0% found this document useful (0 votes)
152 views39 pages

Networking Internship Documentation (1) (1) - Pages-Merged

Uploaded by

saiseshireddy09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views39 pages

Networking Internship Documentation (1) (1) - Pages-Merged

Uploaded by

saiseshireddy09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

LONG-TERM

INTERNSHIP
(On-Site/Virtual)

ANDHRA PRADESH
STATE COUNCIL OF HIGHER EDUCATION
(A STATUTORY BODY OF GOVERNMENT OF ANDHRA PRADESH)
PROGRAM BOOK FOR

LONG-TERMINTERNSHIP
(Onsite/Virtual)

Allamsetty Bhavitha

Vignan’s Lara Institute of Technology & Science

21FE1A0507

Cisco Networking Academy,


Corporate Affairs,
Cisco Systems India Pvt Ltd.

2024-2025
An Internship Report on

Networking
Submitted in accordance with the requirement for the degree of

BACHELOR OF TECHNOLOGY
In

Computer Science and Engineering

Submitted by

ALLAMSETTY BHAVITHA

(21FE1A0507)

Under the Faculty Guideship of

Dr. G.V.V. Nagaraju, Ph. D

Department of Computer Science and Engineering


Student’s Declaration

I, ALLAMSETTY BHAVITHA, a student Bachelor of Technology, Regd. No. 21FE1A0507 of the


Department Computer Science and Engineering, Vignan’s Lara Institute of Technology &
Science, do hereby declare that I have completed the mandatory internship i n Networking from
to in Cisco Networking Academy under the Faculty Guideship of
Dr. G.V.V. Nagaraju, Ph. D, Department of Computer Science and Engineering, Vignan’s
Lara Institute of Technology & Science.

(Signature and Date)

Faculty Guide Head of the Department


Dr. G.V.V. Nagaraju Dr. K. Venkateswara Rao

External Examiner

4
Certificate from Intern Organization

5
Acknowledgements
The satisfaction that accompanies the successful completion of any task would be
incomplete without the mention of people whose ceaseless cooperation made it possible,
whose constant guidance and encouragement crown all efforts with success.

We are grateful to Dr. G. V. V. NAGARAJU, M. Tech, Ph. D, Assistant professor,


Department of Computer Science and Engineering for guiding through this project and
for encouraging right from the beginning of the project till successful completion of the
project. Every interaction with him was an inspiration.

We thank Dr. K. VENKATESWARA RAO, M. Tech, Ph. D, Professor & HOD,


Department of Computer Science and Engineering for support and valuable suggestions.

We also express our thanks to Dr. K. PHANEENDRA KUMAR, Principal, Vignan’s


Lara Institute of Technology & Science for providing the resources to carry out the
project.

We also express our sincere thanks to our beloved Chairman Dr. LAVU RATHAIAH
for providing support and stimulating the environment for developing the project.

We also place our floral gratitude to all other teaching and lab technicians for their
constant support and advice throughout the project.

6
Contents

1 Student Declaration
2 Certificate from Intern Organization
3 Acknowledgements
4 Executive Summary
5 Overview of the Organization
6 Internship Part
7 Networking Fundamentals
8 Network Layer
9 Application Layer
10 Switching Concepts
11 Redundancy in Network Design
12 Network Monitoring and Maintenance
13 WLAN Concepts
14 OSPF and its Configuration
15 NAT Concepts
16 Network Management
17 Network Design and Troubleshooting
18 Outcomes Description

7
CHAPTER 1: EXECUTIVE SUMMARY

Networking is the backbone of modern communication, enabling the seamless exchange of


information between devices, systems, and people. At its core, networking involves the
interconnection of devices such as computers, smart phones, servers, and routers through various
mediums like cables, wireless signals, or optical fibers. These connections form intricate networks
that can span local areas, such as a home or office, or wide areas, like the internet itself.

In essence, networking facilitates the sharing of resources, data, and services, empowering
individuals and organizations to collaborate, communicate, and innovate on a global scale. One
of the key components of networking is protocols, which are sets of rules and conventions
governing how data is transmitted and received across a network. Protocols define everything
from the format of data packets to the procedures for error detection and correction.

