SlideShare uma empresa Scribd logo
1 de 49
Baixar para ler offline
Cisco Certified Network Associate


                      By




                Nikita Kaushal
               (0178EC091055)




Industrial Training Completed at the HCL Career
  Development Center, Bhopal as a Compulsory
   Requirement for the degree of Bachelor of
  Engineering (Electronics and Communication
                  Engineering)


        June 01, 2012 to June 30, 2012
Department of Electronics and Communication &
                 Engineering
  Jai Narain College of Technology & Science
                Bhopal (M.P.)
INDUSTRIAL TRAINING REPORT-2013
Jai Narain College of Technology & Science, Bhopal

1. Name of Student                           :Nikita Kaushal


2. University ID Number                      :0178EC091055



3. Name of Training Place (Industry
   Institution, Govt. Department, etc)       :HCL CDC



4. Address of Training Place with
          Telephone No. and Email             :143 ZONE 1 MP
                                             NAGAR , BHOPAL
                                                  0755 4094852


5. Name and Designation of Training
   Incharge (Under whom training
   was completed)                         :AMIT SHRIVASTAV




6.   Training Period                     : June 01 – June 30, 2012


7. Training Subject                          : CCNA
DECLARATION


      The Industrial Training on Cisco Certified network associate (CCNA)
at the HCL CDC, Bhopal during June 01, 2012 to June 30, 2012 was
completed by the undersigned. During this period, I was taught about the
CCNA by an expert faculty and allowed to practice on computer with other
software related to design. Finally I was given a job for preparing a complete
networking . Thus, I completed the training successfully.




                                                           …………….
………...............                                         Nikita Kaushal
Prof. Amit Sawaskade                                       (0178EC091055 )
Training Incharge
ACKNOWLEDGEMENT


      I feel profound to attend my major training in CCNA in HCL CDC under the guidance of
Mr. Amit Shrivastav who taught us networking and relevant things. He has also given us a brief
knowledge in the training and also discuss various information to enhance our knowledge.

I would like to thanks my training incharge Prof. Amit Sawaskade for guiding me at the time of
training and boosting up required knowledge for training time to time.

       I would greatly indebted to Prof. Ashok Agrawal, Head, Department of Electronics and
Communication Engineering for his keen interest in this work and time to time guidance,
encouragement and providing required facilities for training . We are grateful to Dr. Meghna
Dubey, Principal, JNCTS for his guidance and critical comments which improved the quality of
this report. Thanks are due to Dr. B D Shukla, Director, JNCTS for providing necessary help
and time to time necessary guidance in completion of this task.

        Then other faculty members, friends, etc, may be added accordingly in the
acknowledgement to which the students want to acknowledge for their help and guidance in the
training.




                                                                              Nikita Kaushal
1. INTRODUCTION
As the training arm of HCL Infosystems, HCL Career Development Centre (CDC) carries forth a
legacy of excellence spanning across more than three decades. HCL CDC is an initiative that
enables individuals and organizations to benefit from HCL's deep expertise in the IT space.

Among the fastest growing IT education brands in India, HCL CDC offers a complete spectrum
of quality training programs on software, hardware, networking as well as global certifications in
association with leading IT organizations worldwide.

Empowered with strategic alliances with leading IT organizations in India and abroad, HCL
CDC training solutions cater to diverse consumer profiles including individuals, enterprises,
academic institutions and Government enterprises.

As the fountainhead of the most significant pursuit of human mind (IT), HCL strongly believes,
"Only a Leader can transform you into a Leader". HCL CDC is a formalization of this experience
and credo which has been perfected over three decades.

VISION
"Together we create the enterprises of tomorrow".

MISSION
"To provide world-class information technology solutions and services in order to enable our
customers to serve their customers better".

OBJECTIVE
"To fuel initiative and foster activity by allowing individuals freedom of action and innovation in
attaining defined objectives."

PEOPLE OBJECTIVE
"To help people in HCL Infosystems Ltd. share in the company's successes, which they make
possible; to provide job security based on their performance; to recognize their individual
achievements; and help them gain a sense of satisfaction and accomplishment from their work."

CORE VAUE
       We shall uphold the dignity of the individual.
       We shall honor all commitments.
       We shall be committed to Quality, Innovation and Growth in every endeavour.
       We shall be responsible corporate citizens



                                                  1
A network is a system that transmits any combination of voice, video and/or databetween
users. The main field on which we were working was networking and the course was CCNA
which includes all the parts of networking.


In a typical LAN, there are various types of network devices available as outlined below.

       Hub Repeat signals received on each port by broadcasting to all the other connected
       ports.
       Repeaters Used to connect two or more Ethernet segments of any media type, and to
       provide signal amplification for a segment to be extended. In a network that uses
       repeater, all members are contending for transmission of data onto a single network. We
       like to call this single network a collision domain. Effectively, every user can only enjoy
       a percentage of the available bandwidth. Ethernet is subject to the "5-4-3" rule regarding
       repeater placement, meaning we can only have five segments connected using four
       repeaters with only three segments capable of accommodating hosts.
       Bridge A layer 2 device used to connect different networks types or networks of the
       same type. It maps the Ethernet addresses of the nodes residing on each segment and
       allows only the necessary traffic to pass through the bridge. Packet destined to the same
       segment is dropped. This "store-and-forward" mechanism inspects the whole Ethernet
       packet before making a decision. Unfortunately, it cannot filter out broadcast traffic.
       Also, it introduces a 20 to 30 percent latency when processing the frame. Only 2
       networks can be linked with a bridge.
       Switch Can link up four, six, eight or even more networks. Cut-through switches run
       faster because when a packet comes in, it forwards it right after looking at the destination
       address only. A store-and-forward switch inspects the entire packet before forwarding.
       Most switches cannot stop broadcast traffic. Switches are layer 2 devices.
       Routers Can filter out network traffic also. However, they filter based on the protocol
       addresses defined in OSI layer 3(the network layer), not based on the Ethernet packet
       addresses. Note that protocols must be routable in order to pass through the routers. A
       router can determine the most efficient path for a packet to take and send packets around
       failed segments.
       Brouter Has the best features of both routers and bridges in that it can be configured to
       pass the unroutable protocols by imitating a bridge, while not passing broadcast storms
       by acting as a router for other protocols.
       Gateway Often used as a connection to a mainframe or the internet. Gateways enable
       communications between different protocols, data types and environments. This is
       achieved via protocol conversion, whereby the gateway strips the protocol stack off of the
       packet and adds the appropriate stack for the other side. Gateways operate at all layers of
       the OSI model without making any forwarding decisions.




                                                    2
Work assigned was:

           To design a coaxial cable and twisted cable.

           To design a LAN.

           To design a WAN.

           To design a MAN.

           To program router.

           To design network.

           To break password of router and switches.

A computer network is a connection of two or more computers through a cable or wireless
connection. Computer network enable computer users to share hardware, resources and
information. Aside sharing information, the computer network enables users to share internet
access. The importance of networking two or more computers can not be overemphasized.
Networking in computer is unavoidable. We need networks in most things we do in life.

I wonder what the world of computer will be without computer networks. In computing,
networking is a way of connecting two or more computers together. When you network
computers together, the computers can share information and resources with one another.
Networking is a very vital and delicate area in computing.

We can not really quantify the importance of networking two or more PC. Computer network is
very important for every business, no matter how small a business may be. Computer network
helps in sharing resources. With computer network, so many computers can share one printer,
scanner and some other hardware, which might be expensive for a company to acquire for every
computer user.

It is quite obvious that computer network helps to save cost for an organization. Instead of
buying all hardware for each computer, one can just share one via the computer network In
addition to this, let us just think of additional space that will be occupied by providing printers or
scanners for each of the computers in an organization. Networking two or more computer not
only saves money but also saves space. This in addition makes the user's environment friendly.

Do we ignore the communication aspect? No! Networking enhances effective communication
among members of an organization or a company. With appropriate software, each computer
user can communicate with other members or staff of an organization or company. In addition to
this, Computer network gives users the opportunity to use remote programs and remote databases
either of the same organization or from other enterprises or public sources. The importance of
having a computer networks are really numerous.

