Академический Документы
Профессиональный Документы
Культура Документы
A
PRACTICAL TRAINING REPORT
ON
³
´
TAKEN AT
³
RAJASTHAN TECHNICAL UNIVERSITY
Session 2010-2011
SUBMITTED TO SUBMITTED BY
Mrs. Kuntal Gaur KALRA CHIRAG
Seminar Coordinator Computer Engg
VII SEM CS VII SEM CS C
BMIT-JAIPUR 07EC024
BMIT-JAIPUR
c
c 0
c
c è
c
Summer training is an important part of the engineering curriculum. The B.Tech. course
summer training helps a student in getting acquainted with the manner in which his/her
knowledge is being practically used outside his/her institute and this is normally different
from what he/she has learnt from books. Hence, when the student switches from the process
of learning to that of implementing his/her knowledge, he/she finds an abrupt change. This is
exactly why summer training session during the B.Tech. curriculum becomes all the more
important. Summer training is prescribed for the student of Technical College as a part of the
four year degree course of engineering by the AICTE. We are required to undergo summer
training for a period of 30 days in our 6th sem before the commencement of final exams. The
main objectives of summer training are:
A Correlate courses of study with the way industry or potential workplace operates
A Its business or work using technology.
A Work on implementing what has been learned in school, especially true for Computer
Science under-graduates.
c
c º
I am over whelmed in all humbleness and gratefulness to acknowledge my depth to all those
who have helped me to put these ideas, well above the level of simplicity and into something
concrete.
I am very thankful to my guide Mrs. KUNTAL GAUR (project coordinator) for her valuable
help. She was always there to show me the right track when i needed her help. With the help
of her valuable suggestions, guidance and encouragement, i was able to perform this project
work.
I would also like to thank Mr. Rajeev(ccna faculty) and Mr. Aarif Sheikh(IIHT Manager)
who helped me In every way I wanted.
I would also like to thank my colleagues, who often helped and gave me support at critical
junctures during the making to this project.
KALRA CHIRAG
VII SEM CS
c
c
INDEX
S.NO TOPIC PAGE NO.
1. CERTIFICATE«««««««««««««««««««««««««..2
2. PREFACE«««««««««««««««««««««««««««..3
3. ACKNOWLEDGEMENTS«««««««««««««««««««..«.4
4. LOCAL AREA NETWORK«««««««««««..«««««««««6
5. WIDE AREA NETWORKING OVERVIEW .«««««««««««..«..10
6. OSI MODEL««««..««««««««««««««««««««««12
7. DEVICES AT DIFFERENT LAYERS««««««««««««««««.16
8.LAN TECHNOLOGIES ««««««««««««««««««««.«..16
9. ROUTER ADMINISTRATION «««««««««««««««««.«..19
10.THE TCP/IP PROTOCOL SUITE««««.««««««««««««««24
11. IP SUBNETTING «...«... «««««...«««««««««««««««.26
12. IP ROUTING ««««««««««...«««««««««««««««..27
13. LAN SWITCHING.«««««««««««««««««««««««...35
14. VLAN««««««««««««««««««««««.«««««««36
15. ACL«««««««««««««««««««««««««««.«««36
16. CONCLUSION «««««««««««««««««««««««««..38
17. REFRENCES««««««««««««««««««««««««««..39
c
c Î
Servers
While servers often are spoken of in almost mystical tones, they are really just powerful
computers running specialized software designed to share files, manage printers, or perform
any other specialized task assigned. Most of these computers are powerful enough to do more
than one thing at a time; for example, a single network server might be a file server, a print
server, and a mail server simultaneously.
c
c £
File server.
A file server is essentially the computer equivalent of a filing cabinet. Documents,
spreadsheets, and other (computer) files are stored on a file server, just as paper documents
are stored in a filing cabinet. The file server's job is to make those files available to computer
users on the LAN and, when appropriate, allow the users to update the files.
Print server.
A print server is a piece of software or hardware that manages print jobs submitted by users.