The evolution of networking has been marked by significant milestones, which laid the
groundwork for the internet, to the proliferation of high-speed broadband and wireless
technologies in recent decades. Today, networking continues to advance at a rapid pace, driven
by innovations such as cloud computing, 5G wireless networks, and the Internet of Things (IoT).
These developments promise to revolutionize how we connect, communicate, and interact with
the world around us, ushering in an era of unprecedented connectivity and digital transformation.

8
CHAPTER 2: OVERVIEW OF THE ORGANIZATION

Cisco Systems, Inc. is a multinational technology headquartered in San Jose, California, USA.
Founded in 1984 by Leonard Bosack and Sandy Lerner, Cisco has grown into one of the world's
largest and most influential networking hardware, software, and services companies. Cisco's vision
centers around enabling the seamless connectivity of people, devices, applications, and data to drive
innovation, productivity, and sustainable growth. The company aims to be the global leader in
networking solutions, empowering individuals, businesses, and communities to thrive in a digitally
connected world.

Vision:
Cisco Systems, Inc. envisions a digitally connected world where people, devices, applications,
and data seamlessly interact to drive innovation, productivity, and sustainable growth. As a global
leader in networking solutions, Cisco is committed to empowering individuals, businesses, and
communities to thrive in this interconnected landscape. The company's vision encompasses a future
where connectivity is ubiquitous, reliable, and secure, fostering collaboration, creativity, and
prosperity across all sectors of society.

Team and Infrastructure:


With tens of thousands of employees worldwide, Cisco attracts top talent from a variety of
disciplines, including engineering, software development, marketing, and customer support. Cisco's
team is driven by a passion for technology and to solving complex challenges, working together to
deliver innovative networking solutions. Cisco's infrastructure spans the globe, comprising a
comprehensive network of research and development facilities, manufacturing plants, sales offices,
data centers, and service centers. With a presence in over 100 countries, Cisco operates on a truly
global scale, serving customers across a wide range of industries, including telecommunications,
finance, healthcare, education, government, and more. The company's infrastructure is designed to
deliver high-performance networking solutions that are reliable, scalable, and secure.

9
CHAPTER3: INTERNSHIP PART

Networking is a fundamental skill in today's interconnected world, essential for both


personal and professional success. By learning networking, individuals gain the ability to connect
with others, build relationships, and access new opportunities. Whether in business, academia, or
everyday life, networking enables individuals to exchange ideas, information, and resources,
fostering collaboration, innovation, and growth. In an increasingly competitive job market, the
ability to network effectively can be a valuable asset, opening doors to new career paths and
enhancing one's prospects for success.

Through networking, individuals learn valuable communication, interpersonal, and relationship-


building skills that are essential for navigating social and professional environments. Networking
involves not only making initial connections but also nurturing and maintaining those connections
over time. This requires active listening, empathy, and the ability to understand and respond to the
needs and interests of others. Additionally, networking teaches individuals how to effectively
present themselves and their ideas, whether in face-to-face interactions, written communication, or
online platforms.

The significance of networking extends beyond individual benefits to encompass broader societal
and economic impacts. Networking plays a crucial role in driving innovation, fostering
collaboration, and accelerating economic growth. By facilitating the exchange of knowledge,
expertise, and resources, networking enables individuals and organizations to leverage collective
intelligence and tackle complex challenges more effectively. In an increasingly interconnected and
interdependent world, networking serves as a catalyst for positive change, driving progress and
prosperity for individuals, organizations, and society as a whole.

10
ACTIVITY LOG FOR THE FIRST WEEK

Day Person
In-
& Brief description of the daily Learning Outcome Charge
Activity
Date Signature

Day–1 Introduction to networking Foundational


understanding of
networking

Day-2 Network components Hardware and infrastructure


elements

Day–3 Network topologies Configurations of network


layouts

Day–4 Network security Protection and defense


measures

Day–5 Cisco IOS Operating system for Cisco

Day–6 Protocol suites Networking standards and


specifications

11
WEEKLY REPORT
WEEK–1 (From Dt ……………. to Dt.................... )

Objectives of Activity Done:


• Understand the concept of networking protocols and standards.
• Learn about the TCP/IP protocol suite and its layers.
• Explore other protocol suites commonly used in networking, such as OSI and SNMP.

Detailed Report:
This week's focus was on enhancing our understanding of networking fundamentals, including
network components, topologies, security measures, Cisco IOS, and protocol suites. We delved into
the basic concepts, hardware elements, and layout configurations of networks, while also exploring
critical security measures and Cisco's operating system. Through this exploration, we aim to
strengthen our expertise in networking essentials to better support our organizational objectives.

