Put each port in the proper B=6'
=et;s say we wanted to create B=6';s < and 1-. "e want to put ports ? / in B=6' < #9areting$ and ports 4 and < in B=6' 1-#5uman +esources$. &n a Cisco
7/24/2019 six weeks it training on ccna
56/69
)he router uses IP su!nets to move traffic !etween B=6's. 3ach B=6' has a different IP su!net, and
there is a one%to%one correspondence of B=6' and IP su!net !oundaries. If a host is in a given IP
su!net,
it is also in a given B=6', and vice%versa.
ACL+
6ccess Control =ist, 6C= is a listing containing one or more 6C3that tells a computer operating
system or other networ device what rights users have to each item on a computer or networ device.8or example, an 6C= may specify if a user or the users group have access to a file or folder on that
computer or networ.
6ccess Control =ists #6C=s$ allow a router to permit or deny pacets !ased on a variety of criteria. )he6C= is configured in glo!al mode, !ut is applied at the interface level. 6n 6C= does not tae effect
until it is expressly applied to an interface with the ip access%group command. Pacets can !e filtered asthey enter or exit an interface.
If a pacet enters or exits an interface with an 6C= applied, the pacet is compared against the criteriaof the 6C=. If the pacet matches the first line of the 6C=, the appropriate YpermitZ or YdenyZ action is
taen. If there is no match, the second line;s criterion is examined. 6gain, if there i
Page |
7/24/2019 six weeks it training on ccna
57/69
3ach of these rules has some powerful implications when filtering IP and IPX pacets with access lists.
)here are two types of access lists used with IP and IPX(
St$!%$r% $cce## l"#t#
)hese use only the source IP address in an IP pacet to filter the networ. )his !asically permits or
denies an entire suite of protocols. IPX standards can filter on !oth source and destination IPX address.
Ete!%e% $cce## l"#t#
)hese chec for !oth source and destination IP address, protocol field in the 'etwor layer header, andport num!er at the )ransport layer header. IPX extended access lists use source and
destination IPX addresses, 'etwor layer protocol fields, and socet num!ers in the )ransport layer
header.
7.6 CREATING VLANS
y default all switch port are the mem!er of the single !roadcast domain so all port share the same
!roadcast to solve this pro!lem switch support Blans.Blan is a single !roadcast domain so that all devices connect to Blan receive !roadcast send !y any
other B lan mem!er !ut different Blan will not receive those same !roadcast .
6ll switch ports are the mem!er of Blan 1 called as 'ative Blan .
8ollowing commonds are entered(
SwitchQena!le
Switch\vlan data!ase
FIGURE3@+ CREATING VLANS
Page |
7/24/2019 six weeks it training on ccna
58/69
Switch #vlan$ \vlan 1- name I)
B=6' 1- added(
'ame( I)
Switch #vlan$ \vlan - name 5+
B=6' - added( 'ame( 5+
Switch #vlan$ \vlan /- name 6CC&*')S
B=6' /- added(
'ame( 6CC&*')S
Switch #vlan$ \exit
6PP=2 completed.
efore assigning ports for particular Blan they all are part of Blan 1 called 'ative Blan
FIGURE84+ ALL PORTS ARE MEMBER OF VLAN 3 B: DEFAULT
Page |
7/24/2019 six weeks it training on ccna
59/69
7.6.3 ASSIGNING PORTS FOR PARTICULAR VLAN
In order to assign ports for particular Blan first go to glo!al mode then enter the commands.
Commands to !e entered(
SwitchQena!le
Switch\conf t
3nter configuration commands, one per line. 3nd with C')= .
Switch#config$\interface range f-/ %4
Switch#config%if%range$\switchport mode access
Switch#config%if%range$\switchport access vlan 1-
FIGURE83+ PORTS ASSIGNED TO PARTICULAR VLAN
Page |
7/24/2019 six weeks it training on ccna
60/69
7.?CREATING INTER VLANS
It is the concept of connecting different different Blan !y using layer / device.
