Sei sulla pagina 1di 59

RAJIV GANDHI GOVERNMENT

ENGINEERING COLLEGE, KANGRA

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

SUBMITTED BY: - SUBMITTED TO:-


NIKITA SETHI MR. SANJEEV KUMAR
ROLL NO:-1703617034
ECE 7th
ACKNOWLEDGMENT

It is my pleasure to be indebted to various people, who directly or


indirectly contributed in the development of this work and who
influenced my thinking, behavior, and acts during the course of study. I
express my sincere gratitude to MR. Sanjeev kumar sir of E.C.E
Department for providing me an opportunity to undergo summer training
at INFOWIZ chandigrah. I am thankful to Mr. MANISH KUMAR,
trainer for his support, cooperation, and motivation provided to me
during the training for constant inspiration, presence and blessings.
Lastly, I would like to thank the almighty and my parents for their moral
support and my friend Mr. Ritesh who suggested me to go for training
at INFOWIZ chandigrah.
ABSTRACT

This paper aims to provide a broad review of computer networking. It is a subject too
wide ranging to coverage. Computer Networks have become an essential tool in
many aspects: human communication, gathering, exchange and sharing of
information, distributed work environments, access to remote resources (data and
computing power) and many more.

Starting from an historical overview, this paper will give an introduction to the
underlying ideas and technologies. The second half will concentrate on the most
commonly used network technology today (Ethernet and TCP/IP) and give an
introduction to the communication mechanisms used.
PREFACE

The six week training is a part of our B.Tech E.C.E. Training mainly
aims at making one aware of real practical environment ,which means
that one get to know the limitations ,constraints and freedom under
which an engineer works . One also get an opportunity to watch from
close quarter that indicates manager relation .This training mainly
involves the information about network, how connection is done among
the systems.

During this period the student get the real first hand experience for
working in the actual environment .Most of the theoretical knowledge
that has been gained during the course of their studies is put to test here.

I have the opportunities to have a real experience on many venture


,which enhanced my sphere of knowledge to a great extent .
COMPANY PROFILE

INFOWIZ was formed in 2011 with the mission to provide Industrial training to
aspiring Engineersand technical
support to industries. Within a short span of 2 years “Infowiz” has become one
of the leading organizations which
offer state of art professional IT solutions, Industrial trainings, technical support
and consultancy to software
companies in India and abroad. Due to quality assurance and high level of
commitments in our services, we have
won quite a few accolades and are associated with reputed universities and
popular corporates, in the field.We
strive to impart personalized, professional and contemporary experiential
trainings on all theengineering streams
that are necessary for the career, success and growth for both students &
industry respectively.Founded as industrial lab for providing industrial training
to undergraduate engineers, “Infowiz” has grown
progressively to become vertically integrated company in the industrial training
arena. The core business
of the company is to deliver range of industrial trainings in various engineering
streams to students, IT
solutions, software consultancy and support to small and big companies.
‘Infowiz’ enjoys the distinction of
being Unique & Positive in the tri-city (Chandigarh, Panchkula Mohali) with
extensive steams of softwares
& engineering subjects. “Infowiz” is in a strong position to work with reputed
Universities and Corporates
CONTENTS
S.NO DESCRIPTION PAGE
NO.
Acknowledgement 2
Abstract 3
Preface 4
Company profile 5
1) CHAPTER-1(Introduction to computer network) 6
1.1 Local area network 7
1.2 Metropolitan area network 8
1.3 Wide area network 8-10
1.4 Advantages of computer network 11-14
1.5 Disadvantages of computer network 15
2) CHAPTER-2(Topologies in network) 16
2.1 Bus topology 16
2.2 Star topology 17
2.3 Ring topology 17
2.4 Tree topology 18

2.5 Mesh topology 18


3) CHAPTER-3(Network devices) 20
3.1 Network switch 20
3.2 Hub 24

3.3 Networking routing 26

3.31 Router types 27

3.4 Firewall 29

3.5 Repeater 30

3.6 Cables 30

4 CHAPTER-4(IP Addressing0 35

4.1 IPv4 Address 36

4.2 IPv6 Address 37

4.3 Masking 37

4.4 Private IP 38

4.5 Sub netting 38

5) CHAPTER-5(Network model) 39

5.1 TCP/IP Model 39

5.2 OSI Model 40

6 CHAPTER-6(SIMULATOR) 43

7 CHAPTER-7(Configuration of router and switch) 45

8 CHAPTER-8(Project) 48

9 Conclusion 53

10 Future scope 54
CHAPTER-1
Introduction to Network
A network consists of a collection of devices that is connected together so that they
can communicate and share information .These devices are computers ,smart-phone
,routers, switches, WI-FI etc.

A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.

Figure 2.1
TYPES OF NETWORK
1. LAN(Local area network)
2. MAN(Metropolitan area network)
3. WAN(wide area network)

2.1) LOCAL AREA NETWORK

A Local Area Network (LAN) is a network that is confined to a relatively small area.
It is generally limited to a geographic area such as a writing lab, school, or building.
Computers connected to a network are broadly categorized as servers or workstations.
Servers are generally not used by humans directly, but rather run continuously to
provide "services" to the other computers (and their human users) on the network.
Services provided can include printing and faxing, software hosting, file storage and
sharing, messaging, data storage and retrieval, complete access control (security) for
the network's resources, and many others.

Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally considered a
desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with
integrated keyboard, display, and touchpad. With the advent of the tablet computer,
and the touch screen devices such as iPad and iPhone, our definition of workstation is
quickly evolving to include those devices, because of their ability to interact with the
network and utilize network services. Servers tend to be more powerful than
workstations, although configurations are guided by needs.

For example, a group of servers might be located in a secure area, away from humans,
and only accessed through the network. In such cases, it would be common for the
servers to operate without a dedicated display or keyboard. However, the size and
speed of the server's processor(s), hard drive, and main memory might add
dramatically to the cost of the system.

