Vous êtes sur la page 1sur 39

SIX WEEKS SUMMER TRAINING REPORT

On
Networking Design and Implementation of LPU with Externernal world

Submitted By RAVI YADAV


Regd. No:- 11210356

Under the Guidance of:

SECTION:- E1208

Mr. Balvinder Thakur

DECLARATION
I hereby declare that I have completed my six weeks summer training at Lovely Professional
University, Phagwara from June 12, 2015 to July 17, 2015 under the guidance of Mr.
Balvinder Thakur. I have declare that I have worked with full dedication during these six weeks

of training and my learning outcomes fulfill the requirements of training for the award of degree
of B.tech (ECE), Lovely Professional University, Phagwara, Punjab.

Ravi Yadav
Regd. No :-11210356
Date:- 3 Aug, 2015

ACKNOWLEDGMENT
I hereby convey my thanks to all those who have rendered their valuable help, support and
guidance. I would like to thank project guide Mr. Balvinder Thakur for providing me their
guidance and exceptional technical expertise on the project. Without them this project would not
have been accomplished. I would like to thank all the above for going out of their way to help
out with this project and showing great patience when dealing with the subject pertaining to this
project

I also acknowledge my profound sense of gratitude to all the teachers who have been
instrumental for providing me the technical knowledge and moral support to complete the project
with full understanding.
I thank my friends and family for their moral support to carve out this project and university
which give me the chance for doing this summer training .

ORGANIZATION OVERVIEW

Aegis institute was established in 2006. The institute imparts education so that the candidate is
able to gain initial employment; hence the interest is in ensuring that the candidate gets key skills
and a career start when they leave the institute.
We found out that there was a gap between the graduate students and the market requirement due
to the lack of practical training
Vision
To continuously nurture talents by delivering cutting-edge education and to become dominant
player in the field of Hardware, Networking, Security and Cloud Computing etc.
Mission
To contribute to the economic and social development by enhancing the skills of Individuals
and groups and to prepare globally sound professional to generate employability.
Values
Smart Trust, Knowledge Bank, Learning & Teaching, Open and Transparent, Self Motivation,
Integrity sincerity and Continued Innovation.

INDEX

1. Introduction
2. Module Description
3. Networking
4. Types of Networking
5. Ip Addressing
6. Routing
7. Routing Protocols
8. Redistribution
9. VPN(Virtual Private Network)
10. NAT(Network address translation)
11.Void
12. Hardware and Software Requirement
13. DNS

1.

INTRODUCTION

In this project the Network of Lovely Professional University , Phagwara is connected to


external world like facebook and google .The Google branch includes Domain Name Server,
Internet information Services, Cisco Switches, Cisco Routers. It also includes Cisco Link sys
wireless Router.
The project is based on the concepts of networking ,We have to fetch the data of google and
facebook from Lovely Professional University Campus. It includes configuring different network

devices like Router, Switch connecting it with PCs by using different types of connecting wires
by allocating the IP Addresses to all the interfaces after the subnetting of network id.
The beauty of configuring network devices is that it helps users access the network with few
constraints like allowing some to access the website but not allowing them to access the mail
server on the internet on private IP address which are otherwise excluded by internet service
provider (ISP).
Server is used to provide web access to info. & support for data storage device. Main server &
systems as well as exchange server relies on IP, DNS, DHCP, IIS and other technologies for
communicating between themselves
Main Router is responsible for communication between different networks that is, main branch
and other networks. The main router here describes the best path to reach the system in a
network from a system in another network. Other routers are used at the entrance of the each
network. These routers receive & send routing updates to and from main router which ensure the
reliability of whole network.

2.

MODULE DESCRIPTION

SERVER: A server is a computer program that provides services to other computer program
(and their users), in the same or other computer. The physical computer that runs a server
program is also often referred to as server. Services can be supplied centrally by the use of a
server; in other cases all the machines on a network have the same status with no dedicated
server, and services are supplied peer -to- peer.
Server used as an adjective, as in server operating system, refers to the products ability to
handle multiple requests, and is said to be server- grade. A server operating system is intended
or better enabled to run server applications. The differences between the server and workstation

versions of a product can vary from the removal of an arbitrary software limits due to licensing,
as in the case of window 2000, or the addition of bundled applications as in Mac OS X Server.
A server can also refer to a computer that has been set aside to run a specific server application.
Server application can be divided among server computers over an extreme range, depending
upon the workload.

