Cisco Network Academy validates the ability to install, configure, operate, and troubleshoot
medium-size route and switched networks, including implementation and verification of
connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of
security threats, introduction to wireless networking concepts and terminology, and
performance-based skills. This new curriculum also includes (but is not limited to) the use of
these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line
Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2), VLANs,
Ethernet, access control lists (ACLs).
1.1 SOFTWARE USED: PACKET TRACER VER 6.2.0.005
Cisco Packet Tracer is a powerful network simulation program that allows students to
experiment with network behavior and ask “what if” questions. As an integral part of the
Networking Academy comprehensive learning experience, Packet Tracer provides simulation,
visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching
and learning of complex technology concepts. Packet Tracer supplements physical equipment
in the classroom by allowing students to create a network with an almost unlimited number of
devices, encouraging practice, discovery, and troubleshooting. The simulation based learning
environment helps students develop 21st century skills such as decision making, creative and
critical thinking, and problem solving.
Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run
on Mac OS, Linux and Microsoft Windows. A similar Android app is also available. Packet
Tracer allows users to create simulated network topologies by dragging and dropping routers,
switches and various other types of network devices. A physical connection between devices
is represented by a "cable" item. Packet Tracer supports an array of simulated Application
Layer protocols, as well as basic routing with RIP, OSPF, EIGRP, BDP, to the extents
required by the current CCNA curriculum. As of version 6.2, Packet Tracer also supports the
Border Gateway Protocol, even though; this protocol is not taught in the CCNA curriculum.
As of version 6.2, Packet Tracer supports an embedded web server with JavaScript and CSS
support. The command line can be used for creating a router-to-pc connection. Version 6.1.1
Page 1
Chapter-1 ABOUT THE TECHNOLOGY
added support for various DHCP, EIGRP and OSPF commands, improved support for Zone-
Based Firewall policies. Version 6.0 added support for IOS version 15 and Hot Standby
Routing Protocol.
1.2 Packet Tracer Features: Logical and Physical Workspaces Real-Time and Simulation Modes User friendly CLI Global event list (packet sniffer) LAN, switching, TCP/IP, routing, and WAN protocols Activity Wizard, Lab grading Multiple platform support
Page 2
An ideal Bank Networking system will be fully network base and easy with friendly user interface staff task management system where any banking system manage their networking system somehow Head office , Branch Office, and other office are maintain LAN, MAN, WAN, VLAN, VLSM,VPN and some branch are maintain by manageable switch. LAN is used by Local Area Networking system for example one office and a one building. And MAN are using by the Metro Politian area Network for Example small town, and WAN are use by the WIDE AREA NETWORK. In this networking system are used by all banking users can use by shared their data very easily. So that every user use to take about Network Structure & Security of Banking System instantly this way anywhere. 2.1 Objectives 1. To design and simulate a banking network system which is secure. 2. To simulate a banking network system that will easily manage any banking task. 3. To manage the banking network by a central system
2.3 Justification of study: The trend of growth of Online Banking brings many security issues and increasing cost of implementing higher security system for both Online Banking users and the banks. Classers said security is all about risks and associated cost in his paper .The most critical issue of Online Banking security is to protect valuable information that is susceptible to unauthorized access by attackers. Hence, the banks must constantly increase security. At the same time, the banks must manage costs to make a profit. In contrast, increasing security is increasing the cost for attackers to break into the system, and increasing the punishment that the attackers may suffer. Hence the Internet criminals/attackers/crackers may lose motivation for hacking a high security online banking system.
2.4 Scopes of study
The scope of the Network Structure & Security of Banking System includes.
1. Online based day to day transmission. 2. Save time and cost because of day to day transmission. 3. Established relation between one branch to another 4. Connect all branches to head branch in same network. 5. Online based update and maintain everyday work.
The following case study is used to illustrate the process and documentation required
for a network design. This case study presents a scenario in which the Banks & ATM has
hired a Network Consultant Group to design their network. In order to help organization this
project, the scenario has been broken into eight phases listing requirements for each phase.
Page 3
Chapter-2 INTRODUCTION
A worksheet is to be completed for each part. A formal report, similar to what would
be given to the banks, will need to be created after all tasks have been completed.
This case study requires that you accomplish the following:
1. Use the resources provided, diagram and narrative, to set up the physical network.
2. Set up an IP sub-netting scheme
3. Configure the routers as required.
4. Set up and configure the switches and VLANS as required.
5. Verify and troubleshoot all connections.
6. Provide detailed documentation in the appropriate format.
7. Provide a written final report
Page 4
The Banks & ATM has provided a partially completed logical diagram of the required network.
The company has also provided networking equipment for development and demonstration.
