six weeks it training on ccna

Embed Size (px)

Citation preview

  • 7/24/2019 six weeks it training on ccna

    1/69

    TRAINING REPORT

    OF

    SIX WEEK INDUSTRIAL TRAINING, UNDERTAKEN

    AT

    NETMAX TECHNOLOGIES PVT.LTD.

    IN

    NETWORKING DEPARTMENT

    ON

    INTRANET ENTERPRISE CONNECTION

    SUBMITTED IN PARTIAL FULFILLMENT OF THE DEGREE

    OF

    BE (electr!"c# $!% c&&'!"c$t"!

    U!%er t)e G'"%$!ce *+ S'&"tte% B-+

    N$&e+ Mr. R$/"!%er S"!0) N$&e+ S'#)"l T)$1'r

    De#"0!$t"!+ C"#c Tr$"!er I% 2 B344

    CCIE(567787

    De9$rt&e!t+ Net/r1"!0

    Page | 1

  • 7/24/2019 six weeks it training on ccna

    2/69

    .

    ACKNOWLEDGEMENT

    I express my sincere gratitude to Mr. R$/"!%er S"!0) *rgiving me opportunity of

    undergoing SIX WEEKS INDUSTRIAL TRAINING AT NETMAX

    TECHNOLOG: PVT. LTD., Chandigarh. I would lie to than Mr. R$/"!%er S"!0),

    and all executives for their valua!le guidance, support and encouragement. "ithout their

    encouragement and moral !oosting, it would not have !een possi!le to accomplish this

    tas successfully. I would lie than Mr.H$r#)$r$! Se)0$l#training and placement

    officer$ for giving me an opportunity of undergoing this training.

    I am extremely grateful to all technical staff of NETMAX TECHNOLOG: PVT.

    LTD, Chandigarh for their Co%&peration and guidance that has helped me a lot during

    the course of training. I will always !e thanful to them for this valua!le guidance to me.

    'ame ( Sushil )haur

    *niversity +oll 'o ( 1----/0

    2ear ( 3 #3C3$ 4)52ear #IX Semester$

    College ( CS&3) #addi 5.P$

    Page |

  • 7/24/2019 six weeks it training on ccna

    3/69

    PREFACE

    6 lot of effort has !een made to mae this pro7ect report interesting and a learning experience for us.

    )he report has !een explained with the help of diagrams and figures. )he su!7ect matter has !een

    compiled in a simple, illustrative and lucid manner.

    )his pro7ect report contains the description a!out integration of various networ devices with / rdparty

    software which is Pacet )racer. 8irst we done the feasi!ility study of that, then we have made the

    technical specifications for this tas and get done with the help of networing technical team.

    9y pro7ect is a!out connecting different offices of an enterprise spanned over wide area networ. "e

    will use pu!lic infrastructure to fulfill this purpose. 3nterprise will !e running ipv: routed protocols

    and wide area networ will have ipv4 protocol. In "ide 6rea 'etwor we will have a com!ination of

    routing protocols eigrp and ospf and redistri!ution will !e used to allow route exchange !etween them.'at technology is also used to convert private ip;s into pu!lic ip;s.

    "e will also configure dhcp server in ipv4 domain to assign ip addresses dynamically to end devices.

    Some policies will !e used to restrict access among devices of different offices.

    Page | /

  • 7/24/2019 six weeks it training on ccna

    4/69

    INDEX

    1. About

    Company.................................................................................................

    ............... 72. Networking

    Basics

    8-

    ;. Prect Re;44 N R'ter 6

    ;.;C"#c WS>C;?=4 86PS ?

    ;.6C"#c WS>C8@?4 86PS ?

    ;.? Serer =

    ;.= L$9t9 De#1t9 Pc =

    Page | 4

  • 7/24/2019 six weeks it training on ccna

    5/69

    6. M%el U#e%........................................................................................................................... 7

    6.3)hePrce##A99l"c$t"! L$-er Prtcl#

    6.3.3 Tel!et

    6.3.8 F"le Tr$!#*er Prtcl (FTP @

    6.3.; S"&9le M$"l Tr$!#*er Prtcl (SMTP @

    6.3.6 P#t O**"ce Prtcl (POP @

    6.3.? Sec're S)ell (SSH @

    6.3.= H-9ertet Tr$!#*er Prtcl (HTTP @

    6.3.7 S"&9le Net/r1 M$!$0e&e!t Prtcl (SNMP @

    6.3. D&$"! N$&e Ser"ce (DNS 34

    6.3.@ D-!$&"c H#t C!*"0'r$t"! Prtcl (DHCP

    Bt#tr$9 Prtcl (BtP 34

    6.8 T)e H#t>t>H#t L$-er Prtcl 33

    6.8.3 Tr$!#&"##"! C!trl Prtcl (TCP 38

    6.8.8 U#er D$t$0r$& Prtcl (UDP 3;

    6.; T)e I!ter!et L$-er Prtcl 3?

    6.;.3 I!ter!et Prtcl 3?

    6.;.8 I!ter!et C!trl Me##$0e Prtcl (ICMP 37

    6.;.; A%%re## Re#l't"! Prtcl (ARP 37

    ?. S*t/$re Re

  • 7/24/2019 six weeks it training on ccna

    6/69

    7 Cre$t"!0 Vl$!# ;4

    7.3 A##"0!"!0 Prt *r P$rt"c'l$r Vl$! ;8

    7.8 Cre$t"!0 I!ter$l ;8

    7.; Cre$t"!0 STP (S9$!!"!0 Tree Prtcl Fr Vl$! ;6

    7.6 Sett"!0 Fr$&e Rel$- C!!ect"! ;?

    7.? E!$l"!0 R't"!0 T C!!ect Re&te Are$# ;=

    7.= N$t I&9le&e!t$t"! ;

    . Serer#................................................................................................................

    COMPAN: PROFILE

    'etmax )echnologies Pvt =td was set up in --1 !y young Indian entrepreneurs. It haspioneered the concept of high >uality I) education in 'orth India and has trained over 1-,--- plus

    networing, em!edded systems ? software professionals in the country. In --1, 'etmax)echnologies set up education centre in Chandigarh #Pun7a!$ and followed them with centers in

    Patiala, @alandhar, =udhiana ? hatinda in the years that followed.'etmax )echnologies introduced

    corporate training programs which as an initiative were highly appreciated !y the industry andcorporate alie.NETMAX TECHNOLOGY provides Corporate )raining according to theirre>uirements and standards. &ur faculties are well versed with technologies so they can deliver

    according to live envoiment

    . "e are a group of highly motivated I) professionals with an a!ility to innovate a strong desire toexcel.

    Page | :

  • 7/24/2019 six weeks it training on ccna

    7/69

    NETMAX TECHNOLOG: PVT LTD is a customer focused company woring to provide

    software solutions, which are delivered with +elia!ility, )imeliness, 8lexi!ility and low cost

    customer satisfaction as the primary aim. )he designing solutions are purely !ased on !usiness andtechnical re>uirements of the pro7ect in hand. Software Aevelopment =ife Cycle is strictly followed

    to ensure the timely delivery of the pro7ect without compromising on >uality.

    NETMAX TECHNOLOG: provides a !road range of offshore outsourcing services including6pplication and Systems =evel Programming on =eading )echnologies. It also provides wide rangeof 'etworing Solutions for Corporate, Industries and Software Aevelopment 8irms.

    NETMAX TECHNOLOG: has a niche in providing training to 3ngineering ? 9C6 Students.

    )housands of engineering students from Chandigarh, Pun7a!, 5aryana, and +a7asthan ? 5imachal

    have successfully completed their Industrial and Summer )raining. )he focus of the Industrial)raining is to facilitate students with =ive Pro7ects on latest technologies lie VB.NET, ASP.NET,ORACLE DBADEVELOPER, 8EE, DO, STRUTS, LINUX, Net/r1"!0 under the strict

    guidance of Industry 3xperts.

    Tec)!l0- E9ert"#e

    C"#c Tr$"!"!0

    CC'6,CC'6 Security, CC'6 Boice, CC'P +?S, CC'P Security, CC'P Boice, CCI3

    $$ Tec)!l0"e#

    INTRODUCTION OF ASSIGNED OB

    9y 7o! is a!out connecting different offices of an enterprise spanned over wide area networ. "e use

    pu!lic infrastructure to fulfill this purpose.)o fulfill this purpose we have used ip addressing and

    various type of protocols lie ripv,eigrp,ospf.9y 7o! is to solve the networ related pro!lems and

    connectivity issues.In "ide 6rea 'etwor we will have a com!ination of routing protocols eigrp and

    ospf and redistri!ution will !e used to allow route exchange !etween them.'at technology is also used

    to convert private ip;s into pu!lic ip;s."e will also configure dhcp server in ipv4 domain to assign ip addresses dynamically to end

    devices.Some policies will !e used to restrict access among devices of different offices.

    NETWORKING BASICS

    W)$t "# $ C&9'ter Net/r1

    Page | 0

  • 7/24/2019 six weeks it training on ccna

    8/69

    A c&9'ter !et/r1 allows sharing of resources and information among interconnected devices. In

    the 1:-s, the 6dvanced +esearch Pro7ects 6gency #6+P6$ started funding the design of the 6dvanced

    +esearch Pro7ects 6gency 'etwor #6+P6'3)$ for the *nited States Aepartment of Aefense. It wasthe first computer networ in the world.D1E Aevelopment of the networ !egan in 1:, !ased on

    designs developed during the 1:-s.

