Abhi
Abhi
At
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
SUBMITTED BY
ABHISHEK KUMAR 22-B-CSE-0O4
AUTOMATION
DEPARTMENT OF
ABHISHEK KUMAR
22-B-CSE-004
1
ABSTRACT
2
TABLE OF CONTENTS
6. IP Address 13-14
3
INTRODUCTION
Networking relies on protocols, which are a set of rules and standards that
govern how data is transmitted and received across the network. One
commonly used protocol is the Internet Protocol (IP), which assigns unique
addresses to each device on the network, ensuring that data is properly
directed to its intended recipient.
4
NETWORK & TYPES
There are different types of networks based on their size and geographical
coverage:
Local Area Network (LAN): A LAN is a network that covers a small area,
such as a home, office, or building. It allows devices within this limited space
to share files, printers, and internet connections.
Each type of network serves a different purpose and has varying sizes and
coverage areas. LANs are suitable for small-scale networking within a
limited space, MANs connect LANs across a city or town, and WANs enable
connectivity on a global scale.
5
WAYS OF TRANSMISSION IN COMPUTER NETWORK
6
NETWORKING CABLES
7
STRAIGHT-THROUGH CABLE: Used to connect different types of
devices (e.g., computer to switch). Sequence: orange/white, orange,
green/white, blue, blue/white, green, brown/white, brown.
8
NETWORKING DEVICES
Network devices, also known as networking hardware, are physical devices
that allow hardware on a computer network to communicate and interact
with one another. For example Repeater, Hub, Bridge, Switch, Routers,
Gateway, etc.
LAN Card:
A LAN card, also known as a network interface card (NIC) or Ethernet card,
is a hardware device that enables a computer to connect to a local area
network (LAN). It provides the physical interface between the computer and
the network, allowing data to be transmitted and received over the network.
The MAC address is indeed stored in the LAN card itself.
REPEATER:
A repeater operates at the physical layer. It is hardware component that is
used to boost up signals and also receive signal and retransmits it at higher
frequency. According to the types of signals that they regenerate, repeaters
can be classified into two categories:
Analog Repeaters: It can only amplify the analog signal.
Digital Repeaters: It can reconstruct a distorted signal.
9
HUB:
A hub is a network device that connects multiple devices in a local area
network (LAN). It operates at the physical layer of the network and is
primarily used for signal distribution. It performs broadcasting and LAN
device which connects computer together and works on half duplex. It does
not understand MAC address. . In HUB, there is 7 to 12 port. The speed is
same as cable speed or connection speed.
SWITCH:
A switch is a multiport bridge with a buffer and a design that can boost its
efficiency and performance. A switch is a data link layer device. It is a LAN
device and a central device which is used in network for connecting devices.
The number of ports are more than hub. It has max 24 ports. It understand
MAC address and work on full duplex mode. The speed of switch is double
than connection speed.
10
Based on their configuration types, switches can be categorized into two
main types: o Unmanaged Switch:
Unmanaged switches are the most basic type of switch and are typically used
in small home or office networks. They are plug-and-play devices that
require no configuration or management. Unmanaged switches operate with
default settings and cannot be customized.
o Managed Switch:
Managed switches offer advanced configuration and management
capabilities, making them suitable for larger networks and enterprise
environments. They provide a range of features and options that allow
network administrators to have greater control over the network.
BRIDGE:
A bridge operates at the data link layer. A bridge is a repeater, with add on
the functionality of filtering content by reading the MAC addresses of the
source and destination. It is also used for interconnecting two LANs working
on the same protocol.
GATEWAY:
A gateway, as the name suggests, is a passage to connect two networks that
may work upon different networking models. They work as messenger
agents that take data from one system, interpret it, and transfer it to another
system. Gateways are also called protocol converters and can operate at any
network layer. Gateways are generally more complex than switches or
routers. A gateway is also called a protocol converter.
FIREWALL:
A firewall device is a crucial component of network security that monitors
and filters network traffic based on predefined rules. It acts as a barrier
between networks, preventing unauthorized access and protecting against
threats. Firewalls enforce security policies, perform traffic inspection, and
can include features such as NAT, intrusion detection/prevention, and VPN
support. They play a vital role in enhancing network security and protecting
sensitive data from unauthorized access or malicious activities.
11
ROUTERS:
A router is a network device that forwards information packets
among PC networks. Routers perform traffic routing functions on the
Internet. Data sent over the Internet, such as a website or email, is in
the form of data packets. Data travels through these interfaces in the
network. Ports and interfaces are identified by their name and
number. Different types of Ports are mentioned below:
12
IP ADDRESS
There are two versions of IP addresses that are commonly used on the
internet: IPv4 and IPv6.
