0% found this document useful (0 votes)
57 views24 pages

Internship - Report NETWORKING PDF

Networking internship report

Uploaded by

D. Narendra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views24 pages

Internship - Report NETWORKING PDF

Networking internship report

Uploaded by

D. Narendra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

An Internship Report on

NETWORKING

submitted in partial fulfilment of the requirements

for the award of degree of

BACHELOR OF TECHNOLOGY

in

ELECTRICAL AND ELECTRONICS ENGINEERING

by

……………………………...
( )

under the guidance of

Dr. B. Jayababu , Ph.D.

Associate Professor
DECLARATION

I hereby declare that the work presented in this internship report entitled

“NETWORKING” is an authentic record of original work done by me at CISCO

NETWORK ACADEMY from 03.06.2024 to 03.08.2024 as part of undergraduate

engineering programme and submitted to the Department of Electrical and Electronics

Engineering, Vignan's Lara Institute of Technology & Science, Vadlamudi. This work

has not been submitted elsewhere for the award of any other diploma/degree.

Place: Vadlamudi ………………………..


Date: ( )
CERTIFICATE

This is to certify that the internship report entitled “Networking” is submitted by Mr.

………………………………… (Regd. No. ) to the Department

of Electrical And Electronics Engineering, Vignan’s Lara Institute of Technology &

Science. He has done internship at CISCO NETWORK ACADEMY during the period

from 03.06.2024 to 03.08.2024 at the end of IV B.Tech. I Semester and submitted this

report in partial fulfilment of the requirements for the award of degree of Bachelor of

Technology in Mechanical Engineering.

Dr. B. JAYABABU, Ph.D. Dr. M SHAREF SYED, Ph.D.


Associate Professor Professor
Head of the Department

External Examiner
CERTIFICATE OF INTERNSHIP
ACKNOWLEDGEMENT

I would like thank Dr. B. JAYABABU, Associate Professor for his guidance and
constructive motivation throughout the internship.

I would like to thank Dr. M. Shareef Syed Head of the Department for his constant
support throughout my internship.

I would like to thank Dr. K. Phaneendra Kumar, Principal, for providing the
facilities during the internship programme.

I am extremely great full to our department staff members and friends who helped
me in successful completion of this internship.

Place: Vadlamudi ………………………………….


Date: (Regd. No. )
WEEK TO WEEK SCHEDULE OF INTERNSHIP

Week Date(s) Topic


1st Week 03-06-2024 Introduction
2nd Week 10-06-2024 Basic Network Connectivity and
Communication
3rd Week 24-06-2024 Ethernet Concepts
4th Week 08-07-2024 Communicating b/w Networks
5th Week 15-07-2024 IP Addressing
6th Week 22-07-2024 Network Application
Communications
7th Week 29-07-2024 Building and Securing a Small
Network
8th Week 01-08-2024 Summary
ABSTRACT

Introduction

Basic Network Connectivity and Communication

Ethernet Concepts

Communicating b/w Networks

IP Addressing

Network Application Communications

Building and Securing a Small Network

Summary
CHAPTER-1
INTRODUCTION

Networking is the process of making connections


and building relationships. These connections can
provide you with advice and contacts, which can
help you make informed career decisions.
Networking can even help you find unadvertised
jobs/internships. Networking can take place in a
group or one-on-one setting.

How Do I Start Networking?


Brainstorm to think about who your connections
are and who they might know.