The company consists of 3 remote locations. One being the main building and other two locations on a remote site.
The main building consists of 6 departments with the following requirement:
Department Number RemarksBANKS 120 Size can vary up to 255
ATM 120 Size can vary up to 255CONTYROL 120 Size can vary up to 255
8 servers that distributed in all locations The following ip address to be used for connection with SERVER
198.168.0.1 198.168.0.2 198.168.0.3 198.168.0.4 198.168.0.5 198.168.0.6 198.168.0.7 198.163.0.1 198.163.0.2 198.163.0.3 198.163.0.4 198.163.0.5 198.163.0.6 198.163.0.7
3.1 Following address are used for internal addressing.
Page 5
Chapter-3 REQUIREMENTS
10.0.0.0 20.0.0.0 30.0.0.0 40.0.0.0 11.0.0.0 21.0.0.0 31.0.0.0 41.0.0.0 Use VLSM for IP addressing. Device details
DEVICE MODEL NUMBERRouter 2811 4
Switches 2960 10Server - 11
Page 6
Figure-1Page 7
Chapter-4 NETWORK STRUCTURE
Figure-2
Page 8
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation.
Address ClassesThere are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address.· Class A addresses begin with 0xxx, or 1 to 126 decimal.· Class B addresses begin with 10xx, or 128 to 191 decimal.· Class C addresses begin with 110x, or 192 to 223 decimal.· Class D addresses begin with 1110, or 224 to 239 decimal.· Class E addresses begin with 1111, or 240 to 254 decimal.Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine Class D addresses are reserved for multicasting. Class E addresses are reserved for future use.
SubnettingSubnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive.
Subnet MaskingApplying a subnet mask to an IP address allows you to identify the network and node parts of the address. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number.
DHCPThe Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating the configuration of computers that use TCP/IP. DHCP can be used to automatically assign IP addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and default router, and to provide other configuration information such as the addresses for printer, time and news servers.
Page 9
Chapter-5 IP ADDRESSING
Number of
host
addresses
required
Network
Address
Subnet
Mask
Max
Number of
Hosts
Possible
In Use
(Yes/No)
Network
Name
30 10.0.0.0 /27 30 Yes PNB Control
60 10.0.0.32 /26 30 Yes PNB Bank
6 10.0.0.66 /29 30 Yes PNB ATM
30 20.0.0.0 /27 30 Yes SBI Control
25 20.0.0.32 /24 30 Yes SBI Bank
24 20.0.0.64 /24 30 Yes SBI ATM
20 30.0.0.0 /24 30 Yes HDFC control
30 30.0.0.32 /27 30 Yes HDFC BANK
30 30.0.0.64 /27 30 Yes HDFC ATM
255 40.0.0.0 /27 30 Yes ICICI Bank
NOTE: Overlapping subnets in sales, marketing department etc is note done as more hosts
can be accommodated in the given domain whenever required All devices are assigned ip address using DHCP
Page 10
Chapter-6 INTERNAL IP ADDRESSING
SERVER IP ADDRESS LOCATIONDNS 198.168.0.6 CENTERHTTP 198.168.0.2HTTP 198.168.0.3 CENTERHTTP 198.168.0.4 CENTER
HTTP 198.168.0.5 CENTER
FTP 198.168.0.7 CENTERTFTP 198.168.0.8 CENTERHTTP 198.163.0.2 CENTER
HTTP 198.163.0.3HTTP 198.163.0.4 CENTER
HTTP 198.163.0.5 CENTER
DNS 198.163.0.6 CENTER
TFTP 198.163.0.7 CENTER
7.1 Router Configuration:
NORTH BANKING ROUTER (DCE Speed 64000)
Interface/Sub
Interface
Type/Number
Description and Purpose
Network Number
Interface IP address
Subnet Mask
S0/3/0 Link to PNB 192.168.0.0 192.168.0.1 /30
S0/3/1 Link to SBI 192.168.0.4 192.168.0.5 /30
Se0/0/0 Link to HDFC 192.168.0.8 192.168.0.9 /30
Se0/1/0 Link to ICICI 192.168.0.12 192.168.0.13 /30
Fa0/0 Link to servers 198.168.0.0 198.168.0.1 /30
Page 11
Chapter-7 SERVER ADDRESSING
PNB ROUTER (DTE)
Interface/Sub
Interface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/1 Link To Bank 193.168.0.32 193.168.0.33 /27
Se0/2 Link to north banking 192.168.0.0 192.168.0.2 /30
Se0/3 Link to Contorl 193.168.0.0 193.168.0.1 /27
Se0/0 Link to ATM 193.168.0.65 193.168.0.65 /27
BANK ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 193.168.0.4 193.168.0.6 /30
Fa0/0 Link to Switch 10.0.0.32 10.0.0.1 /27
CONTROL ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 193.168.0.0 193.168.0.1 /30
Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27
ATM ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 193.168.0.8 193.168.0.9 /30
Fa0/0 Link to Switch 10.0.0.64 10.0.0.65 /27
SBI ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