IPv4 IPv6
13
It consists of 4 octets. It consists of 8 fields, and each field
contains 2 octets. Therefore, the
total number of octets in IPv6 is 16.
Types of IP addresses
14
Class B 16 16 128-191 255.255.0.0
Used in Used in
Class D multicasting multicasting 224-239 -
OSI MODEL
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer
moves through a physical medium to the software application in another
computer. o OSI consists of seven layers, and each layer performs a
particular network function. o OSI model was developed by the
International Organization for Standardization (ISO) in 1984, and it is
now considered as an architectural model for the inter-computer
communications. o OSI model divides the whole task into seven smaller
and manageable tasks. Each layer is assigned a particular task. o Each
layer is self-contained, so that task assigned to each layer can be
performed independently.
There are the seven OSI layers. Each layer has different functions. A list of
seven layers are given below:
15
• Physical Layer: Deals with the physical transmission of data over the
network.
16
17
CISCO PACKET TRACER
18
NETWORKING DEVICES USED IN PROJECT
PCs: PCs (Personal Computers) are used to simulate end-user devices in the
network. They can represent workstations, laptops, or any other devices that
connect to the network.
19
IMPLEMENTATION OF PROJECT
Step 2: After the installation procedure has completed this display (below)
will appear when you run the Cisco Packet Tracer-Start the application.
Step 3:
• From the bottom toolbar, click on router and select router 2811.
Also click on switch and selects 2960 switch.
• Now, click on ‘End Devices’ and select ‘PC’ and then click on the
screen.
20
19
Step 4:
• Connect routers and switches by cable.
• For adding ports in router, click on the router, off the router by
clicking on the button and then add the WIC-2T port into the empty
port (which is black in color) by dragging it from the left section of
the screen. And then again turn on the button by clicking on the same
button.
23
• Now, connect the routers with serial cable.
22
21
CISCO ROUTER MODES
2. Privileged mode –
As we type enable to user mode, we enter into Privileged mode where
we can view and change the configuration of the router. Different
commands like show running-configuration, show IP interface brief, etc
can run on this mode which is used for troubleshooting purposes. Here
commands are sh run, sh history, write and so on.
Configuration –
23
24
ASSIGN IP ADDRESS TO SWITCH, ROUTER AND PC
Assigning the IP address is the first step while creating a network in packet
tracer. Before proceeding with any other configuration, we must assign the
appropriate IP address and design the correct IP addressing scheme for the
network.
24
25
CONFIGURE PC IP ADDRESS
To configure the IP address on a PC, laptop, or server, we have to open the
IP configuration utility provided in the packet tracer.
To assign the static IP address, we will select the static option available and
then we will configure the IP address manually.
If we have configured the devices with the correct IP addresses then we can
further develop our network in the packet tracer.
26
ROUTING PROTOCOLS
Routing is the process of forwarding network traffic from one network
location to another. It involves making decisions about the best path for
data packets to reach their destination based on network topology and
routing protocols.
A routing protocol is a set of rules and algorithms that routers use to
communicate and exchange information about network topology,
reachability, and network conditions. These protocols enable routers to
learn about available paths, make routing decisions, and update their
routing tables to determine the most efficient routes for forwarding data
packets.
In simple terms, routing is like finding the best directions to reach a
destination in a network, and routing protocols are the rules and methods
used by routers to share information and decide the most efficient paths for
data to travel through the network.
RIP (Routing Information Protocol):
• RIP is a distance-vector routing protocol that uses hop count as the metric
to determine the best path.
• It supports small to medium-sized networks and is easy to configure. • RIP
sends routing updates periodically (by default, every 30 seconds) to its
neighboring routers.
• It has a maximum hop count limit of 15, making it suitable for small
networks.
29
OSPF (Open Shortest Path First):
• OSPF is a link-state routing protocol that calculates the shortest path based
on the cost assigned to each link.
• It supports large-scale networks and is widely used in enterprise
environments.
• OSPF routers exchange link-state information, including the state of their
interfaces, with neighboring routers.
• OSPF allows for the use of different metrics, such as bandwidth, delay, and
reliability, for path selection.
28
29
REDISTRIBUTION
30
CONFIGURE REDISTRIBUTION ON ROUTER
32
3
Server, DNS Server, Email Server
SERVER:
DNS SERVER:
A DNS (Domain Name System) server is a crucial component of the internet infrastructure
that translates human-readable domain names into IP addresses, which computers use to
identify each other on the network. Here’s a comprehensive explanation of DNS servers.
An email server, also known as a mail server, is a specialized computer or software application
responsible for managing and delivering email messages. It facilitates the sending, receiving,
and storage of email messages over networks, typically the internet or within a private network.
Here's a detailed explanation of email servers.