You are on page 1of 33

INDUSTRIAL TRAINING REPORT

Corporate Network with Advance Routing, Switching & Security

Submitted in Partial fulfillment of the


Requirements for the Award of
Degree of Bachelor of Technology in Information Technology

Submitted by:
Name: Sankalp Sarvahi
University Roll no.: 1403310185

SUBMITTED TO:

Department of Computer Science & Engineering


RKGIT, Ghaziabad
2
3
DECLARATION

I hereby declare that the Industrial Training Report entitled Corporate Network With Advance Routing,
Switching And Security is an authentic record of my own work as requirements of Industrial Training during
the period from 07/06/2017 to 20/07/2017 for the award of degree of B.Tech. (CSE),RKGIT, Ghaziabad,
under the guidance of Mr. Puneet Singh.

Name: Sankalp Sarvahi

Roll no. 1403310185

Date: ________________

4
ACKNOWLEDGEMENT
In this highly complex society no work can be accomplished by a single individual but needs
inspiration and sincere guidance of intellectuals.

With an overwhelming sense of obligations, I avail this opportunity to express my deep sense of
gratitude to Mr. Puneet Singh (My project guide) who gave me right guidance to work on
Procurement model.

I emphatically express my profound thanks and heartfelt gratitude to various faculties at RCPL for
their valuable guidance, timely suggestions and constant encouragement during the entire Internship
period.

Finally, I thank all those who helped me directly and indirectly during the course of my summer
Internship at Ritusha Consultants Pvt. Ltd.

5
Company Profile
"YOUR FUTURE IS CREATED BY WHAT YOU DO TODAY LET'S SHAPE IT WITH SUMMER TRAINING
PROGRAM .
With ever changing technologies & methodologies, the competition today is much greater than ever before.
The industrial scenario needs constant technical enhancements to cater to the rapid demands. If you are an
engineering student or pursuing graduate/post-graduate level IT degree then you may have already heard
the term "Summer Training". These trainings are important because it is the best way to acquire and clear
your concepts about your respective fields.
RCPL(Sole Delivery Partner Hewlett Packard Enterprise Education Services 2004-16) the largest IT
company in the world, offers high quality Courses for 4 & 6 weeks. Few Courses in Summer Training
Program are Programming Techniques using 'C', PHP, VLSI, VHDL & PCB Design, Data Structure using
C Language, Core Java, J2EE - Hibernate with Spring Framework, J2EE - Struts with Hibernate
Framework, Android, ASP.NET With C#, Embedded & Robotics-Basics & Advanced, ARM, Linux
Administration with Scripting, Networking concepts with security.

The above Courses will be conducted at Various Locations across INDIA to name a few are
In North are New Delhi, Allahabad, Agra, Dehradun, Jaipur, Kanpur, Lucknow, Noida
In South are Bengaluru, Visakhapatnam, Hyderabad
In East are Kolkata, Patna, Guwahati
In West are Pune etc.

6
About the Project:
A network is a system that transmits any combination of voice, video and/or data between users. The
main field on which we were working was networking and the course was CCNA which includes all the parts
of networking.

In a typical LAN, there are various types of network devices available as outlined below.

Hub Repeat signals received on each port by broadcasting to all the other connected ports.
Repeaters Used to connect two or more Ethernet segments of any media type, and to provide signal
amplification for a segment to be extended. In a network that uses repeater, all members are
contending for transmission of data onto a single network. We like to call this single network a
collision domain. Effectively, every user can only enjoy a percentage of the available bandwidth.
Ethernet is subject to the "5-4-3" rule regarding repeater placement, meaning we can only have five
segments connected using four repeaters with only three segments capable of accommodating hosts.
Bridge A layer 2 device used to connect different networks types or networks of the same type. It
maps the Ethernet addresses of the nodes residing on each segment and allows only the necessary
traffic to pass through the bridge. Packet destined to the same segment is dropped. This "store-and-
forward" mechanism inspects the whole Ethernet packet before making a decision. Unfortunately, it
cannot filter out broadcast traffic. Also, it introduces a 20 to 30 percent latency when processing the
frame. Only 2 networks can be linked with a bridge.
Switch Can link up four, six, eight or even more networks. Cut-through switches run faster because
when a packet comes in, it forwards it right after looking at the destination address only. A store-and-
forward switch inspects the entire packet before forwarding. Most switches cannot stop broadcast
traffic. Switches are layer 2 devices.
Routers Can filter out network traffic also. However, they filter based on the protocol addresses
defined in OSI layer 3(the network layer), not based on the Ethernet packet addresses. Note that
protocols must be routable in order to pass through the routers. A router can determine the most
efficient path for a packet to take and send packets around failed segments. .
Gateway Often used as a connection to a mainframe or the internet. Gateways enable
communications between different protocols, data types and environments. This is achieved via
protocol conversion, whereby the gateway strips the protocol stack off of the packet and adds the
appropriate stack for the other side. Gateways operate at all layers of the OSI model without making
any forwarding decisions.

