Industrial Training Report: Corporate Network With Advance Routing, Switching & Security
Industrial Training Report: Corporate Network With Advance Routing, Switching & Security
Industrial Training Report: Corporate Network With Advance Routing, Switching & Security
Submitted by:
Name: Sankalp Sarvahi
University Roll no.: 1403310185
SUBMITTED TO:
I hereby declare that the Industrial Training Report entitled Corporate Network With Advance Routing,
Switching And Security is an authentic record of my own work as requirements of Industrial Training during
the period from 07/06/2017 to 20/07/2017 for the award of degree of B.Tech. (CSE),RKGIT, Ghaziabad,
under the guidance of Mr. Puneet Singh.
Date: ________________
4
ACKNOWLEDGEMENT
In this highly complex society no work can be accomplished by a single individual but needs
inspiration and sincere guidance of intellectuals.
With an overwhelming sense of obligations, I avail this opportunity to express my deep sense of
gratitude to Mr. Puneet Singh (My project guide) who gave me right guidance to work on
Procurement model.
I emphatically express my profound thanks and heartfelt gratitude to various faculties at RCPL for
their valuable guidance, timely suggestions and constant encouragement during the entire Internship
period.
Finally, I thank all those who helped me directly and indirectly during the course of my summer
Internship at Ritusha Consultants Pvt. Ltd.
5
Company Profile
"YOUR FUTURE IS CREATED BY WHAT YOU DO TODAY LET'S SHAPE IT WITH SUMMER TRAINING
PROGRAM .
With ever changing technologies & methodologies, the competition today is much greater than ever before.
The industrial scenario needs constant technical enhancements to cater to the rapid demands. If you are an
engineering student or pursuing graduate/post-graduate level IT degree then you may have already heard
the term "Summer Training". These trainings are important because it is the best way to acquire and clear
your concepts about your respective fields.
RCPL(Sole Delivery Partner Hewlett Packard Enterprise Education Services 2004-16) the largest IT
company in the world, offers high quality Courses for 4 & 6 weeks. Few Courses in Summer Training
Program are Programming Techniques using 'C', PHP, VLSI, VHDL & PCB Design, Data Structure using
C Language, Core Java, J2EE - Hibernate with Spring Framework, J2EE - Struts with Hibernate
Framework, Android, ASP.NET With C#, Embedded & Robotics-Basics & Advanced, ARM, Linux
Administration with Scripting, Networking concepts with security.
The above Courses will be conducted at Various Locations across INDIA to name a few are
In North are New Delhi, Allahabad, Agra, Dehradun, Jaipur, Kanpur, Lucknow, Noida
In South are Bengaluru, Visakhapatnam, Hyderabad
In East are Kolkata, Patna, Guwahati
In West are Pune etc.
6
About the Project:
A network is a system that transmits any combination of voice, video and/or data between users. The
main field on which we were working was networking and the course was CCNA which includes all the parts
of networking.
In a typical LAN, there are various types of network devices available as outlined below.
Hub Repeat signals received on each port by broadcasting to all the other connected ports.
Repeaters Used to connect two or more Ethernet segments of any media type, and to provide signal
amplification for a segment to be extended. In a network that uses repeater, all members are
contending for transmission of data onto a single network. We like to call this single network a
collision domain. Effectively, every user can only enjoy a percentage of the available bandwidth.
Ethernet is subject to the "5-4-3" rule regarding repeater placement, meaning we can only have five
segments connected using four repeaters with only three segments capable of accommodating hosts.
Bridge A layer 2 device used to connect different networks types or networks of the same type. It
maps the Ethernet addresses of the nodes residing on each segment and allows only the necessary
traffic to pass through the bridge. Packet destined to the same segment is dropped. This "store-and-
forward" mechanism inspects the whole Ethernet packet before making a decision. Unfortunately, it
cannot filter out broadcast traffic. Also, it introduces a 20 to 30 percent latency when processing the
frame. Only 2 networks can be linked with a bridge.
Switch Can link up four, six, eight or even more networks. Cut-through switches run faster because
when a packet comes in, it forwards it right after looking at the destination address only. A store-and-
forward switch inspects the entire packet before forwarding. Most switches cannot stop broadcast
traffic. Switches are layer 2 devices.