SERVER ROLES:
Server 2008 is a multipurpose operating system capable of handling a diverse set of server roles,
depending on your needs, in either a centralized or distributed fashion. Some of these server
roles include:
1.

Web server and web application services.

2.

Domain name system (DNS).

4. NETWORKING
When we are connecting two or more devices, it is called networking.
For example: two computers to share a CD-ROM.
TYPES OF NETWORKING:
3.

LAN

4.

MAN

5.

WAN

6.

LAN

LAN is designed to operate over a small physical area such as an office, factory or group of
buildings. When we connect two or more computers with help of switch it is LAN.

7.

MAN

It is a bigger version of LAN which is designed to extend over the entire city. It can be a single
network such as a cable TV network or a means of connecting a number of LANS into a larger
network.

8.

WAN

A WAN is a network which is installed when the computers to be connected are at widely
separated locations. Communication is established using leased telephone lines or satellite links.

5. TYPES OF NETWORK
WORK GROUP MODEL
9. All computers are peers; no computer has control over another computer.
10.

Each computer has a set of user accounts. To use any computer in the workgroup,

you must have an account on that computer.


11.

There are typically no more than ten to twenty computers.

12.

All computers must be on the same local network or subnet.

DOMAIN MODEL
13.

One or more computers are servers. Network administrators use servers to control

the security and permissions for all computers on the domain.


14.

This makes it easy to make changes because the changes are automatically made

to all computers.
15.

If you have a user account on the domain, you can log on to any computer on the

domain without needing an account on that computer.


16.

There can be hundreds or thousands of computers.

6. IP ADDRESSING
IP ADDRESS
IP address is a 32-bit address. It is divided into four octets. Each octet has 8 bits. It has two parts
one is network address and second is host address. In local area network, we can use private IP
address, which is provided by IANA (Internet Assigning Numbering Authority). When IP was
first standardized, the specification required that each system attached to an IP-based internet be
assigned a unique, 32-bitninternet address value. Systems that have interface to more than one
network require a unique IP address for each network interface. The first part of an internet
address identifies the network on which the host resides, while the second part identifies the
particular host on the given network. IP addresses are divided into five classes.
Class Range
N/w bits
Host bits
Subnet mask
A
1 126
8
24
255.0.0.0
B
128 191
16
16
255.255.0.0
C
192 223
24
8
255.255.255.0
D
224 239
it is reserved for multicast.
E
240 255
it is reserved for research/scientific use.
IP Address Ranges
We can use first three classes. IANA provides private IP addresses from first three classes.

PRIVATE CLASS IP RANGE


Private IP addresses are another solution to the problem of the impending exhaustion of public IP
addresses. However, private networks that are not connected to the Internet may use any host
addresses, as long as each host within the private network is unique.

IP ADDRESS RANGES
Early network design, when global end to end connectivity was envisioned for all internet hosts,
intended that IP addresses be uniquely assigned to a particular computer or device.
However, it was found that it was not always necessary as private networks developed and
addresses space needed to be conserved (IPv4 address exhaustion).
Computer not connected to the internet, such as factory machines that communicate only with
each other via TCP/IP, need not have globally unique IP addresses.

Three ranges of IPv4 addresses for private networks, one range for each class (A,B,C) were
reserved. These addresses are not routed on the Internet, and thus their use need not be
coordinated with an IP address registry.
Today, such private networks typically connect to the internet through Network
Address Translation (NAT).
IP ADDRESS CLASS

IP ADDRESS RANGE

CLASS A

1-126

CLASS B

128-191

CLASS C

192-223

CLASS D

224-239

CLASS E

240-255

IP Address Range in Decimal


Each containing 1 byte (8 bits). You can depict an IP address using one of three methods: An IP
v4 address consists of 32 bits of information. These bits are divided into four sections, referred to
as octets or bytes

6. ROUTING
Routing is the process of selecting best paths in a network. In the past, the term routing was also
used to mean forwarding network traffic among networks. However this latter function is much
better described as simply forwarding. Routing is performed for many kinds of networks,
including

the telephone

network (circuit

switching), electronic

data

networks (such

as

the Internet), and transportation networks. This article is concerned primarily with routing in
electronic data networks using packet switching technology
17.

Routing is taking place from Host_A to Host_B through the Lab_A Router.

18.

To be able to route, the router must know how to get into the network 172.16.20.0.

TYPES OF ROUTING
19.

STATIC ROUTING

20.