    Computer networs can !e used for a variety of purposes( 8acilitating communications. *sing a networ, people can communicate efficiently and easily

    via email, instant messaging, chat rooms, telephone, video telephone calls, and video

    conferencing.

    Sharing hardware. In a networed environment, each computer on a networ may access and

    use hardware resources on the networ, such as printing a document on a shared networ

    printer.

    Sharing files, data, and information. In a networ environment, authoriFed user may access data

    and information stored on other computers on the networ. )he capa!ility of providing access to

    data and information on shared storage devices is an important feature of many networs.

    Sharing software. *sers connected to a networ may run application programs on remote

    computers.

    Information preservation.

    Security.

    Speed up.

    W)$t "# $ Net/r1"!0

    'etworing is a common synonym for developing and maintaining contacts and personal connections

    with a variety of people who might !e helpful to you and your career.

    'etworing is the practice of lining two or more computing devices together for the purpose ofsharing data. 'etwors are !uilt with a mix of computer hardware and computer software. It is an

    especially important aspect of career management in the financial services industry, since it is helps you

    eep a!reast of(

    T-9e# * !et/r1#

    Lc$l $re$ !et/r1

    6 local area networ #=6'$ is a networ that connects computers and devices in a limited geographical

    area such as home, school, computer la!oratory, office !uilding, or closely positioned group of

    !uildings. 3ach computer or device on the networ is a node. Current wired =6's are most liely to !e

    Page |

  • 7/24/2019 six weeks it training on ccna

    9/69

    !ased on 3thernet technology, although new standards lie I)*%) G.hn also provide a way to create a

    wired =6' using existing home wires #coaxial ca!les, phone lines and power lines$

    Per#!$l $re$ !et/r16 personal area networ #P6'$ is a computer networ used for communication among computer and

    different information technological devices close to one person. Some examples of devices that areused in a P6' are personal computers, printers, fax machines, telephones, PA6s, scanners, and even

    video game consoles. 6 P6' may include wired and wireless devices. )he reach of a P6' typically

    extends to 1- meters.D4E 6 wired P6' is usually constructed with *S and 8irewire connections whiletechnologies such as luetooth and infrared communication typically form a wireless P6'.

    H&e $re$ !et/r16 home area networ #56'$ is a residential =6' which is used for communication !etween digitaldevices typically deployed in the home, usually a small num!er of personal computers and accessories,

    such as printers and mo!ile computing devices. 6n important function is the sharing of Internet access,

    often a !road!and service through a C6)B or Aigital Su!scri!er =ine #AS=$ provider. It can also !e

    referred to as an office area networ #&6'$.

    W"%e $re$ !et/r16 wide area networ #"6'$ is a computer networ that covers a large geographic area such as a city,

    country, or spans even intercontinental distances, using a communications channel that com!ines manytypes of media such as telephone lines, ca!les, and air waves. 6 "6' often uses transmission facilities

    provided !y common carriers, such as telephone companies. "6' technologies generally function at

    the lower three layers of the &SI reference model( the physical layer, the data lin layer, and thenetwor layer.

    C$&9'# Net/r16 campus networ is a computer networ made up of an interconnection of local area networs

    #=6'Hs$ within a limited geographical area. )he networing e>uipments #switches, routers$ and

    transmission media #optical fi!er, copper plant, Cat< ca!ling etc.$ are almost entirely owned #!y thecampus tenant owner( an enterprise, university, government etc.$.

    In the case of a university campus%!ased campus networ, the networ is liely to lin a variety of

    campus !uildings includingJ academic departments, the university li!rary and student residence halls.

    Metr9l"t$! $re$ !et/r16 9etropolitan area networ is a large computer networ that usually spans a city or a large campus.

    V"rt'$l 9r"$te !et/r16 virtual private networ #BP'$ is a computer networ in which some of the lins !etween nodes are

    carried !y open connections or virtual circuits in some larger networ #e.g., the Internet$ instead of !y

    physical wires. )he data lin layer protocols of the virtual networ are said to !e tunneled through the

    larger networ when this is the case. &ne common application is secure communications through thepu!lic Internet, !ut a BP' need not have explicit security features, such as authentication or content

    encryption. BP's, for example, can !e used to separate the traffic of different user communities over an

    underlying networ with strong security features.

    W)$t "# !et/r1 t9l0-

    Page |

  • 7/24/2019 six weeks it training on ccna

    10/69

    'etwor topology is the layout pattern of interconnections of the various elements #lins, nodes, etc.$

    of a computer networ.D1EDE 'etwor topologies may !e physical or logical. Physical topology means

    the physical design of a networ including the devices, location and ca!le installation. =ogical topologyrefers to how data is actually transferred in a networ as opposed to its physical design.

    V$r"'# t9l0"e# ++

    B'# t9l0-

    9any devices connect to a single ca!le K!ac!oneK. If the !ac!one is !roen, the entire segment fails.us topologies are relatively easy to install and donHt re>uire much ca!ling compared to the

    alternatives.

    R"!0 T9l0-

    Page | 1-

  • 7/24/2019 six weeks it training on ccna

    11/69

    In a ring networ, every device has exactly two neigh!ours for communication purposes. 6ll messages

    travel through a ring in the same direction. =ie the !us topology, a failure in any ca!le or device

    !reas the loop and will tae down the entire segment. 6 disadvantage of the ring is that if any device isadded to or removed from the ring, the ring is !roen and the segment fails until it is KreforgedK #!y

    dwarfish goldsmithsL$ It is also considera!ly more expensive than other topologies.

    St$r T9l0-

    6 star networ has a central connection point % lie a hu! or switch. "hile it taes more ca!le, the

    !enefit is that if a ca!le fails, only one node will !e !rought down.

    6ll traffic emanates from the hu! of the star. )he central site is in control of all the nodes attached to it.

    )he central hu! is usually a fast, self contained computer and is responsi!le for routing all traffic toother nodes. )he main advantages of a star networ is that one malfunctioning node does not affect the

    rest of the networ. 5owever this type of networ can !e prone to !ottlenec and failure pro!lems at

    the central site.

    Tree T9l0-

    Page | 11

  • 7/24/2019 six weeks it training on ccna

    12/69

    6lso nown as the H5ierarchical topologyH, the tree topology is a com!ination of !us and startopologies. )hey are very common in larger networs. 6 typical scenario is( a file server is connected to

    a !ac!one ca!le #e.g. coaxial$ that runs through the !uilding, from which switches are connected,

    !ranching out to worstations.

    Me#) t9l0-

    Page | 1

  • 7/24/2019 six weeks it training on ccna

    13/69

    In the topologies shown a!ove, there is only one possi!le path from one node to another node. If any

    ca!le in that path is !roen, the nodes cannot communicate.9esh topology uses lots of ca!les to connect every node with every other node. It is very expensive to

    wire up, !ut if any ca!le fails, there are many other ways for two nodes to communicate. Some "6's,lie the Internet, employ mesh routing. In fact the Internet was deli!erately designed lie this to allowsites to communicate even during a nuclear war.

    H-r"% T9l0-5y!rid networ is the com!ination of different topologies such as star, +ing, 9esh, us etc. 8or

    example, if a department uses a us networ, second department uses the ring networ, third

    department uses the 9esh networ and fourth department uses the star networ. 6ll the networs of

    different types #of four departments$ can !e connected together through a central hu! #in the form ofstar networ$ as shown in the figure !elow.

    B$#"c !et/r1"!0 %e"ce#

    Page | 1/

  • 7/24/2019 six weeks it training on ccna

    14/69

    Computer networing devices are units that mediate data in a computer networ. Computer networing

    devices are also called networ e>uipment, Intermediate Systems #IS$ or Inter"oring *nit #I"*$.

    *nits which are the last receiver or generate data are called hosts or data terminal e>uipment.

    R'ter#6 router is a communication device that is used to connect two logically and physically different

    networs, two =6's, two "6's and a =6' with "6'. )he main function of the router is to sortingand the distri!ution of the data pacets to their destinations !ased on their IP addresses. +outers

    provides the connectivity !etween the enterprise !usinesses, ISPs and in the internet infrastructure,

    router is a main device. Cisco routers are widely used in the world. 3very router has routing software,which is nown as I&S. +outer operates at the networ layer of the &SI model. +outer does not

    !roadcast the data pacets.

    We )$e t/ t-9e# * r'ter(1.5ardware

    .software. M this router is provided !y ++6S S3+BIC3.

    S/"tc)e#

    =ie the router, a switch is an intelligent device that maps the IP address with the 96C address of the

    =6' card. *nlie the hu!s, a switch does not !roadcast the data to all the computers, it sends the datapacets only to the destined computer. Switches are used in the =6', 96' and "6'. In an 3thernet

    networ, computers are directly connected with the switch via twisted pair ca!les. In a networ,

    switches use the three methods to transmit the data i.e. store and forward, cut through and fragmentfree.

    We )$e t/ t-9e# * #/"tc).

    3.M$!0e$le #/"tc)+ it has console port !y using this we can mange this switch according to ournee% .

    8.!!>&$!0e$le + it ha no console port we use this switch as we purc)$#e "t.

