0% found this document useful (0 votes)
188 views24 pages

OFC Training Report PDF

This document is Sidharth Dhammi's report on his summer training at the Advanced Level Telecom Training Centre (ALTTC) in Ghaziabad, India. The training covered topics in networking and cyber security. Sidharth studied networking basics like cables, routers, switches, and wireless access points. He also learned about cyber security threats and using tools like Kali Linux. The objective of the training was to provide information on various technical areas of networking and cyber security.

Uploaded by

Sid Dhammi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
188 views24 pages

OFC Training Report PDF

This document is Sidharth Dhammi's report on his summer training at the Advanced Level Telecom Training Centre (ALTTC) in Ghaziabad, India. The training covered topics in networking and cyber security. Sidharth studied networking basics like cables, routers, switches, and wireless access points. He also learned about cyber security threats and using tools like Kali Linux. The objective of the training was to provide information on various technical areas of networking and cyber security.

Uploaded by

Sid Dhammi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Submitted By

Sidharth Dhammi (201701312)

BACHELOR OF TECHNOLOGY
IN
ELECTRONICS & COMMUNICATION ENGINEERING
Under the Guidance of
Mr. Krishan Kumar Singh Yadav Sir

Manipal University Jaipur


Jaipur(R.J)
CERTIFICATE OF ORIGINALITY

This is to certify that Summer Industrial Training on “Networking & Cyber

Security” is an original work of the student. This report has not been submitted

earlier either to this university or to any other University/Institution for the

fulfilment of the requirement of a course of study.

SIGNATURE OF SUPERVISOR SIGNATURE OF STUDENT

(Mr. Krishan Kumar Yadav) (Sidharth Dhammi)

Place: Place:

Date: Date:
Acknowledgement
I would like to extend my sincere and heartfelt
obligation towards all the people who have helped
me in this endeavour. I would like to thank all the
faculties of ALTTC who guided me during this
training. Without their active guidance, help,
cooperation and encouragement, I would not have
made head way in the report. During my training
every morning I get energised by seeing the energy
of the faculties to teach us. Environment of
ALTTC is amazing, its full of greenery that if
anyone feeling bad, feels good by coming here. All
the facilities provided here is good, all the
equipments are good and with latest technologies. I
was privileged to experience a sustained
enthusiastic and involved interest from the
faculties. This fuelled my enthusiasm even further
and encouraged me to boldly step into what was a
totally dark and unexplored expanse before me.
Once again I would like to express my sincere
gratitude to all my training faculties and also I
would like to thank all employee of ALTTC for
organizing and permitting the Summer training
program for us.
CONTENTS
Serial no. Topic