S0/2 Link to North bank 192.168.0.4 192.168.0.5 /30
Se0/3 Link to Bank 193.168.0.12 193.168.0.13 /27
Se0/1 Link to Control 193.168.0.16 193.168.0.17 /27
Page 12
Se0/0 Link to Atm 192.168.0.20 193.168.0.21 /27
CONTROL ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to SBI 193.168.0.12 193.168.0.13 /30
Fa0/0 Link to Switch 20.0.0.0 20.0.0.1 /27
BANK ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to SBI 193.168.0.16 193.168.0.17 /30
Fa0/0 Link to Switch 20.0.0.32 20.0.0.33 /27
ATM ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to SBI 193.168.0.20 193.168.0.21 /30
Fa0/0 Link to Switch 20.0.0.64 20.0.0.65 /27
HDFC ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
S0/2 Link to North bank 192.168.0.8 192.168.0.9 /30
Se0/3 Link to Bank 194.168.0.0 194.168.0.1 /27
Se0/1 Link to Control 194.168.0.4 194.168.0.5 /27
Se0/0 Link to Atm 194.168.0.8 194.168.0.9 /27
CONTROL ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to HDFC 194.168.0.0 194.168.0.1 /30
Fa0/0 Link to Switch 30.0.0.0 30.0.0.1 /27
BANK ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
Page 13
SE0/2 Link to PNB 193.168.0.4 194.168.0.5 /30
Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27
ATM ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 194.168.0. 194.168.0.5 /30
Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27
ICICI ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
S0/2 Link to North bank 192.168.0.8 192.168.0.5 /30
Se0/3 Link to Bank 194.168.0.12 193.168.0.13 /27
Se0/1 Link to Control 194.168.0.16 193.168.0.17 /27
Se0/0 Link to Atm 194.168.0.20 193.168.0.21 /27
CONTROL ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to HDFC 194.168.0.12 194.168.0.13 /30
Fa0/0 Link to Switch 40.0.0.0 30.0.0.1 /27
BANK ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 194.168.0.4 194.168.0.5 /30
Fa0/0 Link to Switch 40.0.0.32 40.0.0.33 /27
ATM ROUTER (DTE)
Interface/SubInterface
Description and Purpose Network Interface IP Subnet Mask
Page 14
Type/Number Number address
SE0/2 Link to PNB 194.168.0.20 194.168.0.21 /30
Fa0/0 Link to Switch 40.0.0.64 40.0.0.65 /27
SOUTH BANKING ( DCE Speed 64000)
Interface/SubInterface
Type/Number
Description and Purpose Network Number Interface IP address
Subnet Mask
S0/1/1 Link to SBI 192.163.0.4 192.163.0.5 /30
SE0/1/0 Link to PNB 192.163.0.0 192.163.0.1 /30
SE0/0/0 Link to HDFC 192.163.0.8 192.163.0.8 /30
SE0/3/0 Link to ICICI 192.163.0.12 192.163.0.13 /30
SE0/3/1 Link to Server 198.163.0.0 198.163.0.1 /30
PNB ROUTER (DTE)
Interface/Sub
Interface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/1 Link To Control 122.168.0.32 122.168.0.33 /27
Se0/2 Link to South banking 192.16.0.0 192.168.0.2 /30
Se0/3 Link to Bnak 122.168.0.0 122.168.0.1 /27
Se0/0 Link to ATM 122.168.0.64 12.168.0.65 /27
BANK ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/0 Link to PNB 122.168.0.0 122.168.0.2 /30
Fa0/0 Link to Switch 11.0.0.32 11.0.0.33 /27
Page 15
CONTROL ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 122.168.0.64 122.168.0.65 /30
Fa0/0 Link to Switch 11.0.0.64 11.0.0.65 /27
ATM ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 122.168.0.0 122.168.0.1 /30
Fa0/0 Link to Switch 11.0.0.0 11.0.0.0 /27
SBI ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
S0/2 Link to South bank 192.163.0.4 192.163.0.6 /30
Se0/3 Link to Bank 122.168.0.14 122.168.0.12 /27
Se0/1 Link to Control 122.168.0.16 122.168.0.17 /27
Se0/0 Link to Atm 122.168.0.20 122.168.0.21 /27
CONTROL ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to SBI 122.168.0.12 122.168.0.13 /30
Fa0/0 Link to Switch 21.0.0.32 21.0.0.33 /27
BANK ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to SBI 122.168.0.16 122.168.0.17 /30
Fa0/0 Link to Switch 21.0.0.0 21.0.0.1 /27
ATM ROUTER (DTE)
Page 16
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to SBI 122.168.0.20 122.168.0.21 /30
Fa0/0 Link to Switch 21.0.0.64 21.0.0.65 /27
HDFC ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
S0/2 Link to South bank 192.163.0.8 192.163.0.9 /30
Se0/3 Link to Bank 122.122.0.0 122.122.0.1 /27
Se0/1 Link to Control 122.122.0.4 122.122.0.5 /27
Se0/0 Link to Atm 122.122.0.8 122.122.0.9 /27
CONTROL ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to HDFC 122.122.0.4 122.122.0.5 /30
Fa0/0 Link to Switch 31.0.0.4 31.0.0.5 /27