Here are some key concepts related to Week-1:

• Networking Fundamentals: The basics of how networks function, including data


transmission, protocols, and network architecture.
• Network Components: Refers to the physical and logical elements comprising a network,
such as routers, switches, servers, and protocols.
• Network Topologies: Describe the layout of interconnected devices in a network,
determining how they are arranged and connected.
• Network Security Measures: Strategies and technologies to protect networks from
unauthorized access, breaches, and cyber threats.
• Cisco IOS and Protocol Suites: Cisco’s operating system for networking devices and
standardized protocols governing data transmission over networks.
• Network Administration: Involves the management, monitoring, and maintenance of
network infrastructure to ensure its optimal performance and security.
• Network Troubleshooting: The process of identifying and resolving issues or problems that
arise within a network.

12
ACTIVITY LOG FOR THE SECOND WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 Reference models Frameworks for network


architecture

Day–2 Data encapsulation and access Packaging and transmission


methods

Day–3 Physical layer Hardware transmission


mechanisms

Day-4 Types of cables Varieties of connectivity


options

Day–5 Datalink layer Data transfer regulation

Day–6 Ethernet Switching Local network


connectivity control

13
WEEKLY REPORT
WEEK–2 (From Dt ……………. to Dt .................... )

Objectives of Activity Done:


• Understand common network reference models like OSI and TCP/IP.
• Learn about data encapsulation and transmission methods.
• Identify different cable types and their applications in networking.

Detailed Report:
This week was dedicated to immersing ourselves in the intricacies of networking, focusing on
fundamental concepts and technologies essential for understanding modern networks. Our
exploration began with an in-depth study of reference models like OSI and TCP/IP, providing us
with structured frameworks to conceptualize and troubleshoot network architectures effectively.
We explored the physical layer of networking, learning about hardware transmission mechanisms
and the diverse types of cables crucial for establishing network connectivity. Overall, this week's
deep dive into networking concepts and technologies provided us with a robust foundation to
navigate the complexities of modern network environments and drive our organizational objectives
forward.

Here are some key concepts related toWeek-2:

• Reference models: Frameworks for network architecture include the OSI model and TCP/IP
model.

• Data Encapsulation and Access: Data packaging for transmission and protocol- based data
regulation.

• Physical layer and Cable Types: Hardware transmission mechanisms and various cable
types.

• Datalink Layer and Protocols: Data transfer regulation and protocols like Ethernet and Wi-
Fi.

• Ethernet Switching: Control for local network connectivity and switch configuration
management.

14
15
ACTIVITY LOG FOR THE THIRD WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 Network layer Routing and forward


Control

Day–2 IPv4 and IPv6 Internet addressing


standards evolution

Day–3 Router configuration Network device setup


methods

Day–4 Transport layer End-to-end data transfer

Day–5 TCP and UDP Transport layers protocols


comparison

Day–6 Session layer and Presentation layer Communication and


session management

16
WEEKLY REPORT
WEEK–3 (From Dt ……………. to Dt.................... )

Objectives of Activity Done:


• Understand network layer functionality.
• Differentiate between IPv4andIPv6.
• Learn router configuration basics.

Detailed Report:
This week was dedicated to a comprehensive exploration of key networking concepts and
technologies essential for understanding modern network infrastructures. We began by delving into
the network layer, where we focused on understanding its role in routing and forwarding data
packets across networks. Additionally, we examined the evolution of Internet Protocol (IP)
standards, contrasting IPv4 and IPv6 addressing schemes, and exploring the transition to the newer
IPv6 protocol to address the limitations of IPv4. Moving on, we deepened our understanding of the
transport layer, where we explored the functionality of the Transmission Control Protocol (TCP)
and the User Datagram Protocol(UDP),understanding their differences and applications in data
transfer. Finally, we discussed the session and presentation layers, focusing on communication
session management and data representation, respectively. Through hands-on exercises and
theoretical discussions, we enhanced our knowledge and skills in networking fundamentals, laying
a solid foundation for future exploration and application in our professional endeavors.

Here are some key concepts related toWeek-3:

• Network Layer and Routing: It monitors the routing of data packets across networks.

• IPV4 and IPv6 addressing: IPv4 uses 32-bit addresses and IPv6 uses 128-bit
addresses.

• Transport Layer Protocols: TCP and UDP ensures data transmission among two parties.