1 Objective

2 About ALTTC

3 Introduction

4 Networking

5 Cyber Security

6 Conclusion

7 References
Objective of Training

The objective of this training is to fetch the


information about various technical areas
concerning Networking and Cyber Security.
Which comprises of -
Identification of Cables and it’s connectors,
Different types of Routers and its components,
Router Interfaces, IPv4 Addressing, The working
of a router and method to access a router via
console or using telnet, Different types of Show
Commands and there purposes, Assignment of IP
Addresses and enabling Layer 3 connectivity,
Using CISCO Packet Tracer for simulation of
router configuration, Static & Dynamic protocol on
router configuration, Types of ACL, Practical
demonstration of Standard and Extended ACL on
Simulation, VLAN Configuration on simulation,
IVR Configuration on simulator. And at last
understanding basics of Cyber Security and
understanding Kali Linux Operating System and
using it for fishing attack by cloning a website.
About ALTTC
Advanced Level Telecom Training Centre (ALTTC),
Ghaziabad is the apex training institute of BSNL.
ALTTC was set up as a joint venture of
International Telecommunication Union, Geneva,
UNDP and the Government of India in 1975.
ALTTC functions on the frontiers of telecom
technology, finance and management and
imparts training to the leaders in the business.
The strength of ALTTC lies in the state of art labs,
massive infrastructure and trained, talented and
qualified human resource pool.
The training areas cover vast spectrum of topics
such as Digital Switching and IN; Mobile
Communication: GSM, 3G, CDMA; Data
communication and Information Technology:
MPLS, VPN, Broadband, IPv6, Database
Administration, Server administration, IT Security;
Optical Networks: SDH, DWDM, NGSDH, NGN,
Access Networks, Management, Telecom Finance,
Cyber Security, VLSI, Embedded System, Building
Science (Civil and Electrical) and Telecom
Network Planning.
Introduction
The number of cybersecurity attacks is increasing every year.
From a total cost of $445 billion in 2014, the cost of
cybercrimes reached $600 billion in 2017, according to a
report by McAfee. In a Cybersecurity Ventures report on
cybercrimes, the firm projects the cost of cyber threats to rise
to $6 trillion annually by 2021, which includes everything
from damage and destruction of data, stolen money, lost
productivity, theft of intellectual property, theft of personal
and financial data, embezzlement, fraud, post-attack
disruption to businesses, forensic investigation, restoration
and deleted hacked data and systems, to name a few. What
investors might not know is the rising threat of cyber-attacks
on mobile devices, as well as medical devices–which is
expected to reach $65 billion by 2021. Hence the knowledge
of Cyber Security becomes very important. Before we will
jump to cyber security first we will understand networking. As
it is the base of cyber security.

Networking
A network connects computers, mobile phones,
peripherals, and even IoT devices. Switches,
routers, and wireless access points are the essential
networking basics. Through them, devices
connected to your network can communicate with
one another and with other networks, like the
Internet.

Switches, routers, and wireless access


points:
Switches, routers, and wireless access points
perform very different functions in a network.

Switches
Switches are the foundation of most business
networks. A switch acts as a controller, connecting
computers, printers, and servers to a network in a
building or a campus.
Switches allow devices on your network to
communicate with each other, as well as with other
networks, creating a network of shared resources.
Through information sharing and resource
allocation, switches save money and increase
productivity.
There are two basic types of switches to choose
from as part of your networking basics: managed
and unmanaged.
• An unmanaged switch works out of the box but
can't be configured. Home-networking equipment
typically offers unmanaged switches.
• A managed switch can be configured. You can
monitor and adjust a managed switch locally or
remotely, giving you greater control over network
traffic and access.
Routers
Routers connect multiple networks together. They
also connect computers on those networks to the
Internet. Routers enable all networked computers
to share a single Internet connection, which saves
money.
A router acts a dispatcher. It analyzes data being
sent across a network, chooses the best route for
data to travel, and sends it on its way.
Routers connect your business to the world, protect
information from security threats, and can even
decide which computers receive priority over
others.
Beyond those basic networking functions, routers
come with additional features to make networking
easier or more secure. Depending on your needs,
for example, you can choose a router with a
firewall, a virtual private network (VPN), or an
Internet Protocol (IP) communications system.
Access points
An access point allows devices to connect to the
wireless network without cables. A wireless
network makes it easy to bring new devices online
and provides flexible support to mobile workers.
An access point acts like an amplifier for your
network. While a router provides the bandwidth,
an access point extends that bandwidth so that the
network can support many devices, and those
devices can access the network from farther away.
But an access point does more than simply extend
Wi-Fi. It can also give useful data about the
devices on the network, provide proactive security,
and serve many other practical purposes.

Networking Cables
Networking Cables are networking hardware used to
connect one network device to other network devices or
to connect two or more computers to share printers,
scanners etc. Different types of network cables, such as
coaxial cable, optical fiber cable, and twisted pair
cables, are used depending on the network's physical
layer, topology, and size. The devices can be separated
by a few meters (e.g. via Ethernet) or nearly unlimited
distances (e.g. via the interconnections of the Internet).
There are several technologies used for network
connections. Patch cables are used for short distances
in offices and wiring closets. Electrical connections
using twisted pair or coaxial cable are used within a
building. Optical fiber cable is used for long distances or
for applications requiring high bandwidth or electrical
isolation. Many installations use structured cabling
practices to improve reliability and maintainability. In
some home and industrial applications power lines are
used as network cabling.