BANK ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 122.122.0.0 122.122.0.1 /30
Fa0/0 Link to Switch 31.0.0.0 31.0.0.1 /27
ATM ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 122.122.0.8 122.122.0.9 /30
Fa0/0 Link to Switch 31.0.0.64 31.0.0.65 /27
ICICI ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
S0/2 Link to North bank 122.122.012 122.122.0.13 /30
Se0/3 Link to Bank 122.122.0.20 122.122.0.21 /27
Page 17
Se0/1 Link to Control 122.122.0.16 122.122.0.17 /27
Se0/0 Link to Atm 122.122.0.12 122.122.0.13 /27
CONTROL ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to HDFC 122.122.0.16 122.122.0.17 /30
Fa0/0 Link to Switch 41.0.0.32 41.0.0.33 /27
BANK ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 122.122.0.12 122.122.13 /30
Fa0/0 Link to Switch 41.0.0.0 41.0.0.1 /27
ATM ROUTER (DTE)
Interface/SubInterface
Type/Number
Description and Purpose Network Number
Interface IP address
Subnet Mask
SE0/2 Link to PNB 122.122.0.20 122.122.0.21 /30
Fa0/0 Link to Switch 41.0.0.64 41.0.0.65 /27
Page 18
Routing is the act of moving information across an internetwork from a source to a destination. Routing involves two basic activities: determining optimal routing paths and transporting information groups (typically called packets) through an internetwork.
Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard of measurement, such as path bandwidth, that is used by routing algorithms to determine the optimal path to a destination. To aid the process of path determination, routing algorithms initialize and maintain routing tables, which contain route information. Route information varies depending on the routing algorithm used.
Routing algorithms fill routing tables with a variety of information. Destination/next hop associations tell a router that a particular destination can be reached optimally by sending the packet to a particular router representing the "next hop" on the way to the final destination. When a router receives an incoming packet, it checks the destination address and attempts to associate this address with a next hop.
Routing algorithms often have one or more of the following design goals:
• Optimality • Simplicity and low overhead • Robustness and stability • Rapid convergence • Flexibility
Page 19
Chapter-8 ROUTING PROTOCOL
8.1 Types of routing:8.1.1 STATIC ROUTING ALGORITHMS are hardly algorithms at all, but are table mappings established by the network administrator before the beginning of routing. These mappings do not change unless the network administrator alters them. Algorithms that use static routes are simple to design and work well in environments where network traffic is relatively predictable and where network design is relatively simple.
8.1.2 DYNAMIC ROUTING ALGORITHMS which adjust to changing network circumstances by analyzing incoming routing update messages. If the message indicates that a network change has occurred, the routing software recalculates routes and sends out new routing update messages. These messages permeate the network, stimulating routers to rerun their algorithms and change their routing tables accordingly.
8.2 The various routing protocol that can be used are:
1. RIP (routing information protocol) is a distance vector routing protocol. It sends complete routing table out to all other members in an interval of 30 seconds. It uses hop count as a metric and by default hop count is set to 15.
RIP Configuration: The command syntax is as follows: Router (config) #router rip Router (config-router) #network network-number net-mask
2. IGRP is a distance vector Interior Gateway Protocol (IGP). IGRP uses a composite metric that is calculated by factoring weighted mathematical values for internetwork delay, bandwidth, reliability, and load. Network administrators can set the weighting factors for each of these metrics, although great care should be taken before any default values are manipulated.
IGRP Configuration: To configure the IGRP routing process use the router igrp configuration command. The command syntax is as follows: Router A (config) #router igrp as-number Router A (config) #network network-number net-mask There as number identifies the IGRP process. To specify a list of networks for IGRP routing process, se the network router configuration command. To remove an entry, use the no form of the command.