When a document is sent to a networked printer, the print server receives the job and queues
it (puts it in line behind previously submitted jobs). When a job gets to the front of the queue,
the print server sends it to the printer. It is not necessary to buy an individual printer for each
personal computer. Users in classrooms or offices often share printers, since not everyone is
typically printing at the same time. This option can save an agency a great deal of money.
Mail server.
The third common type of server is a mail server. The mail server acts as the conduit to the
outside world as messages are sent and received. Some servers are set up so that all of the
mail stays on the mail server until a user actively deletes it. In other configurations, the user
is able to move the mail from the server to the desktop computer. This process, called
"downloading," uses less space on the mail server.
Router
A router is a piece of equipment that acts as the interface between a local network and the
Internet, by routing traffic from one to the other. A router may be a computer dedicated to
managing the traffic of a WAN, or it may be a piece of software running on a computer that
is configured for other tasks as well. Routers also may be used in LANs to route internal
traffic.
Firewall
A critical component of any network is a firewall. A firewall in layman's terms is a wall that
acts as a firebreak²it keeps a fire from spreading. In this sense, a computer firewall keeps a
network secure from hackers (the "arsonists" of the Internet) by denying access to all or part
of the network. Management of firewalls requires a great deal of expertise. While the network
administrator must ensure that no unwanted traffic can enter the network from outside, a level
of access to and from the Internet must be created that will permit authorized users to conduct
their business safely and efficiently. A solid, well-designed firewall is critical to ensure that
only authorized users have access to a restricted network. Like routers and servers, firewalls
are available as either hardware or software. Choosing a firewall for a particular network is
an issue best addressed at the local level, after reviewing the options available.
!
c
c Ë
all times by requesting an assessment of the provider's typical bandwidth and connection
speed at different times of the day and on different days of the week.
Cable Modems
Cable modems have become, in recent years, the most popular broadband technology for
home computer users. The cable modem uses the same coaxial cable that carries cable TV
signals for high-speed data transmission. While not as robust as fiber optic connections, cable
modems can provide similar quality service at a fraction of the cost. The quality of a cable
modem connection, however, is dependent on the overall quality of the cable modem
provider's network, and the more people accessing the provider's network at the same time,
the slower each individual's connection to the Internet will be. Speed ranges from under 1 to
8 Mbps; costs are generally $100 to $250 per month for commercial users. Because of the
historically strong connection between education and the cable television community, many
schools are using cable modems. When contracting to provide cable service to a city or
county, the cable company typically makes the commitment to provide one cable connection
and one modem to each school within the service area of the cable company. There are cases,
however, in which cable companies have provided additional services.
Satellite
Some larger agencies have considered buying space on a satellite to upload and download
files. While the cost of transmitting information over wires would be removed, satellite
reliability is debatable. Weather (such as rain) or even sunspots can affect satellite
transmission.
Cellular Wireless
Traditionally, Internet access over cellular telephone networks has been slow and somewhat
unreliable. Wireless technology, however, is coming of age, and new, significantly faster
Internet connection services are offered throughout the United States. While these "third
generation wireless" services (generally referred to as 3G services) are not necessarily
suitable for building use, they may suit the needs of individuals within the agency as they
maintain contact with each other during the work day. Already, cellular phones are replacing
"walkie-talkies" in many secondary schools. It is still too soon to tell how much t hese
services will cost, but they will probably be metered, with cost depending upon the amount of
usage.
Fixed Wireless
Fixed wireless refers to the operation of wireless devices in a fixed location. Unlike mobile
wireless devices, which are battery powered, fixed wireless devices are electrically powered.
The basic idea behind fixed wireless is that the traditional wired connection (e.g., fiber optic,
telephone line, or cable TV line) is replaced by a high speed wireless connection. Depending
on the technology, bad weather (such as rain) can significantly interfere with fixed wireless
services. This service is usually most attractive in communities where traditional wired
connections are not available; however, the technology is also suitable for urban are as.