On the other hand, a workstation might not need as much storage or working memory,
but might require an expensive display to accommodate the needs of its user. Every
computer on a network should be appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or wirelessly.
Wireless access to a wired network is made possible by wireless access points
(WAPs). These WAP devices provide a bridge between computers and networks. A
typical WAP might have the theoretical capacity to connect hundreds or even
thousands of wireless users to a network, although practical capacity might be far
less.Nearly always servers will be connected by cables to the network, because the
cable connections remain the fastest. Workstations which are stationary (desktops) are
also usually connected by a cable to the network, although the cost of wireless
adapters has dropped to the point that, when installing workstations in an existing
facility with inadequate wiring, it can be easier and less expensive to use wireless for
a desktop.

Figure-2.2

2.2) METROPOLITAN AREA NETWORK


A metropolitan area network (MAN) is similar to a local area network (LAN) but
spans an entire city or campus. MANs are formed by connecting multiple LANs.
Thus, MANs are larger than LANs but smaller than wide area networks (WAN).

MANs are extremely efficient and provide fast communication via high-speed
carriers, such as fiber optic cables.
A metropolitan area network (MAN) is similar to a local area network (LAN) but
spans an entire city or campus. MANs are formed by connecting multiple LANs.
Thus, MANs are larger than LANs but smaller than wide area networks (WAN).

MANs are extremely efficient and provide fast communication via high-speed
carriers, such as fiber optic cables.

Distributed Queue Dual Bus (DQDB) is the MAN standard specified by the Institute
Of Electrical And Electronics Engineers (IEEE) as IEEE 802.6. Using this standard, a
MAN extends up to 30-40 km, or 20-25 miles.

MAN is designed for customers who need a high-speed connectivity. Speeds of MAN
ranges in terms of Mbps. It’s hard to design and maintain a Metropolitan Area
Network.

The fault tolerance of a MAN is less and also there is more congestion in the network.
It is costly and may or may not be owned by a single organization. The data transfer
rate and the propagation delay of MAN is moderate. Devices used for transmission of
data through MAN are: Modem and Wire/Cable. Examples of a MAN are the part of
the telephone company network that can provide a high-speed DSL line to the
customer or the cable TV network in a city.
Figure2.3

2.3) WIDE AREA NETWORK


A wide area network (WAN) is a network that exists over a large-scale geographical
area. A WAN connects different smaller networks, including local area networks
(LANs) and metro area networks (MANs). This ensures that computers and users in
one location can communicate with computers and users in other locations. WAN
implementation can be done either with the help of the public transmission system or
a private network.

A WAN connects more than one LAN and is used for larger geographical areas.
WANs are similar to a banking system, where hundreds of branches in different cities
are connected with each other in order to share their official data.

A WAN works in a similar fashion to a LAN, just on a larger scale. Typically, TCP/IP
is the protocol used for a WAN in combination with devices such as routers, switches,
firewalls and modems.

Wide Area Networks (WANs) connect networks in larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of global network.

WAN, the popular word in network, refer to wide area network, is a network which is
used to connect different local area networks (LAN). Local area networks are
connected to one another through a device called router. There may be used many
router to connect large amount of LANs.

Using a WAN, schools in Florida can communicate with places like Tokyo in a matter
of seconds, without paying enormous phone bills. Two users a half-world apart with
workstations equipped with microphones and a webcams might teleconference in real
time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect
local and metropolitan networks to global communications networks like the Internet.
To users, however, a WAN will not appear to be much different than a LAN.

The big example of wide area network is internet. On internet we transfer files from
one computer to other. There is ftp, http and https protocols are used to transfer files
on the internet. Ftp stands for file transfer protocol.
Example of Wide area network (WAN)
 Internet is the example of WAN.

A WAN covers a large geographical area. Most WANs are made from several LANs
connected together.

WAN-Wide Area Network Example


 The Internet is a WAN.

 A network of bank cash dispensers is a WAN.

 A school network is usually a LAN.


Figure2.4

 LANs are often connected to WANs, for example a school network could be
connected to the Internet.
 WANs can be connected together using the Internet, leased lines or satellite links.
2.4) ADVANTAGES OF COMPUTER NETWORK

 It enhances communication and availability of information.


 It allows for more convenient resource sharing.
 It makes file sharing easier
 It is highly flexible
 It boosts storage capacity

2.5) DISADVANTAGES OF COMPUTER NETWORK

 It poses security difficulties


 It lacks robustness
 It allows for more presence of computer viruses and malware
 It requires an efficient handler
 It requires an expensive set-up.

CHAPTER-2

TOPOLOGIES IN NETWORK
Network topology is the arrangement of the elements (links, nodes, etc.) of a
communication network. A wide variety of physical topologies have been used in
LANs, including ring, bus, mesh and star. Conversely, mapping the data flow between
the components determines the logical topology of the network.

Network topology is the arrangement of the elements (links, nodes, etc.) of a


communication network. ... A wide variety of physical topologies have been used in
LANs, including ring, bus, mesh and star. Conversely, mapping the data flow between
the components determines the logical topology of the network.

DIFFERENT TYPES OF TOPOLOGY:-

There are different types of topologies they are as follows:-


 Bus Topology
 Star Topology
 Ring Topology
 Tree Topology
 Mesh Topology

2.1)Bus Topology: All the devices/nodes are connected sequentially to the


same backbone or transmission line. This is a simple, low-cost topology, but its single
point of failure presents a risk.

Figure3.1

2.2) Star Topology: All the nodes in the network are connected to a central
device like a hub or switch via cables. Failure of individual nodes or cables does not
necessarily create downtime in the network but the failure of a central device can.
This topology is the most preferred and popular model.

Figure3.2

2.3) Ring Topology: All network devices are connected sequentially to a


backbone as in bus topology except that the backbone ends at the starting node,
forming a ring. Ring topology shares many of bus topology's disadvantages so its use
is limited to networks that demand high throughput
Figure3.3

2.4) Tree Topology: A root node is connected to two or more sub-level nodes,
which themselves are connected hierarchically to sub-level nodes. Physically, the tree
topology is similar to bus and star topologies; the network backbone may have a bus
topology, while the low-level nodes connect using star topology.

Figure3.4

2.5) Mesh Topology: The topology in each node is directly connected to some
or all the other nodes present in the network. This redundancy makes the network
highly fault tolerant but the escalated costs may limit this topology to highly critical
network
CHAPTER -3
NETWORKING DEVICES
Different networking devices have different roles to play in a computer network.
These network devices also work at different segments of a computer network
performing different works

3.1) NETWORK SWITCH


A network switch is a computer networking device that connects the devices together
on a computer network by using packet switching to receive process and forward data
to the destination device. A switch needs to forward data from a network to another
network when required.

