Sie sind auf Seite 1von 128

1.

INTRODUCTION
This project report pertains to six months industrial training that I had underwent at HCL Technologies, Noida as part of curriculum of degree in Bachelor of technology in Electronics and Communication engineering as re uired !y "mity #chool of Engineering and Technology $affiliated to %%#I&', (elhi) * I learnt a lot from professional managers and s+illed engineers* I had a great learning experience as trainee in this firm* I learnt a lot a!out how different networ+s are controlled in the industry or any department with the help of networ+ing processes, under ,C#E and CCN"* I ha-e learnt a!out different type of ser-ers li+e (HC& #er-er, (N# #er-er, N"T #er-er* "lso I ha-e learnt how to control the L"N and ,"N networ+s under ,C#E $,icrosoft Certified #ystem Engineers) and how to control ,"N and ."N networ+s under CCN" $CI#C/ Certified #ystem Engineers)* 0ustification cannot !e done to whate-er I ha-e learnt in this training period within a few pages !ut I ha-e still tried my !est to co-er as much as possi!le in this report* In this report I ha-e tried to sum up the technical +nowledge I ha-e gained in my six months of training*

2. COMPANY PROFILE
HCL Technologies Limited $HCL) is a glo!al technology company* The Company1s operations consist of pro-iding #oftware ser-ices, infrastructure ser-ices, including sale of networ+ing e uipment and !usiness processing outsourcing ser-ices, which are in the nature of customer contact centers and technical help des+s* HCL is a pro-ider of !usiness transformation, enterprise and custom applications, infrastructure management, !usiness process outsourcing $B&/), and engineering ser-ices* The Company deli-ers solutions across a range of -erticals, such as financial ser-ices, manufacturing, consumer ser-ices, pu!lic ser-ices and healthcare* The principal geographical segments include "merica, Europe and others* (uring the fiscal year ended 0une 23, 4355 $fiscal 4355), the Company sold certain portion of its Telecom Expense ,anagement #er-ices !usiness* In ,arch 4352, it di-ested its entire $678) sta+e in NEC HCL #ystem Technologies $NH#T) 5775 9 HCL Technologies Limited was originally incorporated on 54th No-em!er, as :HCL /-erseas Limited:* The certificate of commencement of !usiness was recei-ed on 53th ;e!ruary, 5774* /n 0uly 56, 5776, the name of the Company was changed to :HCL Consulting Limited:* The Company changed its name to :HCL Technologies Limited: on <th /cto!er 5777 to !etter reflect the line of acti-ities of the Company* 9 HCL pro-ides new technology de-elopment ser-ices to its clients* 577< 9 The =3>=3 joint -enture with &erot #ystems Corporation in the year, pro-ided access to high -alue client !ase of &erot #ystems* 9 The Company has one of the largest software de-elopment infrastructures in India* 2

This state9of9the9art infrastructure, which comprises se-en software factories, is designed to ta+e ad-antage of the high producti-ity and scala!ility as well as the relati-ely lower cost of software de-elopment in India* 577? 9 The Company started addressing the mar+ets in Europe and "sia &acific* 9 The company has a rich heritage in technologies li+e the Internet and e9Commerce, networ+ing and internetwor+ing, Internet telephony, telecom, em!edded software, "#IC@AL#I design and testing, satellite communication, wireless communication and component !ased o!ject technologies li+e C/,, (C/, and C/BB"* 9 The Company has the capa!ility to wor+ with a wide -ariety of computing platforms ranging from /pen Client #er-er systems comprising all fla-ors of 'NIC, ,icrosoft platforms, "#@633 to enterprise ser-ers li+e IB, ,ainframes* 9 The Company also offers strategic methodology consulting led ser-ices through its wholly owned su!sidiary Intelicent Inc* to glo!al organisations* 5777 9 The company announced its pu!lic issue on No-em!er 53th, of Bs* 5,64,33,333 ne e uity shares of Bs* 6@9 each* The issue includes a Boo+ Built &ortion of 5,4D,?3,333 e uity shares and ;ixed &rice &ortion of 56,43,333 e uity shares* 9 The company announced on No-em!er 55 that it has signed a fi-e9year contract with %tech and Ela Tencor* 9 HCL Technologies has created wholly9owned su!sidiaries to cater to specific geographic regions* Its major su!sidiary is HCL Technologies "merica, 533 per cent 3

owned !y the company* 4333 9 The Company has set up a dedicated offshore de-elopment centre in Chennai for EL"9 Tencor Corporation, a supplier of process control and yield management solutions for the semiconductor and related microelectronics industry* 9 HCL Comnet, the wholly9owned su!sidiary of HCL Technologies in association with its new partner %lo!eset Inc*, is scouting for large Internet #er-ice &ro-iders and payment gateways in India to introduce Net security management solutions* 9 The Company will set up an offshore de-elopment centre for the F4*59!illion semiconductor company, Conexant Inc, in India* 9 HCL Comnet, a wholly owned su!sidiary of HCL Technologies will in-est Bs* 43 crore in the next one year to set up a networ+ operation centre in (elhi and has tied up with Hewlett &ac+ard* 9 HCL Technologies, the #hi- Nada controlled software major, has in-ested in fi-e -enture capital funds that specialise in high technology, particularly internet technology, related areas* 9 HCL Technologies, in a mo-e to further strengthen its position in the infotech sector, has decided to extend its product !ase and focus on a range of high -alue9added products and ser-ices* 9 HCL Infinet Ltd, the new Internet ser-ices su!sidary of HCL Infosystems, has tied up with 'B# &u!lishersG (istri!utors Ltd, one of the largest distri!utors of !oo+s in the country for its soon to !e launched portal to sell !oo+s on9line*

9 "rmed with F233 million incash reser-es, infotech company HCL Technologies is in the process of ac uiring companies in !oth Europe and the '# as part of its expansion dri-e* 9 HCL Technologies has appro-ed, su!ject to necessary appro-als, to split each e uity share of Bs 6 into two e uity share of Bs 4 each* 9 HCL Technologies has entered into a tie9up with BroadAision Inc, a pro-ider of personalised e9!usiness applications, to act as a distri!utor for the latterGs customised software, ser-ices, support, maintenance and other related acti-ities* 9 %oldman #achs has rated Infosys Technologies and HCL Technologies as mar+et outperformers and amongst the !est uality names in the industry* 9 The Company launched the second No+ia professional centre in New (elhi, second among the chain of centres planned !y the company across the country* 9 HCL Technologies Ltd will !e ac uiring a!out 63 per cent e uity sta+e in an Indian networ+ing product company as part of its incu!ation programme* 9 #hi- Nadar9promoted HCL Technologies Ltd is loo+ing at the possi!ility of opening a software technology de-elopment centre in China* 4335 9 The Company has signed a fi-e9year strategic partner agreement, with NCB Corp* to de-elop customer relationship management, store automation and payment system* 9 The Company signed an agreement with Toshi!a Information #ystems of 0apan to set up an offshore de-elopment centre in India, for the 0apanese company*

9 HCL Technologies has entered into a strategic alliance with Nasda 9listed Aitesse #emiconductor ot de-elop software solutions for glo!al networ+ing mar+ets* 9 The Company is setting up a dedicated offshore centre for Aitesse #emiconductor for design and application support ser-ices* 9 HCL Comnet #ystems H #er-ices Ltd*, a fully9owned su!sidiary of HCL Technologies, is entering into the !usiness of .e!9ena!ling applications through the launch of demand9chain management solutions* 9 HCL InfiNet has !een rated the !est among 5< Internet ser-ice pro-iders !y I(NetIndia*com, a technology portal and magaJine* 9 HCL Technologies /cto!er 47 announced that it would pic+ up 533 per cent sta+e in Northern Ireland9!ased IT9ena!led ser-ices company "pollo Contact Centre in two phases* In the first phase, HCL Technologies would pic+ up 73 per cent sta+e in "pollo Contact Centre for F55*= million from British Telecom $BT), the owner of "pollo Contact Centre*Initially, HCL Technologies, would pay F55*= million either directly or through any of its su!sidiaries to ac uire 73 per cent e uity in "pollo Contact Centre* 9 HCL &erot, a joint -enture of HCL Technologies, which already has two le-els of re9 dundancy in (elhi and Bangalore, is now !ac+ing them up with centres in the 'E and '#*

3. NETWORKING
3.1 Introduction to networking
Networking is a practice of linking of two or more computing devices such as PCs, printers, faxes etc , with each other Connection !etween two devices is through "

ph#sical media or logical media to share information, data and resources Networks are made with the hardware and software

Ca!le$media

Fig 1: computer network

3.1.1 Model o! Networking


%odel means the connectivit# of two computers &e have man# t#pes of networking models 'i( 'ii( 'iii( Client ) *erver %odel Peer to Peer %odel '&orkgroup %odel( +omain %odel

"i#

$lient %&er'er Model ,n a Client server model we have one server and man# clients - Client can share

the resources of server, !ut a server cannot share the resources on clients .n the point of view of administrator it/s ver# eas# to control the network !ecause we com!ine with the server also at securit# point of view ,t is ver# useful

!ecause it uses user level securit# in which users have to remem!er onl# one password to share the resources "ii# (eer to (eer Model "Workgroup Model# ,n Peer to Peer networking model all computers are in e1ual status, that is we cannot manage centrali2ation, administration secutit# ,n Peer to Perr networking client use operating s#stem like &indow 34, &indow 5P, &indow 2666, &indow 7ista "iii# )om*in Model ,t is a mixture of client server and peer8to8peer model ,n this clients can share their resources as peer8to8peer !ut with the permission of the server as in client server model therefore it is commonl# used model !ecause in this securit# is more as we can put restriction on !oth server and clients

)i!!erence +etween Workgroup , )om*in 9a!le 1

Workgroup

)om*in 4

1 ,t is a peer to peer networking model

1 ,t is a server !ased networking model

2 9here is no client and no server -ll the 2 9here is a centrali2ed dedicated server computers are in e1ual status computer called domain controller which controls all other computers called clients 3 9his model is recommended for small networks, upto 16 computers 4 9here is no centrali2ed administrated separatel# 3 9his model is recommended for large networks 4 9here is centrali2ed administration and each PC can !e administrated and managed from the server 5 in this model high grade .* like &,N 5 ,n this model, low grade .* like 2666$2663 *erver can !e used 2666$5P professional, &,N 34 etc can !e used " :sers accounts are created in each PC and are called as ;ocal :sers " :sers accounts are created on the server side and are called +omain :sers

3.1.- $*tegorie o! network


Networks can !e categori2ed as per geographical area to !e covered !# the network Computer network are divided into four categories includes< ;ocal -rea

Network ';-N(, Campus -rea Network 'C-N(, %etropolitan -rea Network '%-N( and &ide -rea Network '&-N( 3.1.-.1 .oc*l /re* Network "./N# ;-N is a computer network that is used to connect computers and work station to share data and resources such as printers or faxes ;-N is restricted to a small area such as home, office or college +evices used in ;-N are < =:> and switch %edia for ;-N is :9P ca!les ?igure 1 2 shows how all work stations, server and printer are interconnected with the help of the network device

Fig -: .oc*l /re* Network

T0pe o! ./N

16

,n ;-Ns, data can !e transferred using techni1ues like token passing -s per techni1ues used for data sharing, ;-N* are classified into @thernet, 9oken >us, 9oken Aing and ?i!er +istri!uted +ata ,nterface '?++,( ?igure 3 3 shows ;-N classification

Fig 3: ./N cl* i!ic*tion

/d'*nt*ge o! ./N a( Provides communication in smaller networks, eas# to install and configure !( man# users can share data or network elements at the same time which results in fast work )i *d'*nt*ge o! ./N a( limited num!er of computers are connected in a ;-N !( ;-N cannot cover large area c( Network performance degrades as the num!er of users exceeds

3.1.-.- $*mpu /re* Network "$/N#


Campus -rea Network is a computer network made up of two or more ;-Ns within a limited area ,t can cover man# !uildings in an area 9he main feature of C-N is that all of the computers which are connected together have some relationship to each other e g different !uildings in a campus can !e connected using different C-N ,t will help to interconnect academic departments, li!rar# and computer la!oratories C-N is larger than ;-N !ut smaller than &-N 11

?igure 3 4 shows a C-N network

Fig 1: $*mpu /re* Network +evices used in C-N are < =:>, *witch, ;a#er83 switch, -ccess Point -nd the media used for C-N is :nshielded twisted pair of ca!les and ?i!er .ptics Ca!le

3.1.-.3

Metropolit*n /re* Network "M/N#

%-N is the interconnection of networks in a cit# %-N is not owned !# a single organi2ation ,t act as a high speed network to allow sharing resources with in a cit# %-N can also !e formed !# connecting remote ;-Ns through telephone lines or radio links %-N supports data and voice transmission 9he !est example of %-N is ca!le 9 7 network in a cit#

12

Fig 2 : Metropolit*n /re* Network

3.1.-.1

Wide /re* Network "W/N#


&-N covers a wide geographical area which include multiple computers or

;-Ns ,t connects computer networks through pu!lic networks like, telephone s#stem, microwave, satellite link or leased line %ost of the &-Ns use leased lines for internet access as the# provide faster data transfer &-N helps an organi2ation to esta!lish network !etween all its departments and offices located in the same or different cities ,t also ena!les communication !etween the organi2ation and rest world

3.- I( /))RE&&E& *nd M/$ /ddre e


,t is also called as logical addresses ,P is a 32 !it long and it is divided into 4 octets and dot ' ( is used to separate one octet from another ,t is represented in the form of decimals 9here are two versions of ,P addresses< 8 8 ,Pv4 ,Pv"

13

T*+le -

$omp*ri on +etween I('1 *nd I('3

I('1

I('3

8 8 8 8

,t is 32 !it long ,t is divided into 4 octets ,pv4 performs !roadcasting, multicasting and unicasting ,Pv4 is divided into 5 classes< - to @ ,Pv4 is in decimal form

8 8 8

,t is 124 !it long ,t is divided into 1" octets ,Pv" doesn/t it support performs !roadcasting,

multicasting and unicasting 8 8 ,pv" doesn/t support classes ,Pv" is in hexadecimal form

3.-.1 I( /ddre

$l* e

,P address is a 32 !it address ,t is divided into various classes namel# Class -, Class >, Class C, Class + and Class @ 9CP$,P defines Class + for experimental purpose 9CP $,P address contains two addresses em!edded within one ,P addressB Network address and host address as shown in figure 3 1

N@9&.AC -++A@** 6 !its

=.*9 -++A@** 31 !its

Class - consists of 48!it network ,+ and 248!it host ,+ Class > consists of 1"8 !it network ,+ and 1"8!it of host ,+ -nd Class C consists of 248!it of network ,+ and 48!it of host ,+

14

/ddre

$l* e $l* e Aange of ?irst %ask 7alue .ctet 7alid =osts

T*+le 3: /ddre -ddres s Class *tarting >its

'first8!#te(

Class - 6

1to 120

255 6 6 6

25"E25"E25"82F 1",000,214

Class >

16

124 to 131

255 255 6 6

25"E25"82F"5,534

Class C

116

132 to 223

255 255 255 6 25"82

Class + 1116

224 to 233

Aeserved for multicasting

Class @ D

1111

246 to 255

Aeserved development

for

research

and

15

3.-.1.1 4ow to / ign I( /ddre

to $omputer

-n ,P address assigned to a computer ma# either !e permanent address or address that is assigned to a computer on a time lease or for temporar# !asis =ence, the address granted to computers is divided into two categories +#namic ,P addresses and *tatic addresses )0n*mic I( /ddre e +#namic ,P addresses are assigned to the devices that re1uire temporar# connectivit# to the network or non8permanent devices such as porta!le computer 9he most common protocol used for assigning +#namic ,P address is +=CP also called +#namic =ost Configuration Protocol 9he +=CP grants ,P address to the computer on lease !asis &t*tic I( /ddre e

1"

*tatic ,P addresses are assigned to the device on the network whose existence in the network remains for a longer duration 9hese static ,P addresses are semi8permanent ,P addresses which remain allocated to a specific device for longer time e g *erver

