Beruflich Dokumente
Kultur Dokumente
OF
SIX WEEK INDUSTRIAL TRAINING, UNDERTAKEN
AT
Submitted By:
Name: Sushil Thakur
Id B100
Page | 1
ACKNOWLEDGEMENT
Name
Sushil Thakur
University Roll No
B100020378
Year
College
PREFACE
A lot of effort has been made to make this project report interesting and a learning experience for us.
The report has been explained with the help of diagrams and figures. The subject matter has been
compiled in a simple, illustrative and lucid manner.
This project report contains the description about integration of various network devices with 3 rd party
software which is Packet Tracer. First we done the feasibility study of that, then we have made the
technical specifications for this task and get done with the help of networking technical team.
My project is about connecting different offices of an enterprise spanned over wide area network. We
will use public infrastructure to fulfill this purpose. Enterprise will be running ipv6 routed protocols
and wide area network will have ipv4 protocol. In Wide Area Network we will have a combination of
routing protocols eigrp and ospf and redistribution will be used to allow route exchange between them.
Nat technology is also used to convert private ips into public ips.
We will also configure dhcp server in ipv4 domain to assign ip addresses dynamically to end devices.
Some policies will be used to restrict access among devices of different offices.
Page | 3
INDEX
1. About
Company.................................................................................................
............... 7
2. Networking
Basics
8-
3. Project Requirements.......................................................................................................... 3
3.1Cisco 2621 Router
3.5 Server
6
Page | 4
4. Model Used........................................................................................................................... 7
4.1 The Process/Application Layer Protocols
4.1.1 Telnet
9
10
10
11
12
13
15
15
17
17
5. Software Requirement...................................................................................................... 18
5.1 System Requirement for Packet Tracer 5.2
18
6. Feasibility Study................................................................................................................ 20
6.1 Technical Feasibility
20
6.1.1 Routing
20
20
21
6.1.4 Switching
6.1.5 VLAN
6.1.6 ACL
6.2 Operational Feasibility
21
21
Page | 5
7 Creating Vlans
30
32
32
34
35
36
38
8. Servers................................................................................................................
COMPANY PROFILE
Netmax Technologies Pvt Ltd was set up in 2001 by young Indian entrepreneurs. It has
pioneered the concept of high quality IT education in North India and has trained over 10,000 plus
networking, embedded systems & software professionals in the country. In 2001, Netmax
Technologies set up education centre in Chandigarh (Punjab) and followed them with centers in
Patiala, Jalandhar, Ludhiana & Bhatinda in the years that followed.Netmax Technologies introduced
corporate training programs which as an initiative were highly appreciated by the industry and
corporate alike. NETMAX TECHNOLOGY provides Corporate Training according to their
requirements and standards. Our faculties are well versed with technologies so they can deliver
according to live envoiment
. We are a group of highly motivated IT professionals with an ability to innovate a strong desire to
excel.
Page | 6
NETWORKING BASICS
What is a Computer Network?
Page | 7
A computer network allows sharing of resources and information among interconnected devices. In
the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced
Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was
the first computer network in the world.[1] Development of the network began in 1969, based on
designs developed during the 1960s.
Computer networks can be used for a variety of purposes:
Facilitating communications. Using a network, people can communicate efficiently and easily
via email, instant messaging, chat rooms, telephone, video telephone calls, and video
conferencing.
Sharing hardware. In a networked environment, each computer on a network may access and
use hardware resources on the network, such as printing a document on a shared network
printer.
Sharing files, data, and information. In a network environment, authorized user may access data
and information stored on other computers on the network. The capability of providing access to
data and information on shared storage devices is an important feature of many networks.
Sharing software. Users connected to a network may run application programs on remote
computers.
Information preservation.
Security.
Speed up.
What is a Networking?
Networking is a common synonym for developing and maintaining contacts and personal connections
with a variety of people who might be helpful to you and your career.
Networking is the practice of linking two or more computing devices together for the purpose of
sharing data. Networks are built with a mix of computer hardware and computer software. It is an
especially important aspect of career management in the financial services industry, since it is helps you
keep abreast of:
Types of networks
Local area network
A local area network (LAN) is a network that connects computers and devices in a limited geographical
area such as home, school, computer laboratory, office building, or closely positioned group of
buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be
Page | 8
based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a
wired LAN using existing home wires (coaxial cables, phone lines and power lines)
Campus Network
A campus network is a computer network made up of an interconnection of local area networks
(LAN's) within a limited geographical area. The networking equipments (switches, routers) and
transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the
campus tenant / owner: an enterprise, university, government etc.).
In the case of a university campus-based campus network, the network is likely to link a variety of
campus buildings including; academic departments, the university library and student residence halls.
Page | 9
Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.)
of a computer network.[1][2] Network topologies may be physical or logical. Physical topology means
the physical design of a network including the devices, location and cable installation. Logical topology
refers to how data is actually transferred in a network as opposed to its physical design.
Various topologies ::
Bus topology
Many devices connect to a single cable "backbone". If the backbone is broken, the entire segment fails.
Bus topologies are relatively easy to install and don't require much cabling compared to the
alternatives.
Ring Topology
Page | 10
In a ring network, every device has exactly two neighbours for communication purposes. All messages
travel through a ring in the same direction. Like the bus topology, a failure in any cable or device
breaks the loop and will take down the entire segment. A disadvantage of the ring is that if any device is
added to or removed from the ring, the ring is broken and the segment fails until it is "reforged" (by
dwarfish goldsmiths?) It is also considerably more expensive than other topologies.
Star Topology
A star network has a central connection point - like a hub or switch. While it takes more cable, the
benefit is that if a cable fails, only one node will be brought down.
All traffic emanates from the hub of the star. The central site is in control of all the nodes attached to it.
The central hub is usually a fast, self contained computer and is responsible for routing all traffic to
other nodes. The main advantages of a star network is that one malfunctioning node does not affect the
rest of the network. However this type of network can be prone to bottleneck and failure problems at
the central site.