    H'#

    Page | 14

  • 7/24/2019 six weeks it training on ccna

    15/69

    )he central connecting device in a computer networ is nown as a hu!. )here are two types of a hu!

    i.e. active hu! and passive hu!. 3very computer is directly connected with the hu!. "hen data pacetsarrives at hu!, it !roadcast them to all the =6' cards in a networ and the destined recipient pics them

    and all other computers discard the data pacets. 5u! has five, eight, sixteen and more ports and one

    port is nown as uplin port, which is used to connect with the next hu!.

    M%e

    6 modem is a communication device that is used to provide the connectivity with the internet. 9odem

    wors in two ways i.e. 9odulation and Aemodulation. It converts the digital data into the analogue and

    analogue to digital.

    LAN C$r%#

    Page | 1

  • 7/24/2019 six weeks it training on ccna

    16/69

    =6' cards or networ adapters are the !uilding !locs of a computer networ. 'o computer can

    communicate without a properly installed and configured =6' card. 3very =6' card is provided witha uni>ue IP address, su!net mas, gateway and A'S #if applica!le$. 6n *)PS)P ca!le connects a

    computer with the hu! or switch. oth ends of the ca!le have the +@%4< connectors one is inserted into

    the =6' card and one in the hu!switch. =6' cards are inserted into the expansion slots inside thecomputer. Aifferent =6' cards support different speed from 1-1-- to 1-1---.

    3thernet N speed 1-m!ps

    8ast 3thernet N 1--m!psGiga 3thernet N 1---m!ps

    8astgiga 3thernet N 1----m!ps

    Net/r1 Re9e$ter

    6 repeater connects two segments of your networ ca!le. It retimes and regenerates the signals to

    proper amplitudes and sends them to the other segments. "hen taling a!out, ethernet topology, youare pro!a!ly taling a!out using a hu! as a repeater. +epeaters re>uire a small amount of time to

    regenerate the signal. )his can cause a propagation delay which can affect networ communication

    when there are several repeaters in a row. 9any networ architectures limit the num!er of repeaters thatcan !e used in a row. +epeaters wor only at the physical layer of the &SI networ model.

    Page | 1:

  • 7/24/2019 six weeks it training on ccna

    17/69

    Br"%0e

    6 !ridge reads the outermost section of data on the data pacet, to tell where the message is going. It

    reduces the traffic on other networ segments, since it does not send all pacets. ridges can !e

    programmed to re7ect pacets from particular networs. ridging occurs at the data lin layer of the&SI model, which means the !ridge cannot read IP addresses, !ut only the outermost hardware address

    of the pacet. In our case the !ridge can read the ethernet data which gives the hardware address of the

    destination address, not the IP address. ridges forward all !roadcast messages. &nly a special !ridge

    called a translation !ridge will allow two networs of different architectures to !e connected. ridgesdo not normally allow connection of networs with different architectures.

    )he hardware address is also called the 96C #media access control$ address. )o determine the

    networ segment a 96C address !elongs to, !ridges use one of(

    Page | 10

  • 7/24/2019 six weeks it training on ccna

    18/69

    )ransparent ridging % )hey !uild a ta!le of addresses #!ridging ta!le$ as they receive pacets. If the

    address is not in the !ridging ta!le, the pacet is forwarded to all segments other than the one it camefrom. )his type of !ridge is used on ethernet networs.

    Source route !ridging % )he source computer provides path information inside the pacet. )his is used

    on )oen +ing networs.G$te/$-

    6 gateway can translate information !etween different networ data formats or networ architectures. Itcan translate )CPIP to 6pple)al so computers supporting )CPIP can communicate with 6pple !rand

    computers. 9ost gateways operate at the application layer, !ut can operate at the networ or session

    layer of the &SI model. Gateways will start at the lower level and strip information until it gets to there>uired level and repacage the information and wor its way !ac toward the hardware layer of the

    &SI model. )o confuse issues, when taling a!out a router that is used to interface to another networ,

    the word gateway is often used. )his does not mean the routing machine is a gateway as defined here,

    although it could !e.

    Net/r1 M%el#

    "hen dealing with networing, you may hear the terms Knetwor modelK and Knetwor layerK used

    often. 'etwor models define a set of networ layers and how they interact. )here are several different

    networ models depending on what organiFation or company started them. )he most important two are(

    T)e TCPIP M%el % )his model is sometimes called the A&A model since it was designed for thedepartment of defense It is also called the internet model !ecause )CPIP is the protocol used on theinternet.

    OSI Net/r1 M%el % )he International Standards &rganiFation #IS&$ has defined a standard

    called the &pen Systems Interconnection #&SI$ reference model. )his is a seven layer architecturelisted in the next section.

    Page | 1

  • 7/24/2019 six weeks it training on ccna

    19/69

    L$-er# "! t)e TCPIP &%elA99l"c$t"! L$-er (9rce##>t>9rce##+ )his is the scope within which applications create user data

    and communicate this data to other processes or applications on another or the same host. )hecommunications partners are often called peers. )his is where the Khigher levelK protocols such as

    S9)P, 8)P, SS5, 5))P, etc. operate.

    Tr$!#9rt L$-er ()#t>t>)#t+ )he )ransport =ayer constitutes the networing regime !etween twonetwor hosts, either on the local networ or on remote networs separated !y routers.

    I!ter!et L$-er ("!ter!et/r1"!0+ )he Internet =ayer has the tas of exchanging datagrams across

    networ !oundaries. It is therefore also referred to as the layer that esta!lishes internetworing, indeed,it defines and esta!lishes the Internet. )his layer defines the addressing and routing structures used for

    the )CPIP protocol suite.

    L"!1 L$-er( )his layer defines the networing methods with the scope of the local networ lin onwhich hosts communicate without intervening routers. )his layer descri!es the protocols used to

    descri!e the local networ topology and the interfaces needed to affect transmission of Internet =ayer

    datagrams to next%neigh!or hosts.

    Page | 1

  • 7/24/2019 six weeks it training on ccna

    20/69

    OSI M%el)he &SI, or &pen System Interconnection, model defines a networing framewor for implementing

    protocols in seven layers. Control is passed from one layer to the next, starting at the application layerin one station, and proceeding to the !ottom layer, over the channel to the next station and !ac up the

    hierarchy.

    A99l"c$t"! (L$-er 7

    )his layer supports application and end%user processes. Communication partners are identified, >uality

    of service is identified, user authentication and privacy are considered, and any constraints on data

    syntax are identified.

    Pre#e!t$t"! (L$-er =

    )his layer provides independence from differences in data representation #e.g., encryption$ !y

    translating from application to networ format, and vice versa.

    Se##"! (L$-er ?

    )his layer esta!lishes, manages and terminates connections !etween applications. )he session layer sets

    up, coordinates, and terminates conversations, exchanges, and dialogues !etween the applications ateach end. It deals with session and connection coordination.

    Tr$!#9rt (L$-er 6

    )his layer provides transparent transfer of data !etween end systems, or hosts, and is responsi!le for

    end%to%end error recovery and flow control. It ensures complete data transfer.

    Net/r1 (L$-er ;

    )his layer provides switching and routing technologies, creating logical paths, nown as virtual

    circuits, for transmitting data from node to node.

    D$t$ L"!1 (L$-er 8

    6t this layer, data pacets are encoded and decoded into !its. It furnishes transmission protocol

    nowledge and management and handles errors in the physical layer, flow control and frame

    synchroniFation. )he data lin layer is divided into two su! layers( )he 9edia 6ccess Control #96C$layer and the =ogical =in Control #==C$ layer.

    P)-#"c$l (L$-er 3

    )his layer conveys the !it stream % electrical impulse, light or radio signal %% through the networ at theelectrical and mechanical level. .

    TCPIP M%el # OSI M%el

    Sr.

    N.TCPIP Re*ere!ce M%el OSI Re*ere!ce M%el

    1 Aefined after the advent of Internet. Aefined !efore advent of internet.

    Service interface and protocols were not clearly distinguished

    !efore

    Service interface and protocols are clearly

    distinguished

    / )CPIP supports Internet woring Internet woring not supported

    4 =oosely layered Strict layering

    Page | -

  • 7/24/2019 six weeks it training on ccna

    21/69

    < Protocol Aependant standard Protocol independent standard

    : 9ore Credi!le =ess Credi!le

    0)CP relia!ly delivers pacets, IP does not relia!ly deliver

    pacets6ll pacets are relia!ly delivered

    B$#"c Net/r1"!0 C$le#

    Net/r1"!0 C$le#are used to connect one networ device to other or to connect two or more computers

    to share printer, scanner etc. Aifferent types of networ ca!les lie Coaxial ca!le, &ptical fi!er

    ca!le, )wisted Pair ca!les are used depending on the networHs topology, protocol and siFe. )he devices

    can !e separated !y a few meters #e.g. via 3thernet$ or nearly unlimited distances #e.g. via the

    interconnections of the Internet$.

    "hile wireless may !e the wave of the future, most computer networ today still utiliFe ca!les to

    transfer signals from one point to another

    )wisted pair

    )wisted pair ca!ling is a type of wiring in which two conductors #the forward and return conductors of a single circuit$ are

    twisted together for the purposes of canceling out electromagnetic interference #39I$ from external sourcesJ for

    instance, electromagnetic radiation from unshielded twisted pair #*)P$ ca!les, and crosstal !etween neigh!oring pairs. Itwas invented !y 6lexander Graham ell.

    *nshielded twisted pair ca!le with different twist rates Shieldedtwisted pair

    6dvantages

    It is a thin, flexi!le ca!le that is easy to string !etween walls.