DYNAMIC ROUTING

21.

DEFAULT ROUTING

STATIC ROUTING
Static routing is a form of routing that occurs when a router uses a manually-configured routing
entry, rather than information from a dynamic routing protocol to forward traffic. In many cases,
static routes are usually manually configured by a network administrator by adding in entries into
a routing table, though this may not always be the case. Unlike dynamic routing, static routes are
fixed and do not change if the network is changed or reconfigured. Static routing and dynamic
routing are not mutually exclusive. Both dynamic routing and static routing are usually used on a
router to maximize routing efficiency and to provide backups in the event that dynamic routing
information fails to be exchanged. Static routing can also be used in stub networks, or to provide
a gateway of last resort.

DYNAMIC ROUTING:-

Dynamic Routing describes the capability of a system, through which routes are characterized by
their destination, to alter the path that the route takes through the system in response to a change
in conditions. Routing is performed for many kinds of networks, including the telephone
network (circuit switching), electronic data networks (such as the Internet), and transportation
networks. The adaptation is intended to allow as many routes as possible to remain valid (that is,
have destinations that can be reached) in response to the change.

DEFAULT ROUTING
Default routing can be considered a special type of static routing. The difference between a
normal static route and a default route is that a default route is used to send packets destined to
any unknown destination to a single next hop address..
When it receives a packet destined to 192.168.5.0/24 it will drop it since it does not know where
the destination network is. If a default route is added in Router1 with next hop address of
Router2, all packets destined to any unknown destination, such as 192.168.5.0/24 will be sent to
Router2.
Default routes are useful when dealing with a network with a single exit point. It is also useful
when a bulk of destination networks have to be routed to a single next-hop device. When adding
a default route, you should ensure that the next-hop device can route the packet further, or else
the next hop device will drop the packet.

7. ROUTING PROTOCOLS
RIP
The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols,
which employs the hop count as a routing metric. RIP prevents routing loops by implementing a
limit on the number of hops allowed in a path from the source to a destination. The maximum
number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks
that RIP can support. A hop count of 16 is considered an infinite distance, in other words the
route is considered unreachable.
It is basically of two types:
22.

RIPv1- It is a classful routing protocol that does not support subnetting. It uses
255.255.255.0 subnet mask for creating routing table.

23.

RIPv2- It is a classless routing protocol that supports subnetting.

Commands to configure rip


Router#confter
Router(config)#router rip

Router(config-router)#network <net address><sub mask>


Router(config-router)#network <net address><sub mask>
Router(config-router)#exit

OSPF
Open Shortest Path First (OSPF) is a link-state routing protocol for Internet Protocol (IP)
networks. It uses a link state routing algorithm and falls into the group of interior routing
protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2
in RFC 2328 (1998) for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC
5340(2008).
OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise
networks. IS-IS, another link-state dynamic routing protocol, is more common in large service
provider networks.
Area 0 is a backbone area number. It is used in OSPF to connect two networks.
An OSPF area is a grouping of contiguous networks and routers. All routers in the same area
share a common Area ID. Because a router can be a member of more than one area at a time, the
Area ID is associated with specific interfaces on the router. This would allow some interfaces to
belong to area 1 while the remaining interfaces can belong to area 0.
Commands to configure OSPF
Router#config
Router(config)#router ospf<process no>
Router(config-router)#network <net address><wild mask> area <area id>
Router(config-router)#network <net address><wild mask> area <area id>
Router(config-router)#exit

EIGRP
Enhanced Interior Gateway Routing Protocol is a hybrid routing protocol developed by Cisco
systems for routing many protocols across an enterprise Cisco network. It has characteristics of
both distance vector routing protocols and link state routing protocols. It is proprietary which
requires that you use Cisco routers. EIGRP will route the same protocols that IGRP routes (IP,
IPX, Decnet and Appletalk) and use the same composite metrics as IGRP to select a best path
destination. As well there is the option to load balance traffic across equal or unequal metric cost
paths. Summarization is automatic at a network class address however it can be configured to
summarize at subnet boundaries as well. Redistribution between IGRP and EIGRP is automatic
as well. There is support for a hop count of 255 and variable length subnet masks.
Commands to configure EIGRP
Router#config
Router(config)#router eigrp<process no>
Router(config-router)#network <net address><wild mask>
Router(config-router)#network <net address><wild mask> area
Router(config-router)#exit

