Ccna PDF

Download as odp, pdf, or txt
Download as odp, pdf, or txt
You are on page 1of 20

ABSTRACT

This project is totally dedicated to the Network Engineer for new and smart learning of the Network Structure. In this concept it is possible for the
networker to check the incoming & the outgoing traffic and to maintain some security concepts as well. In this logic we use the Multi-Layer Switch
to act as a DHCP Server for every Department in Network Bulls Organization. The Multi-Layer Switch along with providing IP Addresses to all the
Hosts in Network Bulls also acts as a Back-Bone to the whole Network Scenario. Multi-Layer Switch makes it possible to route and monitor all the
Traffic Flow in an MNC – Network Bulls. It provides IP Addresses to the hosts through DHCP Process on time lease. Every Router in each & every
Department has been provided with the dedicated PC to be controlled by the Local Administrator of the Department Manually along with the fact
that the Network of Network Bulls is also centrally Manage through a Multi-Layer Switch.
The different Departments can communicate with each other to act as a transparent Network Terminology, being an MNC – Network Bulls. The
Accounting & Sales Department, Quality Analysis Department, Finance Department, IT Security Department, HR Department & Production Floor
are shown as some of the Departments of Network Bulls.
ACKNOWLEDGEMENT
Before we get into the actual report, we would like to express our gratitude to all those who helped us in shaping up this project. In numerous ways,
people who gave unending support right from the start.
We would like to thank Mr. Himanshu Kumar whose guidance and stimulating suggestions helped me conceive the idea of the project.
We would also like to thank our project coordinator Mr. Amit kr and our guide Mr. Monty kumar, for their encouragement, support and perseverance
shown during the course of my project.
We would also like to take this opportunity to thank our teachers for their continued understanding, active involvement, inspiration and patience.
INTRODUCTION
Here are some ideas of projects in the Networking area. Some of these are new, and
some are ideas that have run before but could be run again. Note that, unlike the
normal project ideas, these ideas do not have a contact listed against them. They are
there to give you ideas of the sort of things that could be done. If a project idea
seems interesting, and you would like to pursue it further, then you should discuss it
with one of the lecturers who are experienced in the Networking area: Bill Buchanan,
Gordon Russell, Ahmed Al-Dubai, Imed Romdhani, Jim Jackson, Robert Ludwiniak
or Neil Urquhart. They may not be able to help you directly, but will at least be able to
point you to somebody better placed, perhaps because their specialist knowledge is
in the area of the project.
This introduces the underlying concepts behind networking using the
Internet and its protocols as examples. There are two goals:

(1) to give you an understanding of how networks, especially the Internet, work,

(2) to teach you network programming.


We will cover the first five chapters of Kurose in detail, working our way down
the network stack from the application layer to the data-link layer. Concurrent
with the lectures, you (in groups of two) will be building a functional TCP/IP
stack and a small web server that will run on it. What you build will be “real” –
your code will interoperate with other TCP/IP stacks and you’ll be able to talk to
your web server using any browser on any TCP/IP stack.
This is a learn-by-doing kind of class. You will get your hands dirty by
examining parts of our Internet infrastructure and building other parts. It will be
a lot of work, but it will also be a lot of fun, provided you enjoy this sort of thing.
We will assume that you do and that you will make a good faith effort. We don’t
want to have to spend too much time measuring your performance. If you care
about what we’re teaching, you’ll do a better job of that yourself, and if you don’t
care, then you should take some course that you do care about.
The goal of the networking project is to enable you to do the fo
GOALS
 Build implementations of the Internet protocols

 Generalize this knowledge to other networking protocols.

 Be a competent network and systems programmer.

 Think like a networking practitioner

 Read and judge articles on networking in trade magazines

 Begin to read and judge research and technical articles on networking

 Create simplicity and reliability out of complexity and unreliability

 Structure and design software systems to achieve that simplicity and

Reliability
PROJECT SPECIFICATION
2.1 Hardware Specification
CPU Speed :2GHz recommended or higher
Processor :Pentium Processor or above
Memory/RAM: 1GB minimum,2GB recommended or higher
Display Properties: Greater than 256 color depth
Size of Hard Disk:60 GBminimum
NIC Card

2.2 Software Specification


Software Used: Packet Tracer 5.3.2
Operating System: Microsoft Windows XP,Vista,7
2.2.1Packet Tracer

Packet Tracer is a Cisco router simulator that can be utilized in training and education, but also in research for simple computer network simulations.
The tool is created by Cisco Systems and provided for free distribution to faculty, students, and alumni who are or have participated in the Cisco
Networking Academy. The purpose of Packet Tracer is to offer students and teachers a tool to learn the principles of networking as well as develop
Cisco technology specific skills.