6s a core layer switch is connected to the 8ast 3thernet port i.e.f-- of the router and we have so many
Blan in our networ so we create su! interface of 8ast 3thernet port to assign particular Blan to specific
su! interface port and assign the IP address to particular su! interface.
8ollowing commands are entered(
+outerQena!le #)o enter into the privilege mode$
+outer\Qconfigure terminal #)o enter into glo!al mode$
+outer#config$\interface f--#)o enter the interface of which su! interfaces are created$
FIGURE88+ CREATING SUB INTERFACE AND ASSIGNING FOR VLAN
Page | :-
7/24/2019 six weeks it training on ccna
61/69
+outer#config%if$\no ip address#'o IP is assigned to 8ast 3thernet port$
+outer#config%if$\no shut
+outer#config%if$\interface f--.1 #Su! interface is created and mae the lin up$
T=I'O%
7/24/2019 six weeks it training on ccna
62/69
7. ENABLING ROUTING TO CONNECT REMOTE AREAS
In order to provide connectivity !etween remote areas means that one !ranch is running on particular IP
and another ranch is running on another IP so in order to provide communication !etween different
networs we mae use of routing.
+outing is the act of moving information across an internetwor from a source to a destination. +outing
is used for taing a pacet from one device and sending it through the networ to another device on a
different networ. If your networ has no routers, then you are not routing. +outers route traffic to all
the networs in your inter networ. +outing directs pacet forwarding, the transit of logically
addressed pacets from their source toward their
ultimate destination through intermediate nodesJ typically hardware devices called routers, !ridges,
gateways, firewalls, or switches.
8ollowing commands are to !e entered(
+outerQena!le #)o enter into the privilege mode$
+outer\Qconfigure terminal #)o enter into glo!al mode$
+outer#config$\router eigrp 1#+outing protocol is run$
+outer#config%router$\no auto%summary
+outer#config%router$\networ 1-.-.-.-#'etwor running on particular router$
+outer#config%router$\networ 1.1:.1.-
Page | :
7/24/2019 six weeks it training on ccna
63/69
FIGURE8?+ ENABLING ROUTING
7.@ NAT IMPLEMENTATION
It is use for translating private to pu!lic IP address. So we can connect our private networ running in
the department to connect to the glo!al networ .It converts the private IP to Pu!lic IP in order to
communicate
8ollowing command are entered(
+outerQena!le
+outer\Qconfigure terminal
+outer #config$\Qip nat pool aram 1.1:.1.1 1.1:.1.1 netmas
7/24/2019 six weeks it training on ccna
64/69
+outer #config$\Qip nat inside
FIGURE8=+ PRIVATE IP IS CONVERTED TO PUBLIC IP USING NAT
Serer#
6 server is primarily a program that runs on a machine, providing a particular and specific service toother machines connected to the machine on which it is found.
'owadays, server functionality has !ecome so rich, complex and varied in nature that there are whole
very powerful computers dedicated to !eing exclusively servers. )his has led many non%technical
people to denote servers as !eing machines that run services.
6 !et/r1 #ereris a computer designed to process re>uests and deliver data to other #client$
computers over a local networ or the Internet. 'etwor servers typically are configured with
additional processing, memory and storage capacity to handle the load of servicing clients.
DHCP SERVER
A5CP #Aynamic 5ost Configuration Protocol$ is a protocol that allows a central
computer to automatically assign the )CPIP networ configuration toindividual wor%stations on a private networ.
"ith A5CP ena!led it suffices to ena!le the K&!tain an IP address
automaticallyK in the )CPIP configuration on the private networ. )he A5CP
Page | :4
7/24/2019 six weeks it training on ccna
65/69
Server then taes over the responsi!ility of assigning the )CPIP parameters,
significantly lowering the tas of networ maintenance
5ow Aoes A5CP "orL
6t !oot time the computer has no networ parameters assigned to it. )he
following list provides an overview of the typical networ parameters(_ IP address and networ mas
_ Aefault routegateway ` an IP address which will !e used for forwardingpacets whose destinations are !eyond local networ_ A'S servers for resolving Internet names #e.g. internet.com$ to IP
addresses
_ "orstation parameters, e.g., domain name or worgroupworstationname
_ Static routes
_ IP forwarding setting_ 9)* siFe
_ &ther settings #a complete list can !e found in the A5CP +8Cs$
St$t"c c!*"0'r$t"! .