RJ45 Cable
Registered Jack 45 (RJ45) is a standard type of physical
connector for network cables. RJ45 connectors are most
commonly seen with Ethernet cables and networks.
Modern Ethernet cables feature small plastic plugs on
each end that are inserted into the RJ45 jacks of
Ethernet devices. The term "plug" refers to the cable or
"male" end of the connection while the term "jack" refers
to the port or "female" end.

OFC
An optical fiber cable, also known as a fiber optic cable, is an
assembly similar to an electrical cable, but containing one or
more optical fibers that are used to carry light. The optical
fiber elements are typically individually coated with plastic
layers and contained in a protective tube suitable for the
environment where the cable will be deployed. Different types
of cable[1] are used for different applications, for example long
distance telecommunication, or providing a high-speed data
connection between different parts of a building.
SC and ST connectors
SC stands for subscriber connector and is a
standardduplex fiber-optic connector with a square
molded plastic body and push-pull locking features. SC
connectors are typically used in data communication,
CATV, and telephony environments. ST stands for
straight tip, a high-performance fiberoptic connector with
round ceramic ferrules and bayonet locking features. ST
connectors are more common than SC connectors.

Types of Router modules available


CISCO 1200:
The Cisco 12000, also known as a Gigabit Switch
Router or GSR, is a series of large network routers designed
and manufactured by Cisco Systems.

CISCO 2500:
The Cisco 2500 series routers are a series of 19" rack
mount access routers typically used to connect
Ethernet or token ring networks via ISDN or leased
serial connections (i.e. Frame Relay, T1 etc.). The
routers are based on a Motorola 68EC030 CISC
processor.
This line of routers is no longer sold or supported by
Cisco Systems.[2] They were superseded by the
Cisco 2600 series, which has also reached EOL now.

Some more types are CISCO 7600, CISCO 2800 etc.

IP Address
An Internet Protocol address (IP address) is a numerical
label assigned to each device connected to a computer
network that uses the Internet Protocol for
communication. An IP address serves two principal
functions: host or network interface identification and
location addressing.

IPv4 Addresses:
An IPv4 address has a size of 32 bits, which limits the
address space to 4294967296 (232) addresses. Of this
number, some addresses are reserved for special
purposes such as private networks (~18 million
addresses) and multicast addressing (~270 million
addresses).
IPv4 addresses are usually represented in dot-decimal
notation, consisting of four decimal numbers, each
ranging from 0 to 255, separated by dots,
e.g., 172.16.254.1. Each part represents a group of 8
bits (an octet) of the address. In some cases of technical
writing,[ IPv4 addresses may be presented in various
hexadecimal, octal, or binary representations.

IPv6 Addresses:
In IPv6, the address size was increased from 32 bits in
IPv4 to 128 bits or 16 octets, thus providing up to 2128
(approximately 3.403×1038) addresses. This is deemed
sufficient for the foreseeable future.

Subnetting:
Subnetting is the strategy used to partition a single
physical network into more than one smaller logical
subnetworks (subnets). An IP address includes a
network segment and a host segment. Subnets are
designed by accepting bits from the IP address's host
part and using these bits to assign a number of smaller
sub-networks inside the original network. Subnetting
allows an organization to add sub-networks without the
need to acquire a new network number via the Internet
service provider (ISP). Subnetting helps to reduce the
network traffic and conceals network complexity.
Subnetting is essential when a single network number
has to be allocated over numerous segments of a local
area network (LAN). Subnets were initially designed for
solving the shortage of IP addresses over the Internet.
Packet Tracer
Packet Tracer is a cross-platform visual simulation tool
designed by Cisco Systems that allows users to create
network topologies and imitate modern computer
networks. The software allows users to simulate the
configuration of Cisco routers and switches using a
simulated command line interface. Packet Tracer makes
use of a drag and drop user interface, allowing users to
add and remove simulated network devices as they see
fit. The software is mainly focused towards Certified
Cisco Network Associate Academy students as an
educational tool for helping them learn fundamental
CCNA concepts. Previously students enrolled in a
CCNA Academy program could freely download and use
the tool free of charge for educational use. Since August
2017 with version 7.1 is free to everyone.