Tree Topology
Page | 11
Also known as the 'Hierarchical topology', the tree topology is a combination of bus and star
topologies. They are very common in larger networks. A typical scenario is: a file server is connected to
a backbone cable (e.g. coaxial) that runs through the building, from which switches are connected,
branching out to workstations.
Mesh topology
Page | 12
In the topologies shown above, there is only one possible path from one node to another node. If any
cable in that path is broken, the nodes cannot communicate.
Mesh topology uses lots of cables to connect every node with every other node. It is very expensive to
wire up, but if any cable fails, there are many other ways for two nodes to communicate. Some WANs,
like the Internet, employ mesh routing. In fact the Internet was deliberately designed like this to allow
sites to communicate even during a nuclear war.
Hybrid Topology
Hybrid network is the combination of different topologies such as star, Ring, Mesh, Bus etc. For
example, if a department uses a Bus network, second department uses the ring network, third
department uses the Mesh network and fourth department uses the star network. All the networks of
different types (of four departments) can be connected together through a central hub (in the form of
star network) as shown in the figure below.
Page | 13
Computer networking devices are units that mediate data in a computer network. Computer networking
devices are also called network equipment, Intermediate Systems (IS) or InterWorking Unit (IWU).
Units which are the last receiver or generate data are called hosts or data terminal equipment.
Routers
A router is a communication device that is used to connect two logically and physically different
networks, two LANs, two WANs and a LAN with WAN. The main function of the router is to sorting
and the distribution of the data packets to their destinations based on their IP addresses. Routers
provides the connectivity between the enterprise businesses, ISPs and in the internet infrastructure,
router is a main device. Cisco routers are widely used in the world. Every router has routing software,
which is known as IOS. Router operates at the network layer of the OSI model. Router does not
broadcast the data packets.
We have two types of router:
1.Hardware
2.software. this router is provided by RRAS SERVICE.
Switches
Like the router, a switch is an intelligent device that maps the IP address with the MAC address of the
LAN card. Unlike the hubs, a switch does not broadcast the data to all the computers, it sends the data
packets only to the destined computer. Switches are used in the LAN, MAN and WAN. In an Ethernet
network, computers are directly connected with the switch via twisted pair cables. In a network,
switches use the three methods to transmit the data i.e. store and forward, cut through and fragment
free.
We have two types of switch.
1.Mangeable switch: it has console port by using this we can mange this switch according to our
need .
2.non-mangeable : it ha no console port we use this switch as we purchase it.
Hubs
Page | 14
The central connecting device in a computer network is known as a hub. There are two types of a hub
i.e. active hub and passive hub. Every computer is directly connected with the hub. When data packets
arrives at hub, it broadcast them to all the LAN cards in a network and the destined recipient picks them
and all other computers discard the data packets. Hub has five, eight, sixteen and more ports and one
port is known as uplink port, which is used to connect with the next hub.
Modems
A modem is a communication device that is used to provide the connectivity with the internet. Modem
works in two ways i.e. Modulation and Demodulation. It converts the digital data into the analogue and
analogue to digital.
LAN Cards
Page | 15
LAN cards or network adapters are the building blocks of a computer network. No computer can
communicate without a properly installed and configured LAN card. Every LAN card is provided with
a unique IP address, subnet mask, gateway and DNS (if applicable). An UTP/STP cable connects a
computer with the hub or switch. Both ends of the cable have the RJ-45 connectors one is inserted into
the LAN card and one in the hub/switch. LAN cards are inserted into the expansion slots inside the
computer. Different LAN cards support different speed from 10/100 to 10/1000.
Ethernet = speed 10mbps
Fast Ethernet = 100mbps
Giga Ethernet = 1000mbps
Fastgiga Ethernet = 10000mbps
Network Repeater
A repeater connects two segments of your network cable. It retimes and regenerates the signals to
proper amplitudes and sends them to the other segments. When talking about, ethernet topology, you
are probably talking about using a hub as a repeater. Repeaters require a small amount of time to
regenerate the signal. This can cause a propagation delay which can affect network communication
when there are several repeaters in a row. Many network architectures limit the number of repeaters that
can be used in a row. Repeaters work only at the physical layer of the OSI network model.
Page | 16
Bridge
A bridge reads the outermost section of data on the data packet, to tell where the message is going. It
reduces the traffic on other network segments, since it does not send all packets. Bridges can be
programmed to reject packets from particular networks. Bridging occurs at the data link layer of the
OSI model, which means the bridge cannot read IP addresses, but only the outermost hardware address
of the packet. In our case the bridge can read the ethernet data which gives the hardware address of the
destination address, not the IP address. Bridges forward all broadcast messages. Only a special bridge
called a translation bridge will allow two networks of different architectures to be connected. Bridges
do not normally allow connection of networks with different architectures.
The hardware address is also called the MAC (media access control) address. To determine the
network segment a MAC address belongs to, bridges use one of:
Page | 17
Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If the
address is not in the bridging table, the packet is forwarded to all segments other than the one it came
from. This type of bridge is used on ethernet networks.
Source route bridging - The source computer provides path information inside the packet. This is used
on Token Ring networks.
Gateway
A gateway can translate information between different network data formats or network architectures. It
can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand
computers. Most gateways operate at the application layer, but can operate at the network or session
layer of the OSI model. Gateways will start at the lower level and strip information until it gets to the
required level and repackage the information and work its way back toward the hardware layer of the
OSI model. To confuse issues, when talking about a router that is used to interface to another network,
the word gateway is often used. This does not mean the routing machine is a gateway as defined here,
although it could be.
Network Models
When dealing with networking, you may hear the terms "network model" and "network layer" used
often. Network models define a set of network layers and how they interact. There are several different
network models depending on what organization or company started them. The most important two are:
The TCP/IP Model - This model is sometimes called the DOD model since it was designed for the
department of defense It is also called the internet model because TCP/IP is the protocol used on the
internet.