A switch also works at the layer of LAN (Local Area Network) but you can say that a
switch is more intelligent than a hub. While hub just does the work of data
forwarding, a switch does 'filter and forwarding' which is a more intelligent way of
dealing with the data packets.

So, when a packet is received at one of the interfaces of the switch, it filters the packet
and sends only to the interface of the intended receiver. For this purpose, a switch also
maintains a CAM (Content Addressable Memory) table and has its own system
configuration and memory. CAM table is also called as forwarding table or
forwarding information base (FIB).

In a network, a switch is a device that channels incoming data from any of multiple
input ports to the specific output port that will take it toward its intended destination.

Figure 4.1
TYPES OF SWITCH :-
a) Circuit switched network
b) Packet switched network

Circuit switched network :-

Circuit Switching establishes a physical path between the sender and receiver of the
message before a message is delivered. When a connection is established between a
sender and a receiver, the entire message travels through the established path from
sender to the receiver. Once the message is delivered to the receiver, the source
informs the network about the completion of transmission and all the switches
released. Then the link and other connecting devices are used to set up another
connection.
circuit switching is always implemented at the Physical Layer. Circuit switching can
be explained with an example of a telephone conversation. In a telephone
conversation, once a connection is established, between a caller and the receiver, it
remains connected, till the whole conversation is finished and both the caller and
receiver hang up their phone.

Figure4.1.1

Packet switched network:-


Packet Switching is connectionless as it doesn’t establish any physical connection
before the transmission starts. In packet switching before the message is transmitted,
it is divided into some manageable parts called packets. These packets are routed one
by one from source to destination. In packet switching, each packet may follow a
different route to reach the destination. Packets arrived at the destination are out of
order but, they are assembled in order before the destination forward it to the upper
layer.

Packet Switching is always implemented at the Network Layer. Packet switching has
two approaches Datagram Approach and Virtual Circuit Approach. In Datagram
Approach each packet is independent of other though they belong to the same
message and may also choose a different path to reach the destination. In Virtual
Circuit Approach, the relationship between the packets that belong to the same
message is preserved as the packet are not independent of each other, and all the
packets that belong to a particular message follow the same route to travel to the
destination.

Figure4.1.2

3.2) NETWORK HUB

A network hub is a device that allows the multiple computes to communicate with
each other over a network. It has several Ethernet ports that are used to connect two or
more network device together, while switches send incoming data to a specific port,
hubs broadcast all incoming data to all active ports.
A hub is a device that only operates on a physical layer. Signals that carry information
within a network can travel a fixed distance before attenuation endangers the integrity
of the data. Hub doesn't have a link layer address and does not check the link layer
address of received frame.

Network Hub is a networking device which is used to connect multiple network hosts.
A network hub is also used to do data transfer. The data is transferred in terms of
packets on a computer network. So when a host sends a data packet to a network hub,
the hub copies the data packet to all of its ports connected to. Like this, all the ports
know about the data and the port for whom the packet is intended, claims the packet.

However, because of its working mechanism, a hub is not so secure and safe.
Moreover, copying the data packets on all the interfaces or ports makes it slower and
more congested which led to the use of network switch.

Figure4.2

Network HUB

TYPES OF HUB:
1. ACTIVE HUB: These are the hubs which have their own power supply.
2. PASSIVE HUB: these are the hubs which collect wiring from nodes and power
supply from active hub.
3.3 NETWORK ROUTERING
It is a process of addressing routes in a router which are directly or indirectly with it
in different cases. It is also known as router advertisement.

A router is hardware device designed to receive, analyze and move incoming packets
to another network. It may also be used to convert the packets to another network
interface, drop them, and perform other actions relating to a network. The picture
shows the Linksys BEFSR11 wireless router and is what many home routers
resemble. A router has a lot more capabilities than other network devices, such as
a hub or a switch that are only able to perform basic network functions. For example,
a hub is often used to transfer data between computers or network devices, but does
not analyze or do anything with the data it is transferring. By contrast, routers can
analyze the data being sent over a network, change how it is packaged, and send it to
another network or over a different network. For example, routers are commonly used
in home networks to share a single Internet connection between multiple computers.

Figure 4.3 Router

3.3.1 ROUTER TYPES

 Static routing
 Dynamic routing
3.4 STATIC ROUTING:-
It is a method in which network engine does manual configuration. The routing does
not change the automatically. It is good for small organization. It is used in a one way
communication.

3.5 DYNAMIC ROUTING:-


Dynamic routing is a networking technique that provides optimal data routing. Unlike
static routing, dynamic routing, enables routers to select paths according to real time
logical network layout changes. Dynamic routing is also known as adaptive routing.

Dynamic routing is of three types:-


a) RIP
b) EIGRP
c) OSPF

a) RIP (Routing information protocol) :-


Routing information protocol is a protocol used for the best path from end to end and
a network of using a routing matrix. The Routing Information Protocol, or RIP, as it
is more commonly called, is one of the most enduring of all routing protocols. RIP
has four basic components: routing update process, RIP routing metrics, routing
stability, and routing timers. Devices that support RIP send routing-update messages
at regular intervals and when the network topology changes. These RIP packets
contain information about the networks that the devices can reach, as well as the
number of routers or gateways that a packet must travel through to reach the
destination address.

RIP adheres to the following Distance Vector characteristics:


a) RIP sends out periodic routing updates (every 30 seconds)
b) RIP sends out the full routing table every periodic update
c) RIP uses a form of distance as its metric (in this case, hop count)
b) EIGRP (Enhanced Interior Gateway Routing Protocol) :-
Enhanced Interior Gateway Routing Protocol is a CISCO routing protocol. EIGRP
can redistribute its router and routing protocol and accepts redistribution from other
routing protocols as well Enhanced Interior Gateway Routing protocol (EIGRP) is an
interior gateway protocol suited for many different topologies and media. In a well-
designed network, EIGRP scales well and provides extremely quick convergence
times with minimal network traffic.