Write down the names of people already in your


network. Consider people you know:

Columbia professors and staff members


Former supervisors or colleagues
Parents’ friends
Classmates and club/organization members
Recent alumni
After creating your list of your current contacts, you
can start thinking about who these people can
connect you with. If you don’t ask, you’ll never know!
CHAPTER-2
Basic Network Connectivity and
Communication

Switches, routers, and wireless access points are the


essential networking basics. Through them, devices
connected to your network can communicate with one
another and with other networks, like the Internet.
Switches, routers, and wireless access points perform
very different functions in a network.
This setup includes hardware like computers, routers,
switches, and modems, as well as software protocols that
manage how data flows between these devices. Protocols
such as TCP/IP and HTTP are essential for
communication between devices. They set the rules for
how data is exchanged, ensuring a common connection.
Network Communication is a critical process that allows
computers to exchange data and information
A computer network is a set of computers sharing
resources located on or provided by network nodes.
Computers use common communication protocols over
digital interconnections to communicate with each other.
These interconnections are made up of
telecommunication network technologies based on
physically wired, optical, and wireless radio-frequency
methods that may be arranged in a variety of network
topologies.

The nodes of a computer network can include personal


computers, servers, networking hardware, or other
specialized or general-purpose hosts. They are identified
by network addresses and may have hostnames.
Hostnames serve as memorable labels for the nodes and
are rarely changed after initial assignment. Network
addresses serve for locating and identifying the nodes by
communication protocols such as the Internet Protocol.

Computer networks may be classified by many criteria,


including the transmission medium used to carry signals,
bandwidth, communications protocols to organize
network traffic, the network size, the topology, traffic
control mechanisms, and organizational intent.

Computer networks support many applications and


services, such as access to the World Wide Web, digital
video and audio, shared use of application and storage
servers, printers and fax machines, and use of email and
instant messaging applications.
CHAPTER -3
Ethernet Concepts

To massively simplify the early history of Ethernet,


Xerox relinquished its trademark on the Ethernet name,
and the Institute of Electrical and Electronics Engineers
(IEEE) formalized the 802.3 standard (otherwise known
as Ethernet) in 1983. Other technologies existed, but
Ethernet soon became the dominant standard because it
was open, so networking equipment was available from
multiple manufacturers. Ethernet was also easy to
upgrade, with each version offering backward
compatibility.

The first official Ethernet release supported speeds of up


to 10 Mbps. Then 100 Mbps Fast Ethernet came along in
1995, and Gigabit Ethernet followed in 1999. By 2002,
10-Gigabit Ethernet was possible. Power over Ethernet,
or PoE, which enabled devices to use a single cable for
power and networking, landed in 2003. Work has
continued to increase Ethernet capabilities since,
reaching 40 Gbps in 2010, then 100 Gbps later the same
year. Research continues, but 40 Gbps is the top speed
available for use in the home today, and that’s way more
than most of us need.

Ethernet and Wi-Fi


Even if you have only ever used Wi-Fi, you are probably
familiar with Ethernet plugs and cables. The cable that
connects your modem to your Wi-Fi router or main mesh
unit is likely an Ethernet cable with an RJ45 connector.
Ethernet offers three main advantages over Wi-Fi: It is
faster, more stable, and more secure. But it requires you
to run cables between devices, and connected devices
must have Ethernet ports. Wiring up a network can also
be complex and costly.

Ultimately, the speed you get will always be limited by


the lowest-rated component, whether that’s the cable,
port, or switch.

Ethernet is a family of wired computer networking


technologies commonly used in local area networks
(LAN), metropolitan area networks (MAN) and wide
area networks (WAN).It was commercially introduced in
1980 and first standardized in 1983 as IEEE 802.3.
Ethernet has since been refined to support higher bit
rates, a greater number of nodes, and longer link
distances, but retains much backward compatibility. Over
time, Ethernet has largely replaced competing wired
LAN technologies such as Token Ring,
FDDI and ARCNET.
CHAPTER-4
COMMUNICATING B/W NETWORKS

Network Interconnectivity
Connectivity between networks refers to the extent to
which different networks or systems interact with each
other. This concept is applicable to various domains,
including:

Neural Networks: In the brain, connectivity between


networks describes the communication and coordination
between different brain regions, such as the default mode
network (DMN), attention networks, and sensory
networks. Research suggests that connectivity between
networks changes with age, with older adults exhibiting
increased connectivity between networks and reduced
segregation/modularity (Chan et al., 2014; Geerligs et al.,
2015; King et al., 2017).
Computer Networks: In computer science, connectivity
between networks refers to the ability of different
networks to communicate with each other, enabling data
exchange and information sharing. This is crucial for
ensuring the reliability and resilience of complex network
systems (Shi et al., 2018).
Social Networks: In sociology, connectivity between
networks describes the relationships and interactions
between individuals or groups within and across different
social networks. High levels of connectivity can facilitate
collective action, trust, and reciprocity, while
overconnectivity can lead to detrimental effects on
ecosystem services (Brondizio et al., 2009; Van Nes and
Scheffer, 2005).
Key Findings.

Between-network connectivity is associated with age-


related changes in brain function, with older adults
exhibiting increased connectivity between networks and
reduced segregation/modularity .

Connectivity between networks is a crucial concept that


spans multiple domains, including neuroscience,
computer science, and sociology. Understanding the
dynamics of connectivity between networks can provide
insights into the functioning of complex systems and
inform strategies for improving their resilience
and performance.
CHAPTER -5
IP ADRESSING

IP Addressing
IP addresses are used to identify devices on a network
and facilitate communication between them. Here are the
key concepts:

IP Address Structure: An IP address consists of 32 bits,


divided into four octets (8-bit segments) separated by
dots (e.g., 192.168.1.1).
Network ID (NID): The first part of the IP address (24
bits) identifies the network, similar to an area code in a
telephone network.
Host ID (HID): The last part of the IP address (8 bits)
identifies a specific device (host) within the network.
Subnet Mask: A 32-bit number used to distinguish
between the network ID and host ID. It’s used by routers
to determine which part of the address is the network ID
and which is the host ID.
IP Address Classes

In the early days of IP addressing, IP addresses were


divided into five classes (A, B, C, D, and E). Each class
had a specific range of addresses and was designed for
specific network sizes.

Class A: Large networks (0.0.0.0 - 127.255.255.255)


Class B: Medium-sized networks (128.0.0.0 -
191.255.255.255)
Class C: Small networks (192.0.0.0 - 223.255.255.255)
Class D: Multicast addresses (224.0.0.0 -
239.255.255.255)
Class E: Reserved for future use (240.0.0.0 -
254.255.255.255)
Classful Addressing Limitations

The original classful addressing system had limitations:

Wasted address space: Many Class A and B addresses


were unused.
Insufficient address space: Class C addresses were too
small for large networks.
Inefficient subnetting: Subnetting was limited, making it
difficult to create smaller sub-networks.
CIDR (Classless Inter-Domain Routing)

CIDR replaced classful addressing in 1993. It allows for:

Variable-length subnet masks (VLSMs)


More efficient use of address space
Improved subnetting capabilities
Private IP Addresses
Private IP addresses (e.g., 10.0.0.0 - 10.255.255.255,
172.16.0.0 - 172.31.255.255, 192.168.0.0 -
192.168.255.255) are not routable on the Internet and are
used for local networks.

Public IP Addresses

Public IP addresses are routable on the Internet and are


used for devices that need to communicate with external
networks.

CHAPTER-6
Network Application Communications
A network application is a software program or service
that relies on network resources to perform specific
functions, enabling communication, data sharing, and
collaboration among devices connected to a network.

These applications leverage the power of networks,


whether local area networks (LANs), wide area networks
(WANs), or the internet, to provide various services and
functionalities. Network applications use network
protocols and communication standards to transmit and
receive data, making them integral to modern computing.

Whether you’re browsing the web, sending emails,


sharing files, or engaging in video conferences, you’re
likely using network applications that seamlessly bridge
the gap between your device and the broader networked
world.