#
c
c p
Fixed wireless speed varies considerably, from under 1 Mbps to upwards of 15 Mbps. Cost
also varies widely
Objectives
The
presents a set of general
guidelines for configuring the following software components:
ÈATM
ÈFrame Relay
ÈSMDS
Organization
The
includes the following chapters:
ÈConfiguring ATM
Introduction to NETWORKING
Network is the method to share hardware resources and software resources. We can share the
resources with the help of operating system like windows, Linux, UNIX etc. To connect
multiple networks we have to use internetworking devices like router, bridge, layer 3,
switches etc.
$
c
c pp
1. Software
2. Protocol Stack
3. Network Interface Card
4. Media
Software
Networking software can be divided in two categories:
Client software: The software which is used to access service provided by server^
( (
% '
&
&
IIS, Outlook
,
,
Design Considerations
Server software and Client software should be compatible.
c
c p0
Application layer accepts data and forward into the protocol stack. It creates user
interface between application software and protocol stack^
c
c pè
Presentation Layer: -
This layer decides presentation format of the data. It also able to performs other
function like compression/decompression and encryption/decryption.
Jpg file
Online song
Session Layer: -
This layer initiate, maintain and terminate sessions between different applications.
Due to this layer multiple application software can be executed at the same time.
Telephone trunk
Transport Layer: -
Transport layer is responsible for connection oriented and connection less
communication. Transport layer also performs other functions like
c
c pº
(a) Buffering
Buffer is the temporary storage area. All the data is stored in the buffer
memory and when communication ability is available the data is forward
to another.
(b) Windowing
Windowing is the maximum amounts of the data that can be send to
destination without receiving Acknowledgement. It is limit for buffer to
send data without getting Acknowledgement.
(c) Multiplexing
Multiplexing is used for multiple application on same IP ^
(iii) Sequencing
Transport layer add sequence number to data, so that out of sequence data can
be detected and rearranged in proper manner
! "
^ "
!
"
" "" ^
Network Layer
This layer performs function like logical addressing and path determination. Each
networking device has a physical address that is MAC address. But logical addressing
is easier to communicate on large size network.
Its other responsibilities are:
Logical addressing defines network address and host address. This type of addressing
is used to simplify implementation of large network. Some examples of logical
addressing are: - IP addresses, IPX addresses etc.
Path determination
Network layer has different routing protocols like RIP, EIGRP, BGP, and ARP etc. to
perform the path determination for different routing protocol^
Logical Link Control defines the encapsulation that will be used by the NIC to
delivered data to destination. Some examples of Logical Link Control are ARPA
(Ethernet), 802.11 wi-fi.
Media Access Control defines methods to access the shared media and establish the
identity with the help of MAC address. Some examples of Media Access Control are
CSMA/CD, Token Passing.
Physical Layer
Physical Layer is responsible to communicate bits over the media this layer deals with
the standard defined for media and signals. This layer may also perform modulation
and demodulation as required^
c
c pÎ
Data Encapsulation
# $% $% $%& $%'
DCE: - DCE convert the bits into signal & send them on media.
FDDI ± Fiber Distributed Data Interface
Switch forwards frames on the base of MAC address.
Router forwards packets on the base of IP address.
LAN TECHNOLOGIES
ETHERNET
In these days, we use Ethernet with switches and in switches the technology is made
CSMA/CA (Collision Avoidance). So this reason Ethernet is best compare with Token Ring,
FDDI & Wi-Fi.
c
c p£
C M /C
i l it lli i t
?
!
c
c pË
Collision domain
Broadcast domain
Advantages of Switches: -
"
c
c pâ
Rt
iit ti
Rt
itt
c
c
!
(
CtR R
t
t ill
tt
t t ill l i
t
t
t i t t
ti t l
itt
t
t ill
tt il l
Compact Flash: X
)
(3) NVRAM
NVRAM is a ³Non Volatile Random Access Memory´. It is used to
store the configuration of the Router. The size of NVRAM is 8 KB to
512 KB.
(4) RAM
Ram of the router is divided into two logical parts.