3.-.1.- 4ow to $on!igure I( /ddre


in window -553

Aight click on M0 Network (l*ce 8 propertie right click on working ./N c*rd8 propertie select internet protocol "T$(6I(# 8propertie 9ick on8 7 e t8e !ollowing I( *ddre e 8 now fill the ,P address e g 15.5.5.1 9ick on )7 e t8e !ollowing )N& er'er *ddre ?ill the pre!erred )N& er'er ) 15.5.5.1 Ok $lo e

Now check the connectivit# of computer with itself with command &t*rt9run9cmd9ping 15.5.5.1

3.-.- M/$ /ddre ing


%-C address is a hardware address that is em!edded in the N,C card ,t is also known as hardware address or ph#sical address @ver# N,C card has a uni1ue %-C address assigned !# ,@@@ %-C address is used to identif# the nodes at lower levels of .*, model 9he %-C address operates at the data link la#er of the .*, model %-C address is a 12 digit hexadecimal num!er '44 !it address( ,t is made up of num!ers from 683 or a letter from -8? %-C address can !e written in an# one of the formats< G G %%<%%<%%<**<**<** %%<%%<%%<**<**<** 10

9 o identif# the %-C address in window< Click &t*rt :Run @nter cmd in the Open text !ook 9#pe ipcon!ig 6*ll Press Enter

9he 12 digit %-C address will !e shown as sa# 55:11:11:E/:;):F3

3.3

NETWORKING ME)I/

9o do networking we need to use some t#pe of media 9here are man# t#pes of media 'i( 'ii( 'iii( 'iv( 'iv( Coaxial Ca!le ?i!er optic ca!le 9wisted Pair of Ca!les %icro8 wave *atellite

$o*<i*l $*+le Coaxial ca!le consists of an insulated copper conductor surrounded !# a tu!e shaped copper !raid outer copper tune and the inner conductor have the same axis of curvature hence it called coaxial ca!le ,t is !asicall# of two t#pes< 'i( 'ii( >ase >and Ca!le 'AH ) 53( >road >and Ca!le 'AH ) 54(

&e used >ase >and signal ca!le in Networking of Computers, ,t is so called !ecause it carries single fre1uenc# ,ts speed is 16 %!ps and impedance is 56 I &here as >road >and Ca!les carries multiple fre1uencies Connector used for Coaxial ca!le is 14

>NC'>ritish Novel Connector( connector -ACnet uses AH8"2 coaxial ca!le ,t has an impedance of 33 I and has a comparativel# lesser attenuation, hence #ield greater distances 9hese ca!les are expensive and provide high propagation factor

Fi+er Optic*l $*+le ?i!er optic ca!le consists of a ver# fine fi!er made from two t#pes of glass, one for the inner core and the other for the outer la#er =ere signal is transmitted in the form of light +ifferent varieties of fi!er optics is used depending on the si2e of the network *ingle mode fi!er optics is used for networks spanning longer distance ?i!er .ptics has lower propagation factor than coaxial ca!le ,t is a costl# !ut more secure transmission media Twi ted (*ir $*+le 9here are two wires, which are twisted with each other to avoid @%, '@lectro %agnetic ,nduction( these ca!les are eas# to terminate =owever the# have a slightl# higher value of attenuation value and hence have limited distance covering capacit# Connector used for 9wisted Pair of Ca!le is 'Aegistered Jack( AJ845 and AJ811 9here are two t#pes of twisted pair of ca!les< *9P '*hielded 9wisted Pair(: ,n this an extra wire which is called shielded wire is wrapped over the inner cover which holds copper in pairs 9his protection is used to protect signal from external noise :9P ':nshielded 9wisted Pair( ,n this t#pe of wire no shielded cover is there for extra protection from noise 9here are different categories of :9P ca!les<

$*tegorie o! 7T( $*+le T*+le 1: $*tegor0 *nd &peed o! 7T( c*+le

13

Categor#

*peed

C-981 C-982 C-983 C-984 C-985 C-98" C-980

5" C!ps 4 %!ps 16 %!ps 1"826 %!ps 166 %!ps 1H!ps 1H!ps

3.3.1

Et8ernet $*+ling
*traight ca!le Crossover ca!le Aolled ca!le

9here are three t#pes of @thernet ca!les<

3.3.1.1 &tr*ig8t c*+le


,t is used when we have to connect PC 9. *witch PC to =u! =u! to Aouter *witch to Aouter

$olour $oding !or tr*ig8t $*+le 9->;@ 5 26

23;/ 'one end( Hreen$white Hreen .range$white >lue >lue$white .range >rown$white >rown 'other end( Hreen$white Hreen .range$white >lue >lue$white .range >rown$white >rown 'one end( .range$white .range Hreen$white >lue >lue$white Hreen >rown$white >rown

23;= 'other end( .range$white .range Hreen$white >lue >lue$white Hreen >rown$white >rown

3.3.1.- $ro o'er $*+le


,t is used when we have to connect< PC to PC =u! to =u! *witch to switch Aouter to Aouter PC to Aouter =u! to *witch

$olour $oding !or $ro o'er c*+le 9a!le " $olour $oding !or $ro o'er c*+le

21

'one end( .range$white .range Hreen$white >lue >lue$white Hreen >rown$white >rown

'other end( Hreen$white Hreen .range$white >lue >lue$white Hreen >rown$white >rown

3.3.1.3 Rollo'er $*+le


Aollover ca!le isn/t used to connect an# @thernet connections together, !ut Aollover ca!le can !e used to connect a host to a router console serial communication 'com( port N.9@< *traight ca!le and Cross ca!les are used for data transfer !ut Aollover ca!les are not used for data transfer 9here are two methods for manufacturing Aollover ca!les<

9a!le 0 $olour $oding !or Rollo'er $*+le

5"4'one end( 'other end( 'one end(

5"4> 'other end(

22

Hreen$white Hreen .range$white >lue >lue$white .range >rown$white >rown

>rown >rown$white .range >lue$white >lue .range$white Hreen Hreen$white

.range$white .range Hreen$white >lue >lue$white Hreen >rown$white >rown

>rown >rown$white Hreen >lue$white >lue Hreen$white .range .range$white

3.1 O(ER/TING &>&TEM


3.1.1 T0pe o! Oper*ting &0 tem
"i# )O& ")e ktop Oper*ting &0 tem# 9a!le 4< .perating *#stems "ii# NO& "Network Oper*ting &0 tem#

23

)O&

NO&

1 ,t is a desktop operating s#stem 2 ,t is used in small networks 3 ,n this .*, there is less securit# 4 ,n this .*, all computers are clients 5 ,n this .*, %*8+.*, H:, package &in 3 1, &in 35, &in 34, &in %@ comes

1 ,t is a network operating s#stem 2 ,t is used for large networks 3 ,n this .*, there is more securit# 4 ,n this .*, there are servers and clients 5 ,n this .* &in N9, &in 2666, &in 2663, ;,N:5, :N,5, Novell and %-C comes

3.1.1.1 Introduction to Window -553 &er'er


&indow server 2663 'also referred to as &,N 2k3( is a server operating s#stem produced !# %icrosoft ,ntroduced in 24th -pril 2663 as the successor to window 2666 server, it is considered !# %icrosoft to !e the corner stone of its window server s#stem line of !usiness server products -n update version &indow *erver 2663 A2 was released manufacturing on "th dec, 2665 its successor window 2664 was released on 4 th fe!, 2664 -ccording to %icrosoft, window server 2663 is more scala!le and deliver !etter performance than its predecessor window 2666

Fe*ture o! Window -553 'i( 'ii( 'iii( - significant improved version of ,nternet ,nformation *ervice ',,*( ,ncreased default securit# over previous version due to the !uilt in firewall and having most services disa!led !# default %anage #our server8a role management administrative tools that allow an administrator to choose what functionalit# the server should provide 24

'iv( 'v( 'vi( 'vii( 'viii( 'ix(

,mprovement to -ctive +irector# ,mprovement to Hroup Polic# handling and -dministration Provides a >ackup s#stem to restore lost files ,mproved disk management, including the a!ilit# to >ackup from shadows of files, allowing the >ackup of open files ,mproved securit# and command line tools which are part of %icrosoft initiative to !ring a complete command shell to the next version of window *upport for a hard !ased K&atch +og 9imerL, which can restart the server if the operating s#stem does not suspend with in a certain amount of time

Remo'ed Fe*ture 9he a!ilit# of creating server disk automated s#stem recover# '-*A( is used instead Edition o! Window -553 &indow server 2663 comes in a num!er of editions, each targeted towards a particular si2e and t#pe of !usiness ,n general, all variant of window server 2663 have the a!ilit# to share files and printers, act as application server and host message 1ueue, provide email services, authenticate users, act as an 5 563 certificate server, provide ;+-P ';ight &eight +irector# -ccess Protocol( services, serve streaming media, and to perform other server8oriented functions

3.2

)N& &ER?ER
+N* stands for domain name s#stem +N* s#stem is a standard technolog#

for managing the names of we!sites and other internet domains +N* techni1ues allows #ou to t#pe names into #our we! !rowser like computer networking, a!out computer and allow #our computer to automaticall# find that address on internet +N* is the resolution 25

mechanism used !# &indow *erver 2663 clients to find other computers and services running on those computers for computers in a window 2663 network infrastructure to talk to one another, one of the ke# ingredients is the +N* server =ost name alone do not communicate glo!all# !ut communicate locall#, !ut if domain name is added along with it then the host name can communicate glo!all# +N* is use for name reservation i e to convert ,P address to host name and host name to ,P address or the function of +N* is to resolve host name such as www #ahoo com to an ,P address :ser identif# onl# user friendl# name and all computers and technologies identif# ,P address and %-C address +N* is use to solve this pro!lem !ecause +N* is used to convert host name ?M+N 'full# 1ualified domain name( to ,P address and ,P address to host name

3.2.1 (/RT& OF )N& &>&TEM


'i( 'ii( 'iii( 'iv( 'v( =ost name +omain name ?M+N Namespace +N* server

3.2.1.1 4O&T N/ME =ost name is a computer name and is also called is Net>,.* 'network !asic ,nput$ output s#stem( name Net>,.* is actuall# an application la#er protocol that can use the transport services of 9CP$ ,P when used in routed network - Net>,.* name is 1"8 !#te addresses that identif# a Net>,.* resource on the network 3.2.1.- )OM/IN N/ME 2"

+omain name is used to identifies the internet site one can identifies the location without having to remem!er the ,P address of ever# location e g #ahoo com or gmail com

3.2.1.3 F@) ?M+N means full# 1ualified domain name which represents a hostname appended to the parent name space in hierarch# -lso in full# 1ualified domain name different levels of namespace are visuali2e as in fig !elow this hierarch# is visuali2edN the root level namespace, topN level domain, and so on, in use throughout the internet toda# ;eft most portion of the ?M+N is the host portion of the name - host name is alias we give to an ,P address

Fig 3:To !ind loc*tion o! * computer u ing F@)N ?M+N is a uni1ue name in the computer on the network &e can identif# host id and location of a computer as in fig a!ove *uppose we want to find location of pc1 with ,P address 26 6 6 1, which is in la!2, 2nd floor in the organi2ation center 9he ?M+N for this is (c1.row3.l*+-.!loor-.center.com 20

>ut this address is ver# length# to locate pc1 so to simplif# this we use Kc nameL techni1ue as< (c1.center.comA-5.5.5 1 3.2.1.1 )om*in N*me p*ce +N* operates in what is known as +N* namespace 9he +N* namespace is an organi2ed, hierarchical division of +N* names +omain namespace ena!le users to easil# locate the network services and resources 9he domain namespace include the root domain, the top level domain of the organi2ation and organi2e these domain in a hierarchical tree structure Namespace works on the hierarchical tree structure of root domain 9here are total 13 root domain working in the internet, the# are -, >, C, +, @, ?, H, =, ,, J, C, ; and % 9here is one root domain, which acts as the starting point of the full# 1ualified domain names 9his root domain is designated with a dot ' ( shows the tree structure or domain namespace ?ig " 2

24

Fig B: Tree tructure or )om*in N*me p*ce 3.2.1.2 )N& er'er -n# computer providing domain namespace is a +N* server +N* server is used to convert host name ?M+N into ,P address and ,P address into host name ?M+N 9o store the name8to8,P8addresses mappings so crucial to network communication, name server uses 2one files

3.2.- )N& Cone


Oone is the part of +N* data!ase that contain record of domain or multiple domain ,f the domains represents logical division of the +N* namespace, 2ones represents the ph#sical separation of the +N* namespace ,n other words information a!out records of the resources within +N* domain is stored in a 2one files, and this 2one files exist on hard drive of server Oone files are divided into one of two !asic t#pes< Forw*rd lookup Done: Provides host8name8to8,P8address resolution 23

Re'er e lookup Done: Provides ,P8address8to8host8name resolution

3.2.-.1

Re ource record tored in * Done !ile

@ach record stored in a 2one file has a specific purpose *ome of the records set the !ehavior of the name server, others have the Po! of resolving a host name or service into an ,P ta!le "i# N& "N*me &er'er#: 9hese specif# the name servers that are authoritative for a given portion of +N* namespace 9hese records are essential when +N* servers are performing iterative 1ueries to perform name resolution

"ii#

&O/ "&t*rt o! /ut8orit0#: 9his resource record indicates the name of origin for the 2one contains the name

of the server that is the primar# source for information a!out the 2one 9he information in an *.- record affect how often transfer of the 2one are done !etween servers authoritative for the 2one ,t is also used to store other properties such as version information and timings that affect 2one renewal or expiration "iii# $N/ME "$*nonic*l N*me#:

CN-%@ can !e used to assign multiple names of a single ,P address ?or example, the server hosting the site www a!c com is pro!a!l# not named www, !ut a CN-%@ record exist resolution of www to an ,P address all the same 9he CN-%@ record actuall# points not to an ,P address, !ut to an existing - record in the 2one 3.2.-.- &tep to In t*ll *nd con!igure )N& er'er &t*rt : control p*nel: *dd *nd remo'e progr*m /dd remo'e window component 36

*elect networking er'ice and click on det*il +utton Check !ox of )N& er'er Ok and !ini 8

3.2.-.3 $re*ting * Forw*rd .ookup Cone *taticall# fill the ,P address &t*rt :*dmini tr*tor tool )N&: right click on !orw*rd lookup Done New Done: ne<t *elect prim*r0 Done: ne<t @nter Done n*me "*+c.com#: ne<t 9ick /llow +ot8 ecure *nd non ecure upd*te *nd ecure d0n*mic upd*ted ne<t: ne<t now click on cre*ted Done "*+c.com# new 8o t: enter host name for glo!al level 'i e !# entering www( fill ,P address of the we! server , click on *dd !utton enter another host name, a !lank host with same ,P i e do not fill its host name

tep to c8*nge &O/ *nd N& record Aight click on &O/ record : propertie ?ill primar# server e g 'www a!c com(Q responsi!le person 8o t m* ter.*+c.com: *ppl0: ok right click on N& record click on *dd +uttonQ enter ?M+NQ www a!c com re ol'e: ok: *ppl0: ok ping *+c.com 31

Now go to start menu :

.n Client *ide Q 9o access +N* server fill ,P address of server then use ping command eg ping www.*+c.com

3.2.-.3

$re*ting * Re'er e .ookup Cone Aight click on re'er e lookup Done New Done: ne<t: select prim*r0 Done: ne<t fill QNetwork I): ne<t: ne<t *elect *llow +ot8 non ecure *nd non ecure d0n*mic upd*te Fini 8 Aight click on created reverse 2oneQ new pointer enter 8o t I( num+er e g '56 6 6 56( enter F@)N "www.c8d.com#

3.2.-.1 &ome )N& $omm*nd

'i( c<Rtracert www #ahoo com


command is used to check the path , a data packet follow from one router to another router "ii# c:En lookup command displa# the domain name with ,P 'works onl# when reverse lookup 2one is set up( "i'# c:Eipcon!ig 6*ll 9his command displa# ?M+N, ,P address, %-C address "i'# c:Eipcon!ig 6!lu 8dn 9his command flush or clear all the information in the cache that is retrieved from +N* server "'# c:Eipcon!ig 6di pl*0dn +ispla# the current contents or entries in the cache "'i# c:Eip con!ig 6regi ter 32

register an# +N* name

3.3 )4$( &ER?ER


+=CP '+#namic =ost Configuration Protocol( is a protocol that allocates ,P address to computer on a network +=CP centrali2ed the management of ,P address allocation and reduces human error associated with manual ,P configuration +=CP server supplies all the necessar# networking param8eters 9wo things are alwa#s handed out as a part of +=CP configuration< ,P address and su!net mask ?urther +=CP will fre1uentl# configure clients with optional values, such as a default gatewa#, +N* server address, and the address of a &indow ,nternet Naming *erver, if one is present *cenario showing +=CP server ,P address allocation