17
ACTIVITY LOG FOR THE FOURTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 Application layer User interface interactions,


protocols

Day–2 Network attacks Unauthorized intrusion


attempts, breaches

Day–3 Firewall and types of firewall Network security and


filtering traffic

Day–4 Port numbers Endpoint identifiers

Security threats Risks to network integrity,


Day–5 and
exploits
vulnerabilities

Day–6 DOS attack Network service disruption

18
WEEKLY REPORT
WEEK–4 (From Dt ……………. to Dt.................... )

Objectives of Activity Done:


• Understand application layer protocols and user interactions.
• Identify and mitigate network attacks.
• Learn about firewalls and traffic filtering.

Detailed Report:
This week's focus was on delving into crucial networking concepts and security measures essential
for understanding and safeguarding modern network infrastructures. We commenced by exploring
the application layer, delving into its protocols and user interface interactions vital for enabling
communication between software applications. Additionally, we delved into network attacks,
understanding the various forms of unauthorized intrusion attempts and breaches that pose threats
to network integrity and data security. Moreover, we discussed port numbers as endpoint identifiers
and their role in protocol differentiation. Lastly, we examined security threats and vulnerabilities,
assessing risks to network integrity and potential exploits. Through theoretical discussions and
practical exercises, we deepened our understanding of networking fundamentals and security
principles, equipping ourselves with essential knowledge to address network challenges effectively.

Here are some key concepts related to Week-4:

• Application Layer: Protocols enabling user interactions within software.

• Network Security Measures: Strategies safeguarding against unauthorized access and


breaches.

• Firewall and its types: Network barriers filtering traffic for enhanced protection.

19
20
ACTIVITY LOG FOR THE FIFTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 Introduction to Switching Concepts Understand basic switching


concepts

Day-2 Understanding VLAN’s Learn about VLAN’s and


their benefits

Day–3 Configuring VLAN’s Configure VLAN’s on


network devices

Day–4 InterVLAN Routing Basics Understand InterVLAN


Routing principles

Implement InterVLAN
Day–5 Hands-on InterVLAN Routing Routing in a network
environment

Day–6 Introduction to Redundant Networks Explore the importance of


network redundancy

21
WEEKLY REPORT
WEEK–5 (From Dt ……………. to Dt.................... )

Objective of Activity Done:


• Understand fundamental switching concepts and the operation of Layer-2 switches.
• Learn about VLAN’s and their benefits in network segmentation and
management.
• Gain practical experience in configuring VLAN’s and implementing
InterVLAN routing.

Detailed Report:
This week was dedicated to understanding fundamental switching concepts, VLANs, and
InterVLAN routing. We began by delving into the basics of switching, grasping concepts such as
MAC addresses, frames, and the operation of Layer 2 switches. Moving forward, we explored the
concept of VLANs, learning how they provide logical segmentation within a network for improved
scalability, security, and management. Through hands-on exercises, we gained practical experience
in configuring VLANs on network devices and understanding their role in network segmentation.
By the end of the week, we had acquired a solid understanding of switching fundamentals, VLAN
configuration, and InterVLAN routing principles, laying a strong foundation for more advanced
networking concepts.

VLAN’s:

VLAN’s, or Virtual Local Area Networks, are a fundamental concept in network design that allow
for logical segmentation of a physical network into multiple isolated broadcast domains. This
segmentation provides several benefits, including enhanced security, improved performance, and
simplified network management. By dividing a single physical network into multiple VLAN’s,
organizations can isolate different departments, users, or functions while still sharing the same
physical infrastructure. This isolation prevents broadcast traffic from traversing unnecessary parts
of the network, reducing network congestion and improving overall performance.

Furthermore, VLANs enable simplified network management by allowing administrators to apply


policies and configurations to specific VLANs rather than individual devices. This centralized
management approach streamlines network administration tasks such as access control, Quality of
Service (QoS) policies, and network monitoring. Overall, VLANs play a crucial role in modern
network design by providing flexibility, security, and efficiency in managing network resources
and traffic. They are essential components of scalable and resilient network architectures in
organizations of all sizes.