Some of the advantages of EIGRP are:


a) Very low usage of network resources during normal operation; only hello packets
are transmitted on a stable network .
b)when a change occurs, only routing table changes are propagated, not the entire
routing table; this reduces the load the routing protocol itself places on the network
rapid convergence times for changes in the network topology(in some situations
convergence can be almost instantaneous)

c) OSPF ( Open Shortest Path First):


Open Shortest Path First is a routing protocol for the internet protocol networks. It
uses a link state routing algorithm and falls into the group of interior gateway
protocols, operating within a single autonomous system.
Open Shortest Path First (OSPF) is a routing protocol. It uses a link state routing
algorithm and falls into the group of interior gateway protocols, operating within a
single autonomous system. OSPF does not use a TCP/IP transport protocol (UDP,
TCP), but is encapsulated directly in IP datagram with protocol number 89. This is in
contrast to other routing protocols, such as the Routing Information Protocol (RIP), or
the Border Gateway Protocol (BGP).
OSPF handles its own error detection and correction functions:
a) Unlimited routers.
b) Link state routing protocol.
c) Area 0 is a backbone area.

3.4) FIREWALL
Firewalls can be either hardware or software but the ideal configuration will consist of
both. In addition to limiting access to your computer and network, a firewall is also
useful for allowing remote access to a private network through secure authentication
certificates and logins.

Hardware firewalls can be purchased as a stand-alone product but are typically found
in broadband routers, and should be considered an important part of your system
security and network set-up. Most hardware firewalls will have a minimum of four
network ports to connect other computers, but for larger networks, a business
networking firewall solution is available.

Software firewalls are installed on your computer, like any software program, and you
can customize it; allowing you some control over its function and protection features.
A software firewall will protect your computer from outside attempts to control or
gain access your computer.

Figure 4.4 firewall

3.5 REPEATERS
Repeaters are used to regenerate the signal over the same network before the
signal becomes too weak or corrupted so as to extend the length to which the
signal can be transmitted over the same network.
Figure 4.5

3.6 CABLES:-
These are used to connect computers or other devices in a network. There are many
types of cables used with LAN as :-

3.6.1 Coaxial Cable- Coaxial cable is a type of cable that has an inner conductor
surrounded by insulating layer and enclosed by conducting shield. It is used as a
transmission line for radio frequency signals. It is difficult to install coaxial cabling.
Types:-
a) Thick coaxial- Thick coaxial cable also referred to as thick net. 10Base5 is the
specification of coaxial cable carrying Ethernet signals. It has extra protective plastic
cover. b) Thin coaxial- Thin coaxial cable is also referred to as thinnet.10Base2
refers to the specification for thin coaxial cable carrying ethernet signals. It is popular
in school networks.
Figure-4.6.1

3.6.2 Twisted Pair Cable- It is a type of cabling in which conductors of single


circuit are twisted together for cancelling out electromagnetic interference from
external source.
Types:-
a) STP(Shielded Twisted Pair Cable)- It is suitable for environments with electrical
interference . STP is used on networks using Token ring Topology.
b) UTP(Unshielded Twisted Pair Cable)- It is most popular and it is best option for
school networks. It contains four twisted-pairs(Orange, Green, Blue, Brown).It is
basically used for networking applications.

Figure-4.6.2

4.6.3 Crossover Cable- It is used to connect same type of devices as:

a) Connect 2 computers directly

b) Connect 2 routers/switches
Both sides of a cable have different wire arrangement.

SIDE A SIDE B

1. Orange white Green white

2. Orange Green

3. Green white Orange white

4. Blue Blue

5. Blue white Blue white

6. Green Orange

7. Brown white Brown white

8. Brown Brown

Fig 4.6.3-Crossover Cable


4.7.4 Straight Cable- It is used to connect different type of devices as
a) Connect a computer to switch/hub
b) Connect a router to a switch/hub

Straight Cable is mainly used in networking.

Both sides of a cable have wire arrangement with same color.

SIDE A SIDE B

1. Orange white Orange white

2. Orange Orange

3. Green white Green white

4. Blue Blue

5. Blue white Blue white

6. Green Green

7. Brown white Brown white

8. Brown Brown
CHAPTER-4

IP ADDRESSING
Every machine on the internet has a unique identifying number, called an IP Address.
A typical; IP address looks like this:
216.27.61.45
IP ADDRESS is a 32-bit number, usually written in dotted decimal form, that
uniquely identifies an interface of some computer. This 32-bit number is divided into
4 octets each separated by a decimal. Out so many values certain values are restricted
for use as typical IP address. For example, the IP address 0.0.0.0 is reserved for the
default network and the address 255.255.255.255is used for broadcast.
We use Private IP Address in LAN which is provided by IANA (INTERNET
ASSIGNING NUMBERING AUTHOURTIY). The Minimum Value (Per Octet) is
0 and the Maximum Value is 255. IP Address are Divided in Five Classes.
Each IP address is split into 2 sections:

1) Network address
2) Host address

We can write IP Address in Three Format-


 Binary- 00111101.11111110.00111111.11111100
 Decimal- 192.168.43.16
 Hexadecimal- 2001:0123:1235:2136:1234:0000:1236:6549

There are Two kinds of Addresses used in Network-

Physical Address-

1. It is also called Hardware Address or MAC Address. MAC stands for "Media
Access Control".
2. It is present in the Chip of a NIC Card.
3. It is Unique for every NIC Card and cannot be Changed.
4. It is 48-Bits. Out of 48-Bits, 24-Bits of Address is given by the Manufacturer of
NIC Card and the Remaining 24-Bits of Address is defined as per Instructions
given by IEEE.
5. IEEE stands for "Institute of Electronics and Electrical Engineers".

Logical Address-

1. It is also called Software Address or Logical Address.


2. It is given by the User and can be changed Anytime.
3. Several Schemes or Protocols are used to define Logical Address in a Computer.

There are two versions of IP address .


5.1 IPv4 address
5.2 IPv6 address

4.1 IPv4 ADDRESS


It is a 32 bit decimal value which is used to assign a PC as unique address. IPv4
addresses may be represented in any notation expressing a 32-bit integer value. They
are most often written in the dot-decimal notation, which consists of four octets of the
address expressed individually in decimal numbers and separated by periods.