3.3.1 Working o! )4$( &er'er


'i( 'ii( 'iii( 'iv( 'v( +=CP *cope +=CP *uper *cope @xclusion ,P Aange +=CP ;ease 9ime ,P Aeservation

)4$( &cope *cope having the range of ,P address for providing d#namic ,P address to other computer - group of ,P address within a scope is called as +=CP scope )4$( &uper &cope - super scope is used to com!ine two or more scopes each serving different su!nets, and can make the administration of several scopes on window 2663 +=CP server more managea!le :sing super scope #ou can group multiple scopes as a single administrative entit# that allows the client to lease from either one &ith this feature, a +=CP server can<

33

*upport +=CP clients on a single ph#sical network segment where multiple logical ,P networks are used &hen more than one logical ,P network is used on each ph#sical su!net or network, such configuration is called multinets

*upport +=CP clients located on the far side of +=CP and >..9P rela# agent ,n multinet configuration, +=CP superscope can !e used to group and activate individual scope ranges of ,P addresses used on #our network ,n this wa# , a +=CP server computer can activate and provide leases from more than one scope to clients on a single ph#sical network

E<clu ion I( r*nge ,f #ou want to reserve some ,P for an# computer i e if we want that from the series of 132 1"4 6 2 to 132 1"4 6 166 if we want that a series of ,P addresses must not !e assigned automaticall# then at can !e done using exclusive ,P range )4$( .e* ed Time +=CP lease time is validit# of ,P address ># default +=CP lease time is 4 da#s minimum,1 da# maximum 333 da#s, 23 hours to53 da# &ith in 4 da#s<8 -fter 46S of da# clients demand new ,P some times server refuse the client re1uest -fter 40 5S of da#s it will retr#, and if the server did not give the new ,P address then the client will receive -P,P- address '-utomatic Private ,P -ddress( &hen a +=CP client is una!le to locate a +=CP server, the client picks out a random ,P address from the private -P,P- address range of 1"3 254 E E, with a su!net mask of 255 255 6 6 9he 1"3 254 E E ,P range is private !ecause that network num!er is not in use on the internet, it is random !ecause the client generates an ar!itrar# host num!er for that network 9he significance of -P,P- is that +=CP client computers that cannot find a +=CP server can still !e assigned an ,P address and communicate with other computers on the same su!net mask that also cannot find +=CP server ,t allows communication when +=CP server is down or Pust plain not there Note that -P,P- does not assign a

34

default gatewa#, and therefore it cannot communicate with an# computer that lives on the other side of a router

I( Re er'*tion 9here are some +=CP clients that #ou want to !e the +=CP clients, !ut #ou will also want to make sure that the# get same ,P address ever# time 9his can !e done !# staticall# filling the ,P address &e can reserve ,P address with the help of %-C address for a particular computer

3.3.- In t*ll*tion &tep o! )4$( &er'er


t*rt: control p*nel *dd *nd remo'e progr*m: *dd *nd remo'e window component select networking er'ice and click on det*il +utton check !ox of )4$( er'er ok: !ini 8

3.3.-.1

&tep To $on!igure )4$( &er'er


t*rt: progr*m: *dmini tr*ti'e tool select )4$( cre*te new cope in *ction menu: new cope : ne<t give cope n*meQ ne<t give I( *ddre r*ngeQ ne<t

add e<clu ion n*me: ne<t check le* e dur*tion: ne<t: !ini 8

35

-fter +=CP server is configured, it is re1uired to !e authori2ed and +=CP scope should !e active ?or that select +=CP server and click on authori2e in action menu 9hen right click on scope name and click on active

3.3.-.

On $lient &ide
Ho to ./N c*rd propertie : select T$(6I( protocol: propertie *elect o+t*in I( *ddre *utom*tic*ll0

Ho to comm*nd prompt "cmd# Hive comm*nd

3.3.-.3

=*ckup o! )4$( &er'er

&e can take !ackup of all the configuration in +=CP server with the help of administrator >ackup means to export the +=CP data!ase to another s#stem, as it is helpful in case due to an# reason our data is corrupted or deleted, we can take our data!ase from the place where it is stored *teps of taking !ackup < *top the +=CP server and disa!le the +=CP server services Cop# the +=CP server director# to a temporar# location, sa# pen drive or on a new +=CP server

3.3.3 )4$( Rel*0 /gent


9he +=CP rela# agent is a software that listen +=CP discover packet and forward to +=CP server ,n window 2663 server s#stem the +=CP rela# agent can !e ena!led as a part of Aouting and Aemote -ccess 'AA-*(

3.3.3.1 &tep To $on!igure )4$( Rel*0 /gent


*et the network, fill the ,P address and select two ;-N cards 3"

.pen Routing *nd Remote /cce

: en*+le Routing *nd Remote /cce

Aight click on gener*l new routing protocol *elect )4$( rel*0 *gent New inter!*ce *elect ./N c*rd w8ic8 i to +e connected to t8e cro Ok Aight click on rel*0 *gent : propertie Enter I( *ddre o! )4$( er'er c*+le i.e .1

*dd: *ppl0: ok

3.B

/$TI?E )IRE$TOR>

&ith the release of &indows 2666, %icrosoft introduced -ctive +irector#, a scala!le, ro!ust director# service -ctive +irector# is used to create server !ased networking -ctive +irector#/s Po! is to store and make availa!le a +irector# data!ase i e information a!out the user, its class, name, address, mails, phone num!ers, location -ctive +irector# is a technolog# created !# %icrosoft that provides a variet# of network services like +irector# *ervices, +N* !ased naming and other network information -ctive +irector# also allows administrator to assign policies, deplo# software and appl# critical updates to an organi2ations -ctive +irector# was previewed in 1333, released first with window 2666 server edition and revised to extend functionall# and improve administration in &indow 2663 -dditional improvements were made in &indow server 2663 and &indow server 2664 9he fundamental !uilding !lock of %icrosoft/s +irector# services continues to !e a domain - domain is logicall# grouping of network resources, including shares, printers, groups and users accounts 9he user account represents the individual to domain, and allows for different t#pe of access and different t#pes of tasks @ver# users account is uni1ue ,t has uni1ueness of the user account that allows administrator to control access for ever# mem!er of domain 9here are two t#pes of users accounts< local account and domain account ;ocal accounts are maintained in the local data!ase of a computer and cannot !e used to grant 30

access to network resources ;ocal users are primaril# used to administer a computer or to allow several people to share a single computer that is not a mem!er of a domain &hereas domain users accounts are much more widel# used in organi2ations that local user accounts !ecause the# allow for central administration and user can log onto an# computer in the domain +omain users accounts are stored in -ctive +irector#

3.B.1 /cti'e )irector0 &er'ice


- computer network can !e divided logicall# into two networking models &orkgroup +omain

)i!!erence =etween Workgroup *nd )om*in 9a!le 3 &orkgroup +omain

1 ,t is a peer8to8peer networking 1 ,t is a server !ased networking model model 2 there is a centrali2ed dedicated server 2 9here is no client and no server -ll computers are in e1ual status 3 9his model is recommended for small networks 'upto 16 pcs( 4 9here is no centrali2ed -dmin8 istration and each PC is 4 9here is centrali2ed administration and each PC can !e administrated and managed from the server 34 administrated separatel# 3 9his model is recommended for large networks computer called domain controller '+C(which controls all other computers called clients

5 ,n this model, low grade operating s#stem like 2666$xp professional, 5 ,n this model high grade operating win 34 etc can !e used " &orkgroup can !e given names like sales, =A, accounts etc 0 :sers accounts are created in each PC and are called as K;ocal :sersL 0 :sers accounts are created on sever side +C and are called as L+omain :sersL -ctive +irector# uses domain to hold o!Pects, each domain has securit# !oundar# :sers must authenticates to the domain in which their users account resides !efore the# can access resources, such as a shared folders -ctive +irector# also links related domains in a hierarchical structure and users can access resources in an# of the domain in which their user account resides 9he hierarchical structures of related domain is called a tree, and all domains in the tree share the same +omain Name *#stem '+N*( namespace -ll the domains and the trees in a single organi2ation are called a forest -ll domains in the forest share same schema " +omain can also given names like a!c com, x#2 com etc s#stem ,like win2666$2663 server are used

3.B.1.1

T0pe o! )om*in

+omain ?orest +omain 9ree .rgani2ation unit

)om*in Fore t - forest is created when window 2k3 server computer is configured as a domain controller - forest is a collection of multiple domain link together and relationship !etween the domains

33

)om*in Tree - domain tree is made up when there is a parent child relationship !etween the domain in the forest 9he child domain includes the complete parent domain name a tree is a set of two or more domains sharing common namespace e g we can create a parent domain and then child domain like mail #ahoo comB where mail8 child domain, #ahoo8 parent domain

Fig ;: &tructure o! dom*in !ore t *nd dom*in tree Org*niD*tion 7nit "O7# .rgani2ation unit is the smallest unit in a domain network that can contain users, computer groups, shared folders, printers and group polic# o!Pect in simple words .: means department like sale department, accounts department like sales, accounts in a compan# .: can !e used to appl# different securit# policies to computer and users in

46

different department .: also helps in dividing administration among different administrator of managing onl# computer and users of sales department

3.B.1.-

T0pe o! )om*in $ontroller


'i( 'ii( 'iii( P+C < Primar# domain controller -+C < -dditional domain controller >+C < >ackup domain controller

(rim*r0 )om*in $ontroller "()$# 9his is the first domain controller, in this domain all entries are created in it like users account, group polic#, .rgani2ation unit etc -ll ?*%. role are done in P+C

/ddition*l )om*in $ontroller "/)$# ,t is a domain network, it is important to have more than one +C so that if one +C fails, the other +C will continue serving the client 9here is also load !alancing of -ctive +irector# *ervice if we have more than one +C 9he first +C we create is simpl# called P+C and if we create an extra +C then that +C is known as -+C -+C has same configuration of -+ as primar# domain controller -ll domain controllers in a domain networking are masters &e can make a change in the active director# of an# domain controller and that change is replicated to all other domain controllers Aeplication takes place among all the domain controllers and it is controlled automaticall# ,f we create a user in the first domain controller, it is automaticall# created in the -+C !ecause of replication -ll the domain controllers in the domain networking are peers and this model is called as multi8 master model

41

Fig F: Multi9M* ter Model

3.B.1.3 ReGuirement o! /cti'e )irector0


'i( 'ii( 'iii( 'iv( 'v( 'vi( &indow 2666$2663 server computer -tleast one N9?* partition *tatic ,P address -tleast 1H> free hard disk space ;-N card ena!led and connected to the network ,nstall +N*, if not installed of -ctive +irector# and configure it

,t should !e noted that active director# cannot work without +N* +N* is automaticall# installed and configured during the -ctive +irector# installation

3.B.1.1 In t*ll*tion o! /cti'e )irector0


?irst of all fill the static ,P address, then install +N* service into it and after that install the -ctive +irector# t*rt: run: dcpromo Ok &elcome to active director# Q ne<t: ne<t *elect domain controller for a new domain e g "gm*il.com# Ne<t +omain N@9>,.* name 'gmail com( 42

Ne<t +ata folder, folder new tech director# serviceQ ne<t '*T* 7.;( Ne<t Click on install and configure the +N* server on this computer to use this +N* server as its preferred +N* server 9ick on permission compati!le onl# with window server Ne<t @nter the restore mode and the password ne<t: ne<t: !ini 8 now restart computer

Command used for the removal of -ctive +irector# t*rt: run: dcpromo 9his command is also used to remove active director#, if after this command the active director# is not removed then t#pe t*rt:run cmd:dcpromo 6!orceremo'*l Ok

4ow to identi!0 /cti'e )irector0 in t*ll*tion


&t*rt : *dmini tr*tor tool -fter that if three options specified if come, it means that -ctive +irector# has !een installed N -ctive +irector# domain and trusts N -ctive +irector# sites and services N -ctive +irector# users and computer .pen +N* console !# -dministrator toolsQ+N* 43

?orward lookup 2one N msdcs exam edu N start of authorit# '*.-( N name server 'N*(

Now ping active director# with domain name like t*rt: run: ping gm*il.com

=*ckup o! /cti'e )irector


-ctive +irector# !ackup come in use when there is some pro!lem in active director# ,f there is an# pro!lem in active director# then remove it and restore the !ackup &t*rt: run:nt+*ckup:ok *elect advance mode and untick that is alread# ticked *elect !ackup *elsct s#stem state Change !ackup path !rowse keep in #our hardware and then send it to the pen drive +<U*d+*ckup

44

3.B.- $4I.) )OM/IN


- domain is created sa# Kx#2 comL this domain is known as parent domain or the root domain Now Kchd x#2 comL will !e the child domain or the su! domain of x#2 com

Fig 15 : p*rent9c8ild rel*tion 8ip model - child domain is created to ease administration in a ver# large domain network &e can create the parent domain in the head office of the compan# and the child domain in the !ranch offices @ach !ranch office will have its own administrator to manage the users of the child domain present in the !ranch office - true relationship is automaticall# created !etween the parent domain and the child domain 9his means users in the child domain can access the file server of the parent domain %oreover users of either domain can use clients of either domain for logging in the domain !ut a user can alwa#s logon onl# in the domain in which his 45

account resides, though he ph#sicall# can use client pc of parent or client domain :sers of either domain can logon its own domain from either side !ut onl# when it use its own domain name users of parent domain can communicate with child domain !ut he has to use its domain name for that

3.B.-.1

&tep to cre*te c8ild dom*in

?irst of all install the active director# on pc1 i e on the parent domain Now make 9om user on it .n pc2 create the child domain, then make users on it, user8 Aam >elow are the steps to cerate child domain ?ill the ,P address in the child domain Now ping to the parent domain with the domain name 'x#2 com( Run :dcpromo: ok ne<t: select domain controller for a new domain ne<t: select child domain and existing domain name 'mcse com( ne<t enter username, password and domain name enter user parent domain name also enter child domain name enter complete +N* name i e x#2 mcse com ne<t: ne<t: ne<t: ne<t

it should !e noted that parent domain can logon into child domain !ut on the other hand child domain cannot logon to the parent domain -lso parent domain can appl# policies or securit# on the child domain

4"

%ake the client mem!er !# entering particular user with its domain name ?irst right click on M0 $omputer (ropertie $omputer n*me $8*nge &rite domain name Qok Now logoff start and then write user name 8 9om +omain name 8 mcse com -gain logoff and check the other user *tart8user name8 a!c +omain name ) mail mcse com

3.;

INTERNET &4/REING
&e can share a single internet connection to multiple computers with the help of

networking or internet sharing 9here are four wa#s to share internet 'i( 'ii( 'iii( 'iv( +irect sharing ,C* ) ,nternet connection sharing &in Prox# N-9 ) Network -ddress 9ranslation

3.;.1 )irect &8*ring


,nternet sharing can !e done !etween computers directl#, Pust !# taking internet connection directl# from ,*P ',nternet *erver provider(, then it is provided to -+*; model, -+*; modem is connected to the ,*P through AJ811 connector 9hen it is connected to the switch with AJ845 connector *witch, further connects computers those 40

have to !e provided with internet connection 9he scenario for direct sharing is as shown in figure<

Fig: 11: )irect &8*ring &cen*rio -+*; modem has ,P address 132 1"4 1 1 -ll the PCs are assigned with a +N* '+omain Name *erver( and H& 'gatewa#( 8132 1"4 1 1 -lso +=CP '+#namic =ost Communication Protocol( is ena!led which will provide ,P addresses to the PCs automaticall#

3.;.- I$& "Internet $onnection &8*ring#


,nternet Connection sharing provides an alternate wa# to provide ,nternet *haring ,C* re1uires a server with two network interfaces, one for the private internal network configured with ,P 132 1"4 6 1 address and an adapter for pu!lic connection ,C* re1uires two connections in order to work< one pu!lic and one private i e ,C* server re1uires two ;-N cards, ,nternal 'Private( and @xternal 'Pu!lic( ,nternal ;-N card uses 44