3. EIGRP Key capabilities that distinguish EIGRP from other routing protocols include fast convergence, support for variable-length subnet mask, support for partial updates, and support for multiple network layer protocols.
Page 20
A router running EIGRP stores all its neighbors' routing tables so that it can quickly adapt to alternate routes. If no appropriate route exists, EIGRP queries its neighbors to discover an alternate route. EIGRP does not make periodic updates. Instead, it sends partial updates only when the metric for a route changes.EIGRP Configuration:EIGRP is an ideal choice for large, multi-protocol networks built primary on Cisco routers.RouterA(Config)#router eigrp as-number RouterA(Config)#network network-number net-mask.
4. OSPF is a link-state routing protocol that calls for the sending of link-state advertisements (LSAs) to all other routers within the same hierarchical area. Information on attached interfaces, metrics used, and other variables is included in OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF algorithm to calculate the shortest path to each node.
OSPF Configuration: To enable OSPF routing, use the global configuration command syntax: Router (configure) #router ospf process-id Router (configure-router) #network address wildcard-mask area area-id.
RoutingProtocol
Property 1
Supports VLSM
Property 2
Scalable
Property 3
Uses multicast updates
Property 4
Has view of complete toplology
Property 5
Easy to configure
Property 6
Proprietary
Total
RIP V1 - - - - - - 2
RIP v2 - - - - - - 4
IGRP - - - - - - 2
EIGRP - - - - - - 3
OSPF + + + + - + 5
Our configuration*****OSPF protocol in all routers with process id 10 in single area 0*****
Page 21
Now it’s making peoples life very easy as they get their money when they need. So, they do not need to carry either big amount of money or the checked book all the time. To get rid from this burden they need to deposit money in the bank by opening an account and then the bank will be given a Card i.e. an ATM card with a PIN number to them. By using that they can withdraw money from any ATM machine of that bank. When they insert the card in the machine and the PIN number the machine will show few instructions on the screen. By that time verification (PIN Number and Account Number) will be done with the main bank computer as they are connected. If the verification is correct then the user will choose an instruction and the ATM will dispense money to the card holder.
9.1 Internal Structure of ATM In the following pictures we have the internal structure of two different type of ATM machine. And also it can be divided into two different parts: - Upper Unit, -Lower Unit 9.2 Interactive components of ATM Card Reader: Customer inserts their card in it when there is written “Please Insert Your card” on the screen.
Keypad: Use for PIN code input, choices, amount of money etc as the input to The ATM machine.
Display Screen: This screen shows all the instructions or options for the customers „convenience.
Screen Buttons: When options are given on the screen one user can choose any of the options accordingly by the use of button on left or right side of the screen. These buttons select the option from the screen.
Cash Dispenser: Withdrawal money is given by this slot. Deposit Slot: To deposit money this slot is use.
Speaker: Speaker provides the facilities to the customer by giving auditory feedback.
ATM Card: ATM card is also like magnetic strip card. It is also a data carrier which electronically reads and writes data. ATM cards mainly a debit card.
Ways of Transaction: In Bank transactions are divided into three main categories
My bank to others bank A customer of a bank uses other banks ATM. Others bank to my bank other banks customer uses ATM of Bank Asia. My bank to my bank a customer uses its own bank ATM machine.
Page 22
Chapter-9 Automated Teller Machine:
Security is most important part for online banking system. We use the different method
for provide strong online banking security system and use owasp top ten project provide online banking security. Ensuring comprehensive network security visibility is no easy task. Uncover expert tips on how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions, and anomaly-based monitoring technology.
10.1 AUTHENTICATION MECHANISM :Authentication is the process of establishing whether a client is who or what it claims
to be in a particular context. A client can be an end user, a machine, or an application. The authentication mechanism is responsible for creating a credential, which is an internal product representation of a successfully authenticated client user. The abilities of the credential are determined by the configured authentication mechanism.
10.2 Challenge handshake Authentication Protocol (Chap): CHAP is an authentication scheme used by point to point servers to validate the
identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable challenge-value. CHAP
requires that the client make the secrete available in in plaintext form.
10.3 ACCESS CONTROL LIST (ACL): ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.
ACLs can be created for all routed network protocols such as IP and Internet Packet Exchange (IPX). ACLs can be configured at the router to control access to a network or subnet. To filter network traffic, ACLs determine if routed packets are forwarded or blocked
at the router interfaces.
Page 23
Chapter-10 SECURITY
10.4 ACLs can be used to perform the following task
Limited network traffic and increase network performance Provide traffic follow control Provide a basic level of security for network access. Decide which types of traffic are forwarded or blocked at the router interfaces. Control which areas a client can access on a network. Script hosts to permit or deny access to a network.