    9ore lines can !e run through the same wiring ducts.

    *)P costs less per meterfoot than any other type of =6' ca!le.

    Page | 1

  • 7/24/2019 six weeks it training on ccna

    22/69

    Aisadvantages

    )wisted pair;s suscepti!ility to electromagnetic interferencegreatly depends on the pair twisting schemes #usually

    patented !y the manufacturers$ staying intact during the installation. 6s a result, twisted pair ca!les usually have

    stringent re>uirements for maximum pulling tension as well as minimum !end radius. )his relative fragility of twisted

    pair ca!les maes the installation practices an important part of ensuring the ca!le;s performance.

    In video applications that send information across multiple parallel signal wires, twisted pair ca!ling can introduce

    signaling delays nown assewwhich results in su!tle color defects and ghosting due to the image components not

    aligning correctly when recom!ined in the display device

    &ptical fi!er ca!le

    6n optical fi!er ca!le is a ca!lecontaining one or moreoptical fi!ers. )he optical fi!er elements are typically individually

    coated with plastic layers and contained in a protective tu!e suita!le for the environment where the ca!le will !e deployed.

    Page |

    http://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Skewhttp://en.wikipedia.org/wiki/Skewhttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Skewhttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Electromagnetic_interference
  • 7/24/2019 six weeks it training on ccna

    23/69

    An optical fiber is a single, hair-fine filament drawn from molten silica glass. These fibers arereplacing metal wire as the transmission medium in high-speed, high-capacity

    communications systems that convert information into light, which is then transmitted viafiber optic cable. Currently, American telephone companies represent the largest users of fiberoptic cables, but the technology is also used for power lines, local access computer networks,

    and video transmission.

    Coaxial cable

    C$"$l c$le, or c$, is anelectrical ca!lewith an inner conductor surrounded !y a flexi!le, tu!ular insulating layer,

    surrounded !y a tu!ular conducting shield. )he term coaxialcomes from the inner conductor and the outer shield sharing the

    same geometric axis. Coaxial ca!le was invented !y 3nglish engineer and mathematician&liver 5eaviside,who first

    patented the design in 1-.D1E

    Coaxial ca!le is used as atransmission lineforradio fre>uencysignals, in applications such as connectingradio

    transmittersandreceiverswith their antennas, computer networ #Internet$ connections, and distri!utingca!le

    televisionsignals. &ne advantage of coax over other types of radio transmission lineis that in an ideal coaxial ca!le

    theelectromagnetic fieldcarrying the signal exists only in the space !etween the inner and outerconductors.)his allows

    coaxial ca!le runs to !e installed next to metal o!7ects such as gutters without the power losses that occur in other types of

    transmission lines, and provides protection of the signal from externalelectromagnetic interference.

    Page | /

    http://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Coaxialhttp://en.wikipedia.org/wiki/Oliver_Heavisidehttp://en.wikipedia.org/wiki/Oliver_Heavisidehttp://en.wikipedia.org/wiki/Oliver_Heavisidehttp://en.wikipedia.org/wiki/Coaxial_cable#cite_note-0http://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Radio_transmitterhttp://en.wikipedia.org/wiki/Radio_transmitterhttp://en.wikipedia.org/wiki/Radio_receiverhttp://en.wikipedia.org/wiki/Radio_receiverhttp://en.wikipedia.org/wiki/Radio_receiverhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Electrical_conductorhttp://en.wikipedia.org/wiki/Electrical_conductorhttp://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Electromagnetic_interferencehttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Coaxialhttp://en.wikipedia.org/wiki/Oliver_Heavisidehttp://en.wikipedia.org/wiki/Coaxial_cable#cite_note-0http://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Radio_transmitterhttp://en.wikipedia.org/wiki/Radio_transmitterhttp://en.wikipedia.org/wiki/Radio_receiverhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Transmission_linehttp://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Electrical_conductorhttp://en.wikipedia.org/wiki/Electromagnetic_interference
  • 7/24/2019 six weeks it training on ccna

    24/69

    Str$"0)t C$le

    2ou usually use straight ca!le to connect different type of devices. )his type of ca!le will !e used most of the time and can

    !e used to(

    1$ Connect a computer to a switchhu!Hs normal port.

    $ Connect a computer to a ca!leAS= modemHs =6' port./$ Connect a routerHs "6' port to a ca!leAS= modemHs =6' port.

    4$ Connect a routerHs =6' port to a switchhu!Hs uplin port. #normally used for expanding networ$

  • 7/24/2019 six weeks it training on ccna

    25/69

    :. green :. orange0. !rown white 0. !rown white

    . !rown . rown

    Cl'r c%"!0 *r c$le#

    T>?=B Str$"0)t>T)r'0) Et)er!et C$le

    R>6? Cr##er Et)er!et C$le

    INSTALLING CABLESIn today networs, *)P C6=3S are commonly used to connect computers in a networ.

    Aepending on the colorcodings, we have different ca!les lie straight ca!le, cross ca!le and roll%overca!le.

    Page |

  • 7/24/2019 six weeks it training on ccna

    26/69

    STRAIGHT CABLE

    )he ca!le used !etween the PC and the hu!switch is called straight ca!le.

    Straight ca!le can !e used !etweenPC % S"I)C5

    PC% 5*

    5*#*P=I'O P&+)$ % 5*6ccording to )I63I6#)elecommunications industry standard3lectronics industry standard$,we have

    the following

    two standards for maing straight ca!le(

    CROSS>OVER CABLE

    )he ca!le used to connect two PCs is called cross%over ca!le.

    Cross ca!le can !e used !etween(

    PC % PC5* % 5*

    S"I)C5 % S"I)C5

    +&*)3+ % PC

    ROLL>OVER CABLE)he ca!le used !etween a hardware router and a PC is called roll%over ca!le.

    In this ca!le,thecolor coding used in one end is reversed in the other end.A6)6 )+6B3== &'=2 G+33' &+ &+6'G3 P6I+ &8 C6=3.

    ADDRESSING IN COMPUTER NETWORKING

    )here are two inds of addresses used in networs(1.Physical address

    .=ogical addressPH:SICAL ADDRESS

    1.It is also called hardware address or 96C address.96C stands for media access control..It is present in the chip of a 'IC card./.It is uni>ue for every 'IC card and cannot !e changed.

    4.It is 4 !its.&ut of 4 !its,4 !its of address is given !y the manufacturer of 'IC card and the

    remaining 4 !its of address is defined as per instructions given !y I333.

  • 7/24/2019 six weeks it training on ccna

    27/69

    .It was developed !y A&A#Aepartment of Aefence$ of *S6.

    /.It is used !oth in Internet#pu!lic networ$ and Intranet#private networ$.

    4.It is of / !its.

  • 7/24/2019 six weeks it training on ccna

    28/69

    ut in case of your computer has no IP address then IP address is assigned to the computer from 6PIP6

    +ange . !ut communication is not possi!le when computer has IP address from 6PIP6.

    387.4.4.3 it is the loop !ac address it is used for self communication and for trou!leshooting purpose.

    S'!et &$#1+ su!net mas is also / !it address, which tell us how many !its are used for networ and

    how many !its are used for host address.In su!net mas networ !its are always 1 and host !its are always -.

    IP A%%re## "!$l"% r re#ere IP A%%re##+

    "hen we are going to assign IP 6ddress to our computer interface then we have to follow some rules(

    R'le#+ >

    1. 6ll 5ost !its cannot !e - #1-.-.-.-$, !ecause it represent networ address which is reserved for

    router.

    . 6ll 5ost !it cannot !e 1 #1-.

  • 7/24/2019 six weeks it training on ccna

    29/69

    1 9inimum N -ms, 9aximum N -ms, 6verage N -ms

    )his massage appear when destination computer properly configured and connected with same netwo

    ip address.

    8.Re )his massage appear when Aestination computer has some pro!lem .8or

    e.g ( IP address does not exit, networ ca!le unplugged, computer shutdown, interconnection firewall

    ena!le.;.De#t"!$t"! )#t '!re$c)$le +> )his massage appear when our computer desire to communicate

    with another nw !ut our computer has no gateway IP address.

    6.Re9l- *r& 0$te/$- 't De#t"!$t"! )#t '!re$c)$le+>)his massage appear when computerdesire to communicate with another networ computer !ut our router has no route information in its

    routing ta!le for Aestination nw.

    ?.H$r%/$re errr+> )his massage appears when during communication our networ goes unplugged.

    =.Ne0#)$t"!0 IP #e

  • 7/24/2019 six weeks it training on ccna

    30/69

    FIGURE3+ CISCO ROUTER 8=83

    )he physical interfaces include power plug for the power supply and a power switch. )he router has

    two 8ast 3thernet #1-1-- +@%4

  • 7/24/2019 six weeks it training on ccna

    31/69

    )he "ireless%' road!and +outer will allow you to networ wirelessly !etter than ever, sharing

    Internet access, files and fun, easily and securely and with greater range of up to three times farther

    than standard "ireless%G. 6 router is a device that allows access to an Internet connection over anetwor. "ith the "ireless%' road!and +outer, this access can !e shared over the four switched ports

    or via the wireless !roadcast.