;ocal ;-N card ';2( and @xternal ;-N card ';1( is used !# ,nternet ,C* is designed to !e as simple as possi!le ,C* works on following windows< 5P, 7ista, 2C3 *erver, 2k3 *erver *P1 it doesn/t work on the server in which -+V*P1 is present 9he scenario for ,C* is shown !elow<

Fig 1-: I$& cen*rio Note<8 &hen we configure ,C* then the local card detect 132 1"4 6 1 address automaticall#

4ow to con!igure I$&


.pen network *nd 8*ring center Network9 (ropertie Click on M*n*ge network connection Aight click on ./N $*rd which is used for internet8 (ropertie Click on 8*ring En*+le I$& Ok 0e 43

3.;.3 Win (ro<0 &er'er


&in Prox# is a third part# software which is used for sharing internet and we can also !lock the we! site with the help of win prox# &,N Prox# supports all the three classes -, >, C also it is supported !# all operating s#stems 9he scenario for &,N prox# is shown !elow<

Fig 13: cen*rio o! win pro<0 er'er ,n win prox# as shown in the scenario a!ove we can share internet ?irst of all a -+*; modem is connected to the ,*P ',nternet *ervice Provider( !# a AJ811 connector and other end of -+*; modem is connected to the PC1 through AJ845 -ssign ,P address 132 1"4 1 1 to the -+*; modem also ena!le the +=CP server and set the start ,P address of 132 1"4 1 2 and end ,P address of 132 1"4 1 254 9hen after -+*; modem connect PC1, assign H& 132 1"4 1 1 and

3.;.1 N/T "Network /ddre

Tr*n l*tion#

,f we have to connect man# computers with a single ,P address then we will use N-9 N-9 exchange ,P packet !etween local network and internet 9he routing and remote access server of window 2C3 server provide us with a component known as N-9 ># 56

ena!ling N-9 on a *erver 2663 s#stem, #ou allow connected users on a private s#stem to share a single connection to access a pu!lic network such as the internet i e N-9 ena!le multiple client computer to connect the internet through a single pu!licl# registered ,P address - N-9 server translate private ,P address to pu!lic addresses N-9 eliminates the need for large num!er of ,P addresses !# mapping externall# assigned ,P addresses

Fig 11: N/T er'er &hen deplo#ing N-9, it is needed to configure setting on !oth the client side and the server side .n the server side of N-9 fill the ,P address staticall#

3.;.1.1 &tep to en*+le N/T er'er


.pen internet Q Tool Q Internet option connection Q ./N etting untick the I( *nd port *ddre okQ okQ give site name

.n the client side of N-9, client side is configured to o!tain ,P addresses automaticall# and then restart the client s#stem -ssuming N-9 is used for address assignment, the client s#stem will receive 9CP$,P information from the N-9 server 9he client information includes< 51

,P address from 132 1"4 6 6 private addressing range *u!net mask '255 255 255 6( +N* server address, which would !e the address of the N-9 interface on the server

&ith the client side configured, there are few things to do on N-9 server< 9he first step to configure N-9 server is to actuall# install the Aouting and Aemote -ccess *ervices 9o do this, start the Aouting and Aemote -ccess *ervice *etup &i2ard &t*rtQ *dmini tr*tor tool Q Routing , Remote /cce Aight click on M0 $omputerQ right click on computer n*me *elect option $on!igure *nd en*+le routing , remote *cce Welcome to routing Q ne<tQ ne<t *elect N/TQ ne<t *elect ./N c*rd which is to !e connected to internet ne<tQ ne<t

?rom an# of the four methods of internet sharing onl# method is used at a time to remove the other method
go to t*rtQ etting *dd , remo'e c8*nge6 remo'e, tick on remo'e.

3.F ?IRT7/. (RI?/TE NETWORK "?(N#


- virtual private network is used to convert pu!lic network address to private network -ll the clients of 7PN dial to pu!lic ,P address of 7PN server and receive private ,P from virtual 7PN d#namic host protocol '+=CP( in 7PN one can have multiple virtual connections to a single ,P address 9his wa# ,one network card can host several in!ound connections, rather than re1uire a modem and telephone line for each simultaneous remote user

52

Fig 12 : cen*rio o! ?(N er'er :sing 7PN server we can connect man# private networks to internet services i e the remote connection &e can create a private network through pu!lic network, we can use firewall for securit# and data encr#ption in 7PN server

3.F.1 ?(N component


'i( 'ii( 'iii( 'iv( ?(N &er'er 7PN server, serve as the end points of a 7PN connection &hen configuring a 7PN server, #ou can allow access to Pust that server, or pass traffic through 7PN server so that the remote user gain access the resources of the entire network ?(N $lient 7PN clients esta!lish connection to 7PN server 9he# can also !e routers that o!tain the router8to8router secure connection 7PN client software is included in all the modern window operating s#stems, including &indow 2663 server Aouter8to router 53 7PN server 7PN Clients &-N .ption *ecurit# .ptions

7PN connection can !e made from computers running server2663 and &indows 2666 running Aouting and Aemote -ccess -dditionall#, an# client that support PP9P or ;29P connections can !e 7PN clients of a window server 2663 s#stem W/N Option 9hese provide the ph#sical mechanism for passing data !ack and forth 9hese connections t#picall# include such similar network technologies such as 91or frame rela# ,n order for 7PN connections to !e successful, the 7PN client and 7PN server must !e connected to each other using either permanent &-N connection or !# dialing into an internet server provider ',*P( &ecurit0 Option *ince a 7PN uses a network that is generall# open to the pu!lic, it is important that the data passed over the connection remain secure 9o aid with secure communication routing and remote access supports such securit# measure as logon and domain securit#, data encr#ption, smart cards, ,P packet filtering and caller ,+

3.F.- T0pe o! ?(N


'i( 'ii( PP9P 'Point to Point 9unneling Protocol ( ;29P ';a#er 2 9unneling Protocol( according to CCN-

(oint to (oint Tunneling (rotocol "((T(# PP9P is %icrosoft/s legac# protocol for supporting 7PN ,t was developed in conPunction with other communications companies such as Ao!otics as an extension to the PPP protocol PP9P encapsulates ,P or ,P5 packets inside of PPP datagram/s 9his means that #ou can remotel# run programs that are dependent upon particular network protocols .ne of the ke#s to remem!er a!out PP9P is that the protocol provides encr#ption capa!ilities, making it much safer to send information over nonsecure networks

54

.*0er Two Tunneling (rotocol ".-T(# ;29P is a standard !ased encapsulation protocol with roughl# the same functionalit# as a Point8to8Point 9unneling Protocol 'PP9P( .ne of the ke# differences !etween &indow/s server 2663 implementation of ;29Pand it cousin PP9P is that ;29Pis designed to run nativel# over ,P networks onl# 9his implementation of ;29P does not support native tunneling over 5 25, frame rela#, or -9% networks ;ike PP9P, ;29Pencapsulates Point8to8Point Protocol 'PPP( frames, which then encapsulate ,P or ,P5 protocols, allowing users to remotel# run programs that are dependent on specific network protocols >ut unlike the PP9P protocol, ;29P does not provide encr#ption of the data ?or data securit# ;29Prelies on the services of another standards8 !ased protocol, ,P*ec

3.F.3

4ow to con!igure ?(N


t*rt:*dmini tr*ti'e tool Routing *nd Remote *cce Aight click on computer n*me con!igure *nd en*+le Routing *nd Remote *cce ne<t: select remote *cce ne<t: ?(N: ne<t select ;-N card which is connected to internet "1B-.12.12.25# pu!lic ,P disa!le ena!le securit# Q next from a specific range of addressQ ne<t:new enter the re1uired range ok:ne<t: no r*diu ne<t: !ini 8 "di*l up or ?(N#

3.F.1

$re*te u er in ?(N er'er


open user propertie : di*l in : *llow *cce 55

*ppl0: ok

335

Working on $lient &ide


Aight click on M0 Network (l*ce : propertie +ou!le click on New Network WiD*rd: ne<t Connect to network *t m0 work pl*ce: ne<t ?irtu*l pri'*te network connection: ne<t @nter compan# name 'a!c(Q ne<t @nter pu!lic ,P address of 7PN serverQ ne<t -n# one use Qne<t !ini 8

3.15

RO7TING
,t is a process of transferring information through an inter network i e from one

network to another Aouting connect different networks having ,+ help in process of routing 9he dial8in properties also allow for specific ,P address to !e assigned to a user 9his is the onl# wa# in &indow *erver 2663 that #ou can assign a specific ,P to a user 9o assign a specific ,P to a user, check the !ox next to assign - *tatic ,P -ddress and enter a valid ,P in the space provided *tatic routing can also !e specified as per user ># defining static routes, users can !e limited to onl# specific parts of networks ,n an internetwork a router must then a!out all the networks present in the for effort we!sites, there are hardware routers like C,*C. @ven win 2663 server computer configured as router ,n simple words Aouter is a computer with two network cards 9hese two network cards, then, are attached to two different logical ,P networks 9he routing ta!le helps direct traffic that is passed through the router Now when there is a router, also there is a routing ta!le, there is a need to configure the router in order for that router to pass along traffic to the proper network 9here are two wa#s the routing ta!le can !e !uilt and modified< either manuall# or automaticall#

5"

3.15.1 T0pe o! Routing


'i( 'ii( *tatic Aouting +#namic Aouting

3.15.1.1 &t*tic Routing


,n this routing information re1uired for routing is manuall# entered into the router !# administrator

4ow to con!igure ./N routing


@nter the static ,P in the router /dmini tr*tor tool Routing *nd Remote *cce Aight click on computer name 'pcc1( $on!igure *nd en*+le routing *nd remote *cce ne<t: cu tom con!igur*tion select ./N routing:ne<t: !ini 8 0e and logon to see ,P ta!le route

50

@na!le ;-N routing ,nterface &-N ,P 102 15 6 6 *N% 255 255 6 6 H& 26 6 6 2

ena!le ;-N routing ,nterface &-N 16 6 6 6 ,P 16 6 6 6 *N% 255 6 6 6 H& 26 6 6 1 Fig 13 : cen*rio !or ./N routing

4ow to con!igure t*tic routing


/t Router R1: /t Router R-: En*+le ./N routing Aight click on t*tic route Inter!*ce W/N )e tin*tion 15.5.5.5 M* k -22.5.5.5 54 en*+le ./N routing right click on t*tic route inter!*ce W/N de tin*tion 1B-.12.5.5 m* k -22.-22.5.5 GW -5.5.5.-

GW -5.5.5.1

Fig 1B : t*tic routing

3.15.1.- )0n*mic Routing


9he other wa# to manage a router routing ta!les is to let the computer do it for #ou Just like +=CP allocate ,P addresses, configuring the d#namic routing protocol usuall# means less errors due to human error, and less administrative overhead ,n d#namic routing, routing information is automaticall# entered in the router using protocols like A,P -N+ .*P? 9hese routing protocols used !# &indow *erver 2663 use one of two kinds of algorithms to determine the !est possi!le path for a packet to get to its destination, either distance vector or link state A,P is used for small networks where as .*P? is used for large networks

Routing In!orm*tion (rotocol "RI(#

53

9he distance vector protocol in use on &indow 2663 is called Aouting ,nformation Protocol 'A,P( for ,P 9his protocol was designed for the exchange of the routing information within a small to medium si2e ,P network &hen Aouter is ena!led on &indow 2663 machine, the routing ta!le includes entries onl# for the networks that are ph#sicall# connected &hen A,P is ena!led for an interface, the router will periodicall# send an announcement of its routing ta!le to inform other A,P routers of the networks it can reach A,P version1 uses !roadcast packets for its announcement A,P version2 offers an improvement and can !e configured to use either multicast or !roadcast packets when communicating with other routers -lso, A,P version2 offers more flexi!ilit# in su!netted and classless inter domain routing 'C,+A( environments 9he !iggest advantage of A,Pis its simplicit# &ith a few clicks in the Aouting and Aemote -ccess *erver and %%C console, #ou can deplo# A,P &ith the A,P d#namic routing protocol installed on &indow/s *erver 2663, #ou get the following features< 'i( 'ii( 'iii( A,P version1 and version2, with the a!ilit# to configure individual network cards with separate versions Calculations used to avoid routing loops and speed recover# of the network whenever topolog# changes occur Aoute filtersB #ou can configure A,P to except information from onl# certain networks, and also choose which routes will !e shared with A,P routers 'iv( 'v( Peer filters, which allow control over which router announcements are accepted *imple password authentication support

>ut there are significant draw!acks, which makes A,P a poor, if not unusa!le solution for large networks ?or example, the maximum hop count used for A,P routers is15, making network 1" hops awa# 'or more( unreacha!le where A,P is concerned

"6

Open &8orte t (*t8 Fir t "O&(F# &here A,P is !uilt to work to work in smaller networks, the .pen *hortest Path ?irst '.*P?( routing protocol is designed for large or ver# large networks 9he goal is the same< information a!out connection to other networks is shared from one router to another ,t offers several advantages over A,P, especiall# significant in large networks< 'i( 'ii( 'iii( Aoutes calculated with .*P? are alwa#s loop free .*P? can scale much more easil# than A,P Aeconfiguration for network topolog# changes is faster

9he !iggest reason .*P? is the choice in large networks is its efficienc#B instead of changing routing ta!le via !roadcast the wa# A,P does, .*P? configured routers maintain a map of the network 9he mapping is called the link state data!ase, .*P? routers keep the link state data!ase up to date .nce changes have !een made to link state data!ase, an .*P? router/s link state data!ase is recalculated -s the networks start to multipl#, the si2e of the link state data!ase increases, and a corresponding hit on router performance results 9o com!at this, .*P? su! divide the network into smaller sections, called areas -reas are connected to each other through a !ack!one area, with each router onl# responsi!le for the link state data!ase for those areas connected to the routers -rea >order Aouters '->As( then connect one !ack!one area to another 9he !iggest draw!ack of .*P? is its complexit#B .*P? re1uires proper planning and is more difficult to configure and administer

3.11 EH$4/NGE &ER?ER


@xchange server is a mail server, we can send and receive mail from one user to another user @xchange server is the mail server of %icrosoft

3.11.1 Element o! E<c8*nge &er'er


M*il &er'er - server which helps to the users to send and receive mail is called mail server M*il =o< - storage place where senders and receivers mails are stored "1

3 11 2

E<c8*nge ?er ion


9a!le 16< @xchange *erver with different operating s#stems @xchange 7ersion @xchange *erver 5 5 @xchange *erver 2666 .perating *#stem &,N N9 or 2666 server 'without *P( &,N N9 or 2666 server '*P3,*P4( without '*P( @xchange *erver 2663 &,N 2666 *erver or &,N2663 server '*P4( without *P @xchange server 2660 &,N2663 server or A2$&,N 2664 server with *P1

&here *P stands for *ervice Pack *ervice Pack are the services which are loaded externall# to remove some !ugs that come during installation of server C+

3.11.3 ReGuirement !or E<c8*nge &er'er (rotocol ReGuired


(O(3 "(o t O!!ice (rotocol# 9his protocol is used for receiving e8 mails IM/E1 "Internet Me *ging /cce (rotocol#

9his protocol is advance version of P.P, this is also used to receive mail .MT( ".oc*l M*il Tr*n !er (rotocol#6&MT( "&imple M*il Tr*n !er (rotocol# 9his protocol is used to send mails NNT( "Network New Tr*n !er protocol# "2

9his protocol is used for transferring messages on internet

4*rdw*re ReGuirement
Processor< min 133%=2 Aec 033%=2 A-%< min 25"%> Aec 512%>

Ot8er ReGuirement
.*< 2k or 2k3 *erver N9?* partition *tatic ,P address -ctive +irector# +N* installation with -+ 2one ,,* installed with -*P net, *%9P, NN9P and www service

3.12 Open System Interconnection (OSI) Model


.*, model is the la#er approach to design, develop and implement network .*, provides following advantages< 8 'i( 'ii( 'iii( +evelopment of new technolog# will !e faster +evices from multiple vendors can communicate with each other ,mplementation and trou!leshooting of network will !e eas#