7
Table of Contents

Technology ..................................................................................................................................................... 10

Computer Networking .................................................................................................................................. 10

Networking Comm. ...................................................................................................................................... 10

OSI Model ...................................................................................................................................................... 10

TCP/IP Model ................................................................................................................................................ 10

Routing .......................................................................................................................................................... 10

Switch ............................................................................................................................................................. 11

Project............................................................................................................................................................. 11

Work Assignment 1.12

Work Assignment 1.12

Work Assignment 1.12

Work Assignment 1.12

Work Assignment 1.12

Work Assignment 1.12

Work Assignment 1.12

References.12

8
Technologies Used:
Cisco Packet Tracer Student:
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command line
interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and
remove simulated network devices as they see fit. The software is mainly focused towards
Certified Cisco Network Associate Academy students as an educational tool for helping them
learn fundamental CCNA concepts.

Work assigned:
To design a coaxial cable and twisted cable.

To design a LAN.

To design a WAN.

To design a MAN.

To program router.

To design network.

9
Computer networking
Computer networking is sometimes considered a sub-discipline of electrical engineering,
telecommunications, computer science, information technology or computer engineering, since it relies upon
the theoretical and practical application of these disciplines

Local area network


A local area network (LAN) is a network that connects computers and devices in a limited geographical area
such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each
computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet
technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing
home wires (coaxial cables, phone lines and power lines)

Storage area network


A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data
storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical
jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating
system. A SAN typically has its own network of storage devices that are generally not accessible through the
local area network by other devices. The cost and complexity of SANs dropped in the early 2000s to levels
allowing wider adoption across both enterprise and small to medium sized business environments.

Campus area network


A campus area network (CAN) is a computer network made up of an interconnection of LANs within a
limited geographical area. The networking equipment (switches, routers) and transmission media (optical
fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant / owner: an enterprise,
university, government etc.).

10
In the case of a university campus-based campus network, the network is likely to link a variety of campus
buildings including, for example, academic colleges or departments, the university library, and student
residence halls.

Metropolitan area network

A Metropolitan area network (MAN) is a large computer network that usually spans a city or a large
campus.

Wide area network


A wide area network (WAN) is a computer network that covers a large geographic area such as a city,
country, or spans even intercontinental distances, using a communications channel that combines many types
of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided
by common carriers, such as telephone companies. WAN technologies generally function at the lower three
layers of the OSI reference model: the physical layer, the data link layer, and the network layer.

Virtual private network


A virtual private network (VPN) is a computer network in which some of the links between nodes are carried
by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires.
The data link layer protocols of the virtual network are said to be tunneled through the larger network when
this is the case. One common application is secure communications through the public Internet, but a VPN
need not have explicit security features, such as authentication or content encryption. VPNs, for example,
can be used to separate the traffic of different user communities over an underlying network with strong
security features.VPN may have best-effort performance, or may have a defined service level agreement
(SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more
complex than point-to-point.

11
Networking Comm.:
Networking are Connection-oriented" and "Connectionless" communications.

A connection oriented communication has the following characteristics:

A session is guaranteed.
Acknowledgements are issued and received at the transport layer, meaning if the sender does not
receive an acknowledgement before the timer expires, the packet is retransmitted.
Phrases in a connection-oriented service involves Call Setup, Data transfer and Call termination.
All traffic must travel along the same static path.
A failure along the static communication path can fail the connection.
A guaranteed rate of throughput occupies resources without the flexibility of dynamic allocation.
Reliable = SLOW (this is always the case in networking).

In contrast, a connectionless communication has the following characteristics:

Often used for voice and video applications.


NO guarantee nor acknowledgement.
Dynamic path selection.
Dynamic bandwidth allocation.
Unreliable = FAST.