22
ACTIVITY LOG FOR THE SIXTH WEEK

Day Person
In-
Learning Outcome
& Brief description of the daily Charge
Activity
Date Signature

Day–1 Understanding Redundancy Protocols Understanding STP and its


role

Day-2 Configuring STP Configure STP to prevent


network loops

Day–3 Implementing Ether Channel for Link Understanding EtherChannel


Aggregation

Hands-on Redundant Network Configure redundant


Day–4 Configurations network setups for increased
reliability

Day–5 Designing Available Networks Design networks for high


availability

Day–6 Configuring HSRP for High Configure HSRP for


Availability failover

23
WEEKLY REPORT
WEEK–6 (From Dt ……………. to Dt ................... )

Objective of Activity Done:


• Explore the importance of redundancy in network design and its role in ensuring high
availability.
• Understand redundancy protocols such as Spanning Tree Protocol and
EtherChannel.
• Configure redundant network setups to minimize downtime and improve network
reliability.
Detailed Report:
In this week, our focus shifted to redundant networks and high availability. We began by exploring
the importance of redundancy in network design, understanding how redundant paths and devices
can minimize downtime and improve network reliability. Additionally, we delved into redundancy
protocols such as Spanning Tree Protocol (STP), learning how they prevent loops and ensure a
stable network topology. Through practical exercises, we configured STP on network devices to
achieve loop-free redundancy. By the end of the week, we had gained a thorough understanding of
redundant network design principles and implemented redundancy protocols to enhance network
availability and reliability.

Redundancy in Networking:

Redundancy in networking refers to the practice of deploying duplicate components or paths within
a network infrastructure to ensure continuous operation and minimize the risk of downtime. It is a
critical aspect of network design aimed at improving reliability, fault tolerance, and availability.

There are several key components of redundancy in networking:

1. Redundant Hardware: Redundant hardware can be configured in active-passive or active-


active modes, where one device serves as the primary while the other acts as a standby ready to
take over if the primary fails.

2. Redundant Paths: Redundant paths involve creating multiple physical or logical connections
between network devices to ensure continuous connectivity in case of link failures. Protocols like
Spanning Tree Protocol (STP) and Link Aggregation (EtherChannel) are commonly used to
manage redundant paths and prevent network loops.

3. Redundant Services: Redundant services involve replicating critical network services, such as
DHCP servers, DNS servers, and firewalls, across multiple devices or locations to provide backup
and ensure service availability in case of service failures.

24
ACTIVITY LOG FOR THE SEVENTH WEEK

Day Person
In-
Learning Outcome
& Brief description of the daily Charge
Activity
Date Signature

Day–1 Implementing VRRP for Redundancy Understanding VRRP

Day-2 Configuring GLBP for Load Implementing GLBP


Balancing

Day–3 Hands-on-Available Network Setup available networks to


Configurations ensure reliability

Day–4 Implementing L2 Security Measures Implement Layer-2 security


measures to protect the
network

Day–5 Configuring Port Security Control access to switch


ports

Day–6 Introduction to WLAN’s Learn about WLAN’s and


their deployment

25
WEEKLY REPORT
WEEK–7 (From Dt ……………. to Dt ................... )

Objective of Activity Done:


• Design networks for high availability and reliability.
• Implement redundancy protocols such as HSRP, VRRP and GLBP for fail over and load
balancing.
• Learn network monitoring and maintenance strategies to ensure continuous operation and
proactive issue resolution.
Detailed Report:
The focus of this week was on designing available and reliable networks to meet organizational
requirements for uptime and performance. We began by discussing the principles of high
availability network design, understanding concepts such as fault tolerance, redundancy, and load
balancing. Additionally, we explored redundancy protocols such as Hot Standby Router Protocol
(HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol
(GLBP), learning how they enhance network resilience and ensure continuous operation. Through
practical lab exercises, we configured these protocols on network devices to provide failover and
load balancing capabilities. By the end of the week, we had gained a comprehensive understanding
of available network design principles and implemented redundancy protocols to ensure network
reliability and uptime.

Some Important key concepts:

• Designing networks for high availability by implementing redundancy at various levels, such
as device, link, and service redundancy.
• Configuring redundancy protocols like HSRP, VRRP, and GLBP to provide fail over and load
balancing capabilities for critical network services.
• Learning network monitoring and maintenance strategies to proactively identify and address
potential issues, ensuring continuous operation and minimizing downtime.
• Developing disaster recovery plans and procedures to mitigate the impact of network failures
and minimize downtime during unexpected events.
• Implementing network resilience techniques such as network segmentation, load balancing,
and geographic redundancy to enhance fault tolerance and ensure continuous service
availability.
• Utilizing network virtualization technologies such as Virtual Routing and Forwarding (VRF)
and Virtual Private LAN Service (VPLS) to create isolated network domains and enhance
network scalability, security, and resource utilization.