3.1-.1 )e cription o! )i!!erent .*0er


/pplic*tion .*0er -pplication la#er accepts data and forward into the protocol stack ,t creates user interface !etween application software and protocol stack (re ent*tion .*0er 9his la#er decides presentation format of the data ,t also a!le to performs other function like compression$decompression and encr#ption$decr#ption &e ion .*0er "3

9his la#er initiate, maintain and terminate sessions !etween different applications +ue to this la#er multiple application software can !e executed at the same time Tr*n port .*0er 9ransport la#er is responsi!le for connection oriented and connection less communication 9ransport la#er also performs other functions like 'i( 'ii( @rror checking ?low Control >uffering &indowing %ultiplexing 'iii( 'iv( 'v( 'vi( Network .*0er 9his la#er performs function like logical addressing and path determination @ach networking device has a ph#sical address that is %-C address >ut logical addressing is easier to communicate on large si2e network ;ogical addressing defines network address and host address 9his t#pe of addressing is used to simplif# implementation of large network *ome examples of logical addressing are< 8 ,P addresses, ,P5 addresses etc Network la#er has different routing protocols like A,P, @,HAP, >HP, and -AP etc to perform the path determination for different routing protocol Network la#er also perform other responsi!ilities like defining 1ualit# of service, fragmentation and protocol identification )*t* .ink .*0er 9he functions of +ata ;ink la#er are divided into two su! la#ers ;ogical ;ink Control %edia -ccess Control *e1uencing Positive -cknowledgement Aesponse

"4

'i(

;ogical ;ink Control defines the encapsulation that will !e used !# the N,C to delivered data to destination *ome examples of ;ogical ;ink Control are -AP- '@thernet(, 462 11 wi8fi

'ii(

%edia -ccess Control defines methods to access the shared media and esta!lish the identit# with the help of %-C address *ome examples of %edia -ccess Control are C*%-$C+, 9oken Passing

(80 ic*l .*0er Ph#sical ;a#er is responsi!le to communicate !its over the media this la#er deals with the standard defined for media and signals 9his la#er ma# also perform modulation and demodulation as re1uired

3.13 RO7TER&
13.13.1 Router /rc8itecture *nd it Ke0 $omponent

Processor ,$. Controller %emor# Controller >,.* A.% ,ncomplete ,.* N7A-% *tartup Configuration A-%

;-N &-N Ports

?lash A-% .$* ,.*

Fig 1; : /rc8itecture o! router (roce or "5

*peed< 8 26 %=2 to 1H=2 -rchitecture< 8 A,*C Aeduce ,nstruction set computer %anufacturers< 8 %otorola, ,>%, Power PC, 9exas, .rion, ,ntel

Fl* 8 R/M ?lash memor# is Pust like a hard cop# of the computer ?lash A-% is the permanent read$write memor# 9his memor# is used to store one or more copies of router .$* Aouter .$* is also called ,.* ',nternetwork .perating *#stem( 9he si2e of ?lash A-% in the router is 4%> to 25"%> 9his memor# is @lectricall# @rasa!le Programma!le Aead .nl# %emor# '@@PA.%( N?R/M N7A-% is a KNon 7olatile Aandom -ccess %emor#L ,t is used to store the startup configuration of the Aouter ,t is on chip A-%, its si2e is 32k! R/M "R*ndom /cce Memor0#

,t is a volatile memor# -ll the activities we do are stored in A-%,this means that it holds the running configuration A-% of the router is divided into two logical parts Primar# A-% *hared A-%

(rim*r0 R/M
Primar# A-% is used for< 8 'i( 'ii( 'iii( Aunning cop# of ,.* Aunning configuration Aouting ta!le

""

'iv( 'v( &8*red R/M

-ddress Aesolution Protocol '-AP( ta!le ',P address to %-C address( Processor W other data structure

*hared A-% is used as a !uffer memor# to shared the data received from different interfaces *i2e of A-% in a router ma# var# from 2 %> to 512 %> 9he t#pes of memor# that ma# !e present in a A-% are< 'i( 'ii( 'iii( ROM "R*ndom /cce +A-% 8R +#namic A-% @+.A-% 8R @xtended +ata .ut A-% *+A-% 8R *#nchronous +#namic A-% Memor0#

,t has four components< P.*9 'Power on *elf 9est( ,t performs hardware testing >..9 *trap >oot strap specifies from where and which inter operating s#stem is to !e loaded %ini ,.* Cisco 2566, 1"66 A.% %.&

3.13.2

Router Interfaces & Ports


,nterface is used to connect ;-N networks or wan networks to the router

,nterface will use protocol stacks to send$receive data Ports are used for the configuration of routers Ports are not used to connect different networks 9he primar# purpose of port is the management of router

"0

3.13.2.1

Router Inter!*ce

T*+le 11: Router inter!*ce *nd connector

-:, ) -ttachment :nit ,nterface @P->5 ) @lectronic Private -utomatic >ranch P*9N ) Pu!lic *ervices 9elephone Network 3.13.-.- Router (ort 9a!le 12< Aouter Ports

"4

3.13.3

Modes of Router
&hen we access router command prompt the router will displa# different modes

-ccording to the modes, privileges and rights are assigned to the user

7 er mode
RouterE ,n this mode, we can displa# !asic parameter and status of the router we can test connectivit# and perform telnet to other devices ,n this mode we are not a!le to change and save router configuration

(ri'ileged mode
RouterI ,n this mode, we can displa# all information, configuration, perform administration task, de!ugging, testing and connectivit# with other devices &e are not a!le to perform here configuration editing of the router 9he command to enter in this mode is Xena!le/ &e have to enter ena!le password or ena!le secret password to enter in this mode @na!le secret has more priorit# "3

than ena!le password ,f !oth passwords are configured then onl# ena!le secret will work

Glo+*l con!igur*tion
Route"con!ig#I 9his mode is used for the configuration of glo!al parameters in the router Hlo!al parameters applied to the entire router -ll the changes are performed in this mode >ut here we cannot see and save the changes ?or e g< 8 router hostname or access list of router, password, >anner, Aouting, *ecurit# 9he command to enter in this mode is Xconfigure terminal/

.ine con!igur*tion mode


,n this mode we can set the password of the user mode, i e to set user mode password 9his mode is used to configure lines like console, vt# and auxiliar# 9here are main t#pes of line that are configured 'i( Console Router"con!ig#Iline console 6 'ii( -uxiliar# Router"con!ig#Iline aux 6 'iii( 9elnet or vt# Router"con!ig#Iline vt# 6 4

Inter!*ce con!igur*tion mode


,n this mode we can set ip addresses of the interfaces 9his mode is used to configure router interfaces ?or e g<8 @thernet, *erial, >A, etc Router"con!ig#Iinterface Yt#peR Ynum!erR Router"con!ig#Iinterface serial 1

Routing con!igur*tion mode


9his mode is used to configure routing protocol like A,P, @,HAP, .*P? etc Router"con!ig#Irouter YprotocolR ZYoptionR[ 06

Router"con!ig#Irouter rip Router"con!ig#Irouter eigrp 16

3.13.4 Confi urin Pass!ord


9here are five t#pes of password availa!le in a router

$on ole (* word


router\configure terminal router'config(\line console 6 router'config8line(\password YwordR router'config8line(\login router'config8line(\exit 9o erase password do all steps with no command

?t0 (* word
routerRena!le router\configure terminal router'config(\line vt# 6 4 router'config8line(\password YwordR router'config8line(\login router'config8line(\exit

/u<ili*r0 (* word
router\configure terminal router'config(\line -ux 6 router'config8line(\password YwordR router'config8line(\login router'config8line(\exit

En*+le (* word
01

routerRena!le router\configure terminal router'config(\ena!le password YwordR router'config(\exit

En*+le &ecret (* word


@na!le Password is the clear text password ,t is stored as clear text in configuration where as ena!le secret password is the encr#pted password AouterRena!le Aouter\configure terminal Aouter'config(\ena!le secret YwordR Aouter'config(\exit

Encr0ption *ll p* word


-ll passwords other than ena!le secret password are clear text password 9he command to encr#pt all password are Aouter\configure terminal Aouter'config(\service password8encr#ption

3.13." Mana in Confi uration


9here are two t#pes of configuration present in a router 'i( 'ii( *tartup Configuration Aunning Configuration

*tartup configuration is stored in the N7A-% *tartup configuration is used to save settings in a router *tartup configuration is loaded at the time of !ooting in to the Primar# A-% Aunning Configuration is present in the Primar# A-% wherever we run a command for configuration, this command is written in the running configuration

To *'e con!igur*tion
Aouter\cop# running8configuration startup8configuration .r 02

Aouter\write

To *+ort con!igur*tion
Aouter\cop# startup8configuration running8configuration

To di pl*0 running9con!igur*tion
Aouter\show running8configuration

To di pl*0 t*rtup con!igur*tion


Aouter\show startup8configuration

Confi urin #ost $ame


Aouter\configure terminal Aouter'config(\hostname YnameR YnameR\exit or end or $U2 Aouter\config terminal Aouter'config(\hostname r1 A1'config(\

Confi uration Interfaces


,nterfaces configuration is one of the most important part of the router configuration ># default, all interfaces of Cisco router are in disa!led mode &e have to use different commands as our re1uirement to ena!le and configure the interface Aouter\configure terminal Aouter'config(\interface Yt#peR YnoR Aouter'config8if(\ip address YipR YmaskR Aouter'config8if(\no shutdown Aouter'config8if(\exit

To di pl*0 inter!*ce t*tu


Aouter\show interfaces 'to show all interfaces( Aouter\show interface Yt#peR YnoR 03

9his command will displa# following parameters a!out an interface '1( '2( '3( '4( '5( '"( '0( '4( '3( '16( '11( '12( *tatus %ac address ,P address *u!net mask =ardware t#pe $ manufacturer >andwidth Aelia!ilit# +ela# ;oad ' 9x load Ax load( @ncapsulation -AP t#pe 'if applica!le( Ceep alive

$on!iguring option*l p*r*meter on W/N inter!*ce


Aouter\configure terminal Aouter'config(\interfac Yt#peR YnoR Aouter'config8if(\encapsulation YprotocolR Aouter'config8if(\clock rate YvalueR Aouter'config8if(\end

$omm*nd di pl*0ing 8i tor0 o! Router To di pl*0 comm*nd pre ent in 8i tor0


Aouter\show histor#

To di pl*0 8i tor0 iDe


Aouter\show terminal

To c8*nge 8i tor0 iDe


Aouter\config terminal Aouter'config(\line console 6 Aouter'config8if(\histor# si2e Yvalue'6825"(R 04

Aouter'config8if(\exit

Confi urin %anners


>anners are Pust a message that can appear at different prompts according to the t#pe +ifferent !anners are< 8 %essage of the da# 'motd( 9his !anner appear at ever# access method ;ogin -ppear !efore login prompt @xec -ppear after we enter to the execution mode ,ncoming -ppear for incoming connections

*#ntax<8
Aouter\config terminal Aouter'config(\!anner Ydelimation charR Aouter'config(\ Yt#peR Ydelimation charR9ext %assage

E<*mple
Aouter\config terminal Aouter'config(\!anner motd ] 9his router is distri!ution 3"66 router connected to Aeliance ] Aouter'config(\

&o set time in router


&e can configure router clock with the help of two methods< 'i( 'ii( Configure clock locall# Configure clock on N9P server 'Network 9ime Protocol(

05

Aouter does not have !atter# to save the clock setting *o that clock will reset to the default on re!oot

To di pl*0 clock
Aouter\show clock

To con!igure clock
Aouter\clock set hh<mm<ss da# month #ear Aouter\clock set 0<15<16 3 June 2663

To con!igure clock !rom NT( er'er


Aouter\config terminal Aouter'config(\ntp server Y,P addressR Aouter'config(\exit C<URping pool ntp org 9o get ntp server ip from internet C<URroute print

3.11

&7=NETTING
*u!netting is a process or a techni1ue to divide large and complex networks into

smaller parts or smaller networks and each network is called as su!net *u!netting is done to reduce the wastage of ,P addresses ie instead of having a single huge network for an organi2ation smaller networks are created within a given huge network *u!netting allows the user to create multiple logical networks within a single Class -, > or C !ased networks ,n su!netting, the ,Pv4 address is !roken into two partsB network id and host id 9his process !orrows !its from the host id field ,n this process, the network si2e does not shrink !ut the si2e of hosts per network shrinks in order to include su!8networks within the network

3.11.1

/d'*nt*ge o! u+netting
0"

*i2e of the ph#sical networks is reduced and hence eas# to manage Aeduce network traffic @as# to trou!leshoot Aeduce the wastage of ,P address

&u+net M* k
- su!net mask specifies the part of ,P address that is to !e used for identif#ing a su! network - su!net mask when logicall# -N+ed with ,Paddress provides a 328 !it network address 9his !inar# address gives the first address in the su!net !lock specified in the large network

)e!*ult M* k
Classfull addresses consists of three classesB Class -, Class >, Class C used for su!net @ach class has a default su!net mask C lass - consists of eight 1s in the network address field and 24 6s in remaining field, Class > consists of 1" 1s in network address field and 1" 6s in remaining field, and Class C cointains 24 1s in the network address field and remaining 4 !#tes as 6s the default address mask in !inar# and dotted8decimal is shown in the ta!le 13

00

9o Calculate the *u!net %ask 1 ,dentif# the class of address assigned ?or this example the class of ,P address is Class > 2 check the default address mask for the appropriate class and convert it to !inar# format for this example the default address mask is 255 255 6 6 and the e1uivalent !inar# format isB 11111111 11111111 66666666 66666666 3 4 check the no of 1s in the default mask @ g this address contains 1" 1s in class >, 1" !its 2 octat are for net id and the last 1" !its 2 octates are for host id now if we need 3 su!nets 9his no 3 is not a power of 2 the next no that is power of 2 and greater than 2 is 1" *o, we re1uire 4 extra 4 extra 1s in the network field which has to !e !orrowed from the host id field 5 the total no of 1s is 1"V4F26, as 1" 1s are from network id and 4 1s are of additional !its re1uired for su!network 9he no of 6s in the n$w is 32826F12 which defines whole address " hence address is given as 11111111 11111111 11116666 66666666 and in decimal format can !e given as 255 255 246 6 T*+le 11: decim*l *nd +in*r0 '*lue o! u+net m* k

04

+ecimal >inar#

66666666 6 124 132 224 246 244 252 254 255 16666666 11666666 11166666 11116666 11111666 11111166 11111116 11111111

03

3.11.- T0pe o! &u+netting


?ixed ;ength *u!net %ask '?;*%( 7aria!le ;ength *u!net %ask '7;*%(

&tep o! &u+netting !or F.&M


?or ,P address 132 1"4 16 6 'Class C( *tep 1< ,dentif# the total no of su!nets 2^n F no of su!nets &here n are the no s and !orrowed !#tes from host ,+ portion ;et we are given that we have to make 4 su!nets 9herefore 2^n F4 i e nF2 *tep 2< *tep 3< step 4< ,dentif# the total no of su!nets, no of valid hosts and the !roadcast address Calculate the su!net mask and range *u!net mask for n$w 132 1"4 16 6$2" is 9o idettif# the total no of the valid hosts for each su!net 2^m82F no of valid hosts &here m are the remaining no of !its in host ,+ 2^"8 2F"2

11111111 11111111 11111111 1166666666 ie 255 255 255 132 rangeFR 25"8132F"4

46

T*+le 12: 8owing u+net m* kJ '*lid 8o t J +ro*dc* t *ddre &u+network 132 1"4 16 6 ?*lid 4o t 132 1"4 16 1 132 1"4 16 "3 132 1"4 16 "4 132 1"4 16 "5 132 1"4 16 12" 132 1"4 16 12 4 132 1"4 16 123 132 1"4 16 136 132 1"4 16 133 132 1"4 16 13 2 132 1"4 16 254 to 132 1"4 16 255 to 132 1"4 16 131 to 132 1"4 16 120 to 132 1"4 16 "3 =ro*dc* t /ddre

?.&M
,n 7;*% to allocate ,P addresses to su!nets depending upon the no of hosts 9he network having more no of hosts is given priorit# and the one having least no of host 41

comes at last and for each network the su!net is assigned separatel# -s in the scenario given<