BGP

Border Gateway Protocol is an exterior gateway protocol, which is different from the interior
gateway protocols discussed so far. The distinction is important since the term autonomous
system is used somewhat differently with protocols such as EIGRP than it is with BGP.
Exterior gateway protocols such as BGP route between autonomous systems, which are assigned
a particular as numbers can be assigned to an office with one or several BGP routers.
The BGP routing table is comprised of destination IP addresses, an associated AS-Path to reach
that destination and a next hop router address. They are all managed by the company for defining
route summarization, redistribution and filtering. BGP is utilized a lot by Internet Service
Providers (ISP) and large enterprise companies that have dual homed internet connections with
single or dual routers homed to the same or different Internet Service Providers. BGP will route
packets across an ISP network
Commands to configure BGP
Router#config
Router(config)#router bgp<process no>
Router(config-router)#network <net address><wild mask>
Router(config-router)#network <net address><wild mask> area
Router(config-router)#exit

8. REDISTRIBUTION
Most networks you encounter will probably only run a single routing protocol like OSPF or
EIGRP. Maybe you find some old small networks that are still running RIP that need migration
to OSPF or EIGRP. What if you have a company that is running OSPF and you just bought
another company and their network is running EIGRP?
Its possible that we have multiple routing protocols on our network and well need some method
to exchange routing information between the different protocols. This is called redistribution.
Well look into some of the issues that we encounter. What are we going to do with our metrics?
OSPF uses cost and EIGRP uses K-values and they are not compatible with each other.RIP
uses hop count.

COMMANDS TO CONFIGURE REDISTRIBUTION


Ospf
router ospf 1
network 131.108.0.0 0.0.255.255 area 0
redistribute rip metric 200 subnets
redistribute igrp 1 metric 100 subnets
redistribute eigrp 1 metric 100 subnets

rip
router rip

redistribute igrp 1
redistribute eigrp 1
redistribute ospf 1

9. VPN
A virtual private network (VPN) extends a private network across a public network, such as
the Internet. It enables a computer to send and receive data across shared or public networks as if
it is directly connected to the private network, while benefiting from the functionality, security
and management policies of the private network. A VPN is created by establishing a
virtual point-to-pointconnection through the use of dedicated connections, virtual tunneling
protocols, or traffic encryption.

10. NAT
Network address translation (NAT) is a methodology of remapping one IP address space into
another by modifying network address information in Internet Protocol (IP) datagram packet

headers while they are in transit across a traffic routing device. The technique was originally
used for ease of rerouting traffic in IP networks without renumbering every host. It has become a
popular and essential tool in conserving global address space allocations in face of IPv4 address
exhaustion.
COMMAND FOR BASIC NAT
Router(config)#ip nat inside source list 30 interface seen0
<exiting interface name>
Router(config)#ip nat inside source static 172.16.0.7 200.1.1.3
Router(config)#ip nat inside source static tcp 172.16.0.5 80 200.1.1.4 80
Router(config)#ip nat inside source static udp 172.16.0.6 53 200.1.1.4 53
Router(config)#access-list 30 deny 172.16.0.5
Router(config)#access-list 30 deny 172.16.0.6
Router(config)#access-list 30 deny 172.16.0.7
Router(config)#access-list 30 permit any

11. VOIP
Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice
communications and multimedia sessions over Internet Protocol (IP) networks, such as the
Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony,
broadband telephony, and broadband phone service. The term Internet telephony specifically
refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over
the public Internet, rather than via the public switched telephone network (PSTN). The steps and
principles involved in originating VoIP telephone calls are similar to traditional digital telephony
and involve signaling, channel setup, digitization of the analog voice signals, and encoding.
Instead of being transmitted over a circuit-switched network, however, the digital information is
packetized, and transmission occurs as IP packets over a packet-switched network. Such
transmission entails careful considerations about resource management different from timedivision multiplexing (TDM) networks.
Early providers of voice-over-IP services offered business models and technical solutions that
mirrored the architecture of the legacy telephone network. Second-generation providers, such as
Skype, have built closed networks for private user bases, offering the benefit of free calls and
convenience while potentially charging for access to other communication networks, such as the
PSTN. This has limited the freedom of users to mix-and-match third-party hardware and
software. Third-generation providers, such as Google Talk, have adopted the concept of

federated VoIPwhich is a departure from the architecture of the legacy networks. These
solutions typically allow dynamic interconnection between users on any two domains on the
Internet when a user wishes to place a call.