Routers Can filter out network traffic also. However, they filter based on the protocol addresses
defined in OSI layer 3(the network layer), not based on the Ethernet packet addresses. Note that
protocols must be routable in order to pass through the routers. A router can determine the most
efficient path for a packet to take and send packets around failed segments. .
Gateway Often used as a connection to a mainframe or the internet. Gateways enable
communications between different protocols, data types and environments. This is achieved via
protocol conversion, whereby the gateway strips the protocol stack off of the packet and adds the
appropriate stack for the other side. Gateways operate at all layers of the OSI model without making
any forwarding decisions.
7
Table of Contents
Technology ..................................................................................................................................................... 10
Routing .......................................................................................................................................................... 10
Switch ............................................................................................................................................................. 11
Project............................................................................................................................................................. 11
References.12
8
Technologies Used:
Cisco Packet Tracer Student:
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command line
interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and
remove simulated network devices as they see fit. The software is mainly focused towards
Certified Cisco Network Associate Academy students as an educational tool for helping them
learn fundamental CCNA concepts.
Work assigned:
To design a coaxial cable and twisted cable.
To design a LAN.
To design a WAN.
To design a MAN.
To program router.
To design network.
9
Computer networking
Computer networking is sometimes considered a sub-discipline of electrical engineering,
telecommunications, computer science, information technology or computer engineering, since it relies upon
the theoretical and practical application of these disciplines
10
In the case of a university campus-based campus network, the network is likely to link a variety of campus
buildings including, for example, academic colleges or departments, the university library, and student
residence halls.
A Metropolitan area network (MAN) is a large computer network that usually spans a city or a large
campus.
11
Networking Comm.:
Networking are Connection-oriented" and "Connectionless" communications.
A session is guaranteed.
Acknowledgements are issued and received at the transport layer, meaning if the sender does not
receive an acknowledgement before the timer expires, the packet is retransmitted.
Phrases in a connection-oriented service involves Call Setup, Data transfer and Call termination.
All traffic must travel along the same static path.
A failure along the static communication path can fail the connection.
A guaranteed rate of throughput occupies resources without the flexibility of dynamic allocation.
Reliable = SLOW (this is always the case in networking).
12
OSI Model:
The OSI model is a layered model and a conceptual standard used for defining standards to promote multi-
vendor integration as well as maintain constant interfaces and isolate changes of implementation to a single
layer. It is NOT application or protocol specific. In order to pass any Cisco exam, you need to know the
OSI model inside and out.
Performs protocol conversion, encryption and data Gateway and NCP, AFP,
Presentation
compression redirectors TDI
NetBEUI,
Repackages messages into smaller formats, provides error
Transport Gateway TCP, SPX,
free delivery and error handling functions
and NWLink
13
LLC sublayer uses Destination Service Access
14
TCP/IP:
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. TCP is
one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the
entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of octets
from a program on one computer to another program on another computer. TCP is the protocol used by major
Internet applications such as the World Wide Web, email, remote administration and file transfer. Other
applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP),
which provides a datagram service that emphasizes reduced latency over reliability.
The Internet protocol suite is the set of communications protocols used for the Internet and similar networks,
and generally the most popular protocol stack for wide area networks. It is commonly known as TCP/IP,
because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP),
which were the first networking protocols defined in this standard. It is occasionally known as the DoD
model due to the foundational influence of the ARPANET in the 1970s (operated by DARPA, an agency of
the United States Department of Defense).
TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted,
routed and received at the destination. It has four abstraction layers, each with its own protocols. From lowest
to highest, the layers are:
The link layer (commonly Ethernet) contains communication technologies for a local network.
The internet layer (IP) connects local networks, thus establishing internetworking.
The transport layer (TCP) handles host-to-host communication.
The application layer (for example HTTP) contains all protocols for specific data communications
services on a process-to-process level (for example how a web browser communicates with a web
server).
15
ROUTING
There are 2 main types of routing, which are static and dynamic, the third type of routing is called Hybrid.
Static routing involves the cumbersome process of manually configuring and maintaining route tables by
an administrator. Dynamic routing enables routers to "talk" to each other and automatically update their
routing tables. This process occurs through the use of broadcasts. Next is an explanation of the various
routingprotocols.
RIP:
Routing Information Protocol(RIP) is a distance vector dynamic routing protocol. RIP measures the
distance from source to destination by counting the number of hops (routers or gateways) that the packets
must travel over. RIP sets a maximum of 15 hops and considers any larger number of hops unreachable.