Page 24
.
VLAN is a switched network that is logically segmented by functions, project teams, or applications. Without regard to the physical location of users. For example, several end stations might be grouped as a department, such as engineering or accounting. When the end stations are physically located close to one another, you can group them into a LAN segment. If any of the end stations are in different buildings (not the same physical LAN segment), you can then group them into a VLAN.
We can assign each switch port to a VLAN. Ports in a VLAN share broadcast traffic. Ports that do not belong to that VLAN do not share the broadcast traffic.
VLANs provide the following features:
• Simplification of end-station moves, adds, and changes When an end station is physically moved to a new location, its attributes can be reassigned from a network management station through Simple Network Management Protocol (SNMP) or through the user interface menus. When an end station is moved within the same VLAN, it retains its previously assigned attributes in its new location. When an end station is moved to a different VLAN, the attributes of the new VLAN are applied to the end station.
• Controlled traffic activity VLANs allow ports on the same or different switches to be grouped so that traffic is confined to members of only that group. This feature restricts broadcast, unicast, and multicast traffic (flooding) only to ports included in a certain VLAN. The management domain is a group of VLANs that are managed by a single administrative authority.
• Workgroup and network security You can increase security by segmenting the network into distinct broadcast domains. To this end, VLANs can restrict the number of users in a broadcast domain. You can also control the size and composition of the broadcast domain by controlling the size and composition of a VLAN.
Page 25
Chapter-11 VLAN
NAT allows an Internet Protocol (IP) network to maintain public IP addresses separately from private IP addresses. NAT is a popular technology for Internet connection sharing. It is also sometimes used in server load balancing applications on corporate networks. In its most common configuration, NAT maps all of the private IP addresses on a home network to the single IP address supplied by an Internet Service Provider (ISP). This allows computers on the home LAN to share a single Internet connection. Additionally, it enhances home network security by limiting the access of external computers into the home IP network space.
NAT works by snooping both incoming and outgoing IP datagrams. As needed, it modifies the source or destination address in the IP header (and the affected checksums) to reflect the configured address mapping. NAT technically supports either fixed or dynamic mappings of one or more internal and external IP addresses.
Network Address Translation allows a single device, such as a router, to act as agent between the Internet (or "public network") and a local (or "private") network. This means that only a single unique IP address is required to represent an entire group of computers to anything outside their network.
The shortage of IP addresses is only one reason to use NAT. Two other good reasons are:
Security Administration
Page 26
Chapter-12 NETWORK ADDRESS TRANSLATION (NAT)
North BANKING:-Rou Router#sh run
Building configuration...
Current configuration : 1317 bytes
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
interface FastEthernet0/0
ip address 198.168.0.1 255.255.255.224
duplex au
to
speed auto
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
no ip address
shutdown
interface Serial0/0/1
no ip address
Page 27
Chapter-13 DEVICE CONFIGURATION
shutdown
interface Serial0/1/0
bandwidth 325435
ip address 192.168.0.9 255.255.255.252
clock rate 64000
interface Serial0/1/1
bandwidth 325435
ip address 192.168.0.13 255.255.255.252
clock rate 64000
interface Serial0/2/0
no ip address
shutdown
interface Serial0/2/1
no ip address
shutdown
interface Serial0/3/0
bandwidth 4545
ip address 192.168.0.1 255.255.255.252
clock rate 64000
!
interface Serial0/3/1
bandwidth 4545
ip address 192.168.0.5 255.255.255.252
clock rate 64000
!
interface Vlan1
no ip address
Page 28
shutdown
router ospf 100
log-adjacency-changes
network 192.168.0.0 0.0.0.3 area 0
network 192.168.0.4 0.0.0.3 area 0
network 192.168.0.8 0.0.0.3 area 0
network 192.168.0.12 0.0.0.3 area 0
network 198.168.0.0 0.0.0.3 area 0
network 198.168.0.0 0.0.0.31 area 0
ip classless
line con 0
line vty 0 4
login
end
ters
PNB SERVER:-
Router#SH run
Building configuration...
Current configuration : 894 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
Page 29
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
ip address 193.168.0.5 255.255.255.252
clock rate 64000
interface Serial0/1
ip address 193.168.0.9 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.168.0.2 255.255.255.252
interface Serial0/3
ip address 193.168.0.1 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 192.168.0.0 0.0.0.3 area 0
network 193.168.0.0 0.0.0.3 area 0
network 193.168.0.4 0.0.0.3 area 0
network 193.168.0.8 0.0.0.3 area 0
ip classless
line con 0
line vty 0 4
Page 30
login
end
SBI SERVER:-
Router#Sh run
Building configuration...