    *se wireless security to secure your wireless networ while the whole networ is protected through aStateful Pacet Inspection #SPI$ firewall and 'etwor 6ddress )ranslation #'6)$ technology. )he

    +outer also offers BP' pass%through and other features, which can !e configured through the easy%to%

    use, !rowser%!ased utilityFIGURE ;+ WRT>;44NP a g e |6

    8.; CISCO WS>C;?=4 86PS

    )he Cisco Catalyst /uality of service #VoS$, and resiliency to deliver intelligent services for the networ edge. It

    don;t operate on layer / it operates on =ayer it is used to learn 9ac address in =an networ and for

    providing path selection according to spanning tree selection .

    Page | /1

  • 7/24/2019 six weeks it training on ccna

    32/69

    FIGURE ?+ 8@44 SERIES SWICH

    8.? SERVER

    6 #ereris a computer program running to serve the re>uests of other programs, the KclientsK. )hus, the

    KserverK performs some computational tas on !ehalf of KclientsK. )he clients either run on the same

    computer or connect through the networ.

    In most common use, #ereris a physical computer #a computer hardware system$ dedicated to runningone or more such services #as a host$,to serve the needs of users of the other computers on the networ.

    Aepending on the computing service that it offers it could !e a data!ase server, file server, mail server,

    print server, we! server, or some other ind of server.

    FIGURE=+ SERVER OVERIEW

    8.= LAPTOP AND DESKTOP PC

    )he destop pc should normal in operation has the facilities of we! !rowsing, command prompt,

    minimum storage memory and =aptop should have wireless connection option .

    Page | /

  • 7/24/2019 six weeks it training on ccna

    33/69

    ;. MODEL USED

    )CPIP is so central to woring with the Interne so in the woring of the pro7ect we mae use of

    )CPIP model. )he Transmission Control Protocol/Internet Protocol (TCP/IP) suite was created !y theAepartment of Aefense #AoA$ to ensure and preserve data integrity as well as maintain

    communications in the event of catastrophic war. So it follows that if designed and implemented

    correctly, a)CPIP networ can !e a truly dependa!le and resilient one.

    TCPIP $!% t)e DD M%el

    )he AoA model is !asically a condensed version of the &SI modelWit;s composed of four, instead ofseven, layers(

    Process6pplication layer

    5ost%to%5ost layerInternet layer

    'etwor 6ccess layer

    Page | //

  • 7/24/2019 six weeks it training on ccna

    34/69

    FIGURE7+SHOWS A COMPARISON OF DOD AND OSI MODEL.

    6 vast array of protocols com!ine at the AoA model;sProcess/Application layer to integrate the

    various activities and duties spanning the focusof the &SI;s corresponding top three layers

    #6pplication, Presentation, and Session$.

    )he Process6pplication layer defines protocols for node%to%node application communication and also

    controls user%interfacespecifications.

    )heHost-to-Host layerparallels the functions of the &SI;s )ransport layer, defining protocols for

    setting up the level of transmission service forapplications. It tacles issues such as creating relia!leend%to%end communication and ensuring the error%free delivery of data. It handles pacetse>uencing

    and maintains data integrity.

    )heInternet layer corresponds to the &SI;s 'etwor layer, designating the protocols relating to thelogical transmission of pacets over theentire networ. It taes care of the addressing of hosts !y giving

    them an IP #Internet Protocol$ address, and it handles the routing of pacets amongmultiple networs.

    6t the !ottom of the AoA model, theNetwork Access layer implements the data exchange !etween the

    host and the networ. )he e>uivalent of

    the Aata =in and Physical layers of the &SI model, the 'etwor 6ccess layer oversees hardwareaddressing and defines protocols for the

    physical transmission of data

    .)he AoA and &SI models are alie in design and concept and have similar functions in similar layers.

    ;.3)he Prce##A99l"c$t"! L$-er Prtcl#

    In this layer we will discuss the protocols that are used for communication and their utility.

    ;.3.3 Tel!et

    Telnet is the chameleon of protocolsWits specialty is terminal emulation. It allows a user on a remoteclient machine, called the )elnet client, toaccess the resources of another machine, the )elnet server.

    )elnet achieves this !y pulling a fast one on the )elnet server and maing the clientmachine appears as

    though it were a terminal directly attached to the local networ. )his pro7ection is actually a softwareimageWa virtual terminalthat can interact with the chosen remote host.

    )hese emulated terminals are of the text%mode type and can execute defined procedures such as

    displaying menus that give users theopportunity to choose options and access the applications on theduped server. *sers !egin a )elnet session !y running the )elnet client softwareand then logging into

    the )elnet server.

    Page | /4

  • 7/24/2019 six weeks it training on ccna

    35/69

    ;.3.8 F"le Tr$!#*er Prtcl (FTP

    File Transfer Protocol (FTP) is the protocol that actually lets us transfer files, and it can accomplish

    this !etween any two machines using it. ut8)P isn;t 7ust a protocolJ it;s also a program.

    ;.3.; S"&9le M$"l Tr$!#*er Prtcl (SMTP

    Simple Mail Transfer Protocol (SMTP), answering our u!i>uitous call to email, uses a spooled, or

    >ueued, method of mail delivery. &nce a message has !een sent to a destination, the message is spooled

    to a deviceWusually a dis. )he server software at the destination posts a vigil, regularly checing the

    >ueue for messages. "hen it detects them, it proceeds to deliver them to their destination. S9)P isused to send mailJP&P/ or I96P is used to receive mail.

    ;.3.6 P#t O**"ce Prtcl (POP

    Post ffice Protocol (PP) gives us a storage facility for incoming mail, and the latest version is calledP&P/. It doesn;t allow messages to !e downloaded selectively, !ut once they are, the clientserver

    interaction ends and you can delete and twea your messages locally at will.

    ;.3.? Sec're S)ell (SSH

    Sec!re S"ell (SSH)protocol sets up a secure )elnet session over a standard )CPIP connection and is

    employed for doing things lie logging intoSystems, running programs on remote systems, and moving files from one system to another. 6nd it

    does all of this while maintaining a nice, strong, encrypted connection. 2ou can thin of it as the new%

    generation protocol that;s now used in place of rsh and rloginWeven )elnet.

    ;.3.= H-9ertet Tr$!#*er Prtcl (HTTP)

    6ll those snappy we!sites comprising a mlange of graphics, text, lins, and so onWtheHyperte#tTransfer Protocol (HTTP) is maing it allpossi!le. It;s used to manage communications !etween we!

    !rowsers and we! servers and opens the right resource when you clic a lin, wherever that resource

    may actually reside.

    ;.3.7 S"&9le Net/r1 M$!$0e&e!t Prtcl (SNMP

    Simple Network Mana$ement Protocol (SNMP) collects and manipulates valua!le networ information.

    It gathers data !y polling the devices onthe networ from a management station at fixed or random

    intervals, re>uiring them to disclose certain information. "hen all is well, S'9Preceives something

    Page | /

  • 7/24/2019 six weeks it training on ccna

    36/69

    called a %aselineWa report delimiting the operational traits of a healthy networ. )his protocol can also

    stand as a watchdogover the networ, >uicly notifying managers of any sudden turn of events.

    ;.3. D&$"! N$&e Ser"ce (DNS

    &omain Name Ser'ice (&NS) resolves hostnamesWspecifically, Internet names, such as

    www.google.com."e don;t have to use A'SJ we can 7ust type in the IP address of any device you wantto communicate with. 6n IP address identifies hosts on a networ and the Internet as well.5owever,

    A'S was designed to mae our lives easier.

    ;.3.@Dynamic Host Configuration Protocol (DHCP)/Bootstrap Protocol (BootP)

    &ynamic Host Confi$!ration Protocol (&HCP) assigns IP addresses to hosts. It allows easier

    administration and wors well in small to even verylarge networ environments. 6ll types of hardware can !e used as a A5CP server, including a Cisco

    router.

    ut there is a lot of information a A5CP server can provide to a host when the host is re>uesting an IP

    address from the A5CP server. 5ere;s alist of the information a A5CP server can provide(

    IP address

    Su!net mas

    Aomain name

    Aefault gateway #routers$

    A'S server address

    "I'S server address

    )he following is the four%step process a client taes to receive an IP address from a A5CP server(

    )he A5CP client !roadcasts a A5CP Aiscover message looing for a A5CP server #Port :0$.

    )he A5CP server that received the A5CP Aiscover message sends a unicast A5CP &ffer

    message !ac to the host

    )he client then !roadcasts to the server a A5CP +e>uest message asing for the offered IP

    address and possi!ly other information.

    )he server finaliFes the exchange with a unicast A5CP 6cnowledgment message

    Page | /:

  • 7/24/2019 six weeks it training on ccna

    37/69

    FIGURE + SHOWS THE PROCESS OF A CLIENTSERVER RELATIONSHIP

    ;.8 T)e H#t>t>H#t L$-er Prtcl#.

    )he main purpose of the 5ost%to%5ost layer is to shield the upper%layer applications from thecomplexities of the networ. )his layer says to the upper layer, Y@ust give me your data stream, with

    any instructions, and I;ll !egin the process of getting your information ready to send.Z

    )he following sections descri!e the two protocols at this layer(

    )ransmission Control Protocol #)CP$

    *ser Aatagram Protocol #*AP$

    In addition, we;ll loo at some of the ey host%to%host protocol concepts, as well as the port num!ers.