Primary RAM
Primary RAM is used for: -
Shared RAM
Shared RAM is used as a buffer memory to shared the data received from different
interfaces. Size of ram in a router may vary from 2 mb to 512 mb. The types of
memory that may be present in a ram are: -
Click the Start button on the Windows Taskbar, and select Programs > Accessories >
Communications > HyperTerminal. HyperTerminal launches and displays the Connection
Description dialog box. Type any name
c
c 00
User mode
Privileged mode
Global configuration
Configuring Passwords
There are five types of password available in a router
p Console Password
router#configure terminal
router(config)#line console 0
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit
router#configure terminal
router(config)#line vty 0 4
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit
Auxiliary Password
router#configure terminal
router(config)#line Aux 0
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit
Enable Password
router>enable
router#configure terminal
router(config)#enable password <word>
router(config)#exit
c
c 0è
Enable Password is the clear text password. It is stored as clear text in configuration where as
enable secret password is the encrypted password with MD5 (Media Digest 5) algorithm.
Router#configure terminal
Router(config)#enable secret <word>
Router(config)#exit
Router#configure terminal
Router(config)#service password-encryption
Managing Configuration
There are two types of configurations present in a router
Running Configuration is present in the Primary RAM wherever we run a command for
configuration, this command is written in the running configuration^
To display running-configuration
Router#show running-configuration
c
c 0º
Save[y/n]:n
To save configuration
Router#copy running-config startup-config
Or
Router#write
To abort configuration
Router#copy startup-config running-config
Telnet access*
Telnet is a virtual port through which we can access router command line using interfaces
c
+
Application layer use port no¶s to identity each application at Transport layer. This
layer performs most of functions, which are specified by the Application, Presentation, and
Session layer of OSI model.
Transport Layer
Two protocols are available on Transport layer
c
c 0
TCP performs connection-oriented communication. Its responsibilities are: -
Source Port and Destination Port fields together identify the two local end points of the
particular connection. A port plus its hosts¶ IP address forms a unique end point. Ports are
used to communicate with the upper layer and distinguish different application sessions on the
host.
The Sequence Number and Acknowledgment Number fields specify bytes in the byte stream.
The sequence number is used for segment differentiation and is useful for reordering or
retransmitting lost segments. The Acknowledgment number is set to the next segment
expected.
Data offset or TCP header length indicates how many 4-byte words are contained in the TCP
header.
The Windowfield indicates how many bytes can be transmitted before an acknowledgment is
received.
The Checksum field is used to provide extra reliability and security to the TCP segment.
The actual user data are included after the end of the header.
UDP header is responsible for error checking and identifying applications using port numbers^
c
c 0Î
Internet Layer
The main function of Internet layer is routing and providing a single network interface to the upper
layers protocols. Upper or lower protocols have not any functions relating to routing. To prevent this,
IP provides one single network interface for the upper layer protocols. After that it is the job of IP and
the various Network Access protocols to get along and work together. The main protocols are used in
Internet layer:-
Internet Protocol
This protocol works at internet layer. It is responsible for logical addressing, defining type of
service and fragmentation^
c
c 0£
Source Port and Destination Port fields together identify the two local end points of the
particular connection. A port plus its hosts IP address forms a unique end point. Ports are used
to communicate with the upper layer and distinguish different application sessions on the
host.
The Sequence Number and Acknowledgment Number fields specify bytes in the byte stream.
The sequence number is used for segment differentiation and is useful for reordering or
retransmitting lost segments. The Acknowledgment number is set to the next segment
expected.
Data offset or TCP header length indicates how many 4-byte words are contained in the TCP
header.
Window indicates how many bytes can be transmitted before an acknowledgment is received.
Checksum is used to provide extra reliability and security to the TCP segment.
User data represents the actual data which are always included at end of the header^
IP Subnet
In TCP/IP by default three sizes of networks are available: -
In subneting, we will divide class A,B & C network into small size sub networks. This
procedure is called subneting.
Subneting is performed with the help of subnet mask. There are two types of subneting that
we performed: -
p Path determination
The process of obtaining path in routing table is called path determination. There are three
different methods to which router can learn path.
Packet forwarding
It is a process that is by default enable in router. The router will perform packet
forwarding only if route is available in the routing table.
Static Routing
In this routing, we have to use IP route commands through which we can specify routes for
different networks. The administrator will analyze whole internetwork topology and then
specify the route for each n/w that is not directly connected to the router
(&,-+ (&(++(- +.