'i 1() *aria+le su+net mas, 3.12 TE.NET


9elnet stands for terminal network, telephone network, terminal encapsulation on the network Purpose of 9elnet is to access the remote device in order to configure it ,t provides textual access of the remote device ,t uses the services of 9CP 9elnet service is used where small !andwidth is low ,t provides textual access of the remote device Port num!er of 9elnet is 23

3.12.1 To /cce

t8e )e'ice Remotel0

?or this purpose we have to assign the ,P addresses to the PCs and the interfaces ?or 9elnet the Aouters are to !e configured with A,P version1 , so that the device can ping each other -lso +C@ ca!le is used to connect the Aouters 9he serial link should have the speed of "4C also appl# vt# password and ena!le secret password *et up the Aouters so that the# can manage via 9elnet ?irst of all select the PCs and the routers connect the ports to the router, dou!le click on router, switch off the router if it is on 9hen select the serial port according to the 42

routers, switch on the router *elect the ca!le to connect the Aouters Aouter to Aouter connections are made !# the serial ca!le, so go on first Aouter select the serial port as s6$1$6 in the scenario, then go to the other Aouter and connect the serial ca!le at interface s1$6 -ccordingl# connect the third Aouter with interfaces s1$1 and s1$2 Now connect the PCs to the routers, to do this first select the console ca!le, click on the PC select A*232 option, then connect it on the Aouter and select console ca!le Now select cross8 over ca!le on the PC select ?ast @thernet option and on the Aouter select f6$6 option now as the PCs and Aouters are connected to each other assign ,P addresses to the PCs and the Aouters -ccording to the fig set the ,P addresses of the PCsQ dou!le click on the PCQ choose the option of desktopQ ,P configuration Now set the ,P address, su!net mask, and the default gatewa# ;ike wise set the ,P address of all the PCs Now set the ,P address of the interfaces of router

3.12.- $omm*nd to * ign I( *ddre e to t8e inter!*ce : -t Aouter1<


AouterR AouterRena!le Aouter\configure terminal Aouter'config(\interface f6$6 Aouter'config8if(\ip address 16 6 6 1 255 6 6 6 Aouter'config8if(\no shutdown

43

Fig -5: cen*rio o! Telnet Aouter\ Aouter\configure terminal Aouter'config(\interface s6$1$6 Aouter'config8if(\ip address 46 6 6 1 255 6 6 6 Aouter'config8if(\no shutdown Aouter'config(\interface s6$1$6 Aouter'config8if(\clock rate "4666 Aouter'config8if(\no shutdown Now to check the assigned ,Paddresses to the interfaces the command used is Aouter\show ip interface !rief

-t router 2<
Aouter\configure terminal Aouter'config(\interface f6$6 Aouter'config8if(\ip address 26 6 6 1 255 6 6 6 Aouter'config8if(\no shutdown Aouter\ 44

Aouter\configure terminal Aouter'config(\interface s1$6 Aouter'config8if(\ip address 46 6 6 2 255 6 6 6 Aouter'config8if(\no shutdown Aouter\configure terminal Aouter'config(\interface s1$1 Aouter'config8if(\ip address 56 6 6 1 255 6 6 6 Aouter'config8if(\no shutdown Aouter'config(\interface s1$1 Aouter'config8if(\clock rate "4666 Aouter'config8if(\no shutdown

-t router 3<
Aouter\configure terminal Aouter'config(\interface f6$6 Aouter'config8if(\ip address 36 6 6 1 255 6 6 6 Aouter'config8if(\no shutdown Aouter\ Aouter\configure terminal Aouter'config(\interface s1$6 Aouter'config8if(\ip address 56 6 6 2 255 6 6 6 Aouter'config8if(\no shutdown

To Telnet * de'ice !rom Router


-t all the Aouters use these commands Aouter'config(\line vt# 6 4 Aouter'config8line(\password co!ra Aouter'config8line(\login Aouter'config(\ena!le password co!ra Aouter'config(\ena!le secret co!ra1 45

To telnet * de'ice !rom router


Aouter\telnet Y,PR .r AouterRtelnet Y,PR

To e<it !rom telnet e ion


Aouter\exit

To e<it !rom * 8*nged telnet e ion


CtrlVshftV" .r Aouter\disconnect

To di pl*0 connected e ion


Aouter\show sessions 9his command shows those sessions, which are created or connected !# us ,f we want an#one can telnet our router without password then on the line vt# t#pe command KNo ;oginL

3.13 RO7TING
Aouting is a process or techni1ue to identif# the path from one network to another Aouters don/t reall# care a!out hosts_the# onl# care a!out networks and the !est path to each network 9o route the packet the router must know the following things< +estination network Neigh!our device from witch it can learn a!out remote Networking Possi!le num!er of routers to reach the destination >est route to reach the destination =ow to maintain W verif# the routing information 4"

3.13.1 T>(E& OF RO7TING


*tatic routing +efault routing +#namic routing

3.13.1.1 &T/TI$ RO7TING


,n static routing an administrator specifies all the routes to reach the destination *tatic routing occurs when #ou manuall# add routes in each router/s routing ta!le ># default, *tatic routes have an -dministrative +istance '-+( of 1

?eatures
9here is no overhead on the router CP: 9here is no !andwidth usage !etween routers ,t adds securit#, !ecause the administrator can choose to allow routing access to certain networks onl#

/d'*nt*ge o! t*tic routing


'1( ?ast and efficient '2( %ore control over selected path '3( ;ess overhead for router '4( >andwidth of interfaces is not consumed in routing updates

-isad*anta es of static routin


'1( %ore overheads on administrator '2( ;oad !alancing is not easil# possi!le '3( ,n case of topolog# change routing ta!le has to !e change manuall#

&0nt*< !or &t*tic Routing


40

Aouter 'config(\ ip route Ydestination N$wR Y*u!net maskR YNext =ope8 address or exit interfaceR ZYadministrative distanceRPermanent[

&o c.ec, t.e routin ta+le of router


Aouter \ show ip route

Fig -1: cen*rio o! t*tic routing

*tatic routing of router 'A1(


Aouter'config(\ip route 26 6 6 6 255 6 6 6 46 6 6 2 Aouter'config(\ip route 36 6 6 6 255 6 6 6 46 6 6 2 Aouter'config(\ip route 56 6 6 6 255 6 6 6 46 6 6 2 Aouter'config(\interface so$1$6 Aouter'config(\ clock rate "4666 Aouter \ show ip route

*tatic routing of router 'A2(


44

Aouter'config(\ip route 16 6 6 6 255 6 6 6 46 6 6 1 Aouter'config(\ip route 36 6 6 6 255 6 6 6 56 6 6 2 Aouter\show ip route Aouter'config(\interface s1$6 Aouter'config(\ clock rate "4666 Aouter'config(\interface s1$1 Aouter'config(\clock rate "4666 Aouter\show ip route

*tatic routing of router 'A3(


Aouter'config(\ip route 16 6 6 6 255 6 6 6 56 6 6 1 Aouter'config(\ip route 26 6 6 6 255 6 6 6 56 6 6 1 Aouter'config(\ip route 46 6 6 6 255 6 6 6 56 6 6 1 Aouter'config(\interface s1$6 Aouter'config(\ clock rate "4666 Aouter\show ip route

3.13.1.-

)EF/7.T RO7TING
+efault routing is used to send packets with a remote destination network

not in the routing ta!le to the next8hop route +efault routing is also a t#pe of static routing which reduces the routing overhead W default routing is also used with stu! networks *tu! networks are those having a single exit interface +efault routing is also used for unknown destination - special address is used to perform the default routing ie 6 6 6 6 9he scenario for default routing is same and !ut the commands used at the routers having single exit interface like A1 and A3 have different commands

-t Aouter 'A1(
Aouter'config(\ip route 6 6 6 6 6 6 6 6 46 6 6 2

43

Aouter\show ip route

-t Aouter 'A3(
Aouter'config(\ip route 6 6 6 6 6 6 6 6 56 6 6 1 Aouter\show ip route

3.13.1.3

)>N/MI$ RO7TING
+#namic routing is when protocols are used to find networks and update

routing ta!le on routers - routing protocol defines the set of rules used !# router when it communicates routing information !etween neigh!or routers ,n d#namic routing, we will ena!le a routing protocol on router 9his protocol will send its routing information to the neigh!or router 9he neigh!ors will anal#2e the information and write new routes to the routing ta!le 9he routers will pass routing information receive from one router to other router also ,f there are more than one path availa!le then routes are compared and !est path is selected *ome examples of d#namic protocol are< 8 A,P, ,HAP, @,HAP, .*P? 9here are two t#pe of routing protocols used in internetwors<

,nterior Hatewa# Protocols ',HPs(


,HPs are used to exchange routing information with routers in the same -utonomous *#stem'-*( num!er Aouting which is performed within a single autonomous s#stem is known as interior routing 9he protocol that are used to perform this t#pe of routing are known as ,HP',nterior Hatewa# Protocol( 9hese protocols are<8 'i( 'ii( 'iii( 'iv( A,Pv1 'Aouting ,nformation Protocol 7ersion 1( A,Pv2 'Aouting ,nformation Protocol 7ersion 2( @,HAP '@nhanced ,nterior Hatewa# Aouting Protocol( .*P? '.pen *hortest Path ?irst( 36

'v(

,*8,* ',ntermediate *#stem to ,ntermediate *#stem(

@xterior Hatewa# Protocols '@HPs(


@HPs are used to communicate !etween different -utonomous *#stem Protocol that used to do this t#pe of routing are called exterior gatewa# protocols -utonomous *#stem<8 -n autonomous s#stem is a collection of networks under a common administrative domain, which !asicall# means that all routers sharing the same routing ta!le information are in the same -*

3.13.- Routing (rotocol =* ic


'i( 'ii( 'iii( -dministrative +istances Aouting protocol Aouting ;oops

/dmini tr*ti'e )i t*nce 9he -dministrative +istance '-+( is used to rate the trustworthiness of routing

information received on a router from a neigh!or router -n -dministrative +istance is an integer from 6 to 255, where 6 is the most trusted and 255 means no traffic will !e passed via this route ,f a router receives two updates listing he sane remote network, the first thing the router checks is the -+ ,f one of the advertised routes has lower -+ than the other, then the route with the lowest -+ will !e placed in the routing ta!le ,f !oth advertised routes to the same network have the same -+, then routing protocol metrics 'such as hop count or !andwidth of the lines( will !e used to find the !est path to the remote network 9he advertised route with the lowest metric will !e placed in the routing ta!le >ut if !oth advertised routes have the same -+ as well as the same metrics, then the routing protocol will load8!alance in the remote network

31

Route &ource Connected interface *tatic Aoute @,HAP ,HAP .*P? A,P @xternal @,HAP :nknown 255

)e!*ult /) 6 1 36 166 116 126 106 9his route will never !e used

9a!le 1"

3.13.-.1

$l* e o! Routing (rotocol


'i( 'ii( 'iii( +istance vector protocol ;ink state protocol =#!rid protocol

9here are three classes of Aouting Protocol

+istance vector protocol


9he +istance8vector protocols find the !est path to remote network !# Pudging distance @ach time a packet goes through a router, that/s called a hop 9he route 32

with the least num!er of hops to the network is determined to !e the !est route 9he vector indicates the direction to the remote network 9he# send the entire routing ta!le to directl# connected neigh!ors @x< A,P, ,HAP. 9he distance8vector routing algorithm passes complete routing ta!le contents to neigh!oring routers - router receiving an update from a neigh!or router !elieves the information a!out remote networks without actuall# finding out for itself ,t/s possi!le to have network that has multiple links to the same remote network, and if that/s the case, the administrative distance is checked first ,f the -+ is the same, the protocol will have to use other metrics to determine the !est path to use to that remote network

Fig --: Routing t*+le

$on'erged Network

33

Fig -3 : Routing t*+le o! co'ered network

Routing .oop +istance8vector routing protocols keep track of an# changes to the internet work

!# !roadcasting periodic routing updates out all active interfaces 9his !roadcast includes the complete routing ta!le Aouting loops can occur !ecause a ever# router isn/t updated simultaneousl#

Routing .oop E<*mple

Fig -1: Routing loop 34

9he interface to Network 5 fails -ll routers know a!out Network 5 from Aouter @ Aouter -, in its ta!les, has a path to Network 5 through Aouter > &hen Network 5 fails, Aouter @ tells Aouter C 9his causes Aouter C to stop routing to Network 5 through Aouter @ >ut Aouters -, >, and + don/t know a!out Network 5 #et, so the# keep sending out update information Aouter C will eventuall# send out its update and cause > to stop routing to Network 5, !ut Aouters - and + are still not updated 9o them, it appears that Network 5 is still availa!le through Aouter > with a metric of 3 9he pro!lem occurs when Aouter - sends out its regular 368second K=ello, ,/m still here_these are the links , know a!outL message, which includes the a!ilit# to reach Network 5 and now Aouters > and + receive the wonderful news that Network 5 can !e reached from Aouter -, so Aouters > and + then send out the information that Network 5 is availa!le -n# packet destined for Network 5 will go to Aouter -, to Aouter >, and then !ack to Aouter - 9his is a routing loop .ink t*te protocol -lso called shortest8path8first protocols, the routers each create three separate ta!les .ne keeps track of directl# attached neigh!ors, one determines the topolog# of the entire internet work, and one is used as the routing ta!les ;ink state routers know more a!out the internet work than an# distance8vector routing protocol ;ink state protocols send updates containing the state of their own links to all other routers on the network @x< .*P? 40+rid protocol =#!rid protocol use aspects of !oth distance8vector and link state protocol @x< @,HAP

3.13.3

RI( "Routing In!orm*tion (rotocol#


Aouting ,nformation Protocol is a true distance8vector routing protocol ,t

is an ,H> ',nter Hatewa# Protocol( ,t sends the complete routing ta!le out to all active 35

interfaces ever# 36 seconds to its immediate neigh!our 9his is slow convergence means that one router sends a re1uest to other a!out its route or network get networks which are not assigned to it after all thee three routers have same networks, this process is repeated to send and receive re1uest so it is called slow convergence A,P onl# uses hop count to determine the !est wa# to remote network, !ut it has a maximum allowa!le hop count of 6815 !# default, meaning that 1" is deemed unreacha!le A,P version 1 uses onl# class full routing, which means that all devices in the network must use the same su!net mask A,P version 2 provides something called prefix routing, and does send su!net mask information with the route updates 9his is called classless routing

4op $ount ,t is a wa# of measurement =op count limit is15 9his routing supports onl# 15

routers, if there is one more router in the network then this routing will fails )e!*ult *dmini tr*ti'e di t*nce "1-5#

Timer o! RI(
'i( 'ii( 'iii( 'iv( :pdate timers =old timers ,nvalid timers ?lush out timers

Route upd*te timer


Aouter update timer sets the interval 35 econd !etween periodic routing updates, in which the router sends a complete cop# of its routing ta!le out to all neigh!ors

Router in'*lid timer

3"

- router invalid timer determines the length of time that must elapse 1;5 econd !efore a router determines that a route has !ecome invalid ,t will come to this conclusion if it hasn/t heard an# updates a!out a particular route for that period &hen that happens, thee router will send out updates to all its neigh!ors letting them know that the route is invalid

4old9down timer
9his sets the amount of time during which routing information is suppressed Aouters will enter into the hold8down state when an update packet is received that indicated the route is unreacha!le 9his continues until entire an update packet is received with a !etter metric or until the hold8down timer expires 9he default is 1;5 econd .

