Вы находитесь на странице: 1из 15

MID TERM TRAINING REPORT

OF

SIX MONTHS INDUSTRIAL TRAINING,


UNDERTAKEN

AT

“INFOWIZ”
IN

“CCNA”

ON

“FRAME RELAY”

SUBMITTED IN PARTIAL FULFILLMENT OF THE DEGREE

OF

BACHELOR OF ENGINEERING

IN
ELECTRONICS & COMMUNICATION ENGINEERING
Under the Supervision of: Submitted By:
Name: Varinder Singh Walia Name: Lavish Gambhir
Designation: Network Associate University Roll No.: CUN130102081
Department: CCNA

CHITKARA UNIVERSITY
CHANDIGARH-PATIALA NATIONAL HIGHWAY,
VILL.JHANSLA, TEHSIL, RAJPURA,
DISTT. PATIALA 140401

1
ACKNOWLEDGEMENT

PREFACE

2
CONTENTS

3
Sr. No. Topic Page No.

1. Company Profile 5

2. Introduction to Assigned job 6

3. Modular description of the job 7

4. Detailed description of individual module 8

5. Project undertaken 14

6. Practical Application 15

7. Conclusion

8. References

1. Company Profile

4
2. Introduction
5
The assigned job in this course is to understand, configure, operate and troubleshoot
medium-level switched and routed networks and the verification and
implementation of connection via remote sites using WAN. There are different
topics covered under CCNA, such as:

1. OSI Models
2. IP Addressing
3. Routing protocols (includes EIGRP, RIP and OSPF)
4. Network Security and management

The assigned job is to have good insight of these topics, for instance, dividing a
network into different subnets and assigning different subnets to different
offices/users by implementing different routing protocols based on the situation.
All these things are necessary in order to build effective solutions to networking
problems as well as deploying network security solutions as well as configuring
and installing various network devices and services (e.g., routers, switches,
firewalls, VPN). The course also includes performing network maintenance and
system upgrades including service packs, patches and security configurations as
well as monitoring performance and system resource utilization in order to insure
availability and reliability.

3. Description of job

6
1. Establishing the networking environment by designing system configuration,
direction system installation, defining, documenting and enforcing system
standards.

2. The design and implementation of new solutions and improving resilience of


the current environment.

3. Maximizing network performance, troubleshooting network problems and


outages, scheduling upgrades and collaborating with network architects on
network optimization.

4. Undertaking data network fault investigations in local and wide area


environments, using information from multiple sources.

5. The support and administration of firewall environments.

6. Reporting network operational status by gathering and prioritizing information


and managing projects.

7. The configuration of routing and switching equipment.

8. The configuration of hosted IP services.

9. Implementing different types of network, such as CAN (Campus Area


Network) using VOIP.

4. Detailed Description

Different topics covered in the course:

1. Networking

7
Networking is a practice of linking two or more computing devices such as PCs,
printers, faxes etc., with each other. Connection between two devices is through
physical media or logical media to share information, data and resources.
Networks are made of hardware and software.

2. Categories of network

Networks can be categorized as per the geographical area to be covered by the


network,

 Personal Area Network (PAN)

8
Computer network organized around a single individual within the
same building/area, for example, a personal Wi-Fi hotspot created
from a mobile phone.

 Local Area Network (LAN)

LAN is a computer network that is used to connect computers and


work station to share data and resources such as printers or faxes.
Devices used in LAN are: HUB and Switch. It mostly relies on wired
connection for increased speed and security. If wireless, then the
LAN is called WLAN.

 Metropolitan Area Network (MAN)

Computer network spread across an entire city, that is, different


LANs on different locations connected together at same place. It act
as a high speed network to allow sharing resources with in a city.
When this type of network is specifically designed for a college
campus, it is referred to as a Campus Area Network (CAN), as in
CAN, different LANs are connected together at the same place.

9
 Wide Area Network (WAN)
WAN covers a wide geographical area which include multiple
computers or LANs. It connects networks through public networks
like telephone system, microwave, satellite links or leased lines.
Most of the WANs use leased line for internet access as they provide
faster data transfer. WAN helps an organization to establish network
between all its departments and offices located in different or same
cities.

3. OSI Model

Open System Interconnection is a standard based model, adopted because older


models were proprietary, controlled by one vendor, slowly developed. OSI
supports multivendor software.

10
4. IP Address and MAC Address

It is also called as logical address. IPv4 is 32 bit long and IPv6 is 64 bit long.
IPv4 is divided into 4 octets and IPv6 is divided into 6 octets. IPv4 supports
broadcasting, multicasting while IPv6 doesn’t support broadcasting. IPv4 is
divided into 5 classes while IPv6 doesn’t support classes.

Basically, IP address is used to uniquely identify specific devices on a particular


network.

11
MAC address is a hardware address that is embedded in the NIC. It is also
knowing as hardware address or physical address. Every NIC has a unique
MAC address. MAC address is the combination of OUI and SA. It is 48bit
address.

5. Routing Protocols

In order to route packets from different locations, we need to do routing.


Routing is further of three types: static, default, dynamic. Static and default
routing is useful for small networks but as the size and the complexity of the
network increases, we need to use dynamic routing but static and default routing
have less overhead as compared to dynamic routing protocols.
Further, dynamic routing is divided into two categories:

1. Interior Gateway
2. Exterior Gateway

Interior gateway contains distance vector (RIP) and link state protocol (OSPF).
Exterior gateway contains BGP.