OSI Network Model - The International Standards Organization (ISO) has defined a standard
called the Open Systems Interconnection (OSI) reference model. This is a seven layer architecture
listed in the next section.
Page | 18
OSI Model
The OSI, or Open System Interconnection, model defines a networking framework for implementing
protocols in seven layers. Control is passed from one layer to the next, starting at the application layer
in one station, and proceeding to the bottom layer, over the channel to the next station and back up the
hierarchy.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality
of service is identified, user authentication and privacy are considered, and any constraints on data
syntax are identified.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets
up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at
each end. It deals with session and connection coordination.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for
end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node.
Data Link (Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC)
layer and the Logical Link Control (LLC) layer.
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the
electrical and mechanical level. .
Service interface and protocols were not clearly distinguished Service interface and protocols are clearly
before
distinguished
Loosely layered
Strict layering
Page | 20
More Credible
Less Credible
Twisted pair
Twisted pair cabling is a type of wiring in which two conductors (the forward and return conductors of a single circuit) are
twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources; for
instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs. It
was invented by Alexander Graham Bell.
Shielded
twisted pair
Advantages
UTP costs less per meter/foot than any other type of LAN cable.
Page | 21
Disadvantages
Twisted pairs susceptibility to electromagnetic interference greatly depends on the pair twisting schemes (usually
patented by the manufacturers) staying intact during the installation. As a result, twisted pair cables usually have
stringent requirements for maximum pulling tension as well as minimum bend radius. This relative fragility of twisted
pair cables makes the installation practices an important part of ensuring the cables performance.
In video applications that send information across multiple parallel signal wires, twisted pair cabling can introduce
signaling delays known as skew which results in subtle color defects and ghosting due to the image components not
aligning correctly when recombined in the display device
Page | 22
An optical fiber is a single, hair-fine filament drawn from molten silica glass. These fibers are
replacing metal wire as the transmission medium in high-speed, high-capacity
communications systems that convert information into light, which is then transmitted via
fiber optic cable. Currently, American telephone companies represent the largest users of fiber
optic cables, but the technology is also used for power lines, local access computer networks,
and video transmission.
Coaxial cable
Coaxial cable, or coax, is an electrical cable with an inner conductor surrounded by a flexible, tubular insulating layer,
surrounded by a tubular conducting shield. The term coaxial comes from the inner conductor and the outer shield sharing the
same geometric axis. Coaxial cable was invented by English engineer and mathematician Oliver Heaviside, who first
patented the design in 1880.[1]
Coaxial cable is used as a transmission line for radio frequency signals, in applications such as connectingradio
transmitters and receivers with their antennas, computer network (Internet) connections, and distributingcable
television signals. One advantage of coax over other types of radio transmission line is that in an ideal coaxial cable
the electromagnetic field carrying the signal exists only in the space between the inner and outerconductors. This allows
coaxial cable runs to be installed next to metal objects such as gutters without the power losses that occur in other types of
transmission lines, and provides protection of the signal from externalelectromagnetic interference.
Page | 23
Straight Cable
You usually use straight cable to connect different type of devices. This type of cable will be used most of the time and can
be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
5) Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other one using normal port.
Crossover Cable
A crossover cable connects two devices of the same type, for example DTE-DTE or DCE-DCE, usually connected
asymmetrically (DTE-DCE), by a modified cable called a crosslink. Such distinction of devices was introduced by IBM
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A crossover cable can be used to:
1) Connect 2 computers directly.
2) Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding network)
3) Connect 2 switches/hubs by using normal port in both switches/hubs
Page | 24
6. green 6. orange
7. brown white 7. brown white
8. brown 8. Brown
INSTALLING CABLES
In today networks, UTP CABLES are commonly used to connect computers in a network.
Depending on the colorcodings, we have different cables like straight cable, cross cable and roll-over
cable.
Page | 25
STRAIGHT CABLE
The cable used between the PC and the hub/switch is called straight cable.
Straight cable can be used between
PC - SWITCH
PC- HUB
HUB(UPLINK PORT) - HUB
According to TIA/EIA(Telecommunications industry standard/Electronics industry standard),we have
the following
two standards for making straight cable:
CROSS-OVER CABLE
The cable used to connect two PCs is called cross-over cable.
Cross cable can be used between:
PC - PC
HUB - HUB
SWITCH - SWITCH
ROUTER - PC
ROLL-OVER CABLE
The cable used between a hardware router and a PC is called roll-over cable.
In this cable,thecolor coding used in one end is reversed in the other end.
DATA TRAVELL ONLY GREEN OR ORANGE PAIR OF CABLE.
1.It is also called hardware address or MAC address.MAC stands for media access control.
2.It is present in the chip of a NIC card.
3.It is unique for every NIC card and cannot be changed.
4.It is 48 bits.Out of 48 bits,24 bits of address is given by the manufacturer of NIC card and the
remaining 24 bits of address is defined as per instructions given by IEEE.
5.IEEE stands for Institute of Electronics and Electrical Engineers.
LOGICAL ADDRESS
IP ADDERSSING
IP (INTERNER PROTOCOL) ip stands on internet protocol it is 32 bit.it is divided in 4 octet each
octet contain 8 bit.it is numerical identification of computer on network .it is divided in to two parts one
is network and second is host .we use private ip address in LAN which is provided by
IANA(INTERNET ASSIGNING NUMBRING AUTHOURTIY). The minimum value (per octet) is 0
and the maximum value is 255.IP address are divided in five classes.
1. Network ID : it represent no. of on bit that is (1).
2. Host ID : it represent the no. of off bit that is (0).
But in case of your computer has no IP address then IP address is assigned to the computer from APIPA
Range . but communication is not possible when computer has IP address from APIPA.
127.0.0.1 it is the loop back address it is used for self communication and for troubleshooting purpose.
Subnet mask: subnet mask is also 32 bit address, which tell us how many bits are used for network and
how many bits are used for host address.
In subnet mask network bits are always 1 and host bits are always 0.
IP Address invalid or reserve IP Address:
When we are going to assign IP Address to our computer interface then we have to follow some rules:
Rules: 1. All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved for
router.