Route !lu 8 timer


Aoute flush timers/ sets the time !etween a route !ecoming invalid and its interval from the routing ta!le -15 econd >efore it/s removed from the ta!le, the router notifies its neigh!ors of that route/s impending demise 9he value of the route invalid timer must !e less than that of the route flush timers

)i!!erence +etween RI(?1 , RI(?T*+le 1B

30

&tep to do routing "'er ion 1# -t router 1


Aouter'config(\ router rip Aouter'config8router(\network 16 6 6 6 Aouter'config8router(\network 46 6 6 6 Aouter\show ip route

-t router 2
Aouter'config(\ router rip Aouter'config8router(\network 26 6 6 6 Aouter'config8router(\ network 46 6 6 6 Aouter'config8router(\ network 56 6 6 6 34

Aouter\show ip route

-t router 3
Aouter'config(\ router rip Aouter'config8router(\network 36 6 6 6 Aouter'config8router(\ network 56 6 6 6 Aouter\show ip route

3.13.1 IGR( " Interior G*tew*0 (rotocol#


,nterior Hatewa# Aouting Protocol ',HAP( is a Cisco8proprietar# distance8vector routing protocol 9o use ,HAP, all #our routers must !e Cisco routers ,HAP has a maximum hop count of 255 with a default of 166 ,HAP uses !andwidth and dela# of the line !# default as a metric for determining the !est route to an internetwork Aelia!ilit#, load, and maximum transmission unit '%9:( can also !e used, although the# are not used !# default

T*+le 1; : )i!!erence +etween IGR( *nd RI( IGR( Can !e used in large internetworks RI( &orks !est in smaller networks

33

:ses an autonomous s#stem num!er for +oes not #se a#ti!ini#s s#stem num!ers activation Hives a full route ta!le update ever# 36 Hives full route ta!le update ever# 36 seconds =as an administrative distance of 166 seconds =as an administrative distance of 126

:ses !andwidth and dela# of the line as :ses onl# hop count to determine the !est metric 'lowest composite metric(,with a path to a remote network, with 15 hops maximum hop count of 255 !eing the maximum

IGR( Timer
9o control performance, ,HAP includes the following timers with default settings< 7pd*te timer 9hese specif# how fre1uentl# routing8update messages should !e sent 9he default is 36 seconds

In'*lid timer
9hese specif# how long a router should wait !efore declaring a route invalid if it

doesn/t receive a specific update a!out it 9he default is three times the update period

4old down timer


9hese specif# the hold down period 9he default is three times the update timer

period plus 16 seconds

Flu 8 timer
9hese indicate how much time should pass !efore a route should !e flushed from the routing ta!le 9he default is seven times the routing update period ,f the update timer

166

is 36 seconds !# default, then 0 ` 36 F "36 seconds elapse !efore a route will !e flushed from the route ta!le

-t Aouter 1
A1'config(\router igrp 16 A1'config8router(\network 16 6 6 6 A1'config8router(\network 46 6 6 6 A1\show ip route

-t Aouter 2
A2'config(\router igrp 16 A2'config8router(\network 46 6 6 6 A2'config8router(\network 26 6 6 6 A2'config8router(\network 56 6 6 6 A2\show ip route

-t Aouter 3
A1'config(\router igrp 16 A1'config8router(\network 36 6 6 6 A1'config8router(\network 56 6 6 6 A1\show ip route

3 1" 5

EIGR("En8*nced Interior Routing (rotocol#


@nhanced ,HAP '@,HAP( is a classless, enhanced distance8vector protocol

that gives us a real edge over ,HAP ;ike ,HAP, @,HAP uses the concept of an autonomous s#stem to descri!e the set of contiguous routers that run the same routing protocol and share routing information >ut unlike ,HAP, @,HAP includes the su!net mask in its route updates 9he advertisement of su!net information allows us to use 7;*% and summari2ation when designing our networks

161

@,HAP is sometimes referred to as a h#!rid routing protocol !ecause it has characteristics of !oth distance8vector and link8state protocols ,t sends traditional distance8vector updates containing information a!out networks plus the cost of reaching them from the perspective of the adverting router @,HAP has a maximum hop count of 255

(ower!ul !e*ture t8*t m*ke EIGR( * re*l t*ndout !rom IGR(


*upport for ,P, ,P5, and -pple9alk via protocol8dependent modules Considered classless 'same as A,Pv2 and .*P *upport for 7;*%$C,+A *upport for summaries and discontiguous networks @fficient neigh!or discover# Communication via Aelia!le 9ransport Protocol 'A9P( >est path selection via +iffusing :pdate -lgorithm '+:-;( Cisco calls @,HAP a distance vector routing protocol, or sometimes an advanced distance vector or even a h#!rid routing protocol @,HAP supports different Network la#er protocols through the use of protocol8dependent modules 'P+%s( @ach @,HAP P+% will maintain a separate series of ta!les containing the routing information that applies to a specific protocol ,t means that there will !e ,P$@,HAP ta!les, ,P5$@,HAP ta!les, and -pple9alk$@,HAP ta!les

Neig8+or )i co'er0
>efore @,HAP routers are willing to exchange routes with each other, the# must !ecome neigh!ors 9here are three conditions that must !e met for neigh!orship esta!lishment< =ello or -CC received -* num!ers match ,dentical metrics 'C values(

162

9o maintain the neigh!orship relationship, @,HAP routers must also continue receiving =ellos from their neigh!ors !ecome neigh!ors 9he onl# time @,HAP advertises its entire routing ta!le is when it discovers a new neigh!or and forms an adPacenc# with it through the exchange of =ello packets &hen this happens, !oth neigh!ors advertise their entire routing ta!les to one another -fter each has learned its neigh!or/s routes, onl# changes to the routing ta!le are propagated from then on @,HAP routers that !elong to different autonomous s#stems '-*es( don/t automaticall# share routing information and the# don/t

@,HAP maintains three ta!les containing information a!out the internetworks 'i( Neigh!or 9a!le Aecords information a!out routers with whom neigh!orship relationships have !een formed 'ii( 9opolog# 9a!le *tores the route advertisements a!out ever# route in the internetwork received from each neigh!or

EIGR( Metric
-nother reall# sweet thing a!out @,HAP is that unlike man# other protocols that use a single factor to compare routes and select the !est possi!le path, @,HAP can use a com!ination of four< >andwidth +ela# ;oad Aelia!ilit#

163

3 1" " O&(F "Open &8orte t (*t8 Fir t#


.pen *hortest Path ?irst '.*P?( is an open standards routing protocol that/s !een implemented !# a wide variet# of network vendors, including Cisco 9his works !# using the +iPkstra algorithm ?irst, a shortest path tree is constructed, and then the routing ta!le is populated with the resulting !est paths .*P? converges 1uickl#, although perhaps not as 1uickl# as @,HAP, and it supports multiple, e1ual8cost routes to the same destination >ut unlike @,HAP, it onl# supports ,P routing .*P? is an ,HP protocol ,t is a link state routing protocol ,t is supported !# man# operating s#stems ,ts default -+ is 116, hop count limit is unlimited ,t is classless routing protocol, supports 7;*%$C,+A ># default the highest ,P address of interface will !e elected as Aouter id

O&(F pro'ide t8e !ollowing !e*ture


Consists of areas and autonomous s#stems %inimi2es routing update traffic -llows scala!ilit# *upports 7;*%$C,+A =as unlimited hop count -llows multi8vendor deplo#ment 'open standard( .*P? is supposed to !e designed in a hierarchical fashion, which !asicall# means that #ou can separate the larger internetwork into smaller internetworks called areas 9his is the !est design for .*P? 9he reasons for creating .*P? in a hierarchical design include< 9o decrease routing overhead 9o speed up convergence 9o confine network insta!ilit# to single areas of the network

164

@ach router in the network connects to the !ack!one called *re* 5J or the +*ck+one *re* .*P? must have an *re* 5, and all routers should connect to this area if at all possi!le >ut routers that connect other areas to the !ack!one within an -* are called /re* =order Router "/=R #. *till, at least one interface must !e in area 6 .*P? runs inside an autonomous s#stem, !ut can also connect multiple autonomous s#stems together 9he router that connects these /&e together is called an /utonomou &0 tem =ound*r0 Router "/&=R#.

O&(F Terminolog0
.ink - link is a network or router interface assigned to an# given network &hen an interface is added to the .*P? process, it/s considered !# .*P? to !e a link Router I) 9he Aouter ,+ 'A,+( is an ,P address used to identif# the router Cisco chooses the Aouter ,+ !# using the highest ,P address of all configured loop!ack interfaces ,f no loop!ack interfaces are configured with addresses, .*P? will choose the highest ,P address of all active ph#sical interfaces Neig8+or Neigh!ors are two or more routers that have an interface on a common network,such as two routers connected on a point8to8point serial link /dK*cenc0 -n adPacenc# is a relationship !etween two .*P? routers that permits the direct exchange of route updates .*P? is reall# pick# a!out sharing routing information_ unlike @,HAP, which directl# shares routes with all of its neigh!ors ,nstead, .*P? directl# shares routes onl# with neigh!ors that have also esta!lished adPacencies -nd not all neigh!ors will !ecome adPacent_this depends upon !oth the t#pe of network and the configuration of the routers

O&(F Topologie d*t*+* e


165

9he topolog# data!ase contains information from all of the ;ink *tate -dvertisement packets that have !een received for an area 9he router uses the information from the topolog# data!ase as input into the +iPkstra algorithm that computes the shortest path to ever# network ;*- packets are used to update and maintain the topolog# data!ase - ;ink *tate -dvertisement ';*-( is an .*P? data packet containing link8state and routing information that/s shared among .*P? routers 9here are different t#pes of ;*- packets -n .*P? router will exchange ;*- packets onl# with routers to which it has esta!lished adPacencies - designated router '+A( is elected whenever .*P? routers are connected to the same multi8access network - prime example is an @thernet ;-N - !ackup designated router '>+A( is a hot stand!# for the +A on multi8access links 9he >+A receives all routing updates from .*P? adPacent routers, !ut doesn/t flood ;*- updates O&(F *re* -n .*P? area is a grouping of contiguous networks and routers -ll routers in the same area share a common -rea ,+ =ro*dc* t "multi9*cce # >roadcast 'multi8access( networks such as @thernet allow multiple devices to connect to 'or access( the same network, as well as provide a broadcast a!ilit# in which a single packet is delivered to all nodes on the network ,n .*P?, a +A and a >+A must !e elected for each !roadcast multi8access network Non9+ro*dc* t multi9*cce Non8>roadcast %ulti8-ccess 'N>%-( networks are t#pes such as ?rame Aela#, 5 25, and -s#nchronous 9ransfer %ode '-9%( 9hese networks allow for multi8access, !ut have no !roadcast a!ilit# like @thernet *o, N>%- networks re1uire special .*P? configuration to function properl# and neigh!or relationships must !e defined

16"

(oint9to9point Point8to8point refers to a t#pe of network topolog# consisting of a direct

connection !etween two routers that provides a single communication path 9he point8to8 point connection can !e ph#sical, as in a serial ca!le directl# connecting two routers, or it can !e logical (oint9to9multipoint Point8to8multipoint refers to a t#pe of network topolog# consisting of a series of connections !etween a single interface on one router and multiple destination routers -ll of the interfaces on all of the routers sharing the point8to8multipoint connection !elong to the same network -s with point8to8point, no +As or >+As are needed

&(F Tree $*lcul*tion


&ithin an area, each router calculates the !est$shortest path to ever# network in that same area 9his calculation is !ased upon the information collected in the topolog# data!ase and an algorithm called shortest path first '*P?( .*P? uses a metric referred to as cost - cost is associated with ever# outgoing interface included in an *P? tree 9he cost of the entire path is the sum of costs of the outgoing interfaces along the path Cisco uses a simple e1uation of 164$ !andwidth 9he !andwidth is the configured !andwidth for the interface :sing this rule, a 166%!ps ?ast @thernet interface would have a default .*P? cost of 1 and a 16%!ps @thernet interface would have a cost of 16 -n interface set with a !andwidth of "4,666 would have a default cost of 15"3

=ene!it o! O&(F
'i( 'ii( %inimum routing updates Priorities on all the C,*C. routers the priorit# is 1

160

'iii(

9he routers having highest ,P address !ecome >A+'>order +estination Aouter(

&tep to *ppl0 O&(F *#ntax<


Aouter'config(\router ospf Yospf process idR Aouter'config8router(\network Ynetwork addressR Ywild card maskR area Yarea num!erR

Fig -2: O&(F &cen*rio

-t Aouter r1
Aouter'config(\router ospf 1 Aouter'config8router(\network 16 6 6 6 6 255 255 255 area 6 Aouter'config8router(\network 16 6 6 6 6 255 255 255 area 6 Aouter'config(\interface s6$1$6 Aouter'config8if(\clock rate "4666 Aouter\show ip route

-t Aouter r1
Aouter'config(\router ospf 2 Aouter'config8router(\network 26 6 6 6 6 255 255 255 area 6 Aouter'config8router(\network 46 6 6 6 6 255 255 255 area 6 Aouter'config8router(\network 56 6 6 6 6 255 255 255 area 6 164

Aouter'config(\interface s6$1$6 Aouter'config8if(\clock rate "4666 Aouter\show ip route

-t Aouter r3
Aouter'config(\router ospf 1 Aouter'config8router(\network 36 6 6 6 6 255 255 255 area 6 Aouter'config8router(\network 56 6 6 6 6 255 255 255 area 6 Aouter\show ip route

3.1/ 01$ S2I&C#I$3


3.1B.1 &WIT$4
*witches are generall# used to segment a large ;-N smaller segments *maller switches such as the Cisco Catal#st 23245; have 24 ports capa!le of of creating 24 different network segment for the ;-N ;arger switches such as the Cisco Catal#st "566 can have hundreds of ports *witches can also !e used to connect ;-Ns with different media, for example, a 16 %!ps @thernet ;-N and 166 %!ps @thernet ;-N can !e connected using a switch *ome switches support cut through switching, witch reduces latenc# and dela#s in the network, while !ridges support onl# store8and8forward traffic switching ?inall# switches reduce collision on network segment - switch is a networking device which filters and forward packets through the network ,t is a la#er 2 device ,t is more advanced then hu! !ut not as advanced as router 9he !asic function of a switch is to manage the signal flow &hen the switch is open, it allows the signal to flow through it and when it is closed, it stopes the signal to flow *witch connects separate ;-N segment ,t allows multiple s#stem to transmit simultaneousl# - switch is a hardware device that filters and forward data packets !etween network segments @thernet switches are used in ;-N to create @thernet networks *witches forward the

163

traffic on the !asis of %-C address *witches maintain a switching ta!le in which %-C addresses and port num!ers are used to perform switching decision

WORKING OF &WIT$4
&hen switches receives data from one of connected devices, it forward data onl# to the port on witch the destinated s#stem is connected ,t use the media access Control '%-C( address of the device to determine the correct port 9he %-C address is a uni1e num!er that is programed in to ever# Network ,nterface Card'N,C( Concider, device wants to send data to device > &hen device - passes the data, switch receives it *witch than cecks the %-C address of the destination s#stem ,t then transfer data to device > onl# instead of !rodcasting to all the devices ># forwarding data onl# to the s#stem to witch the data is addressed, switch decreases the amount of traffic on each network link

&WIT$4ING MET4O)&
9here are three t#pes of switching method< &tore9*nd9!orw*rd witc8ing 9he entire frame is received and the CAC is computed and verified !efore forwarding the frame ,f the frame is too short 'i e less than "4 !#tes including the CAC(, too long 'i e more than 1514 !#tes including the CAC(, or has CAC error, it will !e discarded ,t has the lowest error rate !ut the longest latenc# for switching =owever, for high8speed network 'e g ?ast @thernet or Higa!it @thernet network(, the latenc# is not significant ,t is the most commonl# used switching method, and is supported !# most switches $ut9t8roug8 witc8ing ,t is also known as ?ast ?orward switching - frame is forwarded as soon as the destination %-C address in the header has !een received 'the 1st " !#tes following the pream!le( ,t has the highest error rate '!ecause a frame is

116

forwarded without verif#ing the CAC and confirming there is no collision( !ut the shortest latenc# for switching Fr*gment9!ree witc8ing " Modi!ied $ut9t8roug8 witc8ing # - frame is forwarded after the first "4 !#tes of the frame have !een received *ince a collision can !e detected within the first "4 !#tes of a frame, fragment8free switching can detect a frame corrupted !# a collision and drop it 9herefore, fragment8free switching provides !etter error checking than cut8 through switching 9he error rate of fragment8free switching is a!ove store8and8forward switching and !elow cut8through switching 9he latenc# of fragment8free switching is shorter than store8and8 forward switching and longer than cut8 through switching N.9@< >ridges onl# support store8and8forward switching %ost new switch models also use store8and8forward switching =owever, it should !e noted that Cisco 1366 switches use fragment8free switching !# default