Current configuration : 1116 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
ip dhcp excluded-address 20.0.0.1
ip dhcp pool abc2
network 20.0.0.0 255.255.255.224
default-router 20.0.0.1
dns-server 198.168.0.6
interface FastEthernet0/0
ip address 20.0.0.1 255.255.255.224
ip nat inside
d uplex auto
speed auto
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
Page 31
interface Serial0/0
no ip address
shutdown
interface Serial0/1
no ip address
shutdown
interface Serial0/2
ip address 193.168.0.14 255.255.255.252
ip nat outside
interface Serial0/3
no ip address
shutdown
router ospf 100
log-adjacency-changes
network 20.0.0.0 0.0.0.31 area 0
network 193.168.0.12 0.0.0.3 area 0
ip nat pool contorl 193.168.0.13 193.168.0.14 netmask 255.255.255.252
ip nat inside source list 1 pool contorl
ip classless
access-list 1 permit 20.0.0.0 0.0.0.31
access-list 10 deny any
access-list 10 permit 20.0.0.32 0.0.0.31
line con 0
line vty 0 4
login
Page 32
end
HDFC ROUTER:-
R outer#sh run
Building configuration...
Current configuration : 929 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 67767
ip address 194.168.0.5 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 78989
ip address 194.168.0.9 255.255.255.252
Page 33
clock rate 64000
interface Serial0/2
ip address 192.168.0.10 255.255.255.252
interface Serial0/3
ip address 194.168.0.1 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 192.168.0.8 0.0.0.3 area 0
network 194.168.0.0 0.0.0.3 area 0
network 194.168.0.4 0.0.0.3 area 0
network 194.168.0.8 0.0.0.3 area 0
ip classless
line con 0
line vty 0 4
login
end
ICICI ROUTER:-
Router#SH RUN
Building configuration...
Current configuration : 920 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
Page 34
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
ip address 194.168.0.21 255.255.255.252
clock rate 64000
interface Serial0/1
ip address 192.168.0.14 255.255.255.252
interface Serial0/2
ip address 194.168.0.13 255.255.255.252
clock rate 64000
interface Serial0/3
bandwidth 234445
ip address 194.168.0.17 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 192.168.0.12 0.0.0.3 area 0
network 194.168.0.12 0.0.0.3 area 0
network 194.168.0.16 0.0.0.3 area 0
Page 35
network 194.168.0.20 0.0.0.3 area 0
ip classles
line con 0
line vty 0 4
login
end
SOUTH SERVER:-
SOUTHBANK#SH RUN
Building configuration...
Current configuration : 1266 bytes
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname SOUTHBANK
interface FastEthernet0/0
ip address 198.163.0.1 255.255.255.224
duplex auto
speed auto
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 192.163.0.13 255.255.255.252
clock rate 64000
Page 36
interface Serial0/0/1
bandwidth 6743876
ip address 192.163.0.9 255.255.255.252
clock rate 64000
interface Serial0/1/0
bandwidth 345356
ip address 192.163.0.1 255.255.255.252
clock rate 64000
interface Serial0/1/1
ip address 192.163.0.5 255.255.255.252
clock rate 64000
interface Serial0/2/0
no ip address
shutdown
!
interface Serial0/2/1
no ip address
shutdown
interface Serial0/3/0
no ip address
shutdown
interface Serial0/3/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
Page 37
router ospf 100
log-adjacency-changes
network 192.163.0.0 0.0.0.3 area 0
network 192.163.0.4 0.0.0.3 area 0
network 192.163.0.8 0.0.0.3 area 0
network 192.163.0.12 0.0.0.3 area 0
network 198.163.0.0 0.0.0.31 area 0
ip classless
no cdp run
line con 0
line vty 0 4
login
end
PNB SERVER :-
Router#sh run
Building configuration...
Current configuration : 993 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
Page 38
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 4534
ip address 122.168.0.5 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 7674
ip address 122.168.0.9 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.163.0.2 255.255.255.252
interface Serial0/3
bandwidth 766734
ip address 122.168.0.1 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 122.168.0.0 0.0.0.3 area 0
network 122.168.0.4 0.0.0.3 area 0
network 122.168.0.8 0.0.0.3 area 0
network 192.163.0.0 0.0.0.3 area 0
network 12.168.0.12 0.0.0.3 area 0
ip classless
Page 39
no cdp run
line con 0
line vty 0 4
login
end
SBI SERVER:-
SBIBANK#sh run
Building configuration...