"ith static configuration, the client computer uses pre%configured networ parameters. )hedisadvantages of this approach include the possi!ility of IP address conflicts and the administrative
issues possi!le when manually configuring many internal clients.
DHCP c!*"0'r$t"! ($'t&$t"c $."ith automatic configuration, the computer o!tains its networ parameters from the A5CP Server.
)his way the IP addresses are automatically managed and accordingly address conflicts are avoided. If
manual and automatic networ configurations are used together, the administrator must ensure that theA5CP Server wont assign IP addresses used !y manually%configured computers
Page | :
7/24/2019 six weeks it training on ccna
66/69
H/ t c!*"0're t)e DHCP #erer.&nce you have considered the implications of A5CP in your networ, you are ready to get started withthe simple configuration.
8or a small networ, the configuration of the A5CP Server is not very challenging and the In@oy A5CP
Server Plugin is deli!erately designed to !e extremely simple. In fact, in the In@oy 8irewall, you canimmediately ena!le the A5CP Server and have it operational in less than a minute. 5ere is how.
PROECT UNDERTAKEN
Page | ::
7/24/2019 six weeks it training on ccna
67/69
INTRANET COMMUNICATION
BETWEEN TWO SITES
)his pro7ect is a!out the communication of the two sites #India and 6ustralia$ of the same enterprisesituated in different locations and communicating over the intranet !etween two Sites.
I have created six vlans in customer;s sites #India$ and these vlans are connected to a switch creating
six collision domains and six !roadcast domains. 6nd further these two switches are connected to two
different routers of these two different sites in and these two routers are connected to two different
routers of two different service providers.
In these company routers I have used P6) for converting private IP;s into pu!lic address that is usedover the internet. I put default route to the service provider and tunnel to securely perform the
communication !etween the customer sites.
In the service provider end I have used &SP8 #open shortest path first$ for routing purpose.
Page | :0
7/24/2019 six weeks it training on ccna
68/69
)o overview the service provider I have created a syslog server which will generate the log of routers
and provide updated feed!ac. 8or the syslog server I have created a loop!ac adapter and connectedmy laptop as a server.
34. C!cl'#"! $!% F't're Sc9e +
Communication !etween +emote 6reas and Security has it application in almost every field including
!usiness, education, entertainment, etc. 9y main goal in this pro7ect is to develop a communication
!ridge !etween two customer sites having connectivity with each other with security It;s a onetime
Investment pro7ect.
Cisco Pacet )racer used in this pro7ect is one of the latest cutting edge technologies for Student in this
field. Auring the initial phases of developing this pro7ect I faced several challenges in understandingsome concept in CP+ !ut it got cleared after study and practice.
eing a trainee, I got an excellent opportunity to follow the practices of 'etworing. "oring on the
pro7ect help me learn and explore various networing features. )here is always a scope for
enhancement in the pro7ect ,which currently is for seen in the integration of the modules that were
developed so far during training.
Page | :
7/24/2019 six weeks it training on ccna
69/69
33. REFRENCE
3. T%% L$&&le
6 Cisco Certified 'etwor 6ssociate Study Guide 0thedition.
8. ///./"1e9e%"$.c&
6 solution to all the to all pro!lems a encyclopaedia with all solution.
;. ///.//0#l't"!.c&
6 Pdf file giving a !rief description a!out 8rame +elay concepts.
6. C"#c !et/r1"!0 Ac$%e&-
3xplain the concept of the woring of the Cisco Pacet )racer with system re>uirement.
?. I!terc!!ect"!0 C"#c Net/r1 De"ce# P$rt 3 8
6 Self Guide for understanding the concept of internetwor and introduction to Cisco
routers.