    ;.8.3 Tr$!#&"##"! C!trl Prtcl (TCP

    Page | /0

  • 7/24/2019 six weeks it training on ccna

    38/69

    Transmission Control Protocol (TCP) taes large !locs of information from an application and !reas

    them into segments. It num!ers andse>uences each segment so that the destination;s )CP stac can putthe segments !ac into the order the application intended. 6fter thesesegments are sent, )CP #on the

    transmitting host$ waits for an acnowledgment of the receiving end;s )CP virtual circuit session,

    retransmittingthose that aren;t acnowledged.

    )CP is a full%duplex, connection%oriented, relia!le, and accurate protocol, !ut esta!lishing all these

    terms and conditions, in addition to errorchecing, is no small tas.

    TCP Se0&e!t Fr&$t

    Since the upper layers 7ust send a data stream to the protocols in the )ransport layers, I;ll demonstratehow )CP segments a data stream andprepares it for the Internet layer. "hen the Internet layer receives

    the data stream, it routes the segments as pacets through an internetwor. )hesegments are handed to

    the receiving host;s 5ost%to%5ost layer protocol, which re!uilds the data stream to hand to the upper%

    layer applications orprotocols. 8igureshows the )CP segment format. )he figure shows thedifferent fields within the )CP header.

    )he )CP header is - !ytes long, or up to 4 !ytes with options. 2ou need to understand what eachfield in the )CP segment is(

    S'rce 9rt)he port num!er of the application on the host sending the data. #Port num!ers will !eexplained a little later in this section.$

    De#t"!$t"! 9rt )he port num!er of the application re>uested on the destination host.

    Se

  • 7/24/2019 six weeks it training on ccna

    39/69

    He$%er le!0t) )he num!er of /%!it words in the )CP header. )his indicates where the data !egins.

    )he )CP header #even one includingoptions$ is an integral num!er of / !its in length.

    Re#ere% 6lways set to Fero.

    C%e "t#*l$0# Control functions used to set up and terminate a session.

    W"!%/ )he window siFe the sender is willing to accept, in octets.

    C)ec1#'& )he cyclic redundancy chec #C+C$, !ecause )CP doesn;t trust the lower layers and checseverything. )he C+C checs theheader and data fields.

    Ur0e!t 6 valid field only if the *rgent pointer in the code !its is set. If so, this value indicates the

    offset from the current se>uence num!er, inoctets, where the segment of non%urgent data !egins

    .O9t"!# 9ay !e - or a multiple of / !its, if any. "hat this means is that no options have to !e present

    #option siFe of -$. 5owever, if anyoptions are used that do not cause the option field to total a multipleof / !its, padding of -s must !e used to mae sure the data !egins on a/%!it !oundary.

    D$t$ 5anded down to the )CP protocol at the )ransport layer, which includes the upper%layer headers.

    ;.8.8 U#er D$t$0r$& Prtcl (UDP

    *AP doesn;t offer all the !ells and whistles of )CP either, !ut it does do a fa!ulous 7o! of transportinginformation that doesn;t re>uire relia!le deliveryWand it does so using far fewer networ resources.

    )here are some situations in which it would definitely !e wise for developers to opt for *AP rather than)CP. &ne circumstance is when relia!ility is already handled at the Process6pplication layer. 'etwor

    8ile System #'8S$ handles its own relia!ility issues, maing the use of )CP !oth impractical and

    redundant. ut ultimately, it;s up to the application developer to decide whether to use *AP or )CP, notthe user who wants to transfer data faster.

    *AP does not se>uence the segments and does not care in which order the segments arrive at the

    destination. +ather, *AP sends the segments off and forgets a!out them. It doesn;t follow through,chec up on them, or even allow for an acnowledgment of safe arrivalWcomplete a!andonment.

    ecause of this, it;s referred to as an unrelia!le protocol. )his does not mean that *AP is ineffective,

    only that it doesn;t handleissues of relia!ility.

    8urther, *AP doesn;t create a virtual circuit, nor does it contact the destination !efore delivering

    information to it. ecause of this, it;s alsoconsidered a connectionlessprotocol. Since *AP assumes

    that the application will use its own relia!ility method, it doesn;t use any. )his gives anapplication

    Page | /

  • 7/24/2019 six weeks it training on ccna

    40/69

    developer a choice when running the Internet Protocol stac( )CP for relia!ility or *AP for faster

    transfers.

    UDP Se0&e!t Fr&$t

    Source portThe port number of the application on the host sending the data

    Destination portThe port number of the application reuested on the destinationhost

    FIGURE34+ UDP SEGMENT

    engt!TheLength of !"# header and !"# data

    C!ecksumTheChec$sum of both the !"# header and !"# data %elds

    Data !pper&la'er data

    Prt N'&er#

    )CP and *AP must useport n!m%ers to communicate with the upper layers !ecause they;re what eep

    trac of different conversations crossingthe networ simultaneously. &riginating%source port num!ers

    are dynamically assigned !y the source host and will e>ual some num!er starting at1-4.

    FIGURE33+ PORT NUMBER FOR PROTOCOLS

    ;.; T)e I!ter!et L$-er Prtcl#

    Page | 4-

  • 7/24/2019 six weeks it training on ccna

    41/69

    In the AoA model, there are two main reasons for the Internet layer;s existence( routing and providing a

    single networ interface to the upper layers. 'one of the other upper% or lower%layer protocols have any

    functions relating to routingWthat complex and important tas !elongs entirely to the Internet layer.)he Internet layer;s second duty is to provide a single networ interface to the upper%layer protocols.

    "ithout this layer, application programmers would need to write YhoosZ into every one of their

    applications for each different 'etwor 6ccess protocol.

    )he following sections descri!e the protocols at the Internet layer(

    Internet Protocol #IP$

    Internet Control 9essage Protocol #IC9P$

    6ddress +esolution Protocol #6+P$

    ;.;.3INTERNET PROTOCOL

    Internet Protocol (IP)essentially is the Internet layer. IP loos at each pacet;s address. )hen, using a

    routing ta!le, it decides where a pacet is to !e sent next, choosing the !est path.

    6n IP header. )his will give you an idea of what the IP protocol has to go through every time user datais sent from the upper layers and is to !e sent to a remote networ

    .

    )he following fields mae up the IP header(

    Ver#"! IP version num!er.

    He$%er le!0t) 5eader length #5=3'$ in /%!it words.

    Pr"r"t- $!% T-9e * Ser"ce )ype of Service tells how the datagram should !e handled. )he first /!its are the priority !its which is nowcalled the differentiated services !its.

    Tt$l le!0t)=ength of the pacet including header and data.

    I%e!t"*"c$t"! *ni>ue IP%pacet value used to differentiate fragmented pacets from different

    datagrams.

    Fl$0# Specifies whether fragmentation should occur.

    Page | 41

  • 7/24/2019 six weeks it training on ccna

    42/69

    FIGURE38+ IP HEADER

    Fr$0&e!t **#et Provides fragmentation and reassem!ly if the pacet is too large to put in a frame. It

    also allows different maximumtransmission units #9)*s$ on the Internet.

    He$%er c)ec1#'& Cyclic redundancy chec #C+C$ on header only.

    T"&e T L"e )he time to live is set into a pacet when it is originally generated. If it doesn;t get to

    where it wants to go !efore the ))=expires, !oomWit;s gone. )his stops IP pacets from continuouslycircling the networ looing for a home.

    Prtcl Port of upper%layer protocol #)CP is port : or *AP is port 10$. 6lso supports 'etwor layer

    protocols, lie 6+P and IC9P #this can!e called )ype field in some analyFers$. "e;ll tal a!out this

    field in more detail in a minute.

    S'rce IP $%%re## /%!it IP address of sending station.

    De#t"!$t"! IP $%%re## /%!it IP address of the station this pacet is destined for.

    O9t"!# *sed for networ testing, de!ugging, security, and more.

    D$t$ 6fter the IP option field will !e the upper%layer data.

    ;.;.8 I!ter!et C!trl Me##$0e Prtcl (ICMP

    Page | 4

  • 7/24/2019 six weeks it training on ccna

    43/69

    Internet Control Messa$e Protocol (ICMP)wors at the 'etwor layer and is used !y IP for many

    different services. IC9P is a management protocol and messaging service provider for IP. Its messages

    are carried as IP datagram. +8C 1uest and reply messages to chec the physical

    and logical connectivity of machines on an internetwor.

    ;.;.; A%%re## Re#l't"! Prtcl (ARPAress *esol!tion Protocol (A*P) finds the hardware address of a host from a nown IP address.

    5ere;s how it wors( "hen IP has a datagram to send, it must inform a 'etwor 6ccess protocol, such

    as 3thernet or wireless, of the destination;s hardware address on the local networ. #It has already !een

    informed !y upper%layer protocols of the destination;s IP address.$ If IP doesn;t find the destinationhost;s hardware address in the

    6+P cache, it uses 6+P to find this information..

    6s IP;s detective, 6+P interrogates the local networ !y sending out a !roadcast asing the machine

    with the specified IP address to reply withits hardware address. So !asically, 6+P translates the

    software #IP$ address into a hardware addressWfor example, the destination machine;s.

    3thernet adapter addressWand from it, deduces its wherea!outs on the =6' !y !roadcasting for thisaddress.

    6. SOFTWARE REJUIREMENT

    Cisco Pacet )racer is a comprehensive, networing technology teaching and learning program thatoffers a uni>ue com!ination of realistic simulation and visualiFation experiences, assessment and

    Page | 4/

  • 7/24/2019 six weeks it training on ccna

    44/69

    activity authoring capa!ilities, and opportunities for multiuser colla!oration and competition.