26
ACTIVITY LOG FOR THE EIGHTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 Configuring Wireless LAN’s Connecting using


wireless LAN’s

Day-2 Hands-on WLAN Configurations Practice configuring


WLAN’s in various
scenarios

Day–3 Understanding Routing Understand fundamental


Concepts routing concepts

Day–4 Configuring Static Routing Understanding simple


network environments

Day–5 Implementing Dynamic Routing Implementing network


Protocols scalability

Day–6 Hands-on Routing Configurations Hands-on practice with


routing configurations

27
WEEKLY REPORT
WEEK–8 (From Dt ……………. to Dt ................... )

Objective of Activity Done:


• Implement Layer-2 security measures to protect the network from unauthorized access and
networks.
• Configure WLAN’s for secure deployment.
• Understand routing concepts and configure routers.
Detailed Report:
In this week, we focused on Layer 2 security, Wireless LANs (WLANs), and routing concepts and
configuration. We began by exploring Layer 2 security measures to protect the network from
unauthorized access and attacks, including techniques such as port security and VLAN access
control. Additionally, we discussed the fundamentals of WLAN deployment, understanding WLAN
architectures, standards, and security considerations. Through hands-on labs, we configured
wireless networks and implemented security measures to ensure secure WLAN deployment. By the
end of the week, we had gained a comprehensive understanding of Layer 2 security, WLAN
deployment, and routing concepts, laying a strong foundation for building secure and scalable
networks.

Some Important key concepts:

• Implementing Layer 2 security measures such as port security and VLAN access control to
protect the network from unauthorized access and attacks.
• Configuring Wireless LANs (WLANs) for secure deployment, considering architecture,
standards, and security considerations to ensure data confidentiality and integrity.
• Understanding routing concepts and configuring routers for static and dynamic routing
protocols like OSPF to efficiently route traffic between network segments and ensure optimal
network performance.
• Deploying network access control mechanisms such as IEEE 802.1X authentication and MAC
address filtering to enforce security policies and control access to the network.
• Configuring advanced routing features such as route redistribution and route summarization
to optimize routing efficiency and reduce routing table size, enhancing network scalability
and performance.
• Implementing Quality of Service (QoS) policies to prioritize and manage network traffic
effectively, ensuring optimal performance for critical applications and services while
maintaining network responsiveness and stability.

28
29
ACTIVITY LOG FOR THE NINTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 OSPF Features and Characteristics Dynamic routing protocol


functions

Day-2 Components of OSPF Routers, Areas, LSA’s

Day–3 OSPFv2 Configuration Router OSPF command


usage

Day–4 Malware and IP threats Cyber security risks and


vulnerabilities

Day–5 Cryptography Data encryption methods

Day–6 Introduction to ACL Network access control


basics

30
WEEKLY REPORT
WEEK–9 (From Dt ……………. to Dt ................... )

Objective of Activity Done:


• Understand OSPF features and characteristics.
• Identify OSPF components and their functions.
• Learn OSPFv2 configuration commands.
• Recognize malware and IP threats.

Detailed Report:
This week, our focus was on delving into essential networking protocols and cyber security
concepts. We began by exploring OSPF (Open Shortest Path First), understanding its features,
characteristics, and components, which play a crucial role in dynamic routing. Additionally, we
delved into OSPFv2 configuration, mastering techniques for configuring OSPF on routers to
optimize network performance. Moreover, we discussed cryptography, exploring data encryption
methods to ensure secure communication and data protection. Lastly, we introduced Access Control
Lists (ACLs), understanding their role in network access control and security policy enforcement.
Through theoretical discussions and hands- on exercises, we deepened our understanding of
networking protocols and cyber security principles, equipping ourselves with essential knowledge
to address network challenges effectively.

OSPF: Dynamic Routing Protocol

- Features and Characteristics: OSPF's dynamic routing capabilities and its role in efficient
network routing.
- Components: Examination of OSPF components such as routers, areas, and Link State
Advertisements (LSAs).
- Configuration: Mastery over OSPFv2 configuration commands for optimizing network
performance.