2. All Host bit cannot be 1 (10.255.255.255.), because it is broadcast address of that network
(10th)network.
3. All bits cannot be 0 (0.0.0.0), because this address is reserved for default routing.
Default routing is used in case of stub n/w (means our network has no exit point).
4. All bits cannot be 1 (255.255.255.255), because it reserved for Broadcasting
127.0.0.1 this is loopback address, which is used for self-communication or troubleshooting purpose.
C:\> IPCONFIG (this command is use for IP check).
C:\> IPCONFIG /ALL (This cmd is show all detail of your interface.).
Ping Packet Internet Groper
This command is used to check the connectivity with other computer. Ping is performed with in
network or outside the network. In this process four packets are send to destination address and four
packets received from the destination address. ICMP (Internet control massage protocol ) is used for
this process.
ICMP
Internet Control Messaging Protocol is used by ping and traceroute utilities.
Ping (Packet Internet Groper) enables you to validate that an IP address exists and can accept
requests. The following transmissions are used by the Ping utility:
. Ping sends an echo request packet to receive the echo response.
. Routers send Destination Unreachable messages when they cant reach the destination
network and they are forced to drop the packet. The router that drops the packet sends
the ICMP DU message.
C:\> ping (IP of destination) for e.g 10.0.0.1
C:\> ping (IP of destination ) t (for continue).
Press ctrl+c to stop ping.
1.Reply from Destination :
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Ping statistics for 10.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Page | 28
3. PROJECT REQUIREMENTS
The following are the requirements in order to make the infrastructure and to connect the remote
branches and to provide communication between them.
The physical interfaces include power plug for the power supply and a power switch. The router has
two Fast Ethernet (10/100 RJ-45) connectors for data transfers in and out. The module also has two
other RJ-45 connectors on the back panel for a console terminal for local system access and an
auxiliary port for remote system access or dial backup using a modem. The 10/100Base-T LAN ports
have Link/Activity, 10/100Mbps, and half/full duplex LEDs
The Wireless-N Broadband Router will allow you to network wirelessly better than ever, sharing
Internet access, files and fun, easily and securely and with greater range of up to three times farther
than standard Wireless-G. A router is a device that allows access to an Internet connection over a
network. With the Wireless-N Broadband Router, this access can be shared over the four switched ports
or via the wireless broadcast.
Use wireless security to secure your wireless network while the whole network is protected through a
Stateful Packet Inspection (SPI) firewall and Network Address Translation (NAT) technology. The
Router also offers VPN pass-through and other features, which can be configured through the easy-touse, browser-based utilityFIGURE 3: WRT-300NP a g e |4
2.3 CISCO WS-C3560 24PS
The Cisco Catalyst 3500 Series XL is a scalable line of stackable 10/100 and Gigabit Ethernet switches
that deliver premium performance, manageability, and flexibility, with
excellent investment protection. Catalyst 3500 XL stackable switches allow management of all
switched ports from a single IP address and provide interconnected switches with an
independent high-speed stack bus that preserves valuable desktop ports. It can used at Layer 3and it
can provide the same facilities as a router at layer 3by enabling IP routing on it .
Page | 32
3. MODEL USED
TCP/IP is so central to working with the Interne so in the working of the project we make use of
TCP/IP model. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite was created by the
Department of Defense (DoD) to ensure and preserve data integrity as well as maintain
communications in the event of catastrophic war. So it follows that if designed and implemented
correctly, aTCP/IP network can be a truly dependable and resilient one.
TCP/IP and the DoD Model
The DoD model is basically a condensed version of the OSI modelits composed of four, instead of
seven, layers:
Process/Application layer
Host-to-Host layer
Internet layer
Network Access layer
Page | 33
A vast array of protocols combine at the DoD models Process/Application layer to integrate the
various activities and duties spanning the focusof the OSIs corresponding top three layers
(Application, Presentation, and Session).
The Process/Application layer defines protocols for node-to-node application communication and also
controls user-interfacespecifications
.
The Host-to-Host layer parallels the functions of the OSIs Transport layer, defining protocols for
setting up the level of transmission service forapplications. It tackles issues such as creating reliable
end-to-end communication and ensuring the error-free delivery of data. It handles packetsequencing
and maintains data integrity.
The Internet layer corresponds to the OSIs Network layer, designating the protocols relating to the
logical transmission of packets over theentire network. It takes care of the addressing of hosts by giving
them an IP (Internet Protocol) address, and it handles the routing of packets amongmultiple networks.
At the bottom of the DoD model, the Network Access layer implements the data exchange between the
host and the network. The equivalent of
the Data Link and Physical layers of the OSI model, the Network Access layer oversees hardware
addressing and defines protocols for the
physical transmission of data
.
The DoD and OSI models are alike in design and concept and have similar functions in similar layers.
3.1The Process/Application Layer Protocols
In this layer we will discuss the protocols that are used for communication and their utility.
3.1.1 Telnet
Telnet is the chameleon of protocolsits specialty is terminal emulation. It allows a user on a remote
client machine, called the Telnet client, toaccess the resources of another machine, the Telnet server.
Telnet achieves this by pulling a fast one on the Telnet server and making the clientmachine appears as
though it were a terminal directly attached to the local network. This projection is actually a software
imagea virtual terminalthat can interact with the chosen remote host.
These emulated terminals are of the text-mode type and can execute defined procedures such as
displaying menus that give users theopportunity to choose options and access the applications on the
duped server. Users begin a Telnet session by running the Telnet client softwareand then logging into
the Telnet server.
Page | 34
called a baselinea report delimiting the operational traits of a healthy network. This protocol can also
stand as a watchdogover the network, quickly notifying managers of any sudden turn of events.
IP address
Subnet mask
Domain name
Default gateway (routers)
DNS server address
WINS server address
The following is the four-step process a client takes to receive an IP address from a DHCP server:
The DHCP client broadcasts a DHCP Discover message looking for a DHCP server (Port 67).