                                                      3.
Thus, it is a necessity for every organization or company. It makes effective communication
possible and helps to eliminate unnecessary waste of time and duplication or resources.

    The desire result was obtain in every experiments and work as a result we made a successful
network capable of strong communications. A network engineer handles all of the “plumbing”
for a company’s computers, connecting offices with T1 lines, hooking them up to the Internet,
and configuring all internal systems such as net routers and firewalls. This was very interesting
field and we covered a subject know as Data Communication and Network which we have
studied in 6th sem.




                                                 4.
2. TRAINING


Networking are Connection-oriented" and "Connectionless" communications.

. A connection oriented communication has the following characteristics:

       A session is guaranteed.
       Acknowledgements are issued and received at the transport layer, meaning if the sender
       does not receive an acknowledgement before the timer expires, the packet is
       retransmitted.
       Phrases in a connection-oriented service involves Call Setup, Data transfer and Call
       termination.
       All traffic must travel along the same static path.
       A failure along the static communication path can fail the connection.
       A guaranteed rate of throughput occupies resources without the flexibility of dynamic
       allocation.
       Reliable = SLOW (this is always the case in networking).

In contrast, a connectionless communication has the following characteristics:

       Often used for voice and video applications.
       NO guarantee nor acknowledgement.
       Dynamic path selection.
       Dynamic bandwidth allocation.
       Unreliable = FAST.
       The layer which is important for networking are


2.1 OSI Model:
The OSI model is a layered model and a conceptual standard used for defining standards to
promote multi-vendor integration as well as maintain constant interfaces and isolate changes of
implementation to a single layer. It is NOT application or protocol specific. In order to pass any
Cisco exam, you need to know the OSI model inside and out.

The OSI Model consists of 7 layers as follows:




                                                 5.
Layer                           Description                       Device       Protocol

               Provides network access for applications, flow
               control and error recovery. Provides                            NCP, SMB,
               communications services to applications by                      SMTP, FTP,
Application    identifying and establishing the availability of   Gateway      SNMP,
               other computers as well as to determine if                      Telnet,
               sufficient resources exist for communication                    Appletalk
               purposes.




               Performs protocol conversion, encryption and data Gateway and NCP, AFP,
Presentation
               compression                                       redirectors TDI

               Allows 2 applications to communicate over a
               network by opening a session and synchronizing
Session        the involved computers. Handles connection         Gateway      NetBios
               establishment, data transfer and connection
               release

               Repackages messages into smaller formats,                       NetBEUI,
Transport      provides error free delivery and error handling    Gateway      TCP, SPX,
               functions                                                       and NWLink

               Handles addressing, translates logical addresses                IP, IPX,
                                                                  Router and
Network        and names to physical addresses, routing and                    NWLink,
                                                                  brouter
               traffic management.                                             NetBEUI

               Packages raw bits into frames making it
               transmitable across a network link and includes a
               cyclical redundancy check(CRC). It consists of
               the LLC sublayer and the MAC sublayer. The        Switch,
**Data
               MAC sublayer is important to remember, as it is   bridge and    None
Link
               responsible for appending the MAC address of the brouter
               next hop to the frame header. On the contrary,
LLC sublayer uses Destination Service Access

              Points and Source Service Access Points to create
              links for the MAC sublayers.




              Physical layer works with the physical media for
              transmitting and receiving data bits via certain
                                                                   Multiplexer
Physical      encoding schemes. It also includes specifications                   None
                                                                   and repeater
              for certain mechanical connection features, such
              as the adaptor connector.



                                     Table 2.1- OSI Model




Here is an easy way to memorize the order of the layers:
All People Seem To Need Data Processing. The first letter of each word corresponds to the first
letter of one of the layers. It is a little corny, but it works.

The table above mentions the term "MAC Address". A MAC address is a 48 bit address for
uniquely identifying devices on the network. Something likes 00-00-12-33-FA-BC, we call this
way of presenting the address a 12 hexadecimal digits format. The first 6 digits specify the
manufacture, while the remainders are for the host itself. The ARP Protocol is used to determine
the IP to MAC mapping. And of course, MAC addresses cannot be duplicated in the network or
problems will occur. For more information about ARP and related protocols, read Guide To
ARP, IARP, RARP, and Proxy ARP.

Data encapsulation takes place in the OSI model. It is the process in which the information in a
protocol is wrapped in the data section of another protocol. The process can be broken down into
the following steps:

User information -> data -> segments -> packets/datagrams -> frames -> bits.



                                               7.
When discussing the OSI model it is important to keep in mind the differences between
"Connection-oriented" and "Connectionless" communications. A connection oriented
communication has the following characteristics:

       A session is guaranteed.
       Acknowledgements are issued and received at the transport layer, meaning if the sender
       does not receive an acknowledgement before the timer expires, the packet is
       retransmitted.
       Phrases in a connection-oriented service involve Call Setup, Data transfer and Call
       termination.
       All traffic must travel along the same static path.
       A failure along the static communication path can fail the connection.
       A guaranteed rate of throughput occupies resources without the flexibility of dynamic
       allocation.
       Reliable = SLOW (this is always the case in networking).

In contrast, a connectionless communication has the following characteristics:

       Often used for voice and video applications.
       Neither guarantee nor acknowledgement.
       Dynamic path selection.
       Dynamic bandwidth allocation.
       Unreliable = FAST.

A computer network, or simply a network, is a collection of computers and other hardware
components interconnected by communication channels that allow sharing of resources and
information. Where at least one process in one device is able to send/receive data to/from at least
one process residing in a remote device, then the two devices are said to be in a network. Simply,
more than one computer interconnected through a communication medium for information
interchange is called a computer network.

Networks may be classified according to a wide variety of characteristics, such as the medium
used to transport the data, communications protocol used, scale, topology, and organizational
scope.

Communications protocols define the rules and data formats for exchanging information in a
computer network, and provide the basis for network programming. Well-known
communications protocols include Ethernet, a hardware and link layer standard that is ubiquitous
in local area networks, and the Internet protocol suite, which defines a set of protocols for
internetworking, i.e. for data communication between multiple networks, as well as host-to-host
data transfer, and application-specific data transmission formats.

                                                8.
2.2 Computer networking

 Computer networking is sometimes considered a sub-discipline of electrical engineering,
telecommunications, computer science, information technology or computer engineering, since it
relies upon the theoretical and practical application of these disciplines

2.1.1 Local area network

A local area network (LAN) is a network that connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building, or closely
positioned group of buildings. Each computer or device on the network is a node. Current wired
LANs are most likely to be based on Ethernet technology, although new standards like ITU-T
G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone
lines and power lines)




                                          Fig 2.1- LAN

Typical library network, in a branching tree topology and controlled access to resources. A
sample LAN is depicted in the accompanying diagram. All interconnected devices must
understand the network layer (layer 3), because they are handling multiple subnets (the different
colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user
device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches"
because they only have Ethernet interfaces and must understand IP. It would be more correct to
call them access routers, where the router at the top is a distribution router that connects to the
Internet and academic networks' customer access routers.

                                                9.
The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their
higher data transfer rates, smaller geographic range and no need for leased telecommunication
lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at data transfer rates up to
10 Gbit/s. IEEE has projects investigating the standardization of 40 and 100 Gbit/s. LANs can be
connected to Wide area network by using routers.

2.2.2 Home area network

A home area network (HAN) is a residential LAN which is used for communication between
digital devices typically deployed in the home, usually a small number of personal computers
and accessories, such as printers and mobile computing devices. An important function is the
sharing of Internet access, often a broadband service through a cable TV or Digital Subscriber
Line (DSL) provider.

2.2.3 Storage area network

A storage area network (SAN) is a dedicated network that provides access to consolidated, block
level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape
libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally
attached devices to the operating system. A SAN typically has its own network of storage
devices that are generally not accessible through the local area network by other devices. The
cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption
across both enterprise and small to medium sized business environments.

2.2.4 Campus area network

A campus area network (CAN) is a computer network made up of an interconnection of LANs
within a limited geographical area. The networking equipment (switches, routers) and
transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by
the campus tenant / owner: an enterprise, university, government etc.).