 RIP

The Routing Information Protocol defines a way routers, which connect


networks using the Internet Protocol, to share information about how to
route traffic among networks. RIP is classified by the Internet
Engineering Task Force (IETF) as an Interior Gateway Protocol (IGP),
one of the several protocols moving traffic around within a larger
autonomous system network. Each RIP router maintains a routing table,
which is a list of all the destinations it knows how to reach, along with
the distance to that destination. RIP uses distance vector algorithm to
decide which path to put a packet on to get to its destination. Using RIP,
each router sends its entire routing table to its closest neighbors every
30 seconds. RIP uses hop count as a way to determine the network
distance.

 EIGRP

The Enhanced Interior Gateway Routing Protocol is a network protocol


that lets routers exchange information more efficiently than with earlier
network protocols. EIGRP evolved from IGRP (Interior Gateway
Routing Protocol) and routers using either EIGRP and IGRP can
interoperate because the metric (criteria used for selecting a route) used
12
with one protocol can be translated into the metrics of the other protocol.
EIGRP can be used not only for Internet Protocol (IP) networks but also
for AppleTalk and Novell NetWare networks. Using EIGRP, a router
keeps a copy of its neighbor's routing tables. If it can't find a route to a
destination in one of these tables, it queries its neighbors for a route and
they in turn query their neighbors until a route is found. When a routing
table entry changes in one of the routers, it notifies its neighbors of the
change only (some earlier protocols require sending the entire table). To
keep all routers aware of the state of neighbors, each router sends out a
periodic "hello" packet. A router from which no "hello" packet has been
received in a certain period of time is assumed to be inoperative.

 OSPF

Routers connect networks using the Internet Protocol (IP), and OSPF
(Open Shortest Path First) is a router protocol used to find the best path
for packets as they pass through a set of connected networks. OSPF is
designated by the Internet Engineering Task Force (IETF) as one of
several Interior Gateway Protocols (IGPs) -- that is, protocols aimed at
traffic moving around within a larger autonomous system network like
a single enterprise's network, which may in turn be made up of many
separate local area networks linked through routers. The OSPF routing
protocol has largely replaced the older Routing Information Protocol
(RIP) in corporate networks. Using OSPF, a router that learns of a
change to a routing table (when it is reconfigured by network staff, for
example) or detects a change in the network immediately multicasts the
information to all other OSPF hosts in the network so they will all have
the same routing table information. Unlike RIP, which requires routers
to send the entire routing table to neighbors every 30 seconds, OSPF
sends only the part that has changed and only when a change has taken
place. When routes change -- sometimes due to equipment failure -- the
time it takes OSPF routers to find a new path between endpoints with
no loops (which is called "open") and that minimizes the length of the
path is called the convergence time.

 BGP

BGP (Border Gateway Protocol) is protocol that manages how packets


are routed across the internet through the exchange of routing and
reachability information between edge routers. BGP directs packets
between autonomous systems (AS) -- networks managed by a single
enterprise or service provider. Traffic that is routed within a single
network AS is referred to as internal BGP. More often, BGP is used to
connect one AS to other autonomous systems, and it is then referred to
as an external BGP. BGP offers network stability that
guarantees routers can quickly adapt to send packets through another
reconnection if one internet path goes down. BGP makes routing
decisions based on paths, rules or network policies configured by a
network administrator. Each BGP router maintains a standard routing

13
table used to direct packets in transit. This table is used in conjunction
with a separate routing table, known as the routing information base
(RIB), which is a data table stored on a server on the BGP router. The
RIB contains route information both from directly connected
external peers, as well as internal peers, and continually updates the
routing table as changes occur. BGP is based on TCP/IP and uses client-
server topology to communicate routing information, with the client-
server initiating a BGP session by sending a request to the server.

5. Project Undertaken

To draw and implement model of company with frame relay. Frame relay is a
packet-switching telecommunication service designed for cost-efficient data
transmission for intermittent traffic between local area networks(LANs) and
between endpoints in wide area network(WANs). Frame relay puts data in a
variable-size unit called a frame and leaves any necessary error correction
(retransmission of data) up to the endpoints, which speeds up the overall data
transmission. For most services, the network provides a permanent virtual circuit
(PVC), which means that the customer sees a continuous, dedicated connection
without having to pay for a full-time leased line, while the service provider figures
out the router each frame travels to its destination and can charge based on the
usage. An enterprise can select a level of service quality, prioritizing some frames
and making other less important. A number of service providers, including AT&T,
offer frame relay and it’s available on fractional T-1 or full T-carrier system
carriers.

6. Practical Application

Frame relay is based on the older X.25 packet-switching technology that was
designed for transmitting analog data such as voice conversations. Unlike X.25,
which was designed for analog signals, frame relay is a fast packet technology,
which means that the protocol does not attempt to correct errors. When an error is
detected in a frame, it is simply dropped (that is, thrown away). The end points are
responsible for detecting and retransmitting dropped frames. Frame relay is often
used to connect LANs with major backbones as well as on public wide area
networks and also in private network environments with leased T-1 lines. It requires
a dedicated connection during the transmission period and is not ideal for voice or
video, which require a steady flow of transmissions. Frame relay transmits packets
at the data link layer of the Open Systems Interconnection (OSI) model rather than
at the network layer. A frame can incorporate packets from different protocols such
as Ethernet and X.25. It is variable in size and can be as large as a thousand bytes
or more.

7. References

14
 www.google.com

 www.lifewire.com

 www.searchunifiedcommunications.techtarget.com

15

Вам также может понравиться