A Project Report: Implementation of College Network Scenario Module by Using CCNA
A Project Report: Implementation of College Network Scenario Module by Using CCNA
A Project Report: Implementation of College Network Scenario Module by Using CCNA
Project Report
ON
” Implementation of College Network Scenario Module by
Using CCNA”
Session: 2015-2019
Department of Computer Science Engineering
IES COLLEGE OF TECHNOLOGY, BHOPAL
KALKHEDA, RATIBAD, BHOPAL
RGPV University Madhya Pradesh
SUBMITTED BY:
NITESH KUMAR (0177CS151099)
Submitted To:-
PROF. HARSH MATHUR PROF. AISHWARYA MISHRA DR. S. KUMAR
(PROJECT GUIDE) (H.O.D.) (PRINCIPAL)
Department of Computer Science Engineering
We hereby declare that the work, which is being presented in the Project Report, entitled
carried under the Guidance of Prof. Harsh Mathur Department of Computer Science
Engineering, IES College of Technology & Management, Bhopal. We have not submitted the
matter presented in this Project Report anywhere for the award of any other Degree.
Department of Computer Science Engineering
IES College of Technology, Bhopal
This is to certify that, NITESH KUMAR, students of the Course of BE 6th Semester (third
year) have completed this assignment and project work satisfactory. They have performed this
CCNA” under my supervision. I am satisfied with their work and wish for them further
success.
1. INTRODUCTION
2. OBJECTIVES
3. TECHNOLOGY TO BE USED
3.1 MULTILAYER SWITCH
3.2 MANAGEBLE SWITCH
3.3 WIRELESS ROUTER
3.4 ROUTER CISCO
3.5 DNS SERVER
3.6 WEB SERVER
3.7 FTP SERVER
3.8 MAIL SERVER
3.9 DHCP SERVER
3.10 ETHERNET CABLE
3.11 CROSS OVER CABLES
3.12 STRAIGHT CABLE
3.13 PATCH PANNEL
3.14 IO BOX
3.15 PUNCHHING TOOL
3.16 RACK
3.17 LAN TESTER
4. BASIC ARCHITECTURE
5. WORKING OF CNS
6. INTERFACE REQUIREMENTS
6.1 USER INTERFACE
6.2 INTERFACE FORMATS
6.3 SYSTEM INTERFACE
6.4 HARDWARE INTERFACE
6.5SOFTWARE INTERFACE
6.6 COMMUNICATION INTERFACE
7. IP DESCRIPTION OF CNS
8. PRODUCT FEATURES
9. SCOPE OF CNS
10. CONCLUSION
11. BIBLIOGRAPHY
ACKNOWLEDGEMENT
We express our deepest gratitude to our H.O.D. Prof. Aishwarya Mishra for providing us
with an environment to complete our project successfully.
We are deeply indebted to our Principal Dr. S. Kumar, who modeled us both technically and
morally for achieving success in life.
We wish to express our deep sense of gratitude and sincere thanks towards our Project Guide
Prof. Harsh Mathur (Department of Computer Science Engineering, IES College of
Technology & Management, Bhopal) for his guidance and encouraging support which were
invaluable for the completion of this work.
We would like to express my special thanks to our friends and those who helped us directly
and indirectly in completion of this project.
Finally, yet importantly, we would like to express heartfelt thanks to our beloved parents for
their help, and support in all the circumstances and kept our moral always high.
NITESH KUMAR0177CS151099)
ABSTRACT
PURPOSE: This project is aimed to create to college network scenario for security purpose.
This is to find out whether technologies used to save them more time and money by
reducing the effort to manually graph out a network.
The aim of this project is to gives high speed internet speed without any loss of packet
Also secure ports of LAN…
METHOD: A set of questions will be made and then distributed to students of university
industry Selangor. Question covered will be how can fast internet speed and easily used
them. How can secure our network for save to other users, only registered users will used.
FINDING: Results can show whether this scenario is useful to help students learn and gain
more knowledge of CCNA. Thus whether the network diagram should be used or
implemented in the university or colleges.
RESEARCH: From this project we have a better understanding on how scenario introduced
Will easy for implemented and how technology can help easy to accesses and wiil be secure
your department. Maybe from this research, future technology may include inside CNS.
CONCLUSION: By using this scenario, create a better network diagram easily and even
help plan a good layout before implementing a real physical network.
Page | 1
INTRODUCTION
Project Title: “Implementation of College Network Scenario Module by Using CCNA “
The CNS is about designing a topology of a network that is a LAN(Local Area Network) for a
College in which different computers of different departments are arranged so that can
communicate and interact with each other by exchanging data. To design a networking
scenario for a college which connect different departments to each other’s? It provides
communication among different departments. CNS is used to design an efficient topology,
fulfilling all the necessities of the college (that is client). CNS provides a network with good
performance. CNS is also providing security and authentication to prohibit unauthorized
logins.
Page | 2
OBJECTIVE
The first objective of this project is that improve of security of the network.
All users have independent network like faculty, staff, student, lab, server room. By this we
would have a secure network, each of these users will not be able to access each other unless
a need is arises.
The second objective of this project is that it will gives internet speed very fast because used
CAT6 wires.CAT6 wire has frequency is 250 MHz and its give internet speed in GIGABITS.
The third objectives of this project is that it will reduce the broadcast in the network as entire
network will be divided into subnetwork. Even if broadcast happen it will be within that
network it will not effect the other network. This will improve the performance and efficiency
of the network.
The fourth objectives of this project is that, if student connect your other devices then the
network will go slow.
For the college's Internet not to be slow, we will have to register laptop of the student and only
allow registered laptop’s mac in the network and only authorized device and users will be able
to access the network.
Page | 3
TECHNOLOGY TO BE USED
Page | 4
1. MULTI LAYER SWITCH
MLS provides high-performance Layer 3 switching for Cisco routers and switches. MLS
switches IP data packets between subnets using advanced application-specific integrated
circuit (ASIC) switching hardware. Standard routing protocols, such as Open Shortest Path
First (OSPF), Enhanced Interior Gateway Routing Protocol (Enhanced IGRP), Routing
Information Protocol (RIP), and Intermediate System-to-Intermediate System (IS-IS), are
used for route determination.
MLS enables hardware-based Layer 3 switching to offload routers from forwarding unicast
IP data packets over shared media networking technologies such as Ethernet. The packet
forwarding function is moved onto Layer 3 Cisco series switches whenever a partial or
complete switched path exists between two hosts. Packets that do not have a partial or
complete switched path to reach their destinations still use routers for forwarding packets.
MLS also provides traffic statistics as part of its switching function. These statistics are used
for identifying traffic characteristics for administration, planning, and troubleshooting. MLS
uses NetFlow Data Export (NDE) to export the flow statistics.
Page | 5
2. D-LINK 24 PORT SWITCH
24 Ports with Gigabit Ethernet speed. The d-link switch is 24 Port 10/100/1000Mbps switch
that work with your current Ethernet network while allowing you to upgrade to gigabit
speeds. With an aggregated bandwidth of up to 48Gbps and up to 9K jumbo frame support,
its addition to any network will dramatically improve traffic flow and eliminate bottlenecks.
Installation is plug and play, as every port supports auto MDI/MDI-X.
FEATURES
1.Power Saving Performance
These switches consume less energy by cutting down on power consumption when port
utilization is low. By deploying EEE devices, users can cut operating costs and reduce
necessary cooling equipment, helping small and medium-sized businesses stay within
their budgets.
2. Surveillance VLAN and Bandwidth Control
The DGS-1100 switches support Surveillance VLAN for IP surveillance deployments. This
gives video traffic a dedicated VLAN and higher priority through the switch, separating
surveillance traffic from the rest of the network.
3. PoE Support
The DGS-1100-08P, 10MP, -24P and -26MP comply with the 802.3af/at PoE+ standards,
supporting up to 30W on each PoE port, not to exceed the switch’s specific power budget.
4. Easy Troubleshooting
The DGS-1100 Series switches feature Loopback Detection and Cable Diagnostics to help
network administrators find and solve network problems quickly and easily.
Page | 6
3. WIRELESS ROUTER
FEATURES
A wireless router is a device that performs the functions of a router and also includes
the functions of a wireless access point. It is used to provide access to the Internetor a
private computer network. Depending on the manufacturer and model, it can function in
a wired local area network, in a wireless-only LAN, or in a mixed wired and wireless
network.
Most current wireless routers have the following characteristics:
One or multiple NICs supporting Fast Ethernet or Gigabit Ethernet integrated into the
main SoC.
One or multiple WNICs supporting a part of the IEEE 802.11-standard family also
integrated into the main SoC or as separate chips on the printed circuit board. It also can
be a distinct card connected over a MiniPCI or MiniPCIe interface.
So far the PHY-Chips for the WNICs are generally distinct chips on the PCB.
Dependent on the mode the WNIC supports, i.e. 1T1R, 2T2R or 3T3R, one WNIC have
up to 3 PHY-Chips connected to it. Each PHY-Chip is connected to a Hirose U.FL-
connector on the PCB. A so-called pigtail cable connects the Hirose U.FL either to a RF
connector, in which case the antenna can be changed or directly to the antenna, in which
case it is integrated into the casing.
Common are single-band (i.e. only for 2.4 GHz or only for 5 GHz) and dual-band (i.e.
for 2.4 and 5 GHz) antennas
Page | 7
4. ROUTER
The Cisco 2800 series of integrated services routers offers secure, wire-speed delivery of
concurrent data, voice, and video services. The modular design of the Cisco 2800 series
routers provides maximum flexibility, allowing you to configure your router to meet
evolving needs. The Cisco 2800 series routers incorporate data, security, and voice services
in a single system for fast, scalable delivery of crucial business applications. The routers
offer features such as hardware-based VPN encryption acceleration, intrusion-protection
and firewall functions, and optional integrated call processing and voice mail. The routers
offer a wide variety of network modules and interfaces, voice digital signal processor (DSP)
slots, high-density interfaces for a wide range of connectivity requirements, and sufficient
performance and slot density for future network expansion requirements and advanced
applications.
The Cisco 2800 series consists of four versions. The Cisco 2801 routers and Cisco 2811
routers are one rack unit in height and have two 10/100 LAN ports. The more powerful
Cisco 2821 routers and Cisco 2851 routers are two rack units in height and have two
10/100/1000 LAN ports. The higher-end router platforms of the Cisco 2800 series offer
increased performance, increased slot density including network module slots ad extension
voice module slots and increased inline power output.
Guidelines for Modularity
Make sure modules perform a single task, have a single entry point, and have a
single exit point.
Isolate input-output (I-O) routines into a small number of standard modules that
can be shared system-wide.
Page | 8
Isolate system-dependent functions (e.g., getting date or time) in the application to
ease possible future conversions to other computer platforms or to accommodate
future operating system revisions.
Hardware Features
This section describes the basic features of Cisco 2800 series routers, including product
identification, built-in interfaces, modules, memory, LED indicators, chassis ventilation, and
the internal clock.
Page | 9
module 2 double-wide
(NM) or (HWIC-D)
1
network
module
enhanced
(NME) or
1
network
module
enhanced
extended
(NME-X)
Page | 10
extended
double-
wide
(NME-
XD)
Cisco 2800 series routers use PVDM II modules that are not compatible with Cisco 2600
series routers.
Memory
• DRAM—Stores the running configuration and routing tables and is used for packet
buffering by the network interfaces. Cisco IOS software executes from DRAM memory.
• Flash memory—External flash memory. Stores the operating system software image.
Power
summarizes the power options for Cisco 2800 series routers. Cisco 2801 routers are
equipped for operation using AC power only. Cisco 2811, Cisco 2821, and Cisco 2851
routers can be equipped for operation using either AC or DC input power by installation of
the appropriate chassis power supply. IP phone power is supported if the appropriate AC-
input chassis power supply is installed.
Page | 11
5. DNS SERVER
A DNS server is a type of name server that manages, maintains and processes Internet
domain names and their associated records. In other words, a DNS server is the primary
component that implements the DNS (Domain Name System) protocol and provisions
domain name resolution services to Web hosts and clients on an IP-based network.
A DNS server stores a database of different domain names, network names, Internet hosts,
DNS records and other related data. The most basic function of a DNS server is to translate
a domain name into its respective IP address. During a domain name resolution query, DNS
records are searched, and if found, the domain name record is returned. If the domain name
is not registered or added to that DNS server, the query is then passed to other DNS servers
until the domain name record is found.
DNS server software comes in dozens, if not hundreds of flavors. The best known version is
BIND, which is free and distributed with Linux/Unix systems. On Microsoft systems, the
Microsoft DNS is bundled as part of many Windows Server releases.
Page | 12
6. WEB SERVER
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files
that form Web pages to users, in response to their requests, which are forwarded by their
computers' HTTP clients. Dedicated computers and appliances may be referred to as Web
servers as well.
Web servers often come as part of a larger package of Internet- and intranet-related
programs for serving email, downloading requests for File Transfer Protocol (FTP) files, and
building and publishing Web pages. Considerations in choosing a Web server include how
well it works with the operating system and other servers, its ability to handle server-side
programming, security characteristics, and the particular publishing, search engine and site
building tools that come with it.
Page | 13
7. FTP SERVER
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer
of computer files between a client and server on a computer network.
FTP is built on a client-server model architecture and uses separate control and data
connections between the client and the server.[1] FTP users may authenticate themselves
with a clear-text sign-in protocol, normally in the form of a username and password, but can
connect anonymously if the server is configured to allow it. For secure transmission that
protects the username and password, and encrypts the content, FTP is
often secured with SSL/TLS (FTPS). SSH File Transfer Protocol (SFTP) is sometimes also
used instead; it is technologically different.
The first FTP client applications were command-line programs developed before operating
systems had graphical user interfaces, and are still shipped with most Windows, Unix,
and Linux operating systems.[2][3] Many FTP clients and automation utilities have since been
developed for desktops,
servers, mobile devices, and hardware, and FTP has been incorporated into productivity
applications, such as web page editors
Page | 14
8. MAIL SERVER
A mail server is the computerized equivalent of your friendly neighborhood mailman. Every
email that is sent passes through a series of mail servers along its way to its intended
recipient. Although it may seem like a message is sent instantly - zipping from one PC to
another in the blink of an eye - the reality is that a complex series of transfers takes place.
Without this series of mail servers, you would only be able to send emails to people whose
email address domains matched your own - i.e., you could only send messages from one
example.com account to another example.com account.
Page | 15
9. DHCP SERVER
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used
on TCP/IP networks whereby a DHCP server dynamically assigns an IP address and other
network configuration parameters to each device on a network so they can communicate
with other IP networks.
The DHCP operates based on the client–server model. When a computer or other device
connects to a network, the DHCP client software sends a DHCP broadcast query requesting
the necessary information.
OPERATION
DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and
IP lease acknowledgement. These stages are often abbreviated as DORA for discovery,
offer, request, and acknowledgement.
If the client and server are on different subnets, a DHCP Helper or DHCP Relay Agent may
be used.
Clients requesting renewal of an existing lease may communicate directly via UDP unicast,
since the client already has an established IP address at that point.
Page | 16
9.ETHERNET CABLE
An Ethernet cable carries the broadband signals between your modem, router, computer, and
other wired Internet-capable devices.
Cat 5e and Cat 6e (or higher) Ethernet cables are recommended for higher speeds. This
designation is often stamped on the wire casing, along with other specifications. If you can't
find a designation and your Ethernet cables are old, consider replacing them to ensure the
cable is not hampering your Internet speed.
Page | 17
10.CROSS OVER CABLE
An Ethernet crossover cable is a crossover cable for Ethernet used to connect computing
devices together directly. It is most often used to connect two devices of the same type: e.g.
two computers (via their network interface controllers) or two switches to each other. By
contrast, patch cables or straight through cables are used to connect devices of different
types, such as a computer to a network switch or Ethernet hub..
Sometimes you will use crossover cable, it's usually used to connect same type of devices.
A crossover cable can be used to:
Page | 18
11. PATCH PANNEL
A patch panel, patch bay, patch field or jack field is a device or unit featuring a number
of jacks, usually of the same or similar type, for the use of connecting and
routing circuits for monitoring, interconnecting, and testing circuits in a convenient,
flexible manner. Patch panels are commonly used in computer networking, recording
studios, radio and television.
In recording studios, television and radio broadcast studios, and concert sound
reinforcement systems, patchbays are widely used to facilitate the connection of
different devices, such as microphones, electric or electronic instruments,
Using a patchbay also saves wear and tear on the input jacks of studio gear and
instruments, because all of the connections are made with the patchbay.
Page | 19
12. IO BOX
Short for input/output (pronounced "eye-oh"). The term I/O is used to describe any
program, operation or device that transfers data to or from a computer and to or from a
peripheral device. ... Devices such as keyboards and mouse are input-only devices while
devices such as printers are output-only. Every transfer is an output from one device and
an input into another. Devices such as keyboards and mouse are input-only devices
while devices such as printers are output-only.
Page | 20
13. PUNCHHING TOOL
A punch is a hard metal rod with a sharp tip at one end and a blunt butt end at the other,
which is usually struck by a hammer. Typically, woodworkers use a ball-peen
hammer to strike a punch
USES
Punches are used to drive objects such as nails, or to form an impression of the tip on a
workpiece. Decorative punches may also be used to create a pattern or even form an
image
PIN
Metal pins and similar connectors are driven in or out of holes using a pin punch.
For removal, first use a starter punch to loosen the pin, then use a pin punch to finish.
CENTRE
A centre punch is used to mark the centre of a point. It is usually used to mark the centre
of a hole when drilling holes. A drill has the tendency to "wander" if it does not start in a
recess. A centre punch forms a large enough dimple to "guide" the tip of the drill. The
tip of a centre punch has an angle between 60 and 90 degrees
Page | 21
14. RACK
A computer rack (commonly called a rack) is a metal frame used to hold various
hardware devices such as servers, hard disk drives, modems and other electronic
equipment. Some may refer to a rack as "LAN or network furniture" as resembles a
shelving structure where components can be attached vertically, stacked on top of one
another. A computer rack can also be called a relay rack or open rack.
While racks come in many different shapes and sizes, the standard (traditional) size rack
is 19-inches wide. Racks are usually made of aluminum or stainless steel. The
Electronics Industries Association (EIA) establishes standards for cabinets and racks
intended for use with computers and other electronic equipment.
Page | 22
15. LAN TESTER
LAN testers cover the fields of installation and network control. These LAN tester can
be used in the work LAN Network Tester and are ideal for technical service
professionals and network administrators. These LAN testers can determine IP
addresses, identify polarity, connected port and link connectivity. Furthermore, they can
test fibre optic cables. It can also show cable break points, incorrect connections in fibre
optic lines. All this in a large pen design. With these LAN testers you can test the state
of LAN network connections to Hubs and Switches and can analyse the traffic of a
network and which IP it generates.
Page | 23
16.STRAIGHT CABLE
Straight-Through refers to cables that have the pin assignments on each end of the cable.
In other words Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 Ect.
Straight-Through wired cables are most commonly used to connect a host to client.
When we talk about cat5e patch cables, the Straight-Through wired cat5e patch cable is
used to connect computers, printers and other network client devices to the router switch
or hub (the host device in this instance).
A straight-through cable is a type of twisted pair cable that is used in local area networks
to connect a computer to a network hub such as a router. This type of cable is also
sometimes called a patch cable and is an alternative to wireless connections where one
or more computers access a router through a wireless signal
Page | 24
BASIC ARCHITECTURE
The basic architecture of CNS uses basically different different types of VLAN connections,
various computers, Switches, Server, Router, Laptops and personal PC’s.
To build vlan for every department for communicate to each other and to
Save switch cost..
Page | 25
WORKING OF CNS
This work about CNS (College’s Networking Scenario) is to provide an efficient, safe,
authenticated, reliable communication among different departments. The work is build
keeping in mind the cost and complexity factor. With different departments can easily share
the desired data without any problem and can exchange their data without going physically
to them just like a phone call, hence saving time and energy.
Page | 26
INTERFACE REQUIREMENTS
The following section discusses the requirements related to the interfaces used to
communicate with lot of values. These values include client and other hardware and
software interfaces that permit the system to carry out its tasks.
Page | 27
1 Home router (D-link)
1 Multilayer switch (cisco 3560)
36 Computer Systems (Generic and laptop)
Four servers (DNS, MAIL, FTP , WEB)
Cross over cable
Straight through cable
Page | 28
IP DESCRIPTION OF CNS IP ADDRESS
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication.
An IP address as a 32-bit number is defined by a designer. One is IPv4, i.e. Internet Protocol
version 4 in which the IP address is of 32 bit and is represented as X.X.X.X that is each
octet is separated by a dot.
For e.g.: 192.168.1.0, i.e. Internet Protocol version 4 in which the IP address is of 32 bit is
represented as X.X.X.X that is each octet is separated by a dot. In this project IPv4 IP
address is used. Basically the allotment of IP address depends upon the number of hosts
present in the network.
Depending on the number of hosts present in the college; for this network the IP [4] to be
used is a class C IP addresses i.e. 192.168.1.0 with a subnet mask of 255.255.255.248. And
this IP is then distributed among different VLANs and ports for communication. The larger
IP is broken into smaller networks by using the concept of VLSM (Variable Length Subnet
Mask).
Variable Length Subnet Mask: Variable Length Subnet Masking - VLSM - is a technique
that allows network administrators to divide an IP address space into subnets of different
sizes, unlike simple same-size Sub netting. Variable Length Subnet Mask (VLSM) in a way
means sub netting a subnet. To simplify further, VLSM is the breaking down of IP addresses
into subnets (multiple levels) and allocating it according to the individual need on a network.