COMMAND FOR VOIP


Switch(config)#interface range fa0/1 5
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport voice vlan 1
Router(config)#int fa 0/0
Router(config-if)#ip add 192.168.10.1 255.255.255.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#ip dhcp pool voicelab
Router(dhcp-config)#network 192.168.10.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.10.1
Router(dhcp-config)#option 150 ip 192.168.10.1

Router(dhcp-config)#exit
12. ROUTER REDUNDANCY PROTOCOL

In computer networking, the Hot Standby Router Protocol (HSRP) is a Ciscoproprietary


redundancy protocol for establishing a fault-tolerant default gateway, and has been
described in detail in RFC 2281.
The protocol establishes a framework between network routers in order to achieve default
gateway failover if the primary gateway becomes inaccessible, in close association with a
rapid-converging routing protocol like EIGRP or OSPF.
By multicasting packets, HSRP sends its hello messages to the multicast address 224.0.0.2
(all routers) for version 1, or 224.0.0.102 for version 2, using UDP port 1985, to other
HSRP-enabled routers, defining priority between the routers.
The primary router with the highest configured priority will act as a virtual router with a
pre-defined gateway IP address and will respond to the ARP request from machines
connected to the LAN with the MAC address 0000.0C07.ACXX (or 0000.0C9F.FXXX for
HSRPv2) where X will be hex representation of the (decimal) group ID. If the primary
router should fail, the router with the next-highest priority would take over the gateway IP
address and answer ARP requests with the same MAC address, thus achieving transparent
default gateway failover.

13. ACCESS CONTROL LIST


. Each entry in a typical ACL specifies a subject and an operationAn access control list (ACL),
with respect to a computer file system, is a list of permissions attached to an object. An ACL
specifies which users or system processes are granted access to objects, as well as what
operations are allowed

14. REQUIREMENTS
HARDWARE AND SOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
Cisco Packet Tracer:
Used to do the project work easily & proper understanding.
Windows Server 2008:
Server is the operating system used for domain network. In the domain model network,
server mainly provides the resources to the clients, and applies the security to the clients
Windows 8:
It is a operating system. It is a interface unit between the user and hardware device .

Microsoft Office: Used to save the work done on the project.


HARDWARE REQUIREMENTS

CISCO ROUTER:

1 2811 series ( modular)


Link sys wireless router( WRT300N)

SWICHES:

1 cisco 2960 series 24 port


8 Dlink 16 port

CABLES:

cat 5 and cat 6


Console cable, serial cable
Length as per requirement

Clients/Nodes:

Pentium 4 or up
Windows XP Professional
512 MB RAM
80 GB Hard Disk

15. SOFTWARE (SERVER 2008 R2)


A server is a system (software and suitable computer hardware) that responds to requests across
a computer network to provide, or help to provide, a network. Servers can be run on a dedicated
computer, which is also often referred to as "the server", but many networked computers are

capable of hosting servers. In many cases, a computer can provide several services and have
several servers running.
Servers operate within client-server architecture. Servers are computer programs running to serve
the requests of other programs, the clients. Thus, the server performs some tasks on behalf of
clients. The clients typically connect to the server through the network but may run on the same
computer. In the context of Internet Protocol (IP) networking, a server is a program that operates
as a socket listener.

COMPONENTS OF SERVER
1.AD
An AD domain controller authenticates and authorizes all users and computers in a Windows
domain type networkassigning and enforcing security policies for all computers and installing
or updating software.
For example, when a user logs into a computer that is part of a Windows domain, Active
Directory checks the submitted password and determines whether the user is a system
administrator or normal user.
Active Directory is:
A directory service that provides the ability for centralized:
Authentication
Authorization
Management

Remote Server Administration Toolkit (RSAT) includes:


Active Directory Users and Computers (ADUC)
Group Policy Management Console (GPMC)

Group Policy Editor


DFS Management Console

Print Management Console


Domain-wide Administration:
Active Directory Sites and Services
Active Directory Domains and Trusts

2.AD Objects
Organizational Units
Users
Computers
Groups

3.LINKS (PUBLISHING):
Shares
Print Shares

16.DNS :
The Domain Name System (DNS) is a hierarchical distributed naming system for computers,
services, or any resource connected to the Internet or a private network. It associates various
information with domain names assigned to each of the participating entities. Most prominently,
it translates easily memorized domain names to the numerical IP addresses needed for the
purpose of locating computer services and devices worldwide. The Domain Name System is an
essential component of the functionality of the Internet.