    Innovative features of Pacet )racer will help students and teachers colla!orate, solve pro!lems, and

    learn concepts in an engaging and dynamic social environment.Some of the !enefits of Pacet )racer are as follows(

    Provides a realistic simulation and visualiFation learning environment that supplementsclassroom e>uipment

    3na!les multiuser, real%time colla!oration and competition for dynamic learning

    3na!les authoring and localiFation of structured learning activities such as la!s,

    demonstrations, >uiFFes, exams, and games

    3mpowers students to explore concepts, conduct experiments, and test their

    understanding

    6llows students and teachers to design, !uild, configure, and trou!leshoot networs

    using virtual e>uipment

    Supports a variety of teaching and learning opportunities such as lectures, group andindividual la!s, homewor, and competitions

    Supports feature expansion through external applications using an 6PI to enhance the

    functionality of Cisco Pacet )racer in areas such as curriculum and assessmentdelivery, games, accessi!ility, and interfacing with real e>uipment.

    Pacet )racer uivalent

    &S( 9icrosoft "indows ---, "indows XP, Bista 5ome asic, Bista 5ome Premium,

    8edora 0, or *!untu 0.1-

    1

    /

    4

    uirements

    Shortest path computations re>uire many CP* circles

    If networ is sta!le little !andwidth is usedJ react >uicly to topology changes

    6nnouncements cannot !e YfilteredZ. 6ll items in the data!ase must !e sent to neigh!ors

    6ll neigh!ors must !e trusted

    6uthentication mechanisms can !e used to avoid undesired ad7acencies

    'o split horiFon techni>ues are possi!le

    O9e! S)rte#t P$t) F"r#t (OSPF R't"!0 Prtcl

    &pen Shortest Path 8irst #&SP8$ is a routing protocol developed for Internet Protocol #IP$ networs !y the interior

    gateway protocol #IGP$ woring group of the Internet 3ngineering )as 8orce #I3)8$. )he woring group wasformed in 1 to design an IGP !ased on the shortest path first #SP8$ algorithm for use in the Internet. Similar to

    the Interior Gateway +outing Protocol #IG+P$, &SP8 was created !ecause in the mid%1-s, the +outing

    Information Protocol #+IP$ was increasingly una!le to serve large, heterogeneous internetwors.

    &SP8 is a classlessrouting protocol, which means that in its updates, it includes the su!net of each route it nows

    a!out, thus, ena!ling varia!le%length su!net mass. "ith varia!le%length su!net mass, an IP networ can !e!roen into many su!nets of various siFes. )his provides networ administrators with extra networ%configuration

    flexi!ility. )hese updates are multicasts at specific addresses #4.-.-.< and 4.-.-.:$.

    &SP8 has two primary characteristics(

    1$ )he protocol is open #non proprietary$, which means that its specification is in the pu!lic domain.

    )he &SP8 specification is pu!lished as +e>uest 8or Comments #+8C$ 140.

    $ )he second principal characteristic is that &SP8 is !ased on the SP8 algorithm, which sometimes is referred to

    as the Ai7stra algorithm, named for the person credited with its creation.

    Page |

  • 7/24/2019 six weeks it training on ccna

    52/69

    COMMANDS+>

    +outer\config terminal

    +outer#config$\router ospf process%id

    +outer#config%router$\networ networ%num!er mas area area%id

    3xample(

    +outer#config%router$\networ 1.1:.1-.-

  • 7/24/2019 six weeks it training on ccna

    53/69

    )he 3IG+P metric is a can !e a complex calculation, !ut !y default it only uses !andwidth and delay to

    determine the !est path.

    COMMANDS+>

    +outer\config terminal

    +outer #config$\r'ter e"0r9 AS

    +outer #config%router$\!et/r1 X.X.X.X

    ?.3.8FRAME RELA:

    It has the concept of 7oining remote areas through the single interface with the help of 8rame +elay

    Switches.

    It )$# c!ce9t *+

    Birtual Circuits

    8rame +elay 3ncapsulation

    ?.3.;NAT IMPLEMENTATION

    Page |

  • 7/24/2019 six weeks it training on ccna

    54/69

    It is use for translating private to pu!lic IP address. So we can connect our private networ running in

    the department to connect to the glo!al networ .It converts the private IP to Pu!lic IP in order to

    communicate

    It )$# c!ce9t * +

    Static '6)

    Aynamic '6)

    P6) #Port 6ddress )ranslation$

    ?.3.6SWITCHING

    Switching is the process of using the hardware address of devices on a =an to communicate with the

    external networ. It is used to carry data pacets from different vlan to the main router. It provides

    Spanning )ree Protocol to choose the !est path for carrying the data pacets with minimum cost and

    less transmission loss in the networ.

    It )$# t)e c!ce9t *(

    Port Security

    Creating Blans

    W)$t "# $ VLAN

    6s I said, a B=6' is a virtual =6'. In technical terms, a B=6' is a !roadcast domain created !y switches. 'ormally, it is a router

    creating that !roadcast domain. "ith B=6';s, a switch can create the !roadcast domain.

    )his wors !y, you, the administrator, putting some switch ports in a B=6' other than 1, the default B=6'. 6ll ports in a single B=6'are in a single !roadcast domain.

    ecause switches can tal to each other, some ports on switch 6 can !e in B=6' 1- and other ports on switch can !e in B=6' 1-.

    roadcasts !etween these devices will not !e seen on any other port in any other B=6', other than 1-. 5owever, these devices can all

    communicate !ecause they are on the same B=6'. "ithout additional configuration, they would not !e a!le to communicate with any

    other devices, not in their B=6'.

    H/ c$! %e"ce# ! %"**ere!t VLAN# c&&'!"c$te

    Aevices on different B=6';s can communicate with a router or a =ayer / switch. 6s each B=6' is its own su!net, a router or =ayer /

    switch must !e used to route !etween the su!nets.

    W)$t "# $ tr'!1 9rt

    "hen there is a lin !etween two switches or a router and a switch that carries the traffic of more than one B=6', that port is a trun

    port.

    6 trun port must run a special truning protocol. )he protocol used would !e Cisco;s proprietary Inter%switch lin #IS=$ or the I333

    standard -.1>.

    Page |

  • 7/24/2019 six weeks it training on ccna

    55/69

    H/ % I cre$te $ VLAN

    Configuring B=6';s can vary even !etween different models of Cisco switches. 2our goals, no matter what the commands are, is to(

    Create the new B=6';s

    Put each port in the proper B=6'

    =et;s say we wanted to create B=6';s < and 1-. "e want to put ports ? / in B=6' < #9areting$ and ports 4 and < in B=6' 1-#5uman +esources$. &n a Cisco

  • 7/24/2019 six weeks it training on ccna

    56/69

    )he router uses IP su!nets to move traffic !etween B=6's. 3ach B=6' has a different IP su!net, and

    there is a one%to%one correspondence of B=6' and IP su!net !oundaries. If a host is in a given IP

    su!net,

    it is also in a given B=6', and vice%versa.

    ACL+

    6ccess Control =ist, 6C= is a listing containing one or more 6C3that tells a computer operating

    system or other networ device what rights users have to each item on a computer or networ device.8or example, an 6C= may specify if a user or the users group have access to a file or folder on that

    computer or networ.

    6ccess Control =ists #6C=s$ allow a router to permit or deny pacets !ased on a variety of criteria. )he6C= is configured in glo!al mode, !ut is applied at the interface level. 6n 6C= does not tae effect

    until it is expressly applied to an interface with the ip access%group command. Pacets can !e filtered asthey enter or exit an interface.

    If a pacet enters or exits an interface with an 6C= applied, the pacet is compared against the criteriaof the 6C=. If the pacet matches the first line of the 6C=, the appropriate YpermitZ or YdenyZ action is

    taen. If there is no match, the second line;s criterion is examined. 6gain, if there i

    Page |

  • 7/24/2019 six weeks it training on ccna

    57/69

    3ach of these rules has some powerful implications when filtering IP and IPX pacets with access lists.

    )here are two types of access lists used with IP and IPX(

    St$!%$r% $cce## l"#t#

    )hese use only the source IP address in an IP pacet to filter the networ. )his !asically permits or

    denies an entire suite of protocols. IPX standards can filter on !oth source and destination IPX address.

    Ete!%e% $cce## l"#t#

    )hese chec for !oth source and destination IP address, protocol field in the 'etwor layer header, andport num!er at the )ransport layer header. IPX extended access lists use source and

    destination IPX addresses, 'etwor layer protocol fields, and socet num!ers in the )ransport layer

    header.

    7.6 CREATING VLANS

    y default all switch port are the mem!er of the single !roadcast domain so all port share the same

    !roadcast to solve this pro!lem switch support Blans.Blan is a single !roadcast domain so that all devices connect to Blan receive !roadcast send !y any

    other B lan mem!er !ut different Blan will not receive those same !roadcast .

    6ll switch ports are the mem!er of Blan 1 called as 'ative Blan .