CLASSES OF IPv4 :

CLASSES RANGE NETWORK ID HOST ID SUBNET


MASK
A 0-126 8 24 255.0.0.0

LOOPBACK 127 -- -- --

B 128-191 16 16 255.255.0.0

C 192-223 32 8 255.255.255.0

D 224-239 Reserved for - --


multicasting
E 240-254 Research --

4.2 IPv6 ADDRESS


Internet protocol used for carrying data in packet from source to a destination over
various networks, it is the enhanced version of IPV4. It is of 128 bit. It can support
very large number of nodes as compared to IPV4. It allows for 2128 possible nodes,
or address combination.
a) It is a logical address.
b) It works on layer 3.
c) Ipv6 is the extension of ipv4 with several advance features.

4.3 MASKING
Computers use a mask to define size of network and host part of an address. Mask is a
32-bit number written in dotted decimal form. It provides us the network address
when we perform a Boolean AND of mask with the IP address. It also defines number
of host bits in an address.

Class of Size of Size of Default


address network Host Part Mask for
Part of of Each Class
address, address, of Network
in bits in bits
A 8 24 255.0.0.0
B 16 16 255.255.0.0
C 24 8 255.255.255.
0
4.4 PRIVATE IP
It is not necessary that every time we make a network we are connected to some ISP
(Internet Service Provider). So in that case we require some private IP also which can
be used in indigenous networks .In each class a range of IP addresses have been
defined for this purpose
CLASS A 10.0.0.1 to 10.255.255.244
CLASS B 172.16.0.1 to 172.34.255.254
CLASS C 192.168.0.0/16

4.5 SUBNETTING
Basically it is a process of subdividing networks into smaller subnets.
In case we have 2-3 small networks but we can’t buy IP address for each and every
network. So here we use the basic concept of SUBNETTING i.e. using one public IP
address we will give them IP address and make them independent networks. For this
we take some bits of host address and use them for network address so we have
different independent networks
Address Format when sub netting Is Used (class A, B, C resp.):-
8 24-x x
Network Subnet Host
16 16-x x
Network Subnet Host
24 8-x x
Network Subnet Host

And due to this mask changes to subnet mask and now the network address also
includes subnet address.
CHAPTER-5
NETWORK MODEL

5.1 TCP/IP MODEL:-


The Internet protocol suite is the conceptual model and set of communications
protocols used on the Internet and similar computer networks. It is commonly known
as TCP/IP because the original protocols in the suite are the Transmission Control
Protocol (TCP) and the Internet Protocol (IP). It is occasionally known as
the Department of Defense (DoD) model, because the development of the networking
model was funded by DARPA, an agency of the United States Department of
Defense. The Internet protocol suite provides end-to-end data
communication specifying how data should be packetized, addressed,
transmitted, routed and received. This functionality is organized into four abstraction
layers which are used to sort related protocols according to the scope of networking
involved.

Figure 6.1-TCP/IP Model


5.2 OSI NETWORK MODEL:
The OSI model describes how information makes its way from application programs
through a network medium to another application program in other computer. It
divides one big problem in to seven smaller problems. Each problem is addressed by
one of the seven layers of the OSI model.

Figure 6.2- OSI Model

Functions of Network Layers in Brief:


5.2.1) APPLICATION LAYER
 Allows access to network services that support applications.
 Directly represents the services that directly support user applications
 Example apps are file transfer, e-mail, Net BIOS-based applications
5.2.2) PRESENTATION LAYER
 Translates from application to network format and vice-versa
 Responsible for protocol conversion, character conversion, data encryption /
decryption, expanding graphics commands, data compression.

5.2.3) SESSION LAYER


 Establishes, maintains and ends sessions across the network
 Provides synchronization services by planning check points in the data stream
=> if session fails, only data after the most recent checkpoint need be
transmitted
 Manages who can transmit data at a certain time and for how long

5.2.4) TRANSPORT LAYER


 Manages the flow control of data between parties across the network
 Provides error-checking to guarantee error-free data delivery, with on losses or
duplications
 Provides flow control and error-handling
TCP, ARP, RARP;

5.2.5) NETWORK LAYER


 Translates logical network address and names to their physical address
 Responsible for addressing and determining routes for sending
 Managing network problems such as packet switching, data congestion and
routing
5.2.6) DATA LINK LAYER
 Turns packets into raw bits 100101 and at the receiving end turns bits into
packets.
 Handles data frames between the Network and Physical layers
 The receiving end packages raw data from the Physical layer into data frames
for delivery to the Network layer
Logical Link Control
 Error correction and flow control
 Manages link control and defines SAPs

5.2.7) PHYSICAL LAYER


 Transmits raw bit stream over physical cable
 Defines cables, cards, and physical aspects
 Defines NIC attachments to hardware, how cable is attached to NIC
 Defines techniques to transfer bit stream to cable
CHAPTER-6
SIMULATOR
A Network Simulator is a Piece of Software or Hardware that Predicts the Behavior of
a Network, without an Actual Network being Present. Network Simulator Serve a
Variety of need . Compared to the Cost and Time involved in Setting up an Entire
Test bed Containing Multiple Networked Computers, Routers and Data Links,
Network Simulators are Relatively Fast and Inexpensive.
They allow Engineers to Test Scenarios that might be Particularly Difficult or
Expensive to Emulate using Real Hardware, for Instance, Simulating the Effects of a
Sudden Burst in Traffic or a DoS Attack on a Network Service.

The Simulator that we have used to Create a Simulation of the Network Design of the
Project is CISCO PACKET TRACER 7.1.0.0222

Figure 7.1
Packet Tracer is an Integrated Simulation, Visualization, Collaboration, and
Assessment Environment. Packet Tracer Supports Student and Instructor creation of
Simulations, Visualizations, and Animations of Networking Phenomena.
Like any Simulation, Packet Tracer Relies on a Simplified Model of Networking
Devices and Protocols. Real Computer Networks, Experienced both in-Person/Hands-
on and Remotely, remain the Benchmark for understanding Network Behavior and
Developing Networking Skills. Packet Tracer was created to help Address the Digital
Divide in Networking Education, where many Students and Teachers Lack Access to
Equipment, Bandwidth, and Interactive Modes of Learning Networking.