In the case of a university campus-based campus network, the network is likely to link a variety
of campus buildings including, for example, academic colleges or departments, the university
library, and student residence halls.

2.2.5 Backbone network

A backbone network is part of a computer network infrastructure that interconnects various
pieces of network, providing a path for the exchange of information between different LANs or
subnetworks. A backbone can tie together diverse networks in the same building, in different
buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is
greater than that of the networks connected to it.



                                               10.
A large corporation which has many locations may have a backbone network that ties all of these
locations together, for example, if a server cluster needs to be accessed by different departments
of a company which are located at different geographical locations. The equipment which ties
these departments together constitute the network backbone. Network performance management
including network congestion are critical parameters taken into account when designing a
network backbone.

 A specific case of a backbone network is the Internet backbone, which is the set of wide-area
 network connections and core routers that interconnect all networks connected to the Internet.

2.2.6 Metropolitan area network

A Metropolitan area network (MAN) is a large computer network that usually spans a city or a
large campus.


                                                




                    Fig 2.2-Sample EPN made of Frame relay WAN connections and
                                       dialup remote access.




                                               11.
Fig2.3-Sample VPN used to interconnect 3 offices and remote users

2.2.7 Wide area network

A wide area network (WAN) is a computer network that covers a large geographic area such as a
city, country, or spans even intercontinental distances, using a communications channel that
combines many types of media such as telephone lines, cables, and air waves. A WAN often
uses transmission facilities provided by common carriers, such as telephone companies. WAN
technologies generally function at the lower three layers of the OSI reference model: the physical
layer, the data link layer, and the network layer.

2.2.8 Enterprise private network

An enterprise private network is a network built by an enterprise to interconnect various
company sites, e.g., production sites, head offices, remote offices, shops, in order to share
computer resources.

2.2.9 Virtual private network

A virtual private network (VPN) is a computer network in which some of the links between
nodes are carried by open connections or virtual circuits in some larger network (e.g., the
Internet) instead of by physical wires. The data link layer protocols of the virtual network are
said to be tunneled through the larger network when this is the case. One common application is
secure communications through the public Internet, but a VPN need not have explicit security
features, such as authentication or content encryption. VPNs, for example, can be used to
separate the traffic of different user communities over an underlying network with strong
security features.VPN may have best-effort performance, or may have a defined service level
agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN
has a topology more complex than point-to-point.

                                                12.
2.2.10 Virtual Network

Not to be confused with a Virtual Private Network, a Virtual Network defines data traffic flows
between virtual machines within a hypervisor in a virtual computing environment. Virtual
Networks may employ virtual security switches, virtual routers, virtual firewalls and other virtual
networking devices to direct and secure data traffic.

2.2.11 Internetwork

An internetwork is the connection of multiple computer networks via a common routing
technology using routers. The Internet is an aggregation of many connected internetworks
spanning the Earth.

2.3 TCP/IP:

The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol
Suite. TCP is one of the two original components of the suite, complementing the Internet
Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides
reliable, ordered delivery of a stream of octets from a program on one computer to another
program on another computer. TCP is the protocol used by major Internet applications such as
the World Wide Web, email, remote administration and file transfer. Other applications, which
do not require reliable data stream service, may use the User Datagram Protocol (UDP), which
provides a datagram service that emphasizes reduced latency over reliability.

The Internet protocol suite is the set of communications protocols used for the Internet and
similar networks, and generally the most popular protocol stack for wide area networks. It is
commonly known as TCP/IP, because of its most important protocols: Transmission Control
Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in
this standard. It is occasionally known as the DoD model due to the foundational influence of the
ARPANET in the 1970s (operated by DARPA, an agency of the United States Department of
Defense).

TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed,
transmitted, routed and received at the destination. It has four abstraction layers, each with its
own protocols. From lowest to highest, the layers are:

       The link layer (commonly Ethernet) contains communication technologies for a local
       network.
       The internet layer (IP) connects local networks, thus establishing internetworking.
       The transport layer (TCP) handles host-to-host communication.
       The application layer (for example HTTP) contains all protocols for specific data
       communications services on a process-to-process level (for example how a web browser
       communicates with a web server).

                                                    13.
The TCP/IP model and related protocols are maintained by the Internet Engineering Task
   Force (IETF).




                                    Fig 2.4- TCP/IP




The term logy used in network for networking are as follows:




                                            14.
2.4 ROUTING
There are 2 main types of routing, which are static and dynamic, the third type of routing is
called Hybrid. Static routing involves the cumbersome process of manually configuring and
maintaining route tables by an administrator. Dynamic routing enables routers to "talk" to each
other and automatically update their routing tables. This process occurs through the use of
broadcasts. Next is an explanation of the various routing protocols.

2.5 RIP:
Routing Information Protocol(RIP) is a distance vector dynamic routing protocol. RIP measures
the distance from source to destination by counting the number of hops(routers or gateways) that
the packets must travel over. RIP sets a maximum of 15 hops and considers any larger number of
hops unreachable. RIP's real advantage is that if there are multiple possible paths to a particular
destination and the appropriate entries exist in the routing table, it will choose the shortest route.
Routers can talk to each other, however, in the real routing world, there are so many different
routing technologies available, that it is not as simple as just enabling Routing Information
Protocol (RIP).



2.5 OSPF:
Open Shortest Path First (OSPF) is a link-state routing protocol that converges faster than a
distance vector protocol such as RIP. What is convergence? This is the time required for all
routers to complete building the routing tables. RIP uses ticks and hop counts as measurement,
while OSPF also uses metrics that takes bandwidth and network congestion into making routing
decisions. RIP transmits updates every 30 seconds, while OSPF transmits updates only when
there is a topology change. OSPF builds a complete topology of the whole network, while RIP
uses second handed information from the neighboring routers. To summarize, RIP is easier to
configure, and is suitable for smaller networks. In contrast, OSPF requires high processing
power, and is suitable if scalability is the main concern.

We can tune the network by adjusting various timers. Areas that are tunable include: the rate at
which routing updates are sent, the interval of time after which a route is declared invalid, the
interval during which routing information regarding better paths is suppressed, the amount of
time that must pass before a route is removed from the routing table, and the amount of time for
which routing updates will be postponed. Of course, different setting is needed in different
situation. In any case, we can use the "show ip route" command to display the contents of routing
table as well as how the route was discovered.

                                                15.
2.6 IGRP and EIGRP:


RIP and OSPF are considered "open", while IGRP and EIGRP are Cisco proprietary. Interior
Gateway Routing Protocol(IGRP) is a distance vector routing protocol for the interior networks,
while Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid that combines distance
vector and link-state technologies. Do not confuse these with NLSP. Link Services Protocol
(NLSP) is a proprietary link-state routing protocol used on Novell NetWare 4.X to replace SAP
and RIP. For IGRP, the metric is a function of bandwidth, reliability, delay and load. One of the
characteristics of IGRP is the deployment of hold down timers. A hold-down timer has a value of
280 seconds. It is used to prevent routing loops while router tables converge by preventing
routers from broadcasting another route to a router which is off-line before all routing tables
converge. For EIGRP, separate routing tables are maintained for IP, IPX and AppleTalk
protocols. However, routing update information is still forwarded with a single protocol.



2.7 Switch
A network switch or switching hub is a computer networking device that connects network
segments or network devices. The term commonly refers to a multi-port network bridge that
processes and routes data at the data link layer (layer 2) of the OSI model. Switches that
additionally process data at the network layer (layer 3) and above are often referred to as layer-3
switches or multilayer switches.

A switch is a telecommunication device which receives a message from any device connected to
it and then transmits the message only to the device for which the message was meant. This
makes the switch a more intelligent device than a hub (which receives a message and then
transmits it to all the other devices on its network). The network switch plays an integral part in
most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number
of linked managed switches. Small office/home office (SOHO) applications typically use a
single switch, or an all-purpose converged device such as a residential gateway to access small
office/home broadband services such as DSL or cable Internet. In most of these cases, the end-
user device contains a router and components that interface to the particular physical broadband
technology




                                                16.
Fig 2.4- Showing the Switch IP Address




                   17.
3. OUTCOME OF TRAINING

WORK ASSIGNMENT -1



Objective
Describe the features and operation of static routing.