Cyber security Threats: Malware and IP Threats

- Malware Types: Recognition of common malware threats targeting network vulnerabilities.


- IP Threats: Understanding the risks associated with IP networks and strategies for mitigation.
- Impact and Mitigation: Recognizing the impact of cyber security threats on network integrity
and implementing effective countermeasures.

31
ACTIVITY LOG FOR THE TENTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 ACL’s for IPv4 Configuration Access control list


setup

Day-2 Introduction to NAT NAT Overview

Day–3 Types of NAT NAT Variations

Day–4 WAN Concepts WAN fundamentals

Day–5 WAN Connectivity Connection methodologies

VPN and IPSec VPN technology


Day–6

32
WEEKLY REPORT
WEEK–10 (From Dt ……………. to Dt.................... )

Objective of Activity Done:


• Understand ACL setup for IPv4.
• Gain insight to NAT.
• Differentiate types of NAT.
• Explore WAN fundamentals and connectivity methods.
Detailed Report:
This week's focus was on exploring essential networking concepts and technologies, including
ACLs for IPv4 configuration, NAT, WAN concepts, WAN connectivity, VPN, and IPSec. We
began by delving into ACLs, understanding their role in controlling access to network resources
and securing IPv4 configurations. Additionally, we examined NAT, gaining insights into its
significance in translating private IP addresses to public ones for internet connectivity. Moreover,
we explored WAN connectivity methods, including leased lines, MPLS, and VPNs, understanding
their roles in establishing network connections over wide geographic areas. Lastly, we discussed
VPN technology and IPSec protocols, emphasizing their importance in ensuring secure
communication over public networks. Through theoretical discussions and practical exercises, we
enhanced our understanding of networking fundamentals, equipping ourselves with essential
knowledge to address network challenges effectively.

Network Address Translation (NAT): NAT is a crucial networking concept that facilitates
communication between private and public networks by translating private IP addresses to public
ones and vice-versa.

Types of NAT: Various types of NAT include the static NAT, dynamic NAT, and PAT (Port
Address Translation). Static NAT provides one-to-one mapping between private and public IP
addresses, while dynamic NAT dynamically assigns public IP addresses from a pool to private IP
addresses. PAT, on the other hand, maps multiple private IP addresses to a single public IP address
using different port numbers.

Access Control Lists (ACL): ACL’s serve as essential tools in network security, controlling access
to network resources based on predefined rules.

Implementation: ACLs are implemented at router interfaces or switch ports, where they intercept
and inspect packets traversing the network. By configuring ACLs, administrators can define permit
or deny statements to allow or block specific types of traffic, effectively controlling network access
and enforcing security policies. Regular monitoring and maintenance of ACL configurations are
essential to ensure network security remains robust and aligned with organizational security
policies.

33
ACTIVITY LOG FOR THE ELEVENTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 Types of VPN Remote access,


site-to-site

Day-2 QoS Concepts Band width management

Day–3 QoS Models Differentiated and


Integrated services

Day–4 Network Management Monitoring and optimizing


network performance

Day–5 Device discovery with CDP and Protocol-based device


LLDP identification

Day–6 SNMP Operation Remote device monitoring

34
WEEKLY REPORT
WEEK–11 (From Dt ……………. to Dt ....................)

Objective of Activity Done:


• Understand types of VPN.
• Understand QoS concepts.
• Learn about Network management.
• Recognize device discovery protocols.
Detailed Report:
This week's focus was on exploring essential networking concepts and technologies, encompassing
types of VPN, QoS concepts, QoS models, network management, device discovery with CDP and
LLDP, and SNMP operation. We began by delving into types of VPN, understanding their
significance in providing secure remote access and site-to-site connectivity. Additionally, we
explored QoS concepts, gaining insights into prioritizing network traffic and managing bandwidth
to optimize performance. Moving forward, we deepened our understanding of network
management, including monitoring and optimizing network performance to meet organizational
objectives. Moreover, we explored device discovery protocols such as CDP and LLDP, which
facilitate the identification and management of network devices. Lastly, we discussed SNMP
operation, emphasizing its role in remote device monitoring and management.