Features

The current version of Packet Tracer supports an array of simulated Application Layer protocols, as well as basic routing with RIP,OSPF,
and EIGRP, to the extent required by the current CCNA curriculum. While Packet Tracer aims to provide a realistic simulation of functional
networks, the application itself utilizes only a small number of features found within the actual hardware running a current CiscoIOS version. Thus,
Packet Tracer is unsuitable for modeling production networks. With the introduction of version 5.3, several new features were added,
including BGP. BGP is not part of the CCNA curriculum, but part of the CCNP curriculum.
PROJECT DETAILS
2.3.1Description:
Here we have 8 branches of a company in a Campus Network design, they are accessing internet through ISP.

2.3.2 DEVICES USED


8 SERIAL CABLES

28 COPPER CROSS OVER

8 COPPER STRAIGHT THROUGH

8 ROUTERS

16 SWITCHES(LAYER 2)

1 MULTY LAYER SWITCH

28 PCs

16 CONSOLE CABLES
DETAILS
2.3.3 PROTOCOLS USED

EIGRP 100 2.3.1Description:

Here we have 8 branches of a company in a Campus Network design, they are accessing internet through ISP.

2.3.2 DEVICES USED


8 SERIAL CABLES

28 COPPER CROSS OVER

8 COPPER STRAIGHT THROUGH

8 ROUTERS

16 SWITCHES(LAYER 2)

1 MULTY LAYER SWITCH

28 PCs

16 CONSOLE CABLES

2.3.3 PROTOCOLS USED

EIGRP 100

VTP(VLAN TRUNKING PROTOCOL) at all SWITCHES

INTER VLAN SWITCHING

DHCP on MULTI-LAYER SWITCH 2.3.3 PROTOCOLS USED


SUBNET MASKING

WILD CARD MASKING

STP(SPANNING TREE PROTOCOL)


• EIGRP 100 2.3.1Description:
NAT(NETWORK ADDRESS TRANSLATION)

Chapter 3
SYSYTEM DESIGN
3.1Networking Technologies

Networks using a Star topology require a central point for the devices to connect. Originally this device was called a concentrator since it
consolidated the cable runs from all network devices. The basic form of concentrator is the hub.

As shown in Figure; the hub is a hardware device that contains multiple, independent ports that match the cable type of the network. Most common
hubs interconnect Category 3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs also exist. The hub is
considered the least common denominator in device concentrators. Hubs offer an inexpensive option for transporting data between devices, but hubs
don't offer any form of intelligence. Hubs can be active or passive.
SWITCHES
3.2SWITCHES

Switches are a special type of hub that offers an additional layer of intelligence to basic, physical-layer repeater hubs. A switch must be able to read
the MAC address of each frame it receives. This information allows switches to repeat incoming data frames only to the computer or computers to
which a frame is addressed. This speeds up the network and reduces congestion.

Switches operate at both the physical layer and the data link layer of the OSI Model.
BRIDGES
A bridge is used to join two network segments together, it allows computers on either segment to access resources on the other. They can also be
used to divide large networks into smaller segments. Bridges have all the features of repeaters, but can have more nodes, and since the network is
divided, there is fewer computers competing for resources on each segment thus improving network performance.
ROUTERS
Routers Are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most
often used in large internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet
using dedicated leased lines.

Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI) reference model for networking to move packets between
networks using their logical addresses (which, in the case of TCP/IP, are the IP addresses of destination hosts on the network). Because routers
operate at a higher OSI level than bridges do, they have better packet-routing and filtering capabilities and greater processing power, which results in
routers costing more than bridges
GATEWAYS
A gateway is a device used to connect networks using different protocols. Gateways operate at the network layer of the OSI model. In order to
communicate with a host on another network, an IP host must be configured with a route to the destination network. If a configuration route is not
found, the host uses the gateway (default IP router) to transmit the traffic to the destination host. The default t gateway is where the IP sends packets
that are destined for remote networks. If no default gateway is specified, communication is limited to the local network. Gateways receive data from
a network using one type of protocol stack, removes that protocol stack and repackages it with the protocol stack that the other network can use.
NETWORK CARD
Network interface adapters perform a variety of functions that are crucial to getting data to and from the computer over the network.