                                      Fig 3.1- Router(a)




                                            18.
Fig 3.2-router(b)




     19.
Fig 3.3-Static routering




Fig 3.4- Routing Protocol

         20.
Static routing is a concept describing one way of configuring path selection of routers in
computer networks. It is the type of routing characterized by the absence of communication
between routers regarding the current topology of the network. This is achieved by manually
adding routes to the routing table. The opposite of static routing is dynamic routing, sometimes
also referred to as adaptive routing.

In these systems, routes through a data network are described by fixed paths (statically). These
routes are usually entered into the router by the system administrator. An entire network can be
configured using static routes, but this type of configuration is not fault tolerant. When there is a
change in the network or a failure occurs between two statically defined nodes, traffic will not be
rerouted. This means that anything that wishes to take an affected path will either have to wait
for the failure to be repaired or the static route to be updated by the administrator before
restarting its journey. Most requests will time out (ultimately failing) before these repairs can be
made. There are, however, times when static routes can improve the performance of a network.
Some of these include stub networks and default routes.




                                                 21.
WORK ASSIGNMENT -2



Objective
Start a router and recognize the normal boot sequence.




                             Fig 3.5-Bootup output from router.




                                            22.
Fig 3.6-Initial configuration dialog




Fig 3.7- Setup Initial Global Parameters

                    23.
Fig 3.8- Setup Initial Protocol Configurations




 Fig 3.9- Setup Script Review and Use



                     24.
Fig 3.10- login to router




          25.
WORK ASSIGNMENT -3



   Objective
  Complete the initial device configuration, given a functioning router and Configure IP
addresses and IP subnet masks on router interfaces, given a functioning router.




                                      Fig 3.11- Router Module




                                                 26.
Fig 3.12- Configuring router identification.




Fig 3.12-Configurating a Router Password

                    28.
Console line command




Private control session timeout




Configuring a Serial Interface




                                  29.
Enabling and disabling an interface




Introducing IP Addresses




                       Fig 3.13-IP Addresses



                                        30.
IP Addressing




IP Address classes




                     31.
Fig 3.14- Host addressing




Fig 3.15- Addressing without subnet

                    32.
Fig 3.16- Addressing with subnet




Fig 3.17- Subnet Addressing



              33.
Subnet Mask




              34.
WORK ASSIGNMENT -4



 Objective
Describe the features and operation of EIGRP




                                        Fig 3.18-EIGRP




                                 Fig 3.19- Terminology EIGRP



                                          35.
Configuration EIGPR




                      Fig 3.20-EIGPR Configuration




                                  36.
WORK ASSIGNMENT -5



  Objective
 Describe the features and operation of IGRP.




                                          Fig 3.21- IGRP



Configuration IGRP




                                            37.
Fig 3.22-IGRP Configuration




        38.
WORK ASSIGNMENT -6



Objective
Describe the features and operation of OSPF.




                                   Fig 3.23- OSPF




                                         39.
Fig3.24-Shortest path algorithm




Configuration OSPF




                               40.
Fig 3.25- OSPF Configuration




         41.
WORK ASSIGNMENT -7



Objective
Describe the features and operation of RIP




                                     Fig 3.26- RIP




                                             42.
IP Routing Configuration Task




                                Fig 3.27- Routing Configuration.



Dynamic Routing Configuration




RIP Configuration




                                     43.
`




    Fig 3.28- RIP Configuration




                  44.
The above work done by us under different classes and the following work done in software
were an artificial network was establish.

The work allotted was done successful with desired results and hence , the training was
beneficial.




                                               45.
Report training

Mais conteúdo relacionado

Mais procurados

Internship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksInternship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksKalyan Acharjya
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
 
Computer science industrial training report carried out at web info net ltd ...
Computer science  industrial training report carried out at web info net ltd ...Computer science  industrial training report carried out at web info net ltd ...
Computer science industrial training report carried out at web info net ltd ...rashid muganga
 
Ftth development manual part1 (1)
Ftth development manual part1 (1)Ftth development manual part1 (1)
Ftth development manual part1 (1)Igors Cardoso
 
Ericsson 5G learning portfolio 2018
Ericsson 5G learning portfolio 2018Ericsson 5G learning portfolio 2018
Ericsson 5G learning portfolio 2018Ericsson
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship reportkaahwa Armstrong
 
Mise en place d’une plateforme de formation IMS
Mise en place d’une plateforme de formation IMSMise en place d’une plateforme de formation IMS
Mise en place d’une plateforme de formation IMSKokou Gaglo
 
5G Concept
5G Concept5G Concept
5G ConceptEricsson
 
Rapport optique-rahma ghali&karimatorkhani-mp1srt
Rapport optique-rahma ghali&karimatorkhani-mp1srtRapport optique-rahma ghali&karimatorkhani-mp1srt
Rapport optique-rahma ghali&karimatorkhani-mp1srtGhali Rahma
 
internship Project report
internship Project reportinternship Project report
internship Project reportabdikissi
 
Training Report at Mobitel
Training Report at MobitelTraining Report at Mobitel
Training Report at MobitelDinusha Dilanka
 
B.Tech. Summer Training Report
B.Tech. Summer Training ReportB.Tech. Summer Training Report
B.Tech. Summer Training ReportShashank Narayan
 
05. DF - Latest Trends in Optical Data Center Interconnects
05. DF - Latest Trends in Optical Data Center Interconnects05. DF - Latest Trends in Optical Data Center Interconnects
05. DF - Latest Trends in Optical Data Center InterconnectsDimitris Filippou
 
Computer science and information technology
Computer science and information technology Computer science and information technology
Computer science and information technology Vivek Kumar Sinha
 
PTCL Internship report by Iqra Sundip Yasin
PTCL Internship report by Iqra Sundip YasinPTCL Internship report by Iqra Sundip Yasin
PTCL Internship report by Iqra Sundip YasinIqra Yasin
 
CSE390 industrial attachment I report
CSE390 industrial attachment I reportCSE390 industrial attachment I report
CSE390 industrial attachment I reportAmos Kiplagat
 

Mais procurados (20)

Internship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksInternship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication Networks
 
Internship report
Internship report Internship report
Internship report
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
Computer science industrial training report carried out at web info net ltd ...
Computer science  industrial training report carried out at web info net ltd ...Computer science  industrial training report carried out at web info net ltd ...
Computer science industrial training report carried out at web info net ltd ...
 
PTCL INTERNSHIP REPORT
PTCL INTERNSHIP REPORTPTCL INTERNSHIP REPORT
PTCL INTERNSHIP REPORT
 
Ftth development manual part1 (1)
Ftth development manual part1 (1)Ftth development manual part1 (1)
Ftth development manual part1 (1)
 
Ericsson 5G learning portfolio 2018
Ericsson 5G learning portfolio 2018Ericsson 5G learning portfolio 2018
Ericsson 5G learning portfolio 2018
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship report
 
internship report covert
internship report covertinternship report covert
internship report covert
 
Mise en place d’une plateforme de formation IMS
Mise en place d’une plateforme de formation IMSMise en place d’une plateforme de formation IMS
Mise en place d’une plateforme de formation IMS
 
5G Concept
5G Concept5G Concept
5G Concept
 
Rapport optique-rahma ghali&karimatorkhani-mp1srt
Rapport optique-rahma ghali&karimatorkhani-mp1srtRapport optique-rahma ghali&karimatorkhani-mp1srt
Rapport optique-rahma ghali&karimatorkhani-mp1srt
 
internship Project report
internship Project reportinternship Project report
internship Project report
 
Training Report at Mobitel
Training Report at MobitelTraining Report at Mobitel
Training Report at Mobitel
 
Zte Corporation
Zte CorporationZte Corporation
Zte Corporation
 
B.Tech. Summer Training Report
B.Tech. Summer Training ReportB.Tech. Summer Training Report
B.Tech. Summer Training Report
 
05. DF - Latest Trends in Optical Data Center Interconnects
05. DF - Latest Trends in Optical Data Center Interconnects05. DF - Latest Trends in Optical Data Center Interconnects
05. DF - Latest Trends in Optical Data Center Interconnects
 