Types of Network Applications


There are several types of network applications, each
designed to serve specific purposes and meet diverse
communication and data-sharing needs:

Web Browsers:
Examples: Google Chrome, Mozilla Firefox, Microsoft
Edge
Web browsers allow users to access and navigate
websites and web-based applications over the internet.
They use network protocols such as HTTP and HTTPS to
retrieve web content.
Email Clients:
Examples: Microsoft Outlook, Apple Mail, Gmail
Email clients facilitate the sending, receiving, and
management of email messages over email servers,
typically using protocols like SMTP, IMAP, and POP3.
File Transfer Protocols:
Examples: FTP (File Transfer Protocol), SFTP (Secure
File Transfer Protocol)
These applications enable the transfer of files between
devices and servers. FTP and SFTP ensure secure and
efficient file exchange over networks.

CHAPTER-7
Building and Securing a Small Network

Designing and Protecting Small-Scale Networks


To build a small network, you’ll need the following
essential components:
Switches: Connect multiple devices (computers, printers,
servers) together, enabling them to share resources and
communicate with each other.
Routers: Connect multiple switches (and their respective
networks) together, allowing devices to communicate
with each other and access the Internet.
Network Devices: Other devices like firewalls, intrusion
prevention systems (IPS), and protocol analyzers can be
added to enhance network security and performance.
Tips for Building a Small Network

Use business-grade switches and routers, as consumer-


grade devices may not provide the necessary reliability
and scalability.
Design your network with redundancy in mind, ensuring
that devices can continue to function even if one fails.
Plan for growth, choosing devices and configurations that
can adapt to changing network needs.
Consider using a network management system to monitor
and troubleshoot your network.
Securing a Small Network

To secure your small network, focus on the following:

Authentication: Implement username and password


authentication, and consider using multi-factor
authentication (MFA) for added security.
Authorization: Control access to network resources and
devices based on user roles and permissions.
Accounting: Monitor and record user activity to detect
and respond to security incidents.
Encryption: Use secure protocols like SSH and HTTPS to
encrypt data transmitted over the network.
Firewall and IPS: Configure firewalls to control
incoming and outgoing traffic, and implement IPS to
detect and block malicious attacks.
Regular Updates: Keep network devices and software up-
to-date with the latest security patches and firmware.
Best Practices

Use strong passwords and regularly change them.


Limit access to sensitive areas of the network.
Monitor network traffic and logs for suspicious activity.
Implement a incident response plan to quickly respond to
security breaches.
Consider hiring a network administrator or IT
professional to manage and maintain your network.
By following these guidelines, you’ll be well on your
way to building and securing a reliable and secure small
network for your business.
CHAPTER-8

SUMMARY

interconnected devices that communicate with each other


to exchange data, share resources, and provide services.

Key Components:

Hardware: Devices such as personal computers,


smartphones, routers, switches, bridges, repeaters,
servers, and firewalls.
Software: Operating systems, protocols (e.g., HTTP,
HTTPS, SMTP, FTP), and network management tools.
Protocols: Rules that govern data exchange, including
communication protocols (e.g., TCP/IP), addressing
schemes (e.g., IP), and error detection and correction
mechanisms.
Addresses: Unique identifiers assigned to devices,
including IP addresses (32-bit or 64-bit) and MAC
addresses (12-character strings).
Network Types:

Local Area Network (LAN): Confined to a building or


campus, operating at high speeds with minimal
propagation delay.
Metropolitan Area Network (MAN): Covers a larger
geographic area, such as a town or city, operating at
moderate speeds.
Wide Area Network (WAN): Spans a wide geographic
area, such as a country or continent, operating at slower
speeds.
Network Models and Standards:

Network models: Guiding principles for network design


and engineering, such as the OSI (Open Systems
Interconnection) model.
Network standards: Established laws and regulations,
such as IEEE (Institute of Electrical and Electronics
Engineers) standards, that govern network
communications.
Network Functions:

Switching: Connecting devices to a network, controlling


data flow, and providing network segmentation.
Routing: Directing data packets between networks, using
routing tables and algorithms.
Wireless networking: Using radio waves to transmit data
over the air, enabling devices to connect without cabling.
Network Security:

You might also like