These functions are as follows:


FUNCTIONS
3.6.2.1Data encapsulation
The network interface adapter and its driver are responsible for building the frame around the data generated by the network layer protocol, in preparation for transmission. The
network interface adapter also reads the contents of incoming frames and passes the data to the appropriate network layer protocol.
3.6.2.2Signal encoding and decoding
The network interface adapter implements the physical layer encoding scheme that converts the binary data generated by the network layer-now encapsulated in the frame-into
electrical voltages, light pulses, or whatever other signal type the network medium uses, and converts received signals to binary data for use by the network layer.
3.6.2.3Transmission and reception
The primary function of the network interface adapter is to generate and transmit signals of the appropriate type over the network and to receive incoming signals. The nature of the
signals depends on the network medium and the data-link layer protocol. On a typical LAN, every computer receives all of the packets transmitted over the network, and the network
interface adapter examines the destination address in each packet, to see if it is intended for that computer.
3.6.2.4Data buffering
Network interface adapters transmit and receive data one frame at a time, so they have built-in buffers that enable them to store data arriving either from the computer or from the
network until a frame is complete and ready for processing.
3.6.2.5Serial/parallel conversion
The communication between the computer and the network interface adapter runs in parallel, that is, either 16 or 32 bits at a time, depending on the bus the adapter uses. Network
communications, however, are serial (running one bit at a time), so the network interface adapter is responsible for performing the conversion between the two types of transmissions.
3.6.2.6Media access control
The network interface adapter also implements the MAC mechanism that the data-link layer protocol uses to regulate access to the network medium. The nature of the MAC
mechanism depends on the protocol used.
MODEMS
A modem is a device that makes it possible for computers to communicate over telephone lines. The word modem comes from Modulate and
Demodulate. Because standard telephone lines use analog signals, and computers digital signals, a sending modem must modulate its digital
signals into analog signals. The computers modem on the receiving end must then demodulate the analog signals into digital signals.
COMMANDS USED
BASIC COMMANDS
ENABLE : To go in priviledge mode

CONFIGURE TERMINAL : To go in global configuration mode

ENABLE PASSWORD <VALUE> : To give password

ENABLE SECRET <VALUE> : To give secret password

LINE CONSOLE 0 : To go in line console mode

EXECUTION TIMEOUT 0 : To make console never go to sleep in line console mode

LOGGING SYNCHRONOUS : To avoid the messages it also run in line console mode

SHOW RUNNING CONFIGURATION:

SHOW IP INTERFACE BRIEF : To show the IP configuration

INTERFACE FASTETHERNET0/0 : To give the IP configuration of fast ethernet

INTERFACE SERIAL0/0 : To give the IP configuration of serial interface

NO SHUTDOWN : To make interface up

CLOCKRATE 64000 : To provide clock rate to DCE end of serial cable


ROUTING COMMANDS
STATIC ROUTING COMMANDS:

IN global config mode)# ip route <destination network ip> <subnet mask> <exit interface> <permanent>

For ex.) # ip route 10.1.1.0 255.255.255.0 20.1.1.2

DEFAULT ROUTING COMMANDS:

In global config mode)# ip route <destination network ip> <subnet mask> <exit interface> <permanent>
TO CREATE VLANs
1. To give name to vlan:
-config) # vlan 2
-config) # name xyz
2. To add interfaces to VLAN
-config) # int fa0/0
-int) # switchport mode access
-int) # switchport access vlan2

3. To do trunking
-config) # int fa0/0
-int) # switchport mode trunk
-int) # switchport mode dynamic desirable
FUTURE SCOPE
Perhaps the greatest concern companies have in doing business over the Internet is the security risk. Hackers, denial-of-service (DoS) attacks,
identity theft, and even
cyber-terrorism are very real dangers. In addition, you may wonder how to guarantee the performance and reliability of your Internet-based services.
Or, you may not be certain that you have the resources and support needed to deploy and manage e-commerce services and processes.

The good news is that a sound network infrastructure can address all these issues. At the foundation of a robust e-commerce infrastructure are the
routers and switches.

An integrated approach to routing and switching lets all workers—even those at different sites—have the same access to business applications,
unified communications, and videoconferencing as their colleagues at headquarters.
Cisco lets you grow your network over time, adding features and functionality as you need them while ensuring complete investment protection. An
added benefit of this integrated approach is that your IT personnel can centrally
manage the network from headquarters, which keeps staffing counts low.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy