CCNA Training Report
CCNA Training Report
CCNA Training Report
By
Nikita Kaushal
(0178EC091055)
:Nikita Kaushal
2. University ID Number
:0178EC091055
:HCL CDC
6.
Training Period
7. Training Subject
:143 ZONE 1 MP
NAGAR , BHOPAL
0755 4094852
:AMIT SHRIVASTAV
DECLARATION
The Industrial Training on Cisco Certified network associate (CCNA) at
the HCL CDC, Bhopal during June 01, 2012 to June 30, 2012 was completed
by the undersigned. During this period, I was taught about the CCNA by an
expert faculty and allowed to practice on computer with other software
related to design. Finally I was given a job for preparing a complete
networking . Thus, I completed the training successfully.
...............
Prof. Amit Sawaskade
Training Incharge
.
Nikita Kaushal
(0178EC091055 )
ACKNOWLEDGEMENT
I feel profound to attend my major training in CCNA in HCL CDC under the guidance of
Mr. Amit Shrivastav who taught us networking and relevant things. He has also given us a brief
knowledge in the training and also discuss various information to enhance our knowledge.
I would like to thanks my training incharge Prof. Amit Sawaskade for guiding me at the time of
training and boosting up required knowledge for training time to time.
I would greatly indebted to Prof. Ashok Agrawal, Head, Department of Electronics and
Communication Engineering for his keen interest in this work and time to time guidance,
encouragement and providing required facilities for training . We are grateful to Dr. Meghna
Dubey, Principal, JNCTS for his guidance and critical comments which improved the quality of
this report. Thanks are due to Dr. B D Shukla, Director, JNCTS for providing necessary help and
time to time necessary guidance in completion of this task.
Then other faculty members, friends, etc, may be added accordingly in the
acknowledgement to which the students want to acknowledge for their help and guidance in the
training.
Nikita Kaushal
1. INTRODUCTION
As the training arm of HCL Infosystems, HCL Career Development Centre (CDC) carries forth a
legacy of excellence spanning across more than three decades. HCL CDC is an initiative that
enables individuals and organizations to benefit from HCL's deep expertise in the IT space.
Among the fastest growing IT education brands in India, HCL CDC offers a complete spectrum
of quality training programs on software, hardware, networking as well as global certifications in
association with leading IT organizations worldwide.
Empowered with strategic alliances with leading IT organizations in India and abroad, HCL
CDC training solutions cater to diverse consumer profiles including individuals, enterprises,
academic institutions and Government enterprises.
As the fountainhead of the most significant pursuit of human mind (IT), HCL strongly believes,
"Only a Leader can transform you into a Leader". HCL CDC is a formalization of this experience
and credo which has been perfected over three decades.
VISION
"Together we create the enterprises of tomorrow".
MISSION
"To provide world-class information technology solutions and services in order to enable our
customers to serve their customers better".
OBJECTIVE
"To fuel initiative and foster activity by allowing individuals freedom of action and innovation in
attaining defined objectives."
PEOPLE OBJECTIVE
"To help people in HCL Infosystems Ltd. share in the company's successes, which they make
possible; to provide job security based on their performance; to recognize their individual
achievements; and help them gain a sense of satisfaction and accomplishment from their work."
CORE VAUE
1
A network is a system that transmits any combination of voice, video and/or databetween
users. The main field on which we were working was networking and the course was CCNA
which includes all the parts of networking.
In a typical LAN, there are various types of network devices available as outlined below.
Hub Repeat signals received on each port by broadcasting to all the other connected
ports.
Repeaters Used to connect two or more Ethernet segments of any media type, and to
provide signal amplification for a segment to be extended. In a network that uses
repeater, all members are contending for transmission of data onto a single network. We
like to call this single network a collision domain. Effectively, every user can only enjoy
a percentage of the available bandwidth. Ethernet is subject to the "5-4-3" rule regarding
repeater placement, meaning we can only have five segments connected using four
repeaters with only three segments capable of accommodating hosts.
Bridge A layer 2 device used to connect different networks types or networks of the same
type. It maps the Ethernet addresses of the nodes residing on each segment and allows
only the necessary traffic to pass through the bridge. Packet destined to the same segment
is dropped. This "store-and-forward" mechanism inspects the whole Ethernet packet
before making a decision. Unfortunately, it cannot filter out broadcast traffic. Also, it
introduces a 20 to 30 percent latency when processing the frame. Only 2 networks can be
linked with a bridge.
Switch Can link up four, six, eight or even more networks. Cut-through switches run
faster because when a packet comes in, it forwards it right after looking at the destination
address only. A store-and-forward switch inspects the entire packet before forwarding.
Most switches cannot stop broadcast traffic. Switches are layer 2 devices.
Routers Can filter out network traffic also. However, they filter based on the protocol
addresses defined in OSI layer 3(the network layer), not based on the Ethernet packet
addresses. Note that protocols must be routable in order to pass through the routers. A
router can determine the most efficient path for a packet to take and send packets around
failed segments.
Brouter Has the best features of both routers and bridges in that it can be configured to
pass the unroutable protocols by imitating a bridge, while not passing broadcast storms
by acting as a router for other protocols.