A caresful addressing follows the general rule that has been proven to amount to IP address
wastage.
Page | 29
PRODUCT FEATURES
1. First of all the overall topology is based on tree topology which is conveniently serving
the network.
2. The network is based on client-server architecture.
3. Basically there are Nine client [9] switches which are working for the Two floors of
college and they are connected to a Multilayer switch.
4. All the departments are classified into different VLANs, which are connected to the eight
switches .according to the sequence in which they are accommodated on floor.
For e.g. on ground floor there is department called reception for queries of college and that
is a VLAN reception is connected to switch assigned to ground floor?
5. Similarly, different departments confined into VLANs and share switches respective to
ground floors.
6. Now when any request is made by any system of any department it’s forwarded to client
switch which further forwards it to the server.
7. Now there are port-securities which are implemented on different port of the switches
which provides security from unauthorized personnel from connecting to the switch.
8. After the server, the data is transferred to the router connected to it.
9. Router basically routes the data to the desired destination and also serves as DHCP server
for assigning IPs to the host computers.
10. One of the exciting features of this project is that every device that is whether it’s a
switch or a router, they have been under the security of their respective passwords which are
only known to the administrator (network administrator).
Page | 30
SCOPE OF CNS
This project is to provide an efficient communication among the computers that are being
used in a college. Apart from interaction, the topology is designed keeping in mind the cost
hence making the project economical. One of the most important points is security and
authentication to prohibit the unauthorized access is also there.
Page | 31
RESULTS OF CNS
Page | 32
9.5 Packet Is Passed To Router For Selecting Best Path To Destination
Ping successfully ..
Page | 33
CONCLUSION
We conclude that from the intriguing journey of the project development we gained
an insight of various aspects of Network administrator. It was most inspiring to be guided by
the Network Administrator and the project manager who were enthusiastic and willing to share
their career experiences. It was a thought-provoking experience in learning about the various
network topology, switch, routers , etc available in CCNA. The intellectually stimulating
teaching and guidance gave us a unique opportunity to observe for ourselves the practical
aspects of Network engineering.
We would like to thank all those who were directly or indirectly involved in this
training period.
System Features:
System satisfies all the requirements for which the company developed the system.
System has strong security. System is fully GUI based. It is easy to operate and user-friendly.
Platform includes the inbuilt back-up and recovery facility.
Working on the project was a good experience. Working together in teams helped us
to communicate better. We understand the importance of planning and designing as a part of
Network development.
The concept of peer-reviews helped to rectify the problems as and when they occurred
and also helped us to get some valuable suggestions that were incorporated by us. Developing
the project has helped us to gain some experience on real time development procedures.
System required sufficient RAM and faster server to run the application properly.
Page | 34
BIBLIOGRAPHY
Websites:-
https://en.wikipedia.org/wiki/Router_(computing)
https://www.symantec.com/connect/forums/sep-client-switch-computer-mode-user-
mode-automatically-and-moving-other-group
https://www.cisco.com/c/en/us/support/docs/routers/1600-series-routers/46789-port-
pinout.html https://en.wikipedia.org/wiki/Ethernet_crossover_cable
https://www.cisco.com/c/en/us/td/docs/routers/connectedgrid/switch_module_swcg/cgr-
esm-configuration/config_vlans.html
https://www.cisco.com/c/en/us/support/docs/lan-switching/vtp/10558-21.html
https://en.wikipedia.org/wiki/Server_(computing)
https://www.cisco.com/c/en/us/training-events/training-
certifications/certifications/associate/ccna-routing-switching.html
https://en.wikipedia.org/wiki/Command-line_interface
https://en.wikipedia.org/wiki/Web_server
https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
https://en.wikipedia.org/wiki/Category_6_cable
http://www.ciscopress.com
https://subnettingpractice.com/ccna_commands.html
Page | 35
Books:-
[1] CCNA Routing and Switching Complete Study Guide: Exam 200-125
[2] www.goodreads.com/book/show/30269168-ccna-routing-and-switching-complete-study-
guide
[3] http://www.ciscopress.com/articles/article.asp?p=328773&seqNu m=3
[4] Interconnecting Cisco Devices Part 1 by Cisco
[5] Interconnecting Cisco Devices Part 2 by
[6] https://www.youtube.com/user/CiscoPress
[7] http://www.pearsoned.co.uk/bookshop/subject.asp?item=234
Page | 36