CISCO PACKET TRACER INTERFACE

Figure 7.2
CHAPTER-7
CONFIGURATION OF ROUTER AND SWITCH

1. ROUTER CONFIGURATION :-
a) CONFIGURATION FOR HOST NAM E
Router>
Router>enable
Router#conf terminal
Router(config)#hostname ABC
ABC(config)#exit
ABC#exit
ABC>

b) CONFIGURATION FOR PASSWORD


Router>
Router>enable
Router#conf terminal
Router(config)#password 123
Router(config)#exit
Router#exit
Router >

c) CONFIGRURATION FOR CONSOLE PASSWORD


Router>
Router>enable
Router#conf terminal
Router(config)#line console 0
Router(config)#password 1234
Router(config)#exit
Router#exit
Router >
d) CONFIGURATION FOR ASSIGNING IP ADDRESS

Router> enable
Router# Configure Terminal
Router(Config)# Hostname R1
R1(Config)# Interface FastEthernet 0/0
R1(Config-If)# IP Address 192.168.1.1 255.255.255.252
R1(Config-If)# No Shutdown
R1(Config-If)# Exit

2. SWITCH CONFIGURATION :-
a) CONFIGURATION FOR HOST NAM E
switch>
switch >enable
switch #conf terminal
switch (config)#hostname ABC
ABC(config)#exit
ABC#exit
ABC>

b) CONFIGURATION FOR PASSWORD


switch >
switch >enable
switch #conf terminal
switch (config)#password 123
switch (config)#exit
switch #exit
switch >

c) CONFIGRURATION FOR CONSOLE PASSWORD


switch >
switch >enable
switch #conf terminal
switch (config)#line console 0
switch (config)#password 1234
switch (config)#exit
switch#exit
switch>
d) CONFIGURATION FOR ASSIGNING IP ADDRESS

switch > enable


switch # Configure Terminal
switch (Config)# Hostname R2
R2(Config)# Interface FastEthernet 0/0
R2(Config-If)# IP Address 192.168.1.1 255.255.255.252
R2(Config-If)# No Shutdown
R2(Config-If)# Exit

CHAPTER-8
PROJECT

PROJECT
How the system is setup
In this project we will create company LAN network; we will create the better
communication network with its security requirement, first we major and analysis
the all network requirement and make the planning for future reference.
The most vital stage in introducing and utilizing a system is the arranging. From the
kind of association utilized through to the manner in which the system is utilized, the
arranging is a key component.
Building up the right learning and the correct practices when introducing the system
can spare time in a bad position shooting problems. Shared web assets and office
assets for example printers can drastically decrease the running expenses of an
association.
Reveal your independent venture's prerequisites for execution, limit and system
ports. Meet with associates from every region of your organization to comprehend
their application and potential Extension prerequisites.
Neighborhood bolster a solitary area, similar to an office or building, utilizing
switches that give ports to associate servers, stockpiling equipment, PCs, telephones
and printers to the system. The LAN itself comprises of cabling, switches and
switches that give availability to the Internet just as extra areas, whenever required,
and steering between LAN fragments.
Plan and structure the link format. Cabling has an imperative impact of system
structure as it gives the physical correspondence way to your assembling
organization.
Counsel with a link plan proficient experienced in assembling territories to limit the
potential for hardware obstruction. Counseling with a link organization gives genuine
feelings of serenity that you've arranged the right sort of link and included flame
code particulars.

Designing
We will design the basic LAN network of company. IN this designing we use the some
network devices such as routers, switch, and telecommunication devices, voice and
radio.Make a spreadsheet to accumulate key subtleties required for the structure.
Data gathered must incorporate the quantity of clients per area, their jobs, LAN port
rates and hub types, for example, printers and any equipment that will be associated
with the system.
Other system necessities incorporate programmable rationale controllers for
mechanical autonomy or other mechanized frameworks requiring system network.
Arrange the spreadsheet by posting physical areas over the best segments and
making column classifications for clients.
Rundown the all out number of clients per site and order type, for example, office,
designing and assembling.
Another order segment should address the PC room, recognizing every server and
the applications facilitated, just as working frameworks and system card speeds.
Likewise archive the PC room's natural administrations for cooling, electrical limit
and controls to screen mugginess and temperature levels.
Building & Configuration Command :-
Router0 Configuration Command
Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router0
Router0(config)#Interface Serial 0/3/0
Router0(config-if)#IP Address 10.0.0.1 255.0.0.0
Router0(config-if)#No Shutdown
Router0(config-if)#Exit
Router0(config)#Interface Serial 0/3/1
Router0(config-if)#IP Address 20.0.0.1 255.0.0.0
Router0(config-if)#No Shutdown
Router0(config-if)#Exit
Router0(config)#Interface Serial 0/2/0
Router0(config-if)#IP Address 30.0.0.1 255.0.0.0
Router0(config-if)#No Shutdown
Router0(config-if)#Exit
Router0(config)#Interface serial 0/2/1
Router0(config-if)#IP Address 40.0.0.1 255.0.0.0
Router0(config-if)#No Shutdown
Router0(config-if)#Exit

Router1 Configuration Command


Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router1
Router1(config)#Interface Serial 0/3/0
Router1(config-if)#IP Address 10.0.0.2 255.0.0.0
Router1(config-if)#Clock rate 64000
Router1(config-if)#No Shutdown
Router1(config-if)#Exit
Router1(config)#Interface Serial 0/3/1
Router1(config-if)#IP Address 50.0.0.1 255.0.0.0
Router1(config-if)#No SHutdown
Router1(config-if)#Exit
Router1(config)#Interface Serial 0/1/0
Router1(config-if)#Ip Address 60.0.0.1 255.0.0.0
Router1(config-if)#No Shutdown
Router1(config-if)#

Router2 Configuration Command


Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router2
Router2(config)#Interface Serial 0/3/0
Router2(config-if)#IP Address 20.0.0.2 255.0.0.0
Router2(config-if)#Clock rate 64000
Router2(config-if)#No Shutdown
Router2(config-if)#Exit
Router2(config)#Interface Serial 0/1/0
Router2(config-if)#IP Address 70.0.0.1 255.0.0.0
Router2(config-if)#No Shutdown
Router2(config-if)#Exit