The DHCP server that received the DHCP Discover message sends a unicast DHCP Offer
message back to the host
The client then broadcasts to the server a DHCP Request message asking for the offered IP
address and possibly other information.
The server finalizes the exchange with a unicast DHCP Acknowledgment message
Page | 36
Transmission Control Protocol (TCP) takes large blocks of information from an application and breaks
them into segments. It numbers andsequences each segment so that the destinations TCP stack can put
the segments back into the order the application intended. After thesesegments are sent, TCP (on the
transmitting host) waits for an acknowledgment of the receiving ends TCP virtual circuit session,
retransmittingthose that arent acknowledged.
TCP is a full-duplex, connection-oriented, reliable, and accurate protocol, but establishing all these
terms and conditions, in addition to errorchecking, is no small task.
TCP Segment Format
Since the upper layers just send a data stream to the protocols in the Transport layers, Ill demonstrate
how TCP segments a data stream andprepares it for the Internet layer. When the Internet layer receives
the data stream, it routes the segments as packets through an internetwork. Thesegments are handed to
the receiving hosts Host-to-Host layer protocol, which rebuilds the data stream to hand to the upperlayer applications orprotocols.
Figureshows the TCP segment format. The figure shows the
different fields within the TCP header.
The TCP header is 20 bytes long, or up to 24 bytes with options. You need to understand what each
field in the TCP segment is:
Source port The port number of the application on the host sending the data. (Port numbers will be
explained a little later in this section.)
Destination port The port number of the application requested on the destination host.
Sequence number A number used by TCP that puts the data back in the correct order or retransmits
missing or damaged data, a process called sequencing.
Acknowledgment number The TCP octet that is expected next.
Header length The number of 32-bit words in the TCP header. This indicates where the data begins.
The TCP header (even one includingoptions) is an integral number of 32 bits in length.
Reserved Always set to zero.
Code bits/flags Control functions used to set up and terminate a session
.
Window The window size the sender is willing to accept, in octets.
Checksum The cyclic redundancy check (CRC), because TCP doesnt trust the lower layers and checks
everything. The CRC checks theheader and data fields.
Urgent A valid field only if the Urgent pointer in the code bits is set. If so, this value indicates the
offset from the current sequence number, inoctets, where the segment of non-urgent data begins
.
Options May be 0 or a multiple of 32 bits, if any. What this means is that no options have to be present
(option size of 0). However, if anyoptions are used that do not cause the option field to total a multiple
of 32 bits, padding of 0s must be used to make sure the data begins on a32-bit boundary.
Data Handed down to the TCP protocol at the Transport layer, which includes the upper-layer headers.
3.2.2 User Datagram Protocol (UDP)
UDP doesnt offer all the bells and whistles of TCP either, but it does do a fabulous job of transporting
information that doesnt require reliable deliveryand it does so using far fewer network resources.
There are some situations in which it would definitely be wise for developers to opt for UDP rather than
TCP. One circumstance is when reliability is already handled at the Process/Application layer. Network
File System (NFS) handles its own reliability issues, making the use of TCP both impractical and
redundant. But ultimately, its up to the application developer to decide whether to use UDP or TCP, not
the user who wants to transfer data faster.
UDP does not sequence the segments and does not care in which order the segments arrive at the
destination. Rather, UDP sends the segments off and forgets about them. It doesnt follow through,
check up on them, or even allow for an acknowledgment of safe arrivalcomplete abandonment.
Because of this, its referred to as an unreliable protocol. This does not mean that UDP is ineffective,
only that it doesnt handle
issues of reliability.
Further, UDP doesnt create a virtual circuit, nor does it contact the destination before delivering
information to it. Because of this, its alsoconsidered a connectionless protocol. Since UDP assumes
that the application will use its own reliability method, it doesnt use any. This gives anapplication
Page | 39
developer a choice when running the Internet Protocol stack: TCP for reliability or UDP for faster
transfers.
UDP Segment Format
Source port The port number of the application on the host sending the data
Destination port The port number of the application requested on the destination
host
Port Numbers
TCP and UDP must use port numbers to communicate with the upper layers because theyre what keep
track of different conversations crossingthe network simultaneously. Originating-source port numbers
are dynamically assigned by the source host and will equal some number starting at1024.
In the DoD model, there are two main reasons for the Internet layers existence: routing and providing a
single network interface to the upper layers. None of the other upper- or lower-layer protocols have any
functions relating to routingthat complex and important task belongs entirely to the Internet layer.
The Internet layers second duty is to provide a single network interface to the upper-layer protocols.
Without this layer, application programmers would need to write hooks into every one of their
applications for each different Network Access protocol.
The following sections describe the protocols at the Internet layer:
3.3.1INTERNET PROTOCOL
Internet Protocol (IP)essentially is the Internet layer. IP looks at each packets address. Then, using a
routing table, it decides where a packet is to be sent next, choosing the best path.
An IP header. This will give you an idea of what the IP protocol has to go through every time user data
is sent from the upper layers and is to be sent to a remote network
.
The following fields make up the IP header:
Version IP version number.
Header length Header length (HLEN) in 32-bit words.
Priority and Type of Service Type of Service tells how the datagram should be handled. The first 3
bits are the priority bits which is nowcalled the differentiated services bits.
Total lengthLength of the packet including header and data.
Identification Unique IP-packet value used to differentiate fragmented packets from different
datagrams.
Flags Specifies whether fragmentation should occur.
Page | 41
FIGURE12: IP HEADER
Fragment offset Provides fragmentation and reassembly if the packet is too large to put in a frame. It
also allows different maximumtransmission units (MTUs) on the Internet.
Header checksum Cyclic redundancy check (CRC) on header only.
Time To Live The time to live is set into a packet when it is originally generated. If it doesnt get to
where it wants to go before the TTLexpires, boomits gone. This stops IP packets from continuously
circling the network looking for a home.