Computer science and information technology
Computer science and information technology Computer science and information technology
Computer science and information technology
 
PTCL Internship report by Iqra Sundip Yasin
PTCL Internship report by Iqra Sundip YasinPTCL Internship report by Iqra Sundip Yasin
PTCL Internship report by Iqra Sundip Yasin
 
CSE390 industrial attachment I report
CSE390 industrial attachment I reportCSE390 industrial attachment I report
CSE390 industrial attachment I report
 

Destaque

Computer network Report
Computer network ReportComputer network Report
Computer network ReportAmitoj Kaur
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Enterprise network end to end solution
Enterprise network end to end solutionEnterprise network end to end solution
Enterprise network end to end solutionSantanu Mukhopadhyay
 
6 weeks 6 months live project summer industrial training in cmc limited 2012
6 weeks  6 months live project summer industrial training in cmc limited  20126 weeks  6 months live project summer industrial training in cmc limited  2012
6 weeks 6 months live project summer industrial training in cmc limited 2012CMC Limited
 
computer network designing- final year project
computer network designing- final year projectcomputer network designing- final year project
computer network designing- final year projectAboubacar Mchangama
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Saurav Pandey
 
Declaration by the candidate
Declaration by the candidateDeclaration by the candidate
Declaration by the candidateRaj Sekhar
 
Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safetymekashaw tizazu
 
Final Project Presentation for Computer Networking
Final Project Presentation for Computer NetworkingFinal Project Presentation for Computer Networking
Final Project Presentation for Computer NetworkingMaia Bittner
 
Industrial training report on GSM Techology at BSNL
Industrial training report on GSM Techology at BSNLIndustrial training report on GSM Techology at BSNL
Industrial training report on GSM Techology at BSNLAnshul Joshi
 
Computer hardware servicing nc ii module
Computer hardware servicing nc ii moduleComputer hardware servicing nc ii module
Computer hardware servicing nc ii moduleBeth Gorres
 

Destaque (20)

CCNA training report
CCNA training reportCCNA training report
CCNA training report
 
Industrial Training Report-1
Industrial Training Report-1Industrial Training Report-1
Industrial Training Report-1
 
Computer network Report
Computer network ReportComputer network Report
Computer network Report
 
Ccna training report
Ccna training reportCcna training report
Ccna training report
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Enterprise network end to end solution
Enterprise network end to end solutionEnterprise network end to end solution
Enterprise network end to end solution
 
my It report
 my It report my It report
my It report
 
6 weeks 6 months live project summer industrial training in cmc limited 2012
6 weeks  6 months live project summer industrial training in cmc limited  20126 weeks  6 months live project summer industrial training in cmc limited  2012
6 weeks 6 months live project summer industrial training in cmc limited 2012
 
computer network designing- final year project
computer network designing- final year projectcomputer network designing- final year project
computer network designing- final year project
 
Industrial Training report on java
Industrial  Training report on javaIndustrial  Training report on java
Industrial Training report on java
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
Declaration by the candidate
Declaration by the candidateDeclaration by the candidate
Declaration by the candidate
 
Cisco R&S Structure
Cisco R&S StructureCisco R&S Structure
Cisco R&S Structure
 
Training Report
Training ReportTraining Report
Training Report
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safety
 
Final Project Presentation for Computer Networking
Final Project Presentation for Computer NetworkingFinal Project Presentation for Computer Networking
Final Project Presentation for Computer Networking
 
Industrial training report on GSM Techology at BSNL
Industrial training report on GSM Techology at BSNLIndustrial training report on GSM Techology at BSNL
Industrial training report on GSM Techology at BSNL
 
Computer hardware servicing nc ii module
Computer hardware servicing nc ii moduleComputer hardware servicing nc ii module
Computer hardware servicing nc ii module
 

Semelhante a Report training

245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wanAshnaWaseem1
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer NetworkingPulkit Singhal
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-networklklokesh
 
CN project 713711699701-5.pdf
CN project 713711699701-5.pdfCN project 713711699701-5.pdf
CN project 713711699701-5.pdfDakshBaveja
 
Revised Multi Chain Pegasis For Wireless Sensor Networks
Revised Multi Chain Pegasis For Wireless Sensor NetworksRevised Multi Chain Pegasis For Wireless Sensor Networks
Revised Multi Chain Pegasis For Wireless Sensor NetworksTiffany Love
 
Design and Simulation of Local Area Network Using Cisco Packet Tracer
Design and Simulation of Local Area Network Using Cisco Packet TracerDesign and Simulation of Local Area Network Using Cisco Packet Tracer
Design and Simulation of Local Area Network Using Cisco Packet TracerAbhi abhishek
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1paolo374233
 
The Network Requirements Of Many Small Organizations
The Network Requirements Of Many Small OrganizationsThe Network Requirements Of Many Small Organizations
The Network Requirements Of Many Small OrganizationsAngela Overton
 
WIRELESS ROBOT
WIRELESS ROBOTWIRELESS ROBOT
WIRELESS ROBOTAIRTEL
 
FINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKFINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKKulsumKhan13
 
Mis 589 Week 2 You Decide Essays
Mis 589 Week 2 You Decide EssaysMis 589 Week 2 You Decide Essays
Mis 589 Week 2 You Decide EssaysJulie Moore
 
INTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .pptINTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .pptutkarshlodhi4
 
Why Packet Switched Networks Are Used For Data...
Why Packet Switched Networks Are Used For Data...Why Packet Switched Networks Are Used For Data...
Why Packet Switched Networks Are Used For Data...Susan Kennedy
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectMDMusab
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 

Semelhante a Report training (20)

245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
CN project 713711699701-5.pdf
CN project 713711699701-5.pdfCN project 713711699701-5.pdf
CN project 713711699701-5.pdf
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
Nat report1
Nat report1Nat report1
Nat report1
 
Revised Multi Chain Pegasis For Wireless Sensor Networks
Revised Multi Chain Pegasis For Wireless Sensor NetworksRevised Multi Chain Pegasis For Wireless Sensor Networks
Revised Multi Chain Pegasis For Wireless Sensor Networks
 
Design and Simulation of Local Area Network Using Cisco Packet Tracer
Design and Simulation of Local Area Network Using Cisco Packet TracerDesign and Simulation of Local Area Network Using Cisco Packet Tracer
Design and Simulation of Local Area Network Using Cisco Packet Tracer
 
OPC SERVER GATEWAY
OPC SERVER GATEWAYOPC SERVER GATEWAY
OPC SERVER GATEWAY
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
Enterprise network
Enterprise networkEnterprise network
Enterprise network
 
The Network Requirements Of Many Small Organizations
The Network Requirements Of Many Small OrganizationsThe Network Requirements Of Many Small Organizations
The Network Requirements Of Many Small Organizations
 
WIRELESS ROBOT
WIRELESS ROBOTWIRELESS ROBOT
WIRELESS ROBOT
 
FINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKFINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORK
 
Mis 589 Week 2 You Decide Essays
Mis 589 Week 2 You Decide EssaysMis 589 Week 2 You Decide Essays
Mis 589 Week 2 You Decide Essays
 
INTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .pptINTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .ppt
 
Nat report103
Nat report103Nat report103
Nat report103
 
Why Packet Switched Networks Are Used For Data...
Why Packet Switched Networks Are Used For Data...Why Packet Switched Networks Are Used For Data...
Why Packet Switched Networks Are Used For Data...
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 

Mais de Nikita Kaushal

Cell Phone Operated Robot for Search and Research of an Object
Cell Phone Operated Robot for Search and Research of an ObjectCell Phone Operated Robot for Search and Research of an Object
Cell Phone Operated Robot for Search and Research of an ObjectNikita Kaushal
 
Obstacle Detctor Robot report
Obstacle Detctor Robot reportObstacle Detctor Robot report
Obstacle Detctor Robot reportNikita Kaushal
 
Obstacle Detctor Robot
Obstacle Detctor RobotObstacle Detctor Robot
Obstacle Detctor RobotNikita Kaushal
 

Mais de Nikita Kaushal (6)