Router3 Configuration Command


Router>Enable
Router#Configure TerminalRouter(config)#Hostname Router3
Router3(config)#Interface Serial 0/3/0
Router3(config-if)#IP Address 30.0.0.2 255.0.0.0
Router3(config-if)#Clock rate 64000
Router3(config-if)#No Shutdown
Router3(config-if)#Exit
Router3(config)#Interface Serial 0/1/0
Router3(config-if)#IP Address 80.0.0.1 255.0.0.0
Router3(config-if)#No Shutdown
Router3(config-if)#Exit

Router4 Configuration Command


Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router4
Router4(config)#Interface Serial 0/3/0
Router4(config-if)#IP Address 40.0.0.2 255.0.0.0
Router4(config-if)#Clock rate 64000
Router4(config-if)#No Shutdown
Router4(config-if)#Exit
Router4(config)#Interface Serial 0/1/0
Router4(config-if)#IP Address 90.0.0.1 255.0.0.0
Router4(config-if)#No Shutdown
Router4(config-if)#Exit
Router4(config)#Interface Serial 0/1/1
Router4(config-if)#IP Address 100.0.0.1 255.0.0.0
Router4(config-if)#No Shutdown
Router4(config-if)#Exit
Router5 Configuration Command
Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router5
Router5(config)#Interface Serial 0/3/0
Router5(config-if)#IP Address 50.0.0.2 255.0.0.0
Router5(config-if)#Clock rate 64000
Router5(config-if)#No Shutdown
Router5(config-if)#Exit
Router5(config)#Interface FastEthernet 0/0
Router5(config-if)#IP Address 120.0.0.1 255.0.0.0
Router5(config-if)#No Shutdown
Router5(config-if)#Exit

Switchport Port-Security
Switch>Enable
Switch#Configure Terminal
Switch(config)#Hostname Router5Switch
Router5Switch(config)#Interface FastEthernet 0/2
Router5Switch(config-if)#Switchport Mode Access
Router5Switch(config-if)#Switchport Port-security
Router5Switch(config-if)#Switchport Port-security Maximum 1
Router5Switch(config-if)#Switchport Port-security Mac-address Sticky
Router5Switch(config-if)#Switchport Port-security Violation Shutdown
Router5Switch(config-if)#Exit

Router6 Configuration Command


Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router6
Router6(config)#Interface Serial 0/3/0
Router6(config-if)#IP Address 60.0.0.2 255.0.0.0
Router6(config-if)#Clock rate 64000
Router6(config-if)#No Shutdown
Router6(config-if)#Exit
Router6(config)#Interface FastEthernet 0/0
Router6(config-if)#IP Address 110.0.0.1 255.0.0.0
Router6(config-if)#No Shutdown
Router6(config-if)#Exit

DHCP Configuration On Router6


Router6(config)#IP DHCP Pool Abc
Router6(dhcp-config)#Network 110.0.0.0 255.0.0.0
Router6(dhcp-config)#Default-router 110.0.0.1
Router6(dhcp-config)#DNS-server 8.8.8.8
Router6(dhcp-config)#Exit

Router7 Configuration Command


Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router7
Router7(config)#Interface Serial 0/3/0
Router7(config-if)#IP Address 70.0.0.2 255.0.0.0
Router7(config-if)#Clock rate 64000
Router7(config-if)#No Shutdown
Router7(config-if)#Exit
Router7(config)#Interface FastEthernet 0/0
Router7(config-if)#No Shutdown
Router7(config-if)#Exit

VLAN 2 and VLAN 3 Configuration and Assign Port Into VLAN


Switch>Enable
Switch#Configure Terminal
Switch(config)#Hostname Router7Switch
Router7Switch(config)#Vlan 2
Router7Switch(config-vlan)#Name 2
Router7Switch(config-vlan)#Exit
Router7Switch(config)#Vlan 3
Router7Switch(config-vlan)#Name 3
Router7Switch(config-vlan)#Exit
Router7Switch(config)#Interface Range FastEthernet 0/2 - 3
Router7Switch(config-if-range)#Switchport Mode Access
Router7Switch(config-if-range)#Switchport Access Vlan 2
Router7Switch(config-if-range)#Exit
Router7Switch(config)#Interface Range FastEthernet 0/4 - 5
Router7Switch(config-if-range)#Switchport Mode Access
Router7Switch(config-if-range)#Switchport Access Vlan 3
Router7Switch(config-if-range)#Exit

Router On Stick Configuration


Router7(config)#Interface FastEthernet 0/0.1
Router7(config-subif)#Encapsulation Dot1Q 2
Router7(config-subif)#IP Address 1.0.0.1 255.0.0.0
Router7(config-subif)#No Shutdown
Router7(config-subif)#Exit
Router7(config)#Interface FastEthernet 0/0.2
Router7(config-subif)#Encapsulation Dot1Q
Router7(config-subif)#IP Address 2.0.0.1 255.0.0.0
Router7(config-subif)#No Shutdown
Router7(config-subif)#Exit

Router8 Configuration Command


Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router8
Router8(config)#Interface Serial 0/3/0
Router8(config-if)#IP Address 80.0.0.2 255.0.0.0
Router8(config-if)#Clock rate 64000
Router8(config-if)#No Shutdown
Router8(config-if)#Exit
Router8(config)#Interface FastEthernet 0/0
Router8(config-if)#IP Address 5.0.0.1 255.0.0.0
Router8(config-if)#No Shutdown
Router8(config-if)#Exit

Telnet Configuration On Router8


Router8(config)#Enable Secret CCNA
Router8(config)#Line Vty 0 4
Router8(config-line)#Password Telnet
Router8(config-line)#Login
Router8(config-line)#Exit

Router9 Configuration Command


Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router9
Router9(config)#Interface Serial 0/3/0
Router9(config-if)#IP Address 90.0.0.2 255.0.0.0
Router9(config-if)#Clock rate 64000
Router9(config-if)#No Shutdown
Router9(config-if)#Exit
Router9(config)#Interface Fastethernet0/0
Router9(config-if)#IP Address 4.0.0.1 255.0.0.0
Router9(config-if)#No Shutdown
Router9(config-if)#Exit