12
OSI Model:
The OSI model is a layered model and a conceptual standard used for defining standards to promote multi-
vendor integration as well as maintain constant interfaces and isolate changes of implementation to a single
layer. It is NOT application or protocol specific. In order to pass any Cisco exam, you need to know the
OSI model inside and out.

The OSI Model consists of 7 layers as follows:

Layer Description Device Protocol

Provides network access for applications, flow control and


NCP, SMB,
error recovery. Provides communications services to
SMTP, FTP,
Application applications by identifying and establishing the Gateway
SNMP,
availability of other computers as well as to determine if
Telnet
sufficient resources exist for communication purposes.

Performs protocol conversion, encryption and data Gateway and NCP, AFP,
Presentation
compression redirectors TDI

Allows 2 applications to communicate over a network by


opening a session and synchronizing the involved
Session Gateway NetBios
computers. Handles connection establishment, data
transfer and connection release

NetBEUI,
Repackages messages into smaller formats, provides error
Transport Gateway TCP, SPX,
free delivery and error handling functions
and NWLink

Handles addressing, translates logical addresses and IP, IPX,


Router and
Network names to physical addresses, routing and traffic NWLink,
brouter
management. NetBEUI

Packages raw bits into frames making it transmitable


across a network link and includes a cyclical redundancy
check(CRC). It consists of the LLC sublayer and the Switch,
**Data
MAC sublayer. The MAC sublayer is important to bridge and None
Link
remember, as it is responsible for appending the MAC brouter
address of the next hop to the frame header. On the
contrary,

13
LLC sublayer uses Destination Service Access

Points and Source Service Access Points to create links


for the MAC sublayers.

Physical layer works with the physical media for


transmitting and receiving data bits via certain encoding
Multiplexer
Physical schemes. It also includes specifications for certain None
and repeater
mechanical connection features, such as the adaptor
connector.

14
TCP/IP:
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. TCP is
one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the
entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of octets
from a program on one computer to another program on another computer. TCP is the protocol used by major
Internet applications such as the World Wide Web, email, remote administration and file transfer. Other
applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP),
which provides a datagram service that emphasizes reduced latency over reliability.

The Internet protocol suite is the set of communications protocols used for the Internet and similar networks,
and generally the most popular protocol stack for wide area networks. It is commonly known as TCP/IP,
because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP),
which were the first networking protocols defined in this standard. It is occasionally known as the DoD
model due to the foundational influence of the ARPANET in the 1970s (operated by DARPA, an agency of
the United States Department of Defense).

TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted,
routed and received at the destination. It has four abstraction layers, each with its own protocols. From lowest
to highest, the layers are:

The link layer (commonly Ethernet) contains communication technologies for a local network.
The internet layer (IP) connects local networks, thus establishing internetworking.
The transport layer (TCP) handles host-to-host communication.
The application layer (for example HTTP) contains all protocols for specific data communications
services on a process-to-process level (for example how a web browser communicates with a web
server).

15
ROUTING
There are 2 main types of routing, which are static and dynamic, the third type of routing is called Hybrid.
Static routing involves the cumbersome process of manually configuring and maintaining route tables by
an administrator. Dynamic routing enables routers to "talk" to each other and automatically update their
routing tables. This process occurs through the use of broadcasts. Next is an explanation of the various
routingprotocols.

RIP:
Routing Information Protocol(RIP) is a distance vector dynamic routing protocol. RIP measures the
distance from source to destination by counting the number of hops (routers or gateways) that the packets
must travel over. RIP sets a maximum of 15 hops and considers any larger number of hops unreachable.
RIP's real advantage is that if there are multiple possible paths to a particular destination and the
appropriate entries exist in the routing table, it will choose the shortest route. Routers can talk to each other,
however, in the real routing world, there are so many different routing technologies available, that it is not
as simple as just enabling Routing Information Protocol (RIP).

OSPF:
Open Shortest Path First (OSPF) is a link-state routing protocol that converges faster than a distance vector
protocol such as RIP. What is convergence? This is the time required for all routers to complete building
the routing tables. RIP uses ticks and hop counts as measurement, while OSPF also uses metrics that takes
bandwidth and network congestion into making routing decisions. RIP transmits updates every 30 seconds,
while OSPF transmits updates only when there is a topology change. OSPF builds a complete topology of
the whole network, while RIP uses second handed information from the neighboring routers. To
summarize, RIP is easier to configure, and is suitable for smaller networks. In contrast, OSPF requires high
processing power, and is suitable if scalability is the main concern.