Cell Phone Operated Robot for Search and Research of an Object
Cell Phone Operated Robot for Search and Research of an ObjectCell Phone Operated Robot for Search and Research of an Object
Cell Phone Operated Robot for Search and Research of an Object
 
Obstacle Detctor Robot report
Obstacle Detctor Robot reportObstacle Detctor Robot report
Obstacle Detctor Robot report
 
DTMF Robot
DTMF RobotDTMF Robot
DTMF Robot
 
Major
MajorMajor
Major
 
Obstacle Detctor Robot
Obstacle Detctor RobotObstacle Detctor Robot
Obstacle Detctor Robot
 
Obstacle detctor
Obstacle detctorObstacle detctor
Obstacle detctor
 

Último

Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Department of Health Compounder Question ‍Solution 2022.pdf
Department of Health Compounder Question ‍Solution 2022.pdfDepartment of Health Compounder Question ‍Solution 2022.pdf
Department of Health Compounder Question ‍Solution 2022.pdfMohonDas
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTDR. SNEHA NAIR
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxvidhisharma994099
 
How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17Celine George
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 

Último (20)

Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Department of Health Compounder Question ‍Solution 2022.pdf
Department of Health Compounder Question ‍Solution 2022.pdfDepartment of Health Compounder Question ‍Solution 2022.pdf
Department of Health Compounder Question ‍Solution 2022.pdf
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptx
 