Role of Packet Tracer Simulation:


Packet Tracer allows students to design complex and
large networks, which is often not feasible with physical
hardware, due to costs. Packet Tracer is commonly
used by CCNA Academy students, since it is available to
them for free. However, due to functional limitations, it is
intended by CISCO to be used only as a learning aid,
not a replacement for Cisco routers and switches. The
application itself only has a small number of features
found within the actual hardware running a current Cisco
IOS version. Thus, Packet Tracer is unsuitable for
modelling production networks. It has a limited
command set, meaning it is not possible to practice all of
the IOS commands that might be required.
Packet Tracer can be useful for understanding abstract
networking concepts, such as the Enhanced Interior
Gateway Routing Protocol by animating these elements
in a visual form. Packet Tracer is also useful in
education by providing additional components, including
an authoring system, network protocol simulation and
improving knowledge an assessment system.

Below is an Example of CISCO Packet Tracer Simulation:


Core router
A core router is a router designed to operate in the
Internet backbone, or core. To fulfill this role, a router
must be able to support multiple
telecommunications interfaces of the highest speed in
use in the core Internet and must be able to forward IP
packets at full speed on all of them. It must also
support the routing protocols being used in the core. A
core router is distinct from an edge router: edge routers
sit at the edge of a backbone network and connect to
core routers.
Some of the core router manufacturers are Nokia, Cisco,
Ericsson, Huawei, ZTE etc.
In India the four places where these core routers are
installed are Bengaluru, Mumbai, Noida and Chennai.

VLAN and LAN


VLAN and LAN are two terms used frequently in the
networking field. “LAN” is abbreviated as “Local Area
Network” is a computer network to which a large
number of computers and other peripheral devices are
connected within a geographical area. VLAN is an
implementation of a private subset of a LAN in which
the computers interact with each other as if they are
connected to the same broadcast domain irrespective of
their physical locations. Hence:
1.VLAN delivers better performance when compared to
traditional LANs.
2.VLAN requires less network administration work
when compared to LANs.
3.VLAN helps to reduce costs by eliminating the need for
expensive routers unlike LANs.

4. Data transmission on VLAN is safe when compared


to traditional LANs.

5. VLANs can help reduce traffic as it reduces the


latency and creates broadcast domains through switches
rather than routers unlike in traditional LANs.

CYBER SECURITY
Cybersecurity is the protection of internet-connected
systems, including hardware, software and data, from
cyberattacks. In a computing context, security comprises
cybersecurity and physical security -- both are used by
enterprises to protect against unauthorized access to
data centers and other computerized systems.
Information security, which is designed to maintain the
confidentiality, integrity and availability of data, is a
subset of cybersecurity.

Types of cybersecurity threats


The process of keeping up with new technologies,
security trends and threat intelligence is a challenging
task. However, it's necessary in order to protect
information and other assets from cyberthreats, which
take many forms.
• Ransomware is a type of malware that involves an

attacker locking the victim's computer system files --


typically through encryption -- and demanding a
payment to decrypt and unlock them.
• Malware is any file or program used to harm a

computer user, such as worms, computer viruses,


Trojan horses and spyware.
• Social engineering is an attack that relies on human

interaction to trick users into breaking security


procedures in order to gain sensitive information that
is typically protected.
• Phishing is a form of fraud where fraudulent emails

are sent that resemble emails from reputable sources;


however, the intention of these emails is to steal
sensitive data, such as credit card or login information.

Network Security
Network security is any activity designed to protect the
usability and integrity of your network and data. It
includes both hardware and software technologies.
Effective network security manages access to the
network. It targets a variety of threats and stops them
from entering or spreading on your network. Network
security combines multiple layers of defenses at the
edge and in the network. Each network security layer
implements policies and controls. Authorized users gain
access to network resources, but malicious actors are
blocked from carrying out exploits and threats.