We can tune the network by adjusting various timers. Areas that are tunable include: the rate at which
routing updates are sent, the interval of time after which a route is declared invalid, the interval during
which routing information regarding better paths is suppressed, the amount of time that must pass before a
route is removed from the routing table, and the amount of time for which routing updates will be
postponed. Of course, different setting is needed in different situation. In any case, we can use the "show ip
route" command to display the contents of routing table as well as how the route was discovered.

IGRP and EIGRP:


RIP and OSPF are considered "open", while IGRP and EIGRP are Cisco proprietary. Interior Gateway
Routing Protocol(IGRP) is a distance vector routing protocol for the interior networks, while Enhanced
Interior Gateway Routing Protocol (EIGRP) is a hybrid that combines distance vector and link-state
technologies. Do not confuse these with NLSP. Link Services Protocol (NLSP) is a proprietary link-state
routing protocol used on Novell NetWare 4.X to replace SAP and RIP. For IGRP, the metric is a function
of bandwidth, reliability, delay and load. One of the characteristics of IGRP is the deployment of hold
16
down timers. A hold-down timer has a value of 280 seconds. It is used to prevent routing loops while router
tables converge by preventing routers from broadcasting another route to a router which is off-line before
all routing tables converge. For EIGRP, separate routing tables are maintained for IP, IPX and AppleTalk
protocols. However, routing update information is still forwarded with a single protocol.

Switch
A network switch or switching hub is a computer networking device that connects network segments or
network devices. The term commonly refers to a multi-port network bridge that processes and routes data
at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network
layer (layer 3) and above are often referred to as layer-3 switches or multilayer switches.

A switch is a telecommunication device which receives a message from any device connected to it and then
transmits the message only to the device for which the message was meant. This makes the switch a more
intelligent device than a hub (which receives a message and then transmits it to all the other devices on its
network). The network switch plays an integral part in most modern Ethernet local area networks (LANs).
Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO)
applications typically use a single switch, or an all-purpose converged device such as a residential gateway
to access small office/home broadband services such as DSL or cable Internet. In most of these cases, the
end-user device contains a router and components that interface to the particular physical broadband
technology

Showing the Switch IP Address

17
PROJECT
WORK ASSIGNMENT -1

Objective
Describe the features and operation of static routing.

18
Static Routing

STATIC ROUTING is a concept describing one way of configuring path selection of routers in computer
networks. It is the type of routing characterized by the absence of communication between routers
regarding the current topology of the network. This is achieved by manually adding routes to the routing
table. The opposite of static routing is dynamic routing, sometimes also referred to as adaptive routing.

In these systems, routes through a data network are described by fixed paths (statically). These routes are
usually entered into the router by the system administrator. An entire network can be configured using
static routes, but this type of configuration is not fault tolerant. When there is a change in the network or a

19
failure occurs between two statically defined nodes, traffic will not be rerouted. This means that anything
that wishes to take an affected path will either have to wait for the failure to be repaired or the static route
to be updated by the administrator before restarting its journey. Most requests will time out (ultimately
failing) before these repairs can be made. There are, however, times when static routes can improve the
performance of a network. Some of these include stub networks and default routes.

WORK ASSIGNMENT -2

Objective
Start a router and recognize the normal boot sequence.

Bootup output from router.

20
Setup Initial Global Parameters

Setup Initial Protocol Configurations

21
login to router

22
WORK ASSIGNMENT -3

Objective
Complete the initial device configuration, given a functioning router and Configure IP addresses and IP
subnet masks on router interfaces, given a functioning router.

Router Module

23
Configuring router identification.

Configurating a Router Password

Console line command

Private control session timeout

Configuring a Serial Interface

24
Enabling and disabling an interface

Introducing IP Addresses

30.

IP Addressing

25
IP Address classes

26
Fig 3.16- Addressing with subnet

27
Subnet Mask

28
WORK ASSIGNMENT -4

Objective
Describe the features and operation of EIGRP

Configuration EIGRP

29
WORK ASSIGNMENT -5

Objective
Describe the features and operation of IGRP.

Configuration IGRP

30
WORK ASSIGNMENT -6

Objective
Describe the features and operation of OSPF.

Configuration OSPF

31
WORK ASSIGNMENT -7

Objective
Describe the features and operation of RIP

IP Routing Configuration Task

Dynamic Routing Configuration

32
RIP Configuration

The above work done by us under different classes and the following work done in software were an
artificial network was establishing.

The work allotted was done successful with desired results and hence, the training was beneficial.

33

You might also like