How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 

Report training

  • 1. Cisco Certified Network Associate By Nikita Kaushal (0178EC091055) Industrial Training Completed at the HCL Career Development Center, Bhopal as a Compulsory Requirement for the degree of Bachelor of Engineering (Electronics and Communication Engineering) June 01, 2012 to June 30, 2012 Department of Electronics and Communication & Engineering Jai Narain College of Technology & Science Bhopal (M.P.)
  • 2. INDUSTRIAL TRAINING REPORT-2013 Jai Narain College of Technology & Science, Bhopal 1. Name of Student :Nikita Kaushal 2. University ID Number :0178EC091055 3. Name of Training Place (Industry Institution, Govt. Department, etc) :HCL CDC 4. Address of Training Place with Telephone No. and Email :143 ZONE 1 MP NAGAR , BHOPAL 0755 4094852 5. Name and Designation of Training Incharge (Under whom training was completed) :AMIT SHRIVASTAV 6. Training Period : June 01 – June 30, 2012 7. Training Subject : CCNA
  • 3. DECLARATION The Industrial Training on Cisco Certified network associate (CCNA) at the HCL CDC, Bhopal during June 01, 2012 to June 30, 2012 was completed by the undersigned. During this period, I was taught about the CCNA by an expert faculty and allowed to practice on computer with other software related to design. Finally I was given a job for preparing a complete networking . Thus, I completed the training successfully. ……………. ………............... Nikita Kaushal Prof. Amit Sawaskade (0178EC091055 ) Training Incharge
  • 4. ACKNOWLEDGEMENT I feel profound to attend my major training in CCNA in HCL CDC under the guidance of Mr. Amit Shrivastav who taught us networking and relevant things. He has also given us a brief knowledge in the training and also discuss various information to enhance our knowledge. I would like to thanks my training incharge Prof. Amit Sawaskade for guiding me at the time of training and boosting up required knowledge for training time to time. I would greatly indebted to Prof. Ashok Agrawal, Head, Department of Electronics and Communication Engineering for his keen interest in this work and time to time guidance, encouragement and providing required facilities for training . We are grateful to Dr. Meghna Dubey, Principal, JNCTS for his guidance and critical comments which improved the quality of this report. Thanks are due to Dr. B D Shukla, Director, JNCTS for providing necessary help and time to time necessary guidance in completion of this task. Then other faculty members, friends, etc, may be added accordingly in the acknowledgement to which the students want to acknowledge for their help and guidance in the training. Nikita Kaushal
  • 5. 1. INTRODUCTION As the training arm of HCL Infosystems, HCL Career Development Centre (CDC) carries forth a legacy of excellence spanning across more than three decades. HCL CDC is an initiative that enables individuals and organizations to benefit from HCL's deep expertise in the IT space. Among the fastest growing IT education brands in India, HCL CDC offers a complete spectrum of quality training programs on software, hardware, networking as well as global certifications in association with leading IT organizations worldwide. Empowered with strategic alliances with leading IT organizations in India and abroad, HCL CDC training solutions cater to diverse consumer profiles including individuals, enterprises, academic institutions and Government enterprises. As the fountainhead of the most significant pursuit of human mind (IT), HCL strongly believes, "Only a Leader can transform you into a Leader". HCL CDC is a formalization of this experience and credo which has been perfected over three decades. VISION "Together we create the enterprises of tomorrow". MISSION "To provide world-class information technology solutions and services in order to enable our customers to serve their customers better". OBJECTIVE "To fuel initiative and foster activity by allowing individuals freedom of action and innovation in attaining defined objectives." PEOPLE OBJECTIVE "To help people in HCL Infosystems Ltd. share in the company's successes, which they make possible; to provide job security based on their performance; to recognize their individual achievements; and help them gain a sense of satisfaction and accomplishment from their work." CORE VAUE We shall uphold the dignity of the individual. We shall honor all commitments. We shall be committed to Quality, Innovation and Growth in every endeavour. We shall be responsible corporate citizens 1
  • 6. A network is a system that transmits any combination of voice, video and/or databetween users. The main field on which we were working was networking and the course was CCNA which includes all the parts of networking. In a typical LAN, there are various types of network devices available as outlined below. Hub Repeat signals received on each port by broadcasting to all the other connected ports. Repeaters Used to connect two or more Ethernet segments of any media type, and to provide signal amplification for a segment to be extended. In a network that uses repeater, all members are contending for transmission of data onto a single network. We like to call this single network a collision domain. Effectively, every user can only enjoy a percentage of the available bandwidth. Ethernet is subject to the "5-4-3" rule regarding repeater placement, meaning we can only have five segments connected using four repeaters with only three segments capable of accommodating hosts. Bridge A layer 2 device used to connect different networks types or networks of the same type. It maps the Ethernet addresses of the nodes residing on each segment and allows only the necessary traffic to pass through the bridge. Packet destined to the same segment is dropped. This "store-and-forward" mechanism inspects the whole Ethernet packet before making a decision. Unfortunately, it cannot filter out broadcast traffic. Also, it introduces a 20 to 30 percent latency when processing the frame. Only 2 networks can be linked with a bridge. Switch Can link up four, six, eight or even more networks. Cut-through switches run faster because when a packet comes in, it forwards it right after looking at the destination address only. A store-and-forward switch inspects the entire packet before forwarding. Most switches cannot stop broadcast traffic. Switches are layer 2 devices. Routers Can filter out network traffic also. However, they filter based on the protocol addresses defined in OSI layer 3(the network layer), not based on the Ethernet packet addresses. Note that protocols must be routable in order to pass through the routers. A router can determine the most efficient path for a packet to take and send packets around failed segments. Brouter Has the best features of both routers and bridges in that it can be configured to pass the unroutable protocols by imitating a bridge, while not passing broadcast storms by acting as a router for other protocols. Gateway Often used as a connection to a mainframe or the internet. Gateways enable communications between different protocols, data types and environments. This is achieved via protocol conversion, whereby the gateway strips the protocol stack off of the packet and adds the appropriate stack for the other side. Gateways operate at all layers of the OSI model without making any forwarding decisions. 2
  • 7. Work assigned was: To design a coaxial cable and twisted cable. To design a LAN. To design a WAN. To design a MAN. To program router. To design network. To break password of router and switches. A computer network is a connection of two or more computers through a cable or wireless connection. Computer network enable computer users to share hardware, resources and information. Aside sharing information, the computer network enables users to share internet access. The importance of networking two or more computers can not be overemphasized. Networking in computer is unavoidable. We need networks in most things we do in life. I wonder what the world of computer will be without computer networks. In computing, networking is a way of connecting two or more computers together. When you network computers together, the computers can share information and resources with one another. Networking is a very vital and delicate area in computing. We can not really quantify the importance of networking two or more PC. Computer network is very important for every business, no matter how small a business may be. Computer network helps in sharing resources. With computer network, so many computers can share one printer, scanner and some other hardware, which might be expensive for a company to acquire for every computer user. It is quite obvious that computer network helps to save cost for an organization. Instead of buying all hardware for each computer, one can just share one via the computer network In addition to this, let us just think of additional space that will be occupied by providing printers or scanners for each of the computers in an organization. Networking two or more computer not only saves money but also saves space. This in addition makes the user's environment friendly. Do we ignore the communication aspect? No! Networking enhances effective communication among members of an organization or a company. With appropriate software, each computer user can communicate with other members or staff of an organization or company. In addition to this, Computer network gives users the opportunity to use remote programs and remote databases either of the same organization or from other enterprises or public sources. The importance of having a computer networks are really numerous. 3.
  • 8. Thus, it is a necessity for every organization or company. It makes effective communication possible and helps to eliminate unnecessary waste of time and duplication or resources. The desire result was obtain in every experiments and work as a result we made a successful network capable of strong communications. A network engineer handles all of the “plumbing” for a company’s computers, connecting offices with T1 lines, hooking them up to the Internet, and configuring all internal systems such as net routers and firewalls. This was very interesting field and we covered a subject know as Data Communication and Network which we have studied in 6th sem. 4.
  • 9. 2. TRAINING Networking are Connection-oriented" and "Connectionless" communications. . A connection oriented communication has the following characteristics: A session is guaranteed. Acknowledgements are issued and received at the transport layer, meaning if the sender does not receive an acknowledgement before the timer expires, the packet is retransmitted. Phrases in a connection-oriented service involves Call Setup, Data transfer and Call termination. All traffic must travel along the same static path. A failure along the static communication path can fail the connection. A guaranteed rate of throughput occupies resources without the flexibility of dynamic allocation. Reliable = SLOW (this is always the case in networking). In contrast, a connectionless communication has the following characteristics: Often used for voice and video applications. NO guarantee nor acknowledgement. Dynamic path selection. Dynamic bandwidth allocation. Unreliable = FAST. The layer which is important for networking are 2.1 OSI Model: The OSI model is a layered model and a conceptual standard used for defining standards to promote multi-vendor integration as well as maintain constant interfaces and isolate changes of implementation to a single layer. It is NOT application or protocol specific. In order to pass any Cisco exam, you need to know the OSI model inside and out. The OSI Model consists of 7 layers as follows: 5.
  • 10. Layer Description Device Protocol Provides network access for applications, flow control and error recovery. Provides NCP, SMB, communications services to applications by SMTP, FTP, Application identifying and establishing the availability of Gateway SNMP, other computers as well as to determine if Telnet, sufficient resources exist for communication Appletalk purposes. Performs protocol conversion, encryption and data Gateway and NCP, AFP, Presentation compression redirectors TDI Allows 2 applications to communicate over a network by opening a session and synchronizing Session the involved computers. Handles connection Gateway NetBios establishment, data transfer and connection release Repackages messages into smaller formats, NetBEUI, Transport provides error free delivery and error handling Gateway TCP, SPX, functions and NWLink Handles addressing, translates logical addresses IP, IPX, Router and Network and names to physical addresses, routing and NWLink, brouter traffic management. NetBEUI Packages raw bits into frames making it transmitable across a network link and includes a cyclical redundancy check(CRC). It consists of the LLC sublayer and the MAC sublayer. The Switch, **Data MAC sublayer is important to remember, as it is bridge and None Link responsible for appending the MAC address of the brouter next hop to the frame header. On the contrary,
  • 11. LLC sublayer uses Destination Service Access Points and Source Service Access Points to create links for the MAC sublayers. Physical layer works with the physical media for transmitting and receiving data bits via certain Multiplexer Physical encoding schemes. It also includes specifications None and repeater for certain mechanical connection features, such as the adaptor connector. Table 2.1- OSI Model Here is an easy way to memorize the order of the layers: All People Seem To Need Data Processing. The first letter of each word corresponds to the first letter of one of the layers. It is a little corny, but it works. The table above mentions the term "MAC Address". A MAC address is a 48 bit address for uniquely identifying devices on the network. Something likes 00-00-12-33-FA-BC, we call this way of presenting the address a 12 hexadecimal digits format. The first 6 digits specify the manufacture, while the remainders are for the host itself. The ARP Protocol is used to determine the IP to MAC mapping. And of course, MAC addresses cannot be duplicated in the network or problems will occur. For more information about ARP and related protocols, read Guide To ARP, IARP, RARP, and Proxy ARP. Data encapsulation takes place in the OSI model. It is the process in which the information in a protocol is wrapped in the data section of another protocol. The process can be broken down into the following steps: User information -> data -> segments -> packets/datagrams -> frames -> bits. 7.