2
Work assigned was:
To design a LAN.
To design a WAN.
To design a MAN.
To program router.
To design network.
Computer network gives users the opportunity to use remote programs and remote databases
either of the same organization or from other enterprises or public sources. The importance of
having a computer networks are really numerous.
3.
Thus, it is a necessity for every organization or company. It makes effective communication
possible and helps to eliminate unnecessary waste of time and duplication or resources.
The desire result was obtain in every experiments and work as a result we made a successful
network capable of strong communications. A network engineer handles all of the plumbing
for a companys computers, connecting offices with T1 lines, hooking them up to the Internet,
and configuring all internal systems such as net routers and firewalls. This was very interesting
field and we covered a subject know as Data Communication and Network which we have
studied in 6th sem.
4.
2. TRAINING
Networking are Connection-oriented" and "Connectionless" communications.
. A connection oriented communication has the following characteristics:
A session is guaranteed.
Acknowledgements are issued and received at the transport layer, meaning if the sender
does not receive an acknowledgement before the timer expires, the packet is
retransmitted.
Phrases in a connection-oriented service involves Call Setup, Data transfer and Call
termination.
A failure along the static communication path can fail the connection.
Unreliable = FAST.
5.
Layer
Description
Device
Gateway
Protocol
NCP, SMB,
SMTP, FTP,
SNMP, Telnet,
Appletalk
Presentation
Session
Gateway
NetBios
Transport
Gateway
NetBEUI,
TCP, SPX, and
NWLink
Network
Router and
brouter
IP, IPX,
NWLink,
NetBEUI
None
Physical
Multiplexer
and repeater
None
way of presenting the address a 12 hexadecimal digits format. The first 6 digits specify the
manufacture, while the remainders are for the host itself. The ARP Protocol is used to determine
the IP to MAC mapping. And of course, MAC addresses cannot be duplicated in the network or
problems will occur. For more information about ARP and related protocols, read Guide To ARP,
IARP, RARP, and Proxy ARP.
Data encapsulation takes place in the OSI model. It is the process in which the information in a
protocol is wrapped in the data section of another protocol. The process can be broken down into
the following steps:
User information -> data -> segments -> packets/datagrams -> frames -> bits.
7.
When discussing the OSI model it is important to keep in mind the differences between
"Connection-oriented" and "Connectionless" communications. A connection oriented
communication has the following characteristics:
A session is guaranteed.
Acknowledgements are issued and received at the transport layer, meaning if the sender
does not receive an acknowledgement before the timer expires, the packet is
retransmitted.
Phrases in a connection-oriented service involve Call Setup, Data transfer and Call
termination.
A failure along the static communication path can fail the connection.
Unreliable = FAST.
10.
A large corporation which has many locations may have a backbone network that ties all of these
locations together, for example, if a server cluster needs to be accessed by different departments
of a company which are located at different geographical locations. The equipment which ties
these departments together constitute the network backbone. Network performance management
including network congestion are critical parameters taken into account when designing a
network backbone.
A specific case of a backbone network is the Internet backbone, which is the set of wide-area
network connections and core routers that interconnect all networks connected to the Internet.
A Metropolitan area network (MAN) is a large computer network that usually spans a city or a
large campus.
\
11.
2.2.11 Internetwork
An internetwork is the connection of multiple computer networks via a common routing
technology using routers. The Internet is an aggregation of many connected internetworks
spanning the Earth.
2.3 TCP/IP:
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol
Suite. TCP is one of the two original components of the suite, complementing the Internet
Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides
reliable, ordered delivery of a stream of octets from a program on one computer to another
program on another computer. TCP is the protocol used by major Internet applications such as
the World Wide Web, email, remote administration and file transfer. Other applications, which do
not require reliable data stream service, may use the User Datagram Protocol (UDP), which
provides a datagram service that emphasizes reduced latency over reliability.
The Internet protocol suite is the set of communications protocols used for the Internet and
similar networks, and generally the most popular protocol stack for wide area networks. It is
commonly known as TCP/IP, because of its most important protocols: Transmission Control
Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in
this standard. It is occasionally known as the DoD model due to the foundational influence of the
ARPANET in the 1970s (operated by DARPA, an agency of the United States Department of
Defense).
TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed,
transmitted, routed and received at the destination. It has four abstraction layers, each with its
own protocols. From lowest to highest, the layers are:
The link layer (commonly Ethernet) contains communication technologies for a local
network.
The internet layer (IP) connects local networks, thus establishing internetworking.
The application layer (for example HTTP) contains all protocols for specific data
communications services on a process-to-process level (for example how a web browser
communicates with a web server).
13.
The TCP/IP model and related protocols are maintained by the Internet Engineering Task
Force (IETF).
14.
2.4 ROUTING
There are 2 main types of routing, which are static and dynamic, the third type of routing is
called Hybrid. Static routing involves the cumbersome process of manually configuring and
maintaining route tables by an administrator. Dynamic routing enables routers to "talk" to each
other and automatically update their routing tables. This process occurs through the use of
broadcasts. Next is an explanation of the various routing protocols.