Router10 Configuration Command


Router>Enable
Router#Configure Terminal
Router(config)#Hostname Router10
Router10(config)#Interface Serial 0/3/0
Router10(config-if)#IP Address 100.0.0.2 255.0.0.0
Router10(config-if)#Clock rate 64000
Router10(config-if)#No Shutdown
Router10(config-if)#Exit
Router10(config)#Interface FastEthernet 0/0
Router10(config-if)#IP Address 3.0.0.1 255.0.0.0
Router10(config-if)#No Shutdown
Router10(config-if)#Exit

VLAN 4 and VLAN 5 Configuration and Assign Port Into VLAN


Switch>Enable
Switch#Configure Terminal

Switch(config)#Hostname Router10Switch
Router10Switch(config)#Vlan 4
Router10Switch(config-vlan)#Name 4
Router10Switch(config-vlan)#Exit
Router10Switch(config)#Vlan 5
Router10Switch(config-vlan)#Name 5
Router10Switch(config-vlan)#Exit
Router10Switch(config)#Interface Range FastEthernet 0/1 - 2
Router10Switch(config-if-range)#Switchport Mode Access
Router10Switch(config-if-range)#Switchport Access Vlan 4
Router10Switch(config-if-range)#Exit
Router10Switch(config)#Interface Range FastEthernet 0/4 - 5
Router10Switch(config-if-range)#Switchport Mode Access
Router10Switch(config-if-range)#Switchport Access Vlan 5
Router10Switch(config-if-range)#Exit

OSPF Multi Area Routing Configuration On Router0


Router0(config)#Router OSPF 10
Router0(config-router)#Network 10.0.0.0 0.255.255.255 Area 0
Router0(config-router)#Network 20.0.0.0 0.255.255.255 Area 0
Router0(config-router)#Network 30.0.0.0 0.255.255.255 Area 0
Router0(config-router)#Network 40.0.0.0 0.255.255.255 Area 0Router0(config-
router)#Exit

OSPF Multi Area Routing Configuration On Router1


Router1(config)#Router OSPF 10
Router1(config-router)#Network 10.0.0.0 0.255.255.255 Area 0
Router1(config-router)#Network 10.0.0.0 0.255.255.255 Area 0
Router1(config-router)#Network 50.0.0.0 0.255.255.255 Area 1
Router1(config-router)#Network 60.0.0.0 0.255.255.255 Area 1
Router1(config-router)#Exit

OSPF Multi Area Routing Configuration On Router2


Router2(config)#Router OSPF 10
Router2(config-router)#Network 20.0.0.0 0.255.255.255 A
Router2(config-router)#Network 20.0.0.0 0.255.255.255 Area 0
Router2(config-router)#Network 70.0.0.0 0.255.255.255 Area 2
Router2(config-router)#Exit

OSPF Multi Area Routing Configuration On Router3


Router3(config)#Router OSPF 10
Router3(config-router)#Network 30.0.0.0 0.255.255.255 Area 0
Router3(config-router)#Network 80.0.0.0 0.255.255.255 Area 3
Router3(config-router)#Exit

OSPF Multi Area Routing Configuration On Router4


Router4(config)#Router OSPF 10
Router4(config-router)#Network 40.0.0.0 0.255.255.255 Area 0
Router4(config-router)#Network 100.0.0.0 0.255.255.255 Area 4
Router4(config-router)#Network 90.0.0.0 0.255.255.255 Area 4
Router4(config-router)#Exit

OSPF Multi Area Routing Configuration On Router5


Router5(config)#Router OSPF 10
Router5(config-router)#Network 50.0.0.0 0.255.255.255 Area 1
Router5(config-router)#Network 50.0.0.0 0.255.255.255 Area 1
Router5(config-router)#Network 120.0.0.0 0.255.255.255 Area 1
Router5(config-router)#Exit

OSPF Multi Area Routing Configuration On Router6


Router6(config)#Router OSPF 10
Router6(config-router)#Network 60.0.0.0 0.255.255.255 Area 1
Router6(config-router)#Network 110.0.0.0 0.255.255.255 Area 1
Router6(config-router)#Network 110.0.0.0 0.255.255.255 Area 1
Router6(config-router)#Exit

OSPF Multi Area Routing Configuration On Router7


Router7(config)#Router OSPF 10
Router7(config-router)#Network 70.0.0.0 0.255.255.255 Area 2
Router7(config-router)#Network 1.0.0.0 0.255.255.255 Area 2
Router7(config-router)#Network 2.0.0.0 0.255.255.255 Area 2
Router7(config-router)#Exit

OSPF Multi Area Routing Configuration On Router8


Router8(config)#Router OSPF 10
Router8(config-router)#Network 5.0.0.0 0.255.255.255 Area 3
Router8(config-router)#Network 80.0.0.0 0.255.255.255 Area 3
Router8(config-router)#Exit

OSPF Multi Area Routing Configuration On Router9


Router9(config)#Router OSPF 10
Router9(config-router)#Network 4.0.0.0 0.255.255.255 Area 4
Router9(config-router)#Network 90.0.0.0 0.255.255.255 Area 4
Router9(config-router)#Exit

OSPF Multi Area Routing Configuration On Router10


Router10(config)#Router OSPF 10
Router10(config-router)#Network 3.0.0.0 0.255.255.255 Area 4
Router10(config-router)#Network 100.0.0.0 0.255.255.255 Area 4
Router10(config-router)#Exit
CONCLUSION

In conclusion, a network is two or more computers connected together using a telecommunication


system for the purpose of communicating and sharing resources. Without having a network,
Companies would not be able to share resources and increase productivity more effectively. The
WAN network allowed companies to use the Internet over large areas.

This provided the company to have meetings overseas by video conferencing and sharing data over
the network. As you can see, Networks have many benefits to the end user. Weather your Network
is Wired or Wireless, Networks area important part of technology.

FUTURE SCOPE

Computer networking and telecommunications is a career that consists of data


telecommunications, Internet routing, and desktop operating systems. In Early 2000’s,
networking was considered to be one of the best jobs, and it is equally popular today.

There are multiple roles you can take up in a Computer networking:

1. Network administrator
2. Network system engineer
3. Network system technician

COMPUTER NETWORKING(17BTL030409)B Tech ECE Department Page 59

Potrebbero piacerti anche