  • 12. When discussing the OSI model it is important to keep in mind the differences between "Connection-oriented" and "Connectionless" communications. A connection oriented communication has the following characteristics: A session is guaranteed. Acknowledgements are issued and received at the transport layer, meaning if the sender does not receive an acknowledgement before the timer expires, the packet is retransmitted. Phrases in a connection-oriented service involve Call Setup, Data transfer and Call termination. All traffic must travel along the same static path. A failure along the static communication path can fail the connection. A guaranteed rate of throughput occupies resources without the flexibility of dynamic allocation. Reliable = SLOW (this is always the case in networking). In contrast, a connectionless communication has the following characteristics: Often used for voice and video applications. Neither guarantee nor acknowledgement. Dynamic path selection. Dynamic bandwidth allocation. Unreliable = FAST. A computer network, or simply a network, is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network. Networks may be classified according to a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology, and organizational scope. Communications protocols define the rules and data formats for exchanging information in a computer network, and provide the basis for network programming. Well-known communications protocols include Ethernet, a hardware and link layer standard that is ubiquitous in local area networks, and the Internet protocol suite, which defines a set of protocols for internetworking, i.e. for data communication between multiple networks, as well as host-to-host data transfer, and application-specific data transmission formats. 8.
  • 13. 2.2 Computer networking Computer networking is sometimes considered a sub-discipline of electrical engineering, telecommunications, computer science, information technology or computer engineering, since it relies upon the theoretical and practical application of these disciplines 2.1.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines) Fig 2.1- LAN Typical library network, in a branching tree topology and controlled access to resources. A sample LAN is depicted in the accompanying diagram. All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers. 9.
  • 14. The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data transfer rates, smaller geographic range and no need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at data transfer rates up to 10 Gbit/s. IEEE has projects investigating the standardization of 40 and 100 Gbit/s. LANs can be connected to Wide area network by using routers. 2.2.2 Home area network A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a cable TV or Digital Subscriber Line (DSL) provider. 2.2.3 Storage area network A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices. The cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption across both enterprise and small to medium sized business environments. 2.2.4 Campus area network A campus area network (CAN) is a computer network made up of an interconnection of LANs within a limited geographical area. The networking equipment (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc.). In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including, for example, academic colleges or departments, the university library, and student residence halls. 2.2.5 Backbone network A backbone network is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than that of the networks connected to it. 10.
  • 15. A large corporation which has many locations may have a backbone network that ties all of these locations together, for example, if a server cluster needs to be accessed by different departments of a company which are located at different geographical locations. The equipment which ties these departments together constitute the network backbone. Network performance management including network congestion are critical parameters taken into account when designing a network backbone. A specific case of a backbone network is the Internet backbone, which is the set of wide-area network connections and core routers that interconnect all networks connected to the Internet. 2.2.6 Metropolitan area network A Metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus. Fig 2.2-Sample EPN made of Frame relay WAN connections and dialup remote access. 11.
  • 16. Fig2.3-Sample VPN used to interconnect 3 offices and remote users 2.2.7 Wide area network A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. 2.2.8 Enterprise private network An enterprise private network is a network built by an enterprise to interconnect various company sites, e.g., production sites, head offices, remote offices, shops, in order to share computer resources. 2.2.9 Virtual private network A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point. 12.
  • 17. 2.2.10 Virtual Network Not to be confused with a Virtual Private Network, a Virtual Network defines data traffic flows between virtual machines within a hypervisor in a virtual computing environment. Virtual Networks may employ virtual security switches, virtual routers, virtual firewalls and other virtual networking devices to direct and secure data traffic. 2.2.11 Internetwork An internetwork is the connection of multiple computer networks via a common routing technology using routers. The Internet is an aggregation of many connected internetworks spanning the Earth. 2.3 TCP/IP: The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of octets from a program on one computer to another program on another computer. TCP is the protocol used by major Internet applications such as the World Wide Web, email, remote administration and file transfer. Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP), which provides a datagram service that emphasizes reduced latency over reliability. The Internet protocol suite is the set of communications protocols used for the Internet and similar networks, and generally the most popular protocol stack for wide area networks. It is commonly known as TCP/IP, because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in this standard. It is occasionally known as the DoD model due to the foundational influence of the ARPANET in the 1970s (operated by DARPA, an agency of the United States Department of Defense). TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. It has four abstraction layers, each with its own protocols. From lowest to highest, the layers are: The link layer (commonly Ethernet) contains communication technologies for a local network. The internet layer (IP) connects local networks, thus establishing internetworking. The transport layer (TCP) handles host-to-host communication. The application layer (for example HTTP) contains all protocols for specific data communications services on a process-to-process level (for example how a web browser communicates with a web server). 13.
  • 18. The TCP/IP model and related protocols are maintained by the Internet Engineering Task Force (IETF). Fig 2.4- TCP/IP The term logy used in network for networking are as follows: 14.
  • 19. 2.4 ROUTING There are 2 main types of routing, which are static and dynamic, the third type of routing is called Hybrid. Static routing involves the cumbersome process of manually configuring and maintaining route tables by an administrator. Dynamic routing enables routers to "talk" to each other and automatically update their routing tables. This process occurs through the use of broadcasts. Next is an explanation of the various routing protocols. 2.5 RIP: Routing Information Protocol(RIP) is a distance vector dynamic routing protocol. RIP measures the distance from source to destination by counting the number of hops(routers or gateways) that the packets must travel over. RIP sets a maximum of 15 hops and considers any larger number of hops unreachable. RIP's real advantage is that if there are multiple possible paths to a particular destination and the appropriate entries exist in the routing table, it will choose the shortest route. Routers can talk to each other, however, in the real routing world, there are so many different routing technologies available, that it is not as simple as just enabling Routing Information Protocol (RIP). 2.5 OSPF: Open Shortest Path First (OSPF) is a link-state routing protocol that converges faster than a distance vector protocol such as RIP. What is convergence? This is the time required for all routers to complete building the routing tables. RIP uses ticks and hop counts as measurement, while OSPF also uses metrics that takes bandwidth and network congestion into making routing decisions. RIP transmits updates every 30 seconds, while OSPF transmits updates only when there is a topology change. OSPF builds a complete topology of the whole network, while RIP uses second handed information from the neighboring routers. To summarize, RIP is easier to configure, and is suitable for smaller networks. In contrast, OSPF requires high processing power, and is suitable if scalability is the main concern. We can tune the network by adjusting various timers. Areas that are tunable include: the rate at which routing updates are sent, the interval of time after which a route is declared invalid, the interval during which routing information regarding better paths is suppressed, the amount of time that must pass before a route is removed from the routing table, and the amount of time for which routing updates will be postponed. Of course, different setting is needed in different situation. In any case, we can use the "show ip route" command to display the contents of routing table as well as how the route was discovered. 15.
  • 20. 2.6 IGRP and EIGRP: RIP and OSPF are considered "open", while IGRP and EIGRP are Cisco proprietary. Interior Gateway Routing Protocol(IGRP) is a distance vector routing protocol for the interior networks, while Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid that combines distance vector and link-state technologies. Do not confuse these with NLSP. Link Services Protocol (NLSP) is a proprietary link-state routing protocol used on Novell NetWare 4.X to replace SAP and RIP. For IGRP, the metric is a function of bandwidth, reliability, delay and load. One of the characteristics of IGRP is the deployment of hold down timers. A hold-down timer has a value of 280 seconds. It is used to prevent routing loops while router tables converge by preventing routers from broadcasting another route to a router which is off-line before all routing tables converge. For EIGRP, separate routing tables are maintained for IP, IPX and AppleTalk protocols. However, routing update information is still forwarded with a single protocol. 2.7 Switch A network switch or switching hub is a computer networking device that connects network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3) and above are often referred to as layer-3 switches or multilayer switches. A switch is a telecommunication device which receives a message from any device connected to it and then transmits the message only to the device for which the message was meant. This makes the switch a more intelligent device than a hub (which receives a message and then transmits it to all the other devices on its network). The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a residential gateway to access small office/home broadband services such as DSL or cable Internet. In most of these cases, the end- user device contains a router and components that interface to the particular physical broadband technology 16.
  • 21. Fig 2.4- Showing the Switch IP Address 17.
  • 22. 3. OUTCOME OF TRAINING WORK ASSIGNMENT -1 Objective Describe the features and operation of static routing. Fig 3.1- Router(a) 18.
  • 24. Fig 3.3-Static routering Fig 3.4- Routing Protocol 20.
  • 25. Static routing is a concept describing one way of configuring path selection of routers in computer networks. It is the type of routing characterized by the absence of communication between routers regarding the current topology of the network. This is achieved by manually adding routes to the routing table. The opposite of static routing is dynamic routing, sometimes also referred to as adaptive routing. In these systems, routes through a data network are described by fixed paths (statically). These routes are usually entered into the router by the system administrator. An entire network can be configured using static routes, but this type of configuration is not fault tolerant. When there is a change in the network or a failure occurs between two statically defined nodes, traffic will not be rerouted. This means that anything that wishes to take an affected path will either have to wait for the failure to be repaired or the static route to be updated by the administrator before restarting its journey. Most requests will time out (ultimately failing) before these repairs can be made. There are, however, times when static routes can improve the performance of a network. Some of these include stub networks and default routes. 21.
  • 26. WORK ASSIGNMENT -2 Objective Start a router and recognize the normal boot sequence. Fig 3.5-Bootup output from router. 22.
  • 27. Fig 3.6-Initial configuration dialog Fig 3.7- Setup Initial Global Parameters 23.
  • 28. Fig 3.8- Setup Initial Protocol Configurations Fig 3.9- Setup Script Review and Use 24.
  • 29. Fig 3.10- login to router 25.
  • 30. WORK ASSIGNMENT -3 Objective Complete the initial device configuration, given a functioning router and Configure IP addresses and IP subnet masks on router interfaces, given a functioning router. Fig 3.11- Router Module 26.
  • 31. Fig 3.12- Configuring router identification. Fig 3.12-Configurating a Router Password 28.
  • 32. Console line command Private control session timeout Configuring a Serial Interface 29.
  • 33. Enabling and disabling an interface Introducing IP Addresses Fig 3.13-IP Addresses 30.
  • 35. Fig 3.14- Host addressing Fig 3.15- Addressing without subnet 32.
  • 36. Fig 3.16- Addressing with subnet Fig 3.17- Subnet Addressing 33.
  • 37. Subnet Mask 34.
  • 38. WORK ASSIGNMENT -4 Objective Describe the features and operation of EIGRP Fig 3.18-EIGRP Fig 3.19- Terminology EIGRP 35.
  • 39. Configuration EIGPR Fig 3.20-EIGPR Configuration 36.
  • 40. WORK ASSIGNMENT -5 Objective Describe the features and operation of IGRP. Fig 3.21- IGRP Configuration IGRP 37.
  • 42. WORK ASSIGNMENT -6 Objective Describe the features and operation of OSPF. Fig 3.23- OSPF 39.
  • 44. Fig 3.25- OSPF Configuration 41.
  • 45. WORK ASSIGNMENT -7 Objective Describe the features and operation of RIP Fig 3.26- RIP 42.
  • 46. IP Routing Configuration Task Fig 3.27- Routing Configuration. Dynamic Routing Configuration RIP Configuration 43.
  • 47. ` Fig 3.28- RIP Configuration 44.
  • 48. The above work done by us under different classes and the following work done in software were an artificial network was establish. The work allotted was done successful with desired results and hence , the training was beneficial. 45.