Security differences between a LAN and WAN:

The primary difference between a Local Area Network


(LAN) and a Wide Area Network (WAN), besides the
technology used, is that generally you have control of all
the resources for a LAN, but not for a WAN.
As soon as the LAN is connected to another LAN or the
Internet and becomes a WAN, all of that changes. The
company does not know what physical protections have
been made to the rest of the WAN, only its small portion.
In the case of an Internet connection, they have no idea
who might try to access their LAN. The entire threat
model changes. Not that any of the threats from the
LANonly environment have gone away, but many more
have been added. One can think of the threat profile for a
LAN as being a subset of the threat profile for a WAN.

HTTPS:
HTTP Secure (HTTPS) is an extension of the Hypertext
Transfer Protocol (HTTP) for secure communication
over a computer network, and is widely used on the
Internet. In HTTPS, the communication protocol is
encrypted by Transport Layer Security (TLS), or
formerly, its predecessor, Secure Sockets Layer (SSL).
The protocol is therefore also often referred to as HTTP
over TLS, or HTTP over SSL.

Network Layers:
HTTP operates at the highest layer of the TCP/IP model,
the Application layer; as does the TLS security protocol
(operating as a lower sublayer of the same layer), which
encrypts an HTTP message prior to transmission and
decrypts a message upon arrival. Strictly speaking,
HTTPS is not a separate protocol, but refers to use of
ordinary HTTP over an encrypted SSL/TLS connection.
Everything in the HTTPS message is encrypted,
including the headers, and the request/response load.
The attacker can only know that a connection is taking
place between the two parties and their domain names
and IP addresses.

Kali Linux
Kali Linux is a Debian-derived Linux distribution
designed for digital forensics and penetration testing. It
is maintained and funded by Offensive Security Ltd. Mati
Aharoni, Devon Kearns and Raphaël Hertzog are the
core developers.
Kali is already pre-equipped with hundreds of amazing
tools and utilities to help penetration testers around the
globe to perform their job efficiently.
Kali Linux is a Linux distribution that contains its own
collection of hundreds of software tools specifically
tailored for their target users — penetration testers and
other security professionals. It also comes with an
installation program to completely setup Kali Linux as the
main operating system on any computer.
This is pretty much like all other existing Linux
distributions but there are other features that differentiate
Kali Linux, many of which are tailored to the specific
needs of penetration testers. Some of those features are:
A Live System, Forensics Mode, A Custom Linux Kerel,
Completely Customizable, Usable on a wide range of
ARM Devices

Conclusion
The use of cybersecurity can help prevent cyberattacks,
data breaches and identity theft and can aid in risk
management. When an organization has a strong sense
of network security and an effective incident response
plan, it is better able to prevent and mitigate these
attacks. For example, end user protection defends
information and guards against loss or theft while also
scanning computers for malicious code.
Looking ahead, PwC’s Global State of Information Security
Survey 2018 states that “87 percent of global CEOs say they
are investing in cybersecurity to build trust with customers.”
As per this report, approximately two-thirds of GSISS
respondents have appointed a chief privacy officer. As these
statistics show, companies are no longer asking “why is
cybersecurity important?” – they recognize that it’s an area
worthy of commitment and taking preventative action against
threats. Struggle between increased needs and limited funding
is however characteristic of the cybersecurity industry.
Hopefully, more and more companies, government
departments and organizations are recognizing the importance
of cybersecurity, and are allocating funds accordingly.

References
1- www.cisco.com
2- https://en.wikipedia.org/wiki/Computer_network
3- https://www.cisco.com/c/en/us/products/security/whatiscybersec
urity.html
4- An Introduction to Computer Networks by Peter L Dordal
5- https://heimdalsecurity.com/blog/cyber-security-megaguide/

6- https://www.kali.org/

You might also like