RIP's real advantage is that if there are multiple possible paths to a particular destination and the
appropriate entries exist in the routing table, it will choose the shortest route. Routers can talk to each other,
however, in the real routing world, there are so many different routing technologies available, that it is not
as simple as just enabling Routing Information Protocol (RIP).
OSPF:
Open Shortest Path First (OSPF) is a link-state routing protocol that converges faster than a distance vector
protocol such as RIP. What is convergence? This is the time required for all routers to complete building
the routing tables. RIP uses ticks and hop counts as measurement, while OSPF also uses metrics that takes
bandwidth and network congestion into making routing decisions. RIP transmits updates every 30 seconds,
while OSPF transmits updates only when there is a topology change. OSPF builds a complete topology of
the whole network, while RIP uses second handed information from the neighboring routers. To
summarize, RIP is easier to configure, and is suitable for smaller networks. In contrast, OSPF requires high
processing power, and is suitable if scalability is the main concern.
We can tune the network by adjusting various timers. Areas that are tunable include: the rate at which
routing updates are sent, the interval of time after which a route is declared invalid, the interval during
which routing information regarding better paths is suppressed, the amount of time that must pass before a
route is removed from the routing table, and the amount of time for which routing updates will be
postponed. Of course, different setting is needed in different situation. In any case, we can use the "show ip
route" command to display the contents of routing table as well as how the route was discovered.
Switch
A network switch or switching hub is a computer networking device that connects network segments or
network devices. The term commonly refers to a multi-port network bridge that processes and routes data
at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network
layer (layer 3) and above are often referred to as layer-3 switches or multilayer switches.
A switch is a telecommunication device which receives a message from any device connected to it and then
transmits the message only to the device for which the message was meant. This makes the switch a more
intelligent device than a hub (which receives a message and then transmits it to all the other devices on its
network). The network switch plays an integral part in most modern Ethernet local area networks (LANs).
Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO)
applications typically use a single switch, or an all-purpose converged device such as a residential gateway
to access small office/home broadband services such as DSL or cable Internet. In most of these cases, the
end-user device contains a router and components that interface to the particular physical broadband
technology
17
PROJECT
WORK ASSIGNMENT -1
Objective
Describe the features and operation of static routing.
18
Static Routing
STATIC ROUTING is a concept describing one way of configuring path selection of routers in computer
networks. It is the type of routing characterized by the absence of communication between routers
regarding the current topology of the network. This is achieved by manually adding routes to the routing
table. The opposite of static routing is dynamic routing, sometimes also referred to as adaptive routing.
In these systems, routes through a data network are described by fixed paths (statically). These routes are
usually entered into the router by the system administrator. An entire network can be configured using
static routes, but this type of configuration is not fault tolerant. When there is a change in the network or a
19
failure occurs between two statically defined nodes, traffic will not be rerouted. This means that anything
that wishes to take an affected path will either have to wait for the failure to be repaired or the static route
to be updated by the administrator before restarting its journey. Most requests will time out (ultimately
failing) before these repairs can be made. There are, however, times when static routes can improve the
performance of a network. Some of these include stub networks and default routes.
WORK ASSIGNMENT -2
Objective
Start a router and recognize the normal boot sequence.
20
Setup Initial Global Parameters
21
login to router
22
WORK ASSIGNMENT -3
Objective
Complete the initial device configuration, given a functioning router and Configure IP addresses and IP
subnet masks on router interfaces, given a functioning router.
Router Module
23
Configuring router identification.
24
Enabling and disabling an interface
Introducing IP Addresses
30.
IP Addressing
25
IP Address classes
26
Fig 3.16- Addressing with subnet
27
Subnet Mask
28
WORK ASSIGNMENT -4
Objective
Describe the features and operation of EIGRP
Configuration EIGRP
29
WORK ASSIGNMENT -5
Objective
Describe the features and operation of IGRP.
Configuration IGRP
30
WORK ASSIGNMENT -6
Objective
Describe the features and operation of OSPF.
Configuration OSPF
31
WORK ASSIGNMENT -7
Objective
Describe the features and operation of RIP
32
RIP Configuration
The above work done by us under different classes and the following work done in software were an
artificial network was establishing.
The work allotted was done successful with desired results and hence, the training was beneficial.
33