Protocol Port of upper-layer protocol (TCP is port 6 or UDP is port 17). Also supports Network layer
protocols, like ARP and ICMP (this canbe called Type field in some analyzers). Well talk about this
field in more detail in a minute.
Source IP address 32-bit IP address of sending station.
Destination IP address 32-bit IP address of the station this packet is destined for.
Options Used for network testing, debugging, security, and more.
Data After the IP option field will be the upper-layer data.
Internet Control Message Protocol (ICMP)works at the Network layer and is used by IP for many
different services. ICMP is a management protocol and messaging service provider for IP. Its messages
are carried as IP datagram. RFC 1256 is an annex to ICMP, which affords hostsextended capability in
discovering routes to gateways.
ICMP packets have the following characteristics:
The following are some common events and messages that ICMP relates to:
Destination Unreachable If a router cant send an IP datagram any further, it uses ICMP to send a
message back to the sender, advising it ofthe situation.
Buffer Full/Source Quench If a routers memory buffer for receiving incoming datagram is full; it will
use ICMP to send out this message until the congestion abates.
Hops/Time Exceeded Each IP datagram is allotted a certain number of routers, called hops, to pass
through. If it reaches its limit of hops before arriving at its destination, the last router to receive that
datagram deletes it. The executioner router then uses ICMP to send an obituary message, informing the
sending machine of the demise of its datagram.
Ping Packet Internet Groper (Ping) uses ICMP echo request and reply messages to check the physical
and logical connectivity of machines on an internetwork.
3.3.3 Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) finds the hardware address of a host from a known IP address.
Heres how it works: When IP has a datagram to send, it must inform a Network Access protocol, such
as Ethernet or wireless, of the destinations hardware address on the local network. (It has already been
informed by upper-layer protocols of the destinations IP address.) If IP doesnt find the destination
hosts hardware address in the
ARP cache, it uses ARP to find this information..
As IPs detective, ARP interrogates the local network by sending out a broadcast asking the machine
with the specified IP address to reply withits hardware address. So basically, ARP translates the
software (IP) address into a hardware addressfor example, the destination machines.
Ethernet adapter addressand from it, deduces its whereabouts on the LAN by broadcasting for this
address.
4. SOFTWARE REQUIREMENT
Cisco Packet Tracer is a comprehensive, networking technology teaching and learning program that
offers a unique combination of realistic simulation and visualization experiences, assessment and
Page | 43
activity authoring capabilities, and opportunities for multiuser collaboration and competition.
Innovative features of Packet Tracer will help students and teachers collaborate, solve problems, and
learn concepts in an engaging and dynamic social environment.
Some of the benefits of Packet Tracer are as follows:
Allows students and teachers to design, build, configure, and troubleshoot networks
using virtual equipment
Supports a variety of teaching and learning opportunities such as lectures, group and
individual labs, homework, and competitions
Supports feature expansion through external applications using an API to enhance the
functionality of Cisco Packet Tracer in areas such as curriculum and assessment
delivery, games, accessibility, and interfacing with real equipment.
Packet Tracer 5.2 is compatible with the following platforms: Windows (Windows XP, Windows 2000,
Vista Home Basic, and Vista Home Premium) and Linux (Ubuntu 7.10 and Fedora 7).
4.1 System requirements for Packet Tracer 5.2
To successfully install and run Packet Tracer 5.2, the following minimum prerequisites must be met:
CPU: Intel Pentium 300 MHz or equivalent
OS: Microsoft Windows 2000, Windows XP, Vista Home Basic, Vista Home Premium,
Fedora 7, or Ubuntu 7.10
1
2
3
4
5
6
7
RAM: 96 MB
Language fonts supporting Unicode encoding (if viewing in languages other than
English)
Internet connection: 56K dial-up or faster (if using the multiuser feature)
5. FEASIBILITY STUDY
During the phase of the project completion, the technical and the operational aspects of the project
required for its completion were looked upon.
Page | 45
Page | 46
Types of routing
Static routing
Static routing is a data communication concept describing one way of configuring path selection
ofrouters in computer networks. It is the type of routing characterized by the absence of communication
between routers regarding the current topology of the network.[1] This is achieved by manually
adding routes to the routing table. The opposite of static routing isdynamic routing, sometimes also
referred to as adaptive routing.
Example
To configure a static route to network 10.10.20.0/24, pointing to a next-hop router with the IP address of 192.168.100.1,
type: (Note that this example is written in the Cisco IOScommand line syntax and will only work on certain Cisco routers [2])
Router> enable
Router# configure terminal
Router(config)# ip route 10.10.20.0 255.255.255.0 192.168.100.1
The other option is to define a static route with reference to the outgoing interface which is connected to the next hop
towards the destination network.
Router> enable
Router# configure terminal
Router(config)# ip route 10.10.20.0 255.255.255.0 Serial 0/0
Dynamic Routing
Dynamic routing performs the same function as static routing except it is more robust. Static routing
allows routing tables in specific routers to be set up in a static manner so network routes for packets are
set. If a router on the route goes down the destination may become unreachable. Dynamic routing
allows routing tables in routers to change as the possible routes change. There are several protocols
used to support dynamic routing including RIP and OSPF
Default routing
.A default route, also known as the gateway of last resort, is the network route used by a router when no other known route
exists for a given IP packet's destination address. All the packets for destinations not known by the router's routing table are
sent to the default route. This route generally leads to another router, which treats the packet the same way: If the route is
known, the packet will get forwarded to the known route. If not, the packet is forwarded to the default-route of that
router which generally leads to another router. And so on. Each router traversal adds a one-hop distance to the route.
Page | 47
ROUTING PROTOCOLS
Routed and
Routing
Protocols
Routing
Routed
IP
IP
X
Dist
-V
RIPv
1,2
Novell
RIP
RTM
P
Interior
Gateway
Protocols
App
le
IGR
P
LinkS
OSP
F
NLS
P
ISIS
Exterior
Gateway
Protocols
Hybr
id
EIG
RP
BGP
v4
Routed protocols:
TCP/IP, IPX-SPX are protocols which are used in a Local Area Network (LAN) so computers can communicate between
with each other and with other computers on the Internet.