    8ollowing commonds are entered(

    SwitchQena!le

    Switch\vlan data!ase

    FIGURE3@+ CREATING VLANS

    Page |

  • 7/24/2019 six weeks it training on ccna

    58/69

    Switch #vlan$ \vlan 1- name I)

    B=6' 1- added(

    'ame( I)

    Switch #vlan$ \vlan - name 5+

    B=6' - added( 'ame( 5+

    Switch #vlan$ \vlan /- name 6CC&*')S

    B=6' /- added(

    'ame( 6CC&*')S

    Switch #vlan$ \exit

    6PP=2 completed.

    efore assigning ports for particular Blan they all are part of Blan 1 called 'ative Blan

    FIGURE84+ ALL PORTS ARE MEMBER OF VLAN 3 B: DEFAULT

    Page |

  • 7/24/2019 six weeks it training on ccna

    59/69

    7.6.3 ASSIGNING PORTS FOR PARTICULAR VLAN

    In order to assign ports for particular Blan first go to glo!al mode then enter the commands.

    Commands to !e entered(

    SwitchQena!le

    Switch\conf t

    3nter configuration commands, one per line. 3nd with C')= .

    Switch#config$\interface range f-/ %4

    Switch#config%if%range$\switchport mode access

    Switch#config%if%range$\switchport access vlan 1-

    FIGURE83+ PORTS ASSIGNED TO PARTICULAR VLAN

    Page |

  • 7/24/2019 six weeks it training on ccna

    60/69

    7.?CREATING INTER VLANS

    It is the concept of connecting different different Blan !y using layer / device.

    6s a core layer switch is connected to the 8ast 3thernet port i.e.f-- of the router and we have so many

    Blan in our networ so we create su! interface of 8ast 3thernet port to assign particular Blan to specific

    su! interface port and assign the IP address to particular su! interface.

    8ollowing commands are entered(

    +outerQena!le #)o enter into the privilege mode$

    +outer\Qconfigure terminal #)o enter into glo!al mode$

    +outer#config$\interface f--#)o enter the interface of which su! interfaces are created$

    FIGURE88+ CREATING SUB INTERFACE AND ASSIGNING FOR VLAN

    Page | :-

  • 7/24/2019 six weeks it training on ccna

    61/69

    +outer#config%if$\no ip address#'o IP is assigned to 8ast 3thernet port$

    +outer#config%if$\no shut

    +outer#config%if$\interface f--.1 #Su! interface is created and mae the lin up$

    T=I'O%

  • 7/24/2019 six weeks it training on ccna

    62/69

    7. ENABLING ROUTING TO CONNECT REMOTE AREAS

    In order to provide connectivity !etween remote areas means that one !ranch is running on particular IP

    and another ranch is running on another IP so in order to provide communication !etween different

    networs we mae use of routing.

    +outing is the act of moving information across an internetwor from a source to a destination. +outing

    is used for taing a pacet from one device and sending it through the networ to another device on a

    different networ. If your networ has no routers, then you are not routing. +outers route traffic to all

    the networs in your inter networ. +outing directs pacet forwarding, the transit of logically

    addressed pacets from their source toward their

    ultimate destination through intermediate nodesJ typically hardware devices called routers, !ridges,

    gateways, firewalls, or switches.

    8ollowing commands are to !e entered(

    +outerQena!le #)o enter into the privilege mode$

    +outer\Qconfigure terminal #)o enter into glo!al mode$

    +outer#config$\router eigrp 1#+outing protocol is run$

    +outer#config%router$\no auto%summary

    +outer#config%router$\networ 1-.-.-.-#'etwor running on particular router$

    +outer#config%router$\networ 1.1:.1.-

    Page | :

  • 7/24/2019 six weeks it training on ccna

    63/69

    FIGURE8?+ ENABLING ROUTING

    7.@ NAT IMPLEMENTATION

    It is use for translating private to pu!lic IP address. So we can connect our private networ running in

    the department to connect to the glo!al networ .It converts the private IP to Pu!lic IP in order to

    communicate

    8ollowing command are entered(

    +outerQena!le

    +outer\Qconfigure terminal

    +outer #config$\Qip nat pool aram 1.1:.1.1 1.1:.1.1 netmas

  • 7/24/2019 six weeks it training on ccna

    64/69

    +outer #config$\Qip nat inside

    FIGURE8=+ PRIVATE IP IS CONVERTED TO PUBLIC IP USING NAT

    Serer#

    6 server is primarily a program that runs on a machine, providing a particular and specific service toother machines connected to the machine on which it is found.

    'owadays, server functionality has !ecome so rich, complex and varied in nature that there are whole

    very powerful computers dedicated to !eing exclusively servers. )his has led many non%technical

    people to denote servers as !eing machines that run services.

    6 !et/r1 #ereris a computer designed to process re>uests and deliver data to other #client$

    computers over a local networ or the Internet. 'etwor servers typically are configured with

    additional processing, memory and storage capacity to handle the load of servicing clients.

    DHCP SERVER

    A5CP #Aynamic 5ost Configuration Protocol$ is a protocol that allows a central

    computer to automatically assign the )CPIP networ configuration toindividual wor%stations on a private networ.

    "ith A5CP ena!led it suffices to ena!le the K&!tain an IP address

    automaticallyK in the )CPIP configuration on the private networ. )he A5CP

    Page | :4

  • 7/24/2019 six weeks it training on ccna

    65/69

    Server then taes over the responsi!ility of assigning the )CPIP parameters,

    significantly lowering the tas of networ maintenance

    5ow Aoes A5CP "orL

    6t !oot time the computer has no networ parameters assigned to it. )he

    following list provides an overview of the typical networ parameters(_ IP address and networ mas

    _ Aefault routegateway ` an IP address which will !e used for forwardingpacets whose destinations are !eyond local networ_ A'S servers for resolving Internet names #e.g. internet.com$ to IP

    addresses

    _ "orstation parameters, e.g., domain name or worgroupworstationname

    _ Static routes

    _ IP forwarding setting_ 9)* siFe

    _ &ther settings #a complete list can !e found in the A5CP +8Cs$

    St$t"c c!*"0'r$t"! .

    "ith static configuration, the client computer uses pre%configured networ parameters. )hedisadvantages of this approach include the possi!ility of IP address conflicts and the administrative

    issues possi!le when manually configuring many internal clients.

    DHCP c!*"0'r$t"! ($'t&$t"c $."ith automatic configuration, the computer o!tains its networ parameters from the A5CP Server.

    )his way the IP addresses are automatically managed and accordingly address conflicts are avoided. If

    manual and automatic networ configurations are used together, the administrator must ensure that theA5CP Server wont assign IP addresses used !y manually%configured computers

    Page | :

  • 7/24/2019 six weeks it training on ccna

    66/69

    H/ t c!*"0're t)e DHCP #erer.&nce you have considered the implications of A5CP in your networ, you are ready to get started withthe simple configuration.

    8or a small networ, the configuration of the A5CP Server is not very challenging and the In@oy A5CP

    Server Plugin is deli!erately designed to !e extremely simple. In fact, in the In@oy 8irewall, you canimmediately ena!le the A5CP Server and have it operational in less than a minute. 5ere is how.

    PROECT UNDERTAKEN

    Page | ::

  • 7/24/2019 six weeks it training on ccna

    67/69

    INTRANET COMMUNICATION

    BETWEEN TWO SITES

    )his pro7ect is a!out the communication of the two sites #India and 6ustralia$ of the same enterprisesituated in different locations and communicating over the intranet !etween two Sites.

    I have created six vlans in customer;s sites #India$ and these vlans are connected to a switch creating

    six collision domains and six !roadcast domains. 6nd further these two switches are connected to two

    different routers of these two different sites in and these two routers are connected to two different

    routers of two different service providers.

    In these company routers I have used P6) for converting private IP;s into pu!lic address that is usedover the internet. I put default route to the service provider and tunnel to securely perform the

    communication !etween the customer sites.

    In the service provider end I have used &SP8 #open shortest path first$ for routing purpose.

    Page | :0

  • 7/24/2019 six weeks it training on ccna

    68/69

    )o overview the service provider I have created a syslog server which will generate the log of routers

    and provide updated feed!ac. 8or the syslog server I have created a loop!ac adapter and connectedmy laptop as a server.

    34. C!cl'#"! $!% F't're Sc9e +

    Communication !etween +emote 6reas and Security has it application in almost every field including

    !usiness, education, entertainment, etc. 9y main goal in this pro7ect is to develop a communication

    !ridge !etween two customer sites having connectivity with each other with security It;s a onetime

    Investment pro7ect.

    Cisco Pacet )racer used in this pro7ect is one of the latest cutting edge technologies for Student in this

    field. Auring the initial phases of developing this pro7ect I faced several challenges in understandingsome concept in CP+ !ut it got cleared after study and practice.

    eing a trainee, I got an excellent opportunity to follow the practices of 'etworing. "oring on the

    pro7ect help me learn and explore various networing features. )here is always a scope for

    enhancement in the pro7ect ,which currently is for seen in the integration of the modules that were

    developed so far during training.

    Page | :

  • 7/24/2019 six weeks it training on ccna

    69/69

    33. REFRENCE

    3. T%% L$&&le

    6 Cisco Certified 'etwor 6ssociate Study Guide 0thedition.

    8. ///./"1e9e%"$.c&

    6 solution to all the to all pro!lems a encyclopaedia with all solution.

    ;. ///.//0#l't"!.c&

    6 Pdf file giving a !rief description a!out 8rame +elay concepts.

    6. C"#c !et/r1"!0 Ac$%e&-

    3xplain the concept of the woring of the Cisco Pacet )racer with system re>uirement.

    ?. I!terc!!ect"!0 C"#c Net/r1 De"ce# P$rt 3 8

    6 Self Guide for understanding the concept of internetwor and introduction to Cisco

    routers.