HOW DNS WORKS


The BasicsDNS is an Internet service that translates domain names into IP
addresses. Because domain names are alphabetic, they're easier to remember.

1.The DNS system is, in fact, its own network. If one DNS server doesn't know
how to translate a particular domain name, it asks another one, and so on, until
the correct IP address is returned. When you use the Web , you use a domain
name to do it. For example, the URL "http://www.google.com" contains the
domain name google.com.
2.

Domain name servers translate domain names to IP addresses. That sounds

like a simple task, and it would be -- except for five things:


3. There are billions of IP addresses currently in use, and most machines have a
human-readable name as well.
4 .There are many billions of DNS requests made every day. A single person
can easily make a hundred or more DNS requests a day, and there are hundreds
of millions of people and machines using the Internet daily.
5
6

.Domain names and IP addresses change daily.


New domain names get created daily.

7. Millions of people do the work to change and add domain names and IP
addresses every day.

17 .DHCP
The Dynamic Host Configuration Protocol (DHCP) is a networking service used on Internet
Protocol (IP) computer networks, for allocating IP addresses to computers that are configured to

use the service. From an administrative and user perspective, DHCP generally automates the
configuration of the IP address, subnet mask, default gateway and, in some cases, can also be
used to configure the DNS server that a computer will use. DHCP is often used to centralize
configuration of IP addresses and for PXE booting, which requires DHCP to be used in order to
work properly.

INTERNET INFORMATION SERVICES


Internet Information Services has been an integral part of the Windows NT family
since Windows NT 4.0, though it may be absent from some editions (e.g. Windows XP Home
edition). IIS is not turned on by default when Windows is installed. The IIS Manager is accessed
through the Microsoft Management Console or Administrative Tools in the Control Panel.
The architecture of IIS 7 is modular. Modules, also called extensions, can be added or removed
individually so that only modules required for specific functionality have to be installed. IIS 7
includes native modules as part of the full installation. HTTP modules is Used to perform tasks
specific to HTTP in the request processing pipeline, such as responding to information and
inquiries sent in client headers, returning HTTP errors, and redirecting requests.

17. HARDWARE
DEVICE CONFIGURATION
Step 1: Cable the network as shown in the topology.
Attach the devices shown in the topology diagram and cable as necessary.
Router to router: To connectivity of router to router, first we have select serial ports from WIC
2T.

SELECT SERIAL PORTS :

Router to switch: For connectivity of router to switch, we used straight wire at fast Ethern

et port Fat0/0 to Fat 0/1.

DEVICES:
1. Hub: Hub is centralized device, which is used to connect multiple workstations.
There are two types of Hub: -

2.SWITCH
Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has
special kind of memory called mac address/filter/lookup table. Switch reads mac addresses.
Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the
destination mac address and consult with its filter table. If he has entry in its filter table then he
forwards the frame to that particular mac address, if not found then it performs broadcasting to
all its connected nodes.
Every port has its own buffer memory. A port has two queues one is input queue and second is
output queue. When switch receives the frame, the frame is received in input queue and
forward from output queue. So in case of switch there is no chance or place for collisions. In case
of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision
Avoidance). Switches provide more efficiency, more speed and security.

There are two types of switches: (i) Manageable switches (can be configured with console cable).
(ii) Non-manageable switches.
We can perform LAN segmentation by using switches.

3.BRIDGE
Bridge is a hardware device, which is used to provide LAN segmentation means it is used for
break the collision domain. It has same functionality as performed by switch. We can use bridge
between two different topologies. It has fewer ports. Each port has a own buffer memory. It
works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table.
In case of bridge there is one broadcast domain.

5.ROUTER:
Router is hardware device, which is used to communicate two different networks. Router
performs routing and path determination. It does not perform broadcast information. There are
two types of routers: (i) Hardware Routers are developed by Cisco, HP.
(ii) Software Routers is configured with the help of routing and remote access. This feature is
offered by Microsoft. This feature is by default installed, but you have to enable or configure it.
Hardware routers are dedicated routers. They are more efficient. But in case of software routers,
it has less features, slow performance. They are not very much efficient.

LAN CARD:
Lan card is media access device. Lan card provide us connectivity in the network. There is a
RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is
another led which is also called heartbeat of Lan card. When any activity occur it may be
receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan
card.