Router>en
Router0#conf t
Router(config)#int s1/0
Router(config)#no shut
Router(config)#exit
"
c
c 0â
Router>en
Router1#conf t
Router(config)#int s 1/0
Router(config)#no shut
Router(config)#exit
Router#conf t
Router(config)#int s 1/1
Router(config)#no shut
Router(config)#exit
Router>en
Router2#conf t
Router(config)#int s 1/0
Router(config)#no shut
Router(config)#exit
+(- ,
For Router 0
For Routert 1
#
c
c è
For Router 2
Features of RIP: -
Distance Vector
Open standard
Broadcast Updates
(255.255.255.255)
Metric - Hop Count Timers
Update 30 sec
Invalid 180 sec
Hold 180 sec
Flush 240 sec
Loop Control
Split Horizon
Triggered Updates
Maximum Hop Count
Hold Down
RIP CONFIGURATION
Router 0
Router 1
Router 2
Router 3
c
c è0
Router(config)#network 10.0.0.0 255.0.0.0
Router 4
Router 5
(1) Each router will send Hello packets to all neighbors using all interfaces.
(2) The router from which Hello reply receive are stored in the neighborship table. Hello
packets are send periodically to maintain the neighbor table.
(3) The router will send link state information to the all neighbors. Link state information
from one neighbor is also forwarded to other neighbor.
(4) Each router will maintain its link state database created from link state advertisement
received from different routers.
(5) The router will use best path algorithm to store the path in routing table^
(2) More hardware resources required that is processor and memory (RAM)
* Cisco proprietary
* Hybrid protocol
Link State
c
c èè
Distance Vector
* Multicast Updates using
Address 224.0.0.10
* Support ASN
* Support VLSM
* Automatic Route Summarization
* Unequal path cost load balancing
* Metric (32 bit composite)
Bandwidth
Delay
Load
Reliability
MTU
* Neighbor Recovery
* Partial updates
* Triggered updates
* Backup Route
* Multi Protocol Routing
* Link State
* Open standard
* Multicast updates
224.0.0.5
224.0.0.6
* Support VLSM
* Support Area similar to AS
* Manual Route Summarization
* Hierarchical model
* Metric Bandwidth
* Equal path cost load balancing
* Support authentication
* Unlimited hop count
c
c èº
(&,-+ ((&(&+(- ,
c
c è
LAN Switching
Ethernet switches are used in LAN to create Ethernet networks. Switches forward the traffic
on the basis of MAC address. Switches maintain a switching table in which MAC addresses
and Port No are used to perform switching decision. Working of bridge and switch is similar
to each other.
Classification of switches
Switches are classified according to the following criteria: -
c
c èÎ
VTP server
VTP server is a switch in which we can create, delete or modify Vlans. The server will send
periodic updates for VTP clients.
VTP client
On VTP client, we are not able to create, modify or delete Vlans. The client will receive and
forward vtp updates. The client will create same Vlans as defined in vtp update.
VTP Transparent
Transparent is a switch, which will receive and forward VTP update. It is able to create,
delete and modify Vlans locally. A transparent will not send its own VTP updates and will
not learn any information from received vtp update.
c
c è£
!
c
c èË
CONCLUSION
So after making my project report and completing my summer training I have concluded
many new things and now I learnt the importance of summer training, and learnt about the
experience of working in an industry and how the atmosphere is in an IT industry.
I also learnt very deeply about networking and all its fundamentals and so I can say that I
have the potential to withstand in any networks related company and I can survive there with
my abilities and qualities I have gained during my summer training.
I also got a very good experience to work with my faculties and my seniors who worked very
generously and I learnt how to tackle every problem coming between your way to success.
"
c
c èâ
REFERENCES
Websites from which I got the reference about my content
A www.Google.com
A www.cisco.com
A www.w3schools.com
A www.docstoc.com
Reference Books
A Cisco Press
A kross & ross
A Tenenbaum
#
c
c º
$
c
c ºp
c
c º0
c
c ºè
c
c ºº
c