Chances are that in your LAN you are most probably running TCP/IP. This protocol is what we call a "routed" protocol. The
term "routed" refers to something which can be passed on from one place (network) to another. In the example of TCP/IP,
this is when you construct a data packet and send it across to another computer on the Internet
Routing protocols:
Page | 48
Routing protocols were created for routers. These protocols have been designed to allow the exchange of routing tables, or
known networks, between routers. There are a lot of different routing protocols, each one designed for specific network
sizes, so I am not going to be able to mention and analyse them all, but I will focus on the most popular.
Distance Vector routers compute the best path from information passed to them from neighbors
Link State routers each have a copy of the entire network map
Link State routers compute best routes from this local map
RIPV1:
Routing Information Protocol (RIP) is a true Distance-Vector routing protocol. It sends the complete routing table out to all
active interfaces every 30 seconds. RIP only uses hop count to determine the best way to a remote network, but it has a
Page | 49
maximum allowable hop count of 15, meaning that 16 is deemed unreachable. RIP works well in small networks, but it is
inefficient on large networks with slow WAN links or on networks with large number of routers installed.
RIP comes in two different versions. RIP version 1 uses only classful routing, which means that all devices in the network
must use the same subnet mask. This is because RIP version 1 does not include the subnet mask when it sends updates. RIP
v1 uses broadcasts (255.255.255.255).
RIP version 2 does, however, and this is what we call classless routing (check the Subnetting section for more details). RIP
v2 uses multicasts (224.0.0.9) to update its routing tables.
COMMANDS:Configure RIP:
Use the following command to enable RIP on RouterA:
RouterA(config)#router rip
Configure the router to receive and send only RIP Version 2 packets using the following command:
RouterA(config-router)#version 2
Use the following commands to specify the networks directly connected to the router:
RouterA(config-router)#network 192.168.11.0
RouterA(config-router)#network 192.168.22.0
COMMANDS:RouterA#configure terminal
Enter configuration commands, one per line. End with Cntl/z
RouterA#(config)#router igrp AS no.
RouterA#(config-router)#network ip address
RouterA#(config-router)#exit
Page | 50
Announcements cannot be filtered. All items in the database must be sent to neighbors
Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the interior
gateway protocol (IGP) working group of the Internet Engineering Task Force (IETF). The working group was
formed in 1988 to design an IGP based on the shortest path first (SPF) algorithm for use in the Internet. Similar to
the Interior Gateway Routing Protocol (IGRP), OSPF was created because in the mid-1980s, the Routing
Information Protocol (RIP) was increasingly unable to serve large, heterogeneous internetworks.
OSPF is a classless routing protocol, which means that in its updates, it includes the subnet of each route it knows
about, thus, enabling variable-length subnet masks. With variable-length subnet masks, an IP network can be
broken into many subnets of various sizes. This provides network administrators with extra network-configuration
flexibility. These updates are multicasts at specific addresses (224.0.0.5 and 224.0.0.6).
OSPF has two primary characteristics:
1) The protocol is open (non proprietary), which means that its specification is in the public domain.
The OSPF specification is published as Request For Comments (RFC) 1247.
2) The second principal characteristic is that OSPF is based on the SPF algorithm, which sometimes is referred to
as the Dijkstra algorithm, named for the person credited with its creation.
Page | 51
COMMANDS:Router#config terminal
Router(config)#router ospf process-id
Router(config-router)#network network-number mask area area-id
Example:
Router(config-router)#network 192.168.10.0 255.255.255.0 area
0.0.0.0
Eigrp
.Enhanced
Interior Gateway Routing Protocol (EIGRP) is another Cisco proprietary, hybrid (has feature
of Distance Vector and Link State protocols), interior gateway protocol (IGP) used by routers to
exchange routing information. EIGRP uses a composite metric composed of Bandwidth, Delay,
Reliability, and Loading to determine the best path between two locations.
EIGRP can route IP, IPX and Appletalk. Along with IS-IS, it is one of the few multi-protocol routing
protocols.
The Diffusing Update Algorithm (DUAL) is the heart of EIGRP. In essence, DUAL always keeps a
backup route in mind, in case the primary route goes down. DUAL also limits how many routers are
affected when a change occurs to the network.
There is no maximum allowable number of hops. In a EIGRP network, each router multi-casts "hello"
packs to discover its adjacent neighbor. This adjacency database is shared with other router to build a
topology database. From the topology database the best route (Successor) and the second best route
(Feasible Successor) is found.
EIGRP is classless, meaning it does include the subnet mask in routing updates. However, by default
'auto-summary' is enable. You must disable if you want subnet information from other major networks.
Page | 52
The EIGRP metric is a can be a complex calculation, but by default it only uses bandwidth and delay to
determine the best path.
COMMANDS:Router#config terminal
5.1.2FRAME RELAY
It has the concept of joining remote areas through the single interface with the help of Frame Relay
Switches.
It has concept of:
Virtual Circuits
Frame Relay Encapsulation
5.1.3NAT IMPLEMENTATION
Page | 53
It is use for translating private to public IP address. So we can connect our private network running in
the department to connect to the global network .It converts the private IP to Public IP in order to
communicate
It has concept of :
Static NAT
Dynamic NAT
PAT (Port Address Translation)
5.1.4SWITCHING
Switching is the process of using the hardware address of devices on a Lan to communicate with the
external network. It is used to carry data packets from different vlan to the main router. It provides
Spanning Tree Protocol to choose the best path for carrying the data packets with minimum cost and
less transmission loss in the network.
It has the concept of:
Port Security
Creating Vlans
What is a VLAN?
As I said, a VLAN is a virtual LAN. In technical terms, a VLAN is a broadcast domain created by switches. Normally, it is a router
creating that broadcast domain. With VLANs, a switch can create the broadcast domain.
This works by, you, the administrator, putting some switch ports in a VLAN other than 1, the default VLAN. All ports in a single VLAN
are in a single broadcast domain.