- VPN Types: Remote access VPNs allow secure individual connections to corporate networks,
while site-to-site VPNs enable secure communication between different locations over the internet.
- QoS Principles: Prioritization ensures critical applications receive needed bandwidth and
latency, while bandwidth management prevents congestion, ensuring optimal performance for all
network traffic.
- QoS Models: Differentiated Services (DiffServ) categorize and prioritize traffic based on
service levels, while Integrated Services (IntServ) establish explicit paths and resource reservations
for each traffic flow, ensuring consistent performance with more overhead.
- Network Administration: Involves monitoring, configuring, and maintaining network
devices and resources to ensure optimal performance and security, including tasks like traffic
monitoring, device configuration, security management, troubleshooting, and network upgrades.
- Device Discovery: Protocols like CDP and LLDP identify and gather information about
neighboring network devices, operating at the data link layer to advertise device presence and
capabilities, aiding in device management, inventory tracking, and troubleshooting.
- SNMP Functionality: SNMP allows remote monitoring and management of network devices,
collecting device statistics, configuring settings, and receiving alerts, operating with manager-
agent architecture for data collection and analysis.

35
ACTIVITY LOG FOR THE TWELFTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day–1 NTP Operation Time synchronization


protocol operation

Day-2 Network Design Planning network


architecture layout

Day–3 Switch and Router Hardware Networking device


hardware components

Day–4 Network Troubleshooting Resolving network


issues

Day–5 Troubleshooting tools and process Utilizing tools for network


issue resolution

Day–6 Network Automation Automating network


management tasks

36
WEEKLY REPORT
WEEK–12 (From Dt ……………. to Dt ................... )

Objective of Activity Done:


• Understand NTP operation for time synchronization.
• Use network design principles for planning architecture.
• Getting familiar with switch and router hardware components.
• Learn network troubleshooting techniques and tools.
• Understand network automation.

Detailed Report:
This week's focus was on delving into essential networking concepts and practices, encompassing
NTP operation, network design, switch and router hardware, network troubleshooting,
troubleshooting tools, and network automation. We began by exploring NTP operation, gaining
insights into its role in synchronizing time across network devices, ensuring accurate timestamps
for events and transactions. Moreover, we explored the concept of network automation, recognizing
its potential in streamlining network management tasks and improving operational efficiency.
Through theoretical discussions and hands-on exercises, we enhanced our knowledge and skills in
networking fundamentals, equipping ourselves with essential tools and techniques to address
network challenges effectively.
Network design: Network design involves planning and implementing network architectures to
meet organizational requirements efficiently. It encompasses various elements such as topology,
addressing, routing, and security. It begins with understanding business objectives and user
requirements, followed by determining the appropriate network topology and selecting hardware
and software components. Design considerations also include redundancy, fault tolerance, and
disaster recovery planning to minimize downtime and ensure continuity of operations.
Network troubleshooting: Network troubleshooting is the process of diagnosing and resolving
network issues to maintain optimal performance and reliability. It involves identifying problems,
analyzing symptoms, and implementing solutions to restore network functionality. Troubleshooting
techniques include isolating the scope of the issue, testing connectivity, and analyzing network
traffic using diagnostic tools like ping, trace route, and packet sniffers. Troubleshooting often
follows a systematic approach, starting with gathering information about the problem, identifying
potential causes, and testing hypotheses to isolate the root cause.

37
38
CHAPTER5: OUTCOMES DESCRIPTION

The outcomes description for all the weeks combined are as follows:

• Gain a comprehensive understanding of fundamental networking concepts, including


switching, VLANs, inter-VLAN routing, redundancy, and network availability.

• Learn to design, configure, and troubleshoot VLANs and InterVLAN routing to segment and
optimize network traffic effectively.

• Develop proficiency in implementing redundancy protocols such as Spanning Tree Protocol


(STP), EtherChannel, HSRP, VRRP, and GLBP to ensure high availability and fault tolerance
in network environments.

• Acquire skills in configuring Layer 2 security measures, including port security, VLAN access
control, and network access control mechanisms, to protect the network from unauthorized
access and attacks.

• Master the deployment and management of wireless LANs (WLANs), including WLAN
architecture, standards, security considerations, and configuration best practices.

• Understand routing concepts and configuration, including static and dynamic routing
protocols like OSPF, to efficiently route traffic between network segments and optimize
network performance.

• Explore advanced networking topics such as network virtualization, Quality of Service (QoS)
implementation, disaster recovery planning, and network monitoring and maintenance
strategies.

• Gain hands-on experience through practical lab exercises and real-world scenarios to reinforce
theoretical concepts and develop practical skills in network design, configuration, and
troubleshooting.

39

You might also like