2.5 RIP:
Routing Information Protocol(RIP) is a distance vector dynamic routing protocol. RIP measures
the distance from source to destination by counting the number of hops(routers or gateways) that
the packets must travel over. RIP sets a maximum of 15 hops and considers any larger number of
hops unreachable. RIP's real advantage is that if there are multiple possible paths to a particular
destination and the appropriate entries exist in the routing table, it will choose the shortest route.
Routers can talk to each other, however, in the real routing world, there are so many different
routing technologies available, that it is not as simple as just enabling Routing Information
Protocol (RIP).
2.5 OSPF:
Open Shortest Path First (OSPF) is a link-state routing protocol that converges faster than a
distance vector protocol such as RIP. What is convergence? This is the time required for all
routers to complete building the routing tables. RIP uses ticks and hop counts as measurement,
while OSPF also uses metrics that takes bandwidth and network congestion into making routing
decisions. RIP transmits updates every 30 seconds, while OSPF transmits updates only when
there is a topology change. OSPF builds a complete topology of the whole network, while RIP
uses second handed information from the neighboring routers. To summarize, RIP is easier to
configure, and is suitable for smaller networks. In contrast, OSPF requires high processing
power, and is suitable if scalability is the main concern.
We can tune the network by adjusting various timers. Areas that are tunable include: the rate at
which routing updates are sent, the interval of time after which a route is declared invalid, the
interval during which routing information regarding better paths is suppressed, the amount of
time that must pass before a route is removed from the routing table, and the amount of time for
which routing updates will be postponed. Of course, different setting is needed in different
situation. In any case, we can use the "show ip route" command to display the contents of routing
table as well as how the route was discovered.
15.
RIP and OSPF are considered "open", while IGRP and EIGRP are Cisco proprietary. Interior
Gateway Routing Protocol(IGRP) is a distance vector routing protocol for the interior networks,
while Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid that combines distance
vector and link-state technologies. Do not confuse these with NLSP. Link Services Protocol
(NLSP) is a proprietary link-state routing protocol used on Novell NetWare 4.X to replace SAP
and RIP. For IGRP, the metric is a function of bandwidth, reliability, delay and load. One of the
characteristics of IGRP is the deployment of hold down timers. A hold-down timer has a value of
280 seconds. It is used to prevent routing loops while router tables converge by preventing
routers from broadcasting another route to a router which is off-line before all routing tables
converge. For EIGRP, separate routing tables are maintained for IP, IPX and AppleTalk
protocols. However, routing update information is still forwarded with a single protocol.
2.7 Switch
A network switch or switching hub is a computer networking device that connects network
segments or network devices. The term commonly refers to a multi-port network bridge that
processes and routes data at the data link layer (layer 2) of the OSI model. Switches that
additionally process data at the network layer (layer 3) and above are often referred to as layer-3
switches or multilayer switches.
A switch is a telecommunication device which receives a message from any device connected to
it and then transmits the message only to the device for which the message was meant. This
makes the switch a more intelligent device than a hub (which receives a message and then
transmits it to all the other devices on its network). The network switch plays an integral part in
most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number
of linked managed switches. Small office/home office (SOHO) applications typically use a single
switch, or an all-purpose converged device such as a residential gateway to access small
office/home broadband services such as DSL or cable Internet. In most of these cases, the enduser device contains a router and components that interface to the particular physical broadband
technology
16.
17.
3. OUTCOME OF TRAINING
WORK ASSIGNMENT -1
Objective
Describe the features and operation of static routing.
18.
Fig 3.2-router(b)
19.
In these systems, routes through a data network are described by fixed paths (statically). These
routes are usually entered into the router by the system administrator. An entire network can be
configured using static routes, but this type of configuration is not fault tolerant. When there is a
change in the network or a failure occurs between two statically defined nodes, traffic will not be
rerouted. This means that anything that wishes to take an affected path will either have to wait
for the failure to be repaired or the static route to be updated by the administrator before
restarting its journey. Most requests will time out (ultimately failing) before these repairs can be
made. There are, however, times when static routes can improve the performance of a network.
Some of these include stub networks and default routes.
21.
WORK ASSIGNMENT -2
Objective
22.
24.
25.
WORK ASSIGNMENT -3
Objective
Complete the initial device configuration, given a functioning router and Configure IP
addresses and IP subnet masks on router interfaces, given a functioning router.
26.
29.
Introducing IP Addresses
30.
IP Addressing
IP Address classes
31.
33.
Subnet Mask
34.
WORK ASSIGNMENT -4
Objective
Describe the features and operation of EIGRP
Fig 3.18-EIGRP
35.
Configuration EIGPR
36.
WORK ASSIGNMENT -5
Objective
Describe the features and operation of IGRP.
Configuration IGRP
37.
38.
WORK ASSIGNMENT -6
Objective
39.
Configuration OSPF
40.
41.
WORK ASSIGNMENT -7
Objective
42.
RIP Configuration
43.
44.
The above work done by us under different classes and the following work done in software
were an artificial network was establish.
The work allotted was done successful with desired results and hence , the training was
beneficial.
45.