Because switches can talk to each other, some ports on switch A can be in VLAN 10 and other ports on switch B can be in VLAN 10.
Broadcasts between these devices will not be seen on any other port in any other VLAN, other than 10. However, these devices can all
communicate because they are on the same VLAN. Without additional configuration, they would not be able to communicate with any
other devices, not in their VLAN.
Page | 54
Lets say we wanted to create VLANs 5 and 10. We want to put ports 2 & 3 in VLAN 5 (Marketing) and ports 4 and 5 in VLAN 10
(Human Resources). On a Cisco 2950 switch, here is how you would do it:
At this point, only ports 2 and 3 should be able to communicate with each other and ports 4 & 5 should be able to communicate. That is
because each of these is in its own VLAN. For the device on port 2 to communicate with the device on port 4, you would have to
configure a trunk port to a router so that it can strip off the VLAN information, route the packet, and add back the VLAN information.
The router uses IP subnets to move traffic between VLANs. Each VLAN has a different IP subnet, and
there is a one-to-one correspondence of VLAN and IP subnet boundaries. If a host is in a given IP
subnet,
it is also in a given VLAN, and vice-versa.
ACL:
Access Control List, ACL is a listing containing one or more ACE that tells a computer operating
system or other network device what rights users have to each item on a computer or network device.
For example, an ACL may specify if a user or the users group have access to a file or folder on that
computer or network.
Access Control Lists (ACLs) allow a router to permit or deny packets based on a variety of criteria. The
ACL is configured in global mode, but is applied at the interface level. An ACL does not take effect
until it is expressly applied to an interface with the ip access-group command. Packets can be filtered as
they enter or exit an interface.
If a packet enters or exits an interface with an ACL applied, the packet is compared against the criteria
of the ACL. If the packet matches the first line of the ACL, the appropriate permit or deny action is
taken. If there is no match, the second lines criterion is examined. Again, if there i
Page | 56
Each of these rules has some powerful implications when filtering IP and IPX packets with access lists.
There are two types of access lists used with IP and IPX:
Standard access lists
These use only the source IP address in an IP packet to filter the network. This basically permits or
denies an entire suite of protocols. IPX standards can filter on both source and destination IPX address.
Extended access lists
These check for both source and destination IP address, protocol field in the Network layer header, and
port number at the Transport layer header. IPX extended access lists use source and
destination IPX addresses, Network layer protocol fields, and socket numbers in the Transport layer
header.
Page | 57
Page | 58
Page | 59
As a core layer switch is connected to the Fast Ethernet port i.e.f0/0 of the router and we have so many
Vlan in our network so we create sub interface of Fast Ethernet port to assign particular Vlan to specific
sub interface port and assign the IP address to particular sub interface.
Following commands are entered:
Router>enable
Page | 60
Servers
A server is primarily a program that runs on a machine, providing a particular and specific service to
other machines connected to the machine on which it is found.
Nowadays, server functionality has become so rich, complex and varied in nature that there are whole
very powerful computers dedicated to being exclusively servers. This has led many non-technical
people to denote servers as being machines that run services.
A network server is a computer designed to process requests and deliver data to other (client)
computers over a local network or the Internet. Network servers typically are configured with
additional processing, memory and storage capacity to handle the load of servicing clients.
DHCP SERVER
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows a central
computer to automatically assign the TCP/IP network configuration to
individual work-stations on a private network.
With DHCP enabled it suffices to enable the "Obtain an IP address
automatically" in the TCP/IP configuration on the private network. The DHCP
Page | 64
Server then takes over the responsibility of assigning the TCP/IP parameters,
significantly lowering the task of network maintenance
For a small network, the configuration of the DHCP Server is not very challenging and the InJoy DHCP
Server Plugin is deliberately designed to be extremely simple. In fact, in the InJoy Firewall, you can
immediately enable the DHCP Server and have it operational in less than a minute. Here is how.
PROJECT UNDERTAKEN
Page | 66
INTRANET COMMUNICATION
BETWEEN TWO SITES
This project is about the communication of the two sites (India and Australia) of the same enterprise
situated in different locations and communicating over the intranet between two Sites.
I have created six vlans in customers sites (India) and these vlans are connected to a switch creating
six collision domains and six broadcast domains. And further these two switches are connected to two
different routers of these two different sites in and these two routers are connected to two different
routers of two different service providers.
In these company routers I have used PAT for converting private IPs into public address that is used
over the internet. I put default route to the service provider and tunnel to securely perform the
communication between the customer sites.
In the service provider end I have used OSPF (open shortest path first) for routing purpose.
Page | 67
To overview the service provider I have created a syslog server which will generate the log of routers
and provide updated feedback. For the syslog server I have created a loopback adapter and connected
my laptop as a server.
10. Conclusion and Future Scope :
Communication between Remote Areas and Security has it application in almost every field including
business, education, entertainment, etc. My main goal in this project is to develop a communication
bridge between two customer sites having connectivity with each other with security Its a onetime
Investment project.
Cisco Packet Tracer used in this project is one of the latest cutting edge technologies for Student in this
field. During the initial phases of developing this project I faced several challenges in understanding
some concept in CPR but it got cleared after study and practice.
Being a trainee, I got an excellent opportunity to follow the practices of Networking. Working on the
project help me learn and explore various networking features. There is always a scope for
enhancement in the project ,which currently is for seen in the integration of the modules that were
developed so far during training.
Page | 68
11. REFRENCE
1. Todd Lammle
A Cisco Certified Network Associate Study Guide 7th edition.
2. www.wikepedia.com
A solution to all the to all problems a encyclopaedia with all solution.
3. www.wwgsolution.com
A Pdf file giving a brief description about Frame Relay concepts.
4. Cisco networking Academy
Explain the concept of the working of the Cisco Packet Tracer with system requirement.
5. Interconnecting Cisco Network Devices Part 1 & 2
A Self Guide for understanding the concept of internetwork and introduction to Cisco
routers.
Page | 69