Current configuration : 950 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname SBIBANK
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
Page 40
bandwidth 43545
ip address 122.168.0.17 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 3454546
ip address 122.168.0.21 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.163.0.6 255.255.255.252
interface Serial0/3
ip address 122.168.0.13 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 122.168.0.12 0.0.0.3 area 0
network 122.168.0.16 0.0.0.3 area 0
network 122.168.0.20 0.0.0.3 area 0
network 192.163.0.4 0.0.0.3 area 0
ip classless
no cdp run
line con 0
line vty 0 4
login
end
HDFC SERVER:-
HDFCBANK#sh run
Building configuration...
Page 41
Current configuration : 966 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname HDFCBANK
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 354435
ip address 122.122.0.1 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 78433
ip address 122.122.0.5 255.255.255.252
clock rate 64000
interface Serial0/2
bandwidth 34566
ip address 192.163.0.10 255.255.255.252
Page 42
interface Serial0/3
bandwidth 35455
ip address 122.122.0.9 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 122.122.0.0 0.0.0.3 area 0
network 122.122.0.4 0.0.0.3 area 0
network 122.122.0.8 0.0.0.3 area 0
network 192.163.0.8 0.0.0.3 area 0
ip classless
line con 0
line vty 0 4
login
end
ICICI SERVER:-
ICICIBANK#SH RUN
Building configuration...
Current configuration : 954 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname ICICIBANK
interface FastEthernet0/0
no ip address
duplex auto
Page 43
speed auto
shutdown
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0
ip address 122.122.0.13 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 22345
ip address 122.122.0.17 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.163.0.14 255.255.255.252
interface Serial0/3
bandwidth 6568778
ip address 122.122.0.21 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 122.122.0.12 0.0.0.3 area 0
network 122.122.0.16 0.0.0.3 area 0
network 122.122.0.20 0.0.0.3 area 0
Page 44
network 192.163.0.12 0.0.0.3 area 0
ip classlesS
no cdp
line con 0
line vty 0 4
login
end
HTTP SERVER:-
-
Page 45
Chapter-14 RESULT
DNS SERVER:-
Page 46
FTP:-
Page 47
TFTP:-
WEB BROWSING:-
Page 48
WEB BROWSING:-
Page 49
COMMUNICATION BETWEEN TWO PC’S AND NAT TRANSLATION
Page 50
PING TO PC WITHOUT NAT
DHCP IP ADDRESS:-
Page 51
Page 52
DESCRIPTION:The aim of this system is to overcome the lacking of the manual system. All branches
of the Bank situated at District level provide the Banking services to customers and had to send report to the central branch manually, which sometimes create problem to get up-to-date information rapidly. But now through this system whenever any transaction will be taking place it will store in the central database and authorized person can get necessary information or report when they get into the system from any branches through Wide Area Network (WAN). Routers are generally known as intermediate systems, which operates at the network layer of the OSI reference model, routers are devices used to connect two or more networks (IP networks) or a LAN to the Internet. A router acts as a packet filter when it forwards or denies packets according to filtering rules. As a Layer 3 device, a packet-filtering router uses rules to determine whether to permit or deny traffic based on source and destination IP addresses, source port and destination port, and the protocol of the packet. These rules are defined using access control lists or ACLs. Banking system in India all banks has an IT department. IT department solution all type of IT problem and serve the core network. IT creates a core network diagram. This diagram involves all type of useable network mechanism (Switch, Router, Firewall, Server) etc. Simulation is the most important of any system. An accurate system design, accurate performance and accurate Simulation give best performance of a system. Now we discuss and simulate the OSPF protocol. Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the interior gateway protocol (IGP) working group of the Internet Engineering Task Force (IETF).
Page 53
Chapter -15 SUMMARY STEP WORK DESCRIPTION
Now a days, technological development, and automated system development is more essential and crying need for the expansion of banking services because They will need less employers by using automated system. On top of that Security is a major issue regarding banking issues. With this system network will be more easy to handle and it will route the data in a shortest path in a vast distributed system. In future we will try to implement it in real life so that banks can use it and get benefited from this project.
Future Work: Add time based transmission. Security system will be upgraded . Make the project more user friendly. Real life implementation.
Limitations : The main Limitation is to implement the project in real world . Because we only
simulate it via packet tracer. Due to less time and work pressure we could not add more features which could make
the project more useful.
Page 54
Chapter-16 CONCLUSION
Computer Networks by Tanenbaum All about Computer Network By Manohar Lodia Data communication By Ferozon www.cisco.com www.education.umd.edu/EDMS/mislevy/CiscoPapers/DPs_for_Learning.pdfwww.packettracernetwork.comwww.weikipedia.comwww.routeralley.comwww.networkessential.comwww.google.com
THANKS@@@@@@@@@@@@@@@@@@
Page 55
Chapter-17 REFRENCES