REPEATERS
REPEATER is defined as range extender or expander. Its main work is to boost up the signal for
next 100metres. Repeaters in network regenerate incoming electrical or wireless signals.
Whenever the range of signal is not properly reaching the desired location then the repeaters are
used that helps to boost up the signal and make it reachable.
In this fig. the repeater is used in between the wireless router and laptop. It simply extends
the range of the signal and makes it properly received at the desktop or laptop.

18. LAN TOPOLOGIES:


BUS TOPOLOGY
Cable Type

Coaxial

Connector Type

BNC (Bayonet Neill-Concelman), T type, Terminator

Coaxial Thick

Maximum length 500 meters


N/w devices 100

Coaxial Thin

Maximum length 185 meters

N/w devices 30

STAR TOPOLOGY
Cable type

- UTP

Connector type - RJ45


Maximum Length 100 meters (with proper color coding)

In case of hub media access method will be CSMA/CD.


Ring Topology
Cable - UTP
There is token ring method used, so there is no collision chance.

Networking Cables
Networking cables are used to connect one network device to other network devices or to
connect two or more computers to share printer, scanner etc.There are generally three
main types of networking cables: straight-through, crossover, and rollover cables. Each
cable type has a distinct use, and should not be used in place of another

NETWORKING CABLES
What you need?
18 A reasonable length FTP cable
19 Two RJ45 tips
20 A clip crimp

Crossover cable-It usually used to connect same type of devices. A crossover cable can be
used to:
1) Connect two computers directly.
2) Connect a router's LAN port to a switch/hub's normal port. (Normally used for
expanding network)
3) Connect two switches/hubs by using normal port in both switches/hubs.

STRIGHT CABLESusually use straight cable to connect different type of devices. This type of cable will be
used most of the time and can be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (Normally used for
expanding network)
5) Connect two switches/hubs with one of the switch/hub using an uplink port and the
other one using normal port.

ROLL-OVERIt is wired with each pin on one end of the cable connected to the reverse pin on the
other end. So the cable on Pin 1 on one end of the cable connects to Pin 8 at the other
end, etc.
Rollover cables are used to connect the serial port of a computer to the serial port of
a network switch so that you can configure the network switch. These cables are not
used for network connectivity.

PROJECT WORK
PROJECT NAME: INTER-SECURITY AND CONNECTIVITY OF BANKS
VPN.

USING

1) HARDWARE REQUIREMENT

Switch

Router

Cables

Server

PC

2) SOFTWARE REQUIREMENT

Insimulator

Packet Tracer

In Original-Superputty

Server installation

End user installation

3) Cisco Configuration

Connection [wires]

Ports Up [Basic Configuration]

Static IP Addressing

Routing-Dynamic [RIP,OSPF,EIGRP]

Redistribution

VPN

Tunnel

DHCP for n devices

Server configuration

DHCP configuration

Connection with DNS

Authentication

VTY (Routers Accessing)

Scripting (HTML)

Labelling

Notes

WORKING:

In this project , there is connectivity of Lovely Professional University to Facebook and Google
which which is having their own server in different different place and we have to fetch the data
of facebook and google from LPU campus so that initially we have to design the collage of
Lpu,Facebook,Google and Cloud.Now we have to take routers in all the side. After that we have

take switches Pcs and server in LPU campus,google and facebook. Now we take research and
development in facebook and google side .

I have connected to all the routers with all the side ,we have to up all the routers and connect to
each other. In Pcs we have to apply dynamic ip and in servers we apply static ip.

After completing the to give connectivity of all the routers we will apply OSPF from coloud to
facebook and google. And in lpus all the side will apply RIP ,OSPF,EIGRP.

Now we will apply tunnel in facebook and google in R & D to main side.From cloud we will
apply redistribution to connect all the branch to cloud.And we will check that all the Pcs are to
different branch . After that we have to make a DNS in google side where I have been added the
ip of facebook.com, lpu.in, gmail.com ,googleplus.com and connect to all the server and they
will communicate with each other .so that we will open the URL of any pcs and open the link of
these any ip and open it ,It will open the link of that website.

19. BIBLIOGRAPHY

BOOKS:
21 CiscoCertifiedNetwork Associate Study Guide by Todd Lammle
22 CCNA study- guide by Sybex
23 Cisco packet Tracer by Tumblr
24 Computer Networking by James F. Kurose

INTERNET:
25 google.com
26 Wikipedia
27 www.edu.ac.in

Vous aimerez peut-être aussi