T0pe o! witc8 +* ed on O&I model


'i( 'ii( ;a#er82 switch ;a#er83 switch

.*0er9- &witc8ing ;a#er82 switching is hardware !ased, which means it uses the %-C

address from the host N,C card to filter the network traffic ;a#er82 switch can !e considered as multi8 port !ridge

111

;a#er 2 switches are fast !ecause the# do not look at the network la#er header information, instead it looks at the frames hardware address !efore deciding to either forward the frame or drop it .imit*tion o! .*0er - &witc8ing &ith !ridge the connected networks are still one large !roadcast domain ;a#er 2 switch cannot !reak the !roadcast domain, this cause performance issue which limits the si2e of #our network ?or this one reason the switch cannot completel# replace routers in the internetwork

3.1B.1.1

?./N "?irtu*l ./N#

7;-N provides 7irtual *egmentation of >roadcast +omain in the network 9he devices, which are mem!er of same 7lan, are a!le to communicate with each other 9he devices of different 7lan ma# communicate with each other with routing *o that different 7lan devices will use different n$w addresses 7lan provides following advantages< 8 ;ogical *egmentation of network @nhance network securit#

$re*ting port +* ed ?l*n


,n port !ased 7lan, first we have to create a 7lan on managea!le switch then we have to add ports to the 7lan - 7irtual ;-N '7;-N( is a !roadcast domain created !ased on the functional, securit#, or other re1uirements, instead of the ph#sical locations of the devices, on a switch or across switches &ith 7;-Ns, a switch can group different interfaces into different !roadcast domains &ithout 7;-Ns, all interfaces of a switch are in the same !roadcast domainB switches connected with each other are also in the same !roadcast domain, unless there is a router in !etween +ifferent ports of a switch can !e assigned to different 7;-Ns - 7;-N can also span multiple switches T8e *d'*nt*ge o! implementing ?./N *re 112

,t can group devices !ased on the re1uirements other than their ph#sical locations ,t !reaks !roadcast domains and increases network throughput ,t provides !etter securit# !# separating devices into different 7;-Ns *ince each 7;-N is a separate !roadcast domain, devices in different 7;-Ns cannot listen or respond to the !roadcast traffic of each other ,nter87;-N communication can !e controlled !# configuring access control lists on the router or ;a#er 3 switch connecting the 7;-Ns

T0pe o! ?./N
&t*tic ?./N -ssigning 7;-Ns to switch ports !ased on the port num!ers ,t is easier to set up and manage )0n*mic ?./N -ssigning 7;-Ns to switch ports !ased on the %-C addresses of the devices connected to the ports - 7;-N management application is used to set up a data!ase of %-C addresses, and configure the switches to assign 7;-Ns to the switch ports d#namicall# !ased on the %-C addresses of the connected devices 9he application used !# Cisco switches is called 7;-N %anagement Polic# *erver '7%P*( Cisco switches support a separate instance of spanning tree and a separate !ridge ta!le for each 7;-N

113

/ ?./N A / =ro*dc* t )om*in A .ogic*l Network "&u+net#

./N Oper*tion

114

Fig -3: ?./N Oper*tion a a a a @ach logical 7;-N is like a separate ph#sical !ridge 7;-Ns can span across multiple switches 9runks carr# traffic for multiple 7;-Ns 9runks use special encapsulation to distinguish !etween different 7;-Ns

?./N link

9here are two different t#pes of links in a switched network< /cce link 115

- link from Pc to switch is called as access link or - link that is part of onl# one 7;-N 9herefore, a port connecting to an access link can !e a mem!er of onl# one 7;-N -nd the mode of port is called as access mode

Trunk link - link from switch to switch or switch to router is called as trunk link - 166 switches or routers, and carries

%!ps or 1666 %!ps point8to8point link that connects

frames of different 7;-Ns 9herefore, a port connecting to a trunk link can !e a mem!er of multiple 7;-Ns -ll 7;-Ns are configured on a trunk link !# default 7;-N 9runking, !# making use of frame tagging, allows traffic from different 7;-Ns to transmit through the same @thernet link 'trunk link( across switches 7;-N 9runking identifies the 7;-N from which a frame is sent !# tagging the frame with the source 7;-N ,+ '128!it long( 9his feature is known as frame tagging or frame identification &hen there are multiple switches then we have to use trunk links to connect one switch with other ,f we are not using trunk links then we have to connect one ca!le from each vlan to the corresponding vlan of the other switch &ith frame tagging, a switch knows which ports it should forward a !roadcast frame 'forward out the ports which have the same 7;-N ,+ as the source 7;-N ,+( ,t also knows which !ridge ta!le it should use for forwarding an unicast frame 'since a separate !ridge ta!le is used for each 7;-N( 11"

- frame tag is added when a frame is forwarded out to a trunk link, and is removed when the frame is forwarded out to an access link 9herefore, an# device attached to an access link is unaware of its 7;-N mem!ership.

$omm*nd to cre*te ?l*n


*witch\vlan data!ase *witch'vlan(\vlan Yno R Zname Yname of vlanR[ *witch'vlan(\exit

$omm*nd to con!igure port !or * ?l*n


># default, all ports are mem!er of single vlan that is 7lan1 we can change vlan mem!ership according to our re1uirement *witch'config(\interface Yt#peR Yno R *witch'config8if(\switchport access vlan Yno R *witch'config8if(\exit

$omm*nd to con!igure multiple port in * 'l*n


*witch'config(\interface range Yt#peR Yslot$port no 'space()'space( port no R *witch'config8if(\switchport access vlan Yno R *witch'config8if(\exit E<*mple: 9 *uppose we want to add interface fast @thernet 6$16 to 6$14 in vlan5 *witch'config(\interface range fastethernet 6$16 ) 14 *witch'config8if(\switchport access vlan 5 *witch'config8if(\exit

To di pl*0 m*c *ddre


7lan %ac address

t*+le
t#pe ports 110

*witch\show mac8address8ta!le

26

668648a1"8a!8"a80!

d#namic

fa6$0

To )i pl*0 ?l*n *nd port mem+er 8ip


*witch\show vlan !rief

$omm*nd to m*ke Trunk link


*witch'config(\interface Yt#peR Yt#pe num!erR Note <8 9runk mode should not !e a mem!er of an# vlan port

3.1B.1.- ?l*n Trunking (rotocol "?T(#


&ith the help of 79P, we can simplif# the process of creating 7lan ,n multiple switches, we can configure one switch as 79P server and all other switches will !e configured as 79P client &e will create 7lans on 79P server switch 9he server will send periodic updates to 79P client switches 9he clients will create 7lans from the update received from the 79P server

?T( Oper*tion
a a a 79P advertisements are sent as multicast frames 79P servers and clients are s#nchroni2ed to the latest revision num!er 79P advertisements are sent ever# 5 minutes or when there is a change

?T( Mode
?T( er'er mode ># default all the switches in this mode are in server mode 79P server is a switch in which we can create, delete or modif# 7lans #he switch in this mode forwords the vlans to next switch 9he server will send periodic updates for 79P clients 114

?T( client mode .n 79P client, we are not a!le to create, modif# or delete 7lans 9he switch

in this mode creates the vlans that are received from server mode switch 9he client will receive and forward vtp updates 9he client will create same 7lans as defined in vtp update ?T( Tr*n p*rent mode 9ransparent is a switch, which will receive and forward 79P update ,t is a!le to create, delete and modif# 7lans locall# - vlan created in this mode cannot !e forworded into next switch - transparent will not send its own 79P updates and will not learn an# information from received vtp update

?T( con!igur*tion -t *witch 1<


Creat vlan Port assignment 9runk port *witch vtp

*witch'config(\vtp mode server *witch'config(\vtp domain cisco *witch'config(\vtp password sun

-t switch 2<
*witch'config(\vtp mode server *witch'config(\vtp domain cisco *witch'config(\vtp password sun

-t switch 3<
*witch'config(\vtp mode server *witch'config(\vtp domain cisco *witch'config(\vtp password sun 113

Fig -B : ?T( $on!igur*tion

To ee *ll t8e con!igur*tion


*witch\show vtp password *witch\show vlan !rief *witch\show vtp status 7tp version 7tp domain 7tp mode 7tp pruning 7tp reusion num!er %aximum vlan supporting 9otal no of vlans

?T( (runing
Pruning is the 79P feature through which a trunk link can !e automaticall# disa!le, for a particular 7lan if neigh!or switch does not contain ports in that 7lan 7lan1 is not prun eligi!le a ,ncreases availa!le !andwidth !# reducing unnecessar# flooded traffic

126

@xample< *tation - sends !roadcast, and !roadcast is flooded onl# toward an# switch with ports assigned to the red 7;-N

$omm*nd to con!igure ?T( (runing


&e have to use onl# one command on 79P server for 79P Pruning *witch\configure terminal *witch'config(\vtp pruning *witch'config(\exit

Fig -; : ?T( (runing

&p*nning Tree (rotocol


&hen we connect multiple switches with each other and multiple path exist from one switch to another switch then it ma# lead to the switching loop in the network %ultiple paths are used to create redundanc# in the network *9P is onl# re1uired when multiple path exist then there is possi!ilit# of loop in n$w

(ro+lem t8*t occur wit8 redund*nc0 p*t8


'i( 'ii( %ultiple copies of the frame will !e received !# destination ?re1uent changes in the mac address ta!le of switch

'iii( - mac address ma# appear at multiple ports in a switch 121

'iv(

Packets ma# enter in the endless loop

*panning 9ree Protocol will solve this pro!lem !# !locking the redundanc# interface *o that onl# one path will remain active in the switches ,f the primar# path goes down then disa!led link will !ecome ena!le and data will !e transferred through that path

&p*nning Tree (rotocol =* ic


*panning 9ree Protocol or *9P ',@@@ 462 1d( is used to solve the looping pro!lem ,t runs on !ridges and switches in a network ,t implements a *panning 9ree -lgorithm '*9-(, which calculates a loop8free topolog# for the network *9P ensures that there is onl# one active path !etween an# two network segments !# !locking the redundant paths - redundant path is used onl# when the corresponding active path failed ,t is not used for load8!alancing >ecause *9P solves the looping pro!lem !# !locking one or more links in a network, the frames traveling !etween some source $ destination devices ma# not !e a!le to use the shortest ph#sical path >ridges exchange *9P information using messages called >ridge Protocol +ata :nits '>P+:s( through ;a#er 2 multicast

3.1;

Wi9Fi "WIRE.E&& FI)E.IT>#


9he term b&i8?ib suggests b&ireless ?idelit#b, compared with the long8

esta!lished audio recording term b=igh ?idelit#b or b=i8?ib 9he term b&i8?ib, first used commerciall# in -ugust 1333 &i8?i is an ,@@@ standard 462 11

3.1;.1 Wirele

./N

122

&i8?i is also known as wireless ;-N 9he name of a popular wireless networking technolog# that uses radio waves to provide wireless high8speed ,nternet and network connections b&i8?i works with no ph#sical wired connection !etween sender and receiver !# using radio fre1uenc# 'A?( technolog#, a fre1uenc# within the electromagnetic spectrum associated with radio wave propagation &hen an A? current is supplied to an antenna, an electromagnetic field is created that then is a!le to propagate through space

T8e T0pic*l R*nge o! * Wi9Fi ./N


9he range of a home &i8?i ;-N depends on the wireless access point '&-P( or wireless router !eing used ?actors that determine a particular &-P or wireless routercs range are< the specific 462 11 protocol emplo#ed the overall strength of the device transmitter the nature of o!structions and interference in the surrounding area - general rule of thum! in home networking sa#s that 462 11! and 462 11g &-Ps and routers support a range of up to 156 feet '4" m( indoors and 366 feet '32 m( outdoors -nother rule of thum! holds that the effective range of 462 11a is approximatel# one8third that of 462 11!$g .!structions in home such as !rick walls and metal frames or siding greatl# can reduce the range of a &i8?i ;-N !# 25S or more >ecause 462 11a emplo#s a higher signalling fre1uenc# than 462 11!$g, 462 11a is most suscepti!le to o!structions ,nterference from microwave ovens and other e1uipment also affects range 462 11! and 462 11g are !oth suscepti!le to these 333333 Wirele

&t*nd*rd

9he different wireless standards that are used for ,@@@ 462 11 standard are

123

Fig -F:

IEEE ;5-.11 &t*nd*rd

;5-.11
,t was rele* ed in 0e*r 1FFB. T8e t*nd*rd w* origin*l o! ;5-.11. t8e m*<. d*t* r*te o! t8i i -M+p *nd !reGuenc0 o! t8i i -.1G4D *nd c*n co'er upto 13m.

;5-.11*
,t was modified in #ear 1333 this is improved version of original standard .perates at the fre1uenc# of 5H=2, which is less crowded than 2 4H=2 where telephones and microwaves ma# cause interference -lthough the speed is up to 54%!ps, the range is onl# up to 05 feet or distance covered is 4"m 462 11a standard is incompati!le with !oth 462 11! and g !ecause it operates at a different fre1uenc#

;5-.11+
9his standard was released in 1333. .perates on the 2 4H=2 fre1uenc# !and and can transmit data at speeds of up to 11%!ps within a range of up to 1668156 feet or a distance of 36m &ireless range can !e affected !# reflective or signal8!locking o!stacles, such as mirrors, walls, devices and location, whether indoors or outdoors

;5-.11g
9his standard was released in 2663 9he max data rate for the standard is 54%!ps ,t supports a fre1uenc# range of 2 4H=2, covers a distance of 36m

;5-.11n
124

9he latest version of ,@@@ 462 11 standard that is still in progress of development 9he next generation of high8speed wireless networking, capa!le of delivering the range and capacit# to support toda#cs most !andwidth8hungr# applications like streaming high definition video, voice, and music &ireless8n is !ased on %,%. '%ultiple ,nput, %ultiple .utput( technolog#, which uses multiple radios to transmit multiple streams of data over multiple channnels .perates in two modes of fre1uenc# 2 4H=2 and 5 "H=2 fre1uenc# !and and can transmit data at speeds of up to 11%!ps within a range of up to 1668156 feet &ireless range can !e affected !# reflective or signal8!locking o!stacles, such as mirrors, walls, devices and location, whether indoors or outdoors

Wi9Fi i

upported +0 m*n0 *pplic*tion *nd de'ice


video game consoles home networks P+-s mo!ile phones maPor operating s#stems other t#pes of consumer electronics

3.1;.3

Wirele

&ecurit0

- common !ut unproductive measure to deter unauthori2ed users is to suppress the -Pcs **,+ !roadcast, bhidingb it 9his is ineffective as a securit# method !ecause the **,+ is !roadcast in the clear in response to a client **,+ 1uer# -nother unproductive method is to onl# allow computers with known %-C addresses to Poin the network %-C address are easil# spoofed ,f the eavesdropper has the a!ilit# to change his %-C address, then he ma# Poin the network !# spoofing an authori2ed address. &ired @1uivalent Privac# '&@P( encr#ption was designed to protect against casual snooping, !ut is now considered completel# !roken 9ools such as -ir *nort or aircrack can 1uickl# recover &@P encr#ption ke#s 125

9o counteract this in 2662, the &i8?i -lliance !lessed &i8?i Protected -ccess '&P-( for wireless securit# 9hough more secure than &@P, it has outlived its designed lifetime, has known attack vectors and is no longer recommended ,n 2664 the full ,@@@ 462 11i '&P-2( encr#ption standards were released ,f used with a 462 15 server or in pre8shared ke# mode with a strong and uncommon passphrase &P-2 is still considered secure, as of 2663

12"

1.
Gener*l $onclu ion

$ON$.7&ION

Computer Networking is a ver# vast proPect in the present developing era of electronics and communication Now a da#s, computers are used in a wider range -ll the organi2ations are using multiple computers within their departments to perform their da# to da# work Computer network allows the user to share data , share folders and files with other users connected in a network Computer Networking has !ound the world in a ver# small area with it wide networking processes like ;-N, %-N, &-N

/pplic*tion
Communication ?ield ,ndustries %edical ?ield Aearch ?ield .rganisations *chool Colleges

2.REFREN$E&
www goole com www hcltech com www microsoft com 120

www n#thimes com www digitech8engineers com Network @ssentials module 48in81 %C*@ stud# material ,ntroduction to &indow *erver2663 C,*C. Cretified Network -ssociate ?aruk =usain

124

Das könnte Ihnen auch gefallen