SimranjitKaur File
SimranjitKaur File
SimranjitKaur File
Submitted by
SIMRANJIT KAUR
GU-2021-4212
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
AT
ENGINEERING
ACKNOWLEDGEMENT
While presenting this report I would like to express my deep sense of gratitude
to entire Solitaire staff that was indispensable part of my training giving me
unending guidance, inspiration, encouragement and providing me excellent
environment throughout my training at Solitaire Infosys Pvt. LTD. The training
was an extremely productive; enriching experience, not only technically but
also from providing practical skills. I am extremely thankful to Mr. Sham
Sunder who had devoted a lot of time in guiding and supervising me during my
training. I place my gratitude towards Mr. Sham Sunder for his valuable advice
and guidance in carrying out this enjoyable and productive experience, which
provided me a great opportunity to search new horizons.
SIMRANJIT KAUR
GU-2021-4212
1
GU-2021-4212
ABSTRACT
Network security is a crucial aspect of the course, covering areas such as virtual
private networks (VPNs), DNS server, Email server, NAT, VOIP. Participants
will also gain insights into network design methodologies, IP addressing,
redistribution and subnetting.
2
GU-2021-4212
TABLE OF CONTENTS
1. Introduction 4
6. IP Address 13-14
3
GU-2021-4212
INTRODUCTION
Networking relies on protocols, which are a set of rules and standards that
govern how data is transmitted and received across the network. One commonly
used protocol is the Internet Protocol (IP), which assigns unique addresses to
each device on the network, ensuring that data is properly directed to its
intended recipient.
Different types of networks exist, including wired and wireless networks. Wired
networks use physical cables, like Ethernet cables, to connect devices, while
wireless networks use radio waves to transmit data without the need for physical
connections.
4
GU-2021-4212
There are different types of networks based on their size and geographical
coverage:
Local Area Network (LAN): A LAN is a network that covers a small area, such
as a home, office, or building. It allows devices within this limited space to
share files, printers, and internet connections.
Each type of network serves a different purpose and has varying sizes and
coverage areas. LANs are suitable for small-scale networking within a limited
space, MANs connect LANs across a city or town, and WANs enable
connectivity on a global scale.
5
GU-2021-4212
6
GU-2021-4212
NETWORKING CABLES
7
GU-2021-4212
Fiber optic cable: Utilizes thin glass or plastic fibers to transmit data
using light signals, offering high-speed and long-distance
communication.
NETWORKING DEVICES
Network devices, also known as networking hardware, are physical devices that
allow hardware on a computer network to communicate and interact with one
another. For example Repeater, Hub, Bridge, Switch, Routers, Gateway, etc.
LAN Card
A LAN card, also known as a network interface card (NIC) or Ethernet card, is
a hardware device that enables a computer to connect to a local area network
(LAN). It provides the physical interface between the computer and the
network, allowing data to be transmitted and received over the network. The
MAC address is indeed stored in the LAN card itself.
REPEATER
A repeater operates at the physical layer. It is hardware component that is used
to boost up signals and also receive signal and retransmits it at higher
frequency. According to the types of signals that they regenerate, repeaters can
be classified into two categories:
Analog Repeaters : It can only amplify the analog signal.
Digital Repeaters : It can reconstruct a distorted signal.
9
GU-2021-4212
HUB
A hub is a network device that connects multiple devices in a local area network
(LAN). It operates at the physical layer of the network and is primarily used for
signal distribution. It performs broadcasting and LAN device which connects
computer together and works on half duplex. It does not understand MAC
address. . In HUB, there is 7 to 12 port. The speed is same as cable speed or
connection speed.
SWITCH
A switch is a multiport bridge with a buffer and a design that can boost its
efficiency and performance. A switch is a data link layer device. It is a LAN
device and a central device which is used in network for connecting devices.
The number of ports are more than hub. It has max 24 ports. It understand
MAC address and work on full duplex mode. The speed of switch is double
than connection speed.
Based on their configuration types, switches can be categorized into two main
types:
10
GU-2021-4212
o Unmanaged Switch:
Unmanaged switches are the most basic type of switch and are typically used in
small home or office networks. They are plug-and-play devices that require no
configuration or management. Unmanaged switches operate with default
settings and cannot be customized.
o Managed Switch:
Managed switches offer advanced configuration and management capabilities,
making them suitable for larger networks and enterprise environments. They
provide a range of features and options that allow network administrators to
have greater control over the network.
BRIDGE
A bridge operates at the data link layer. A bridge is a repeater, with add on
the functionality of filtering content by reading the MAC addresses of the
source and destination. It is also used for interconnecting two LANs working
on the same protocol.
GATEWAY
A gateway, as the name suggests, is a passage to connect two networks that
may work upon different networking models. They work as messenger agents
that take data from one system, interpret it, and transfer it to another system.
Gateways are also called protocol converters and can operate at any network
layer. Gateways are generally more complex than switches or routers. A
gateway is also called a protocol converter.
FIREWALL
A firewall device is a crucial component of network security that monitors and
filters network traffic based on predefined rules. It acts as a barrier between
networks, preventing unauthorized access and protecting against threats.
Firewalls enforce security policies, perform traffic inspection, and can include
features such as NAT, intrusion detection/prevention, and VPN support. They
play a vital role in enhancing network security and protecting sensitive data
from unauthorized access or malicious activities.
11
GU-2021-4212
ROUTERS
12
GU-2021-4212
IP ADDRESS
An IP address is a unique address that identifies a device on the internet or a
local network. IP stands for "Internet Protocol," which is the set of rules
governing the format of data sent via the internet or local network. Typically
assigned by an internet service provider (ISP), an IP address is an online device
address used for communicating across the internet. The internet needs a way to
differentiate between different computers, routers, and websites.
There are two versions of IP addresses that are commonly used on the
internet: IPv4 and IPv6.
IPv4 IPv6
13
GU-2021-4212
Types of IP addresses
In the IPv4 IP address space, there are five classes: A, B, C, D and E. Each class
has a specific range of IP addresses. Primarily, class A, B, and C are used by the
majority of devices on the Internet. Class D and class E are for special uses.
14
GU-2021-4212
OSI MODEL
There are the seven OSI layers. Each layer has different functions. A list of
seven layers are given below:
15
GU-2021-4212
Physical Layer: Deals with the physical transmission of data over the
network.
16
GU-2021-4212
Cisco Packet Tracer is a software tool developed by Cisco Systems that allows
users to design, configure, and simulate computer networks. It provides a virtual
environment where users can create network topologies by adding devices such
as routers, switches, PCs, and servers. With Packet Tracer, users can connect
these devices, configure their settings, and simulate network operations.
17
GU-2021-4212
In a networking project using Cisco Packet Tracer, a wide range of devices can
be used to create and simulate network environments. Here are some common
devices used in such projects:
PCs: PCs (Personal Computers) are used to simulate end-user devices in the
network. They can represent workstations, laptops, or any other devices that
connect to the network.
18
GU-2021-4212
IMPLEMENTATION OF PROJECT
Step 2: After the installation procedure has completed this display (below)
will appear when you run the Cisco Packet Tracer
Tracer-Start
Start the application.
Step 3:
From the bottom toolbar, click on router and select router 2811.
Also click on switch and selects 2960 switch.
Now, click on ‘End Devices’ and select ‘PC’ and then click on the
screen.
19
GU-2021-4212
Step 4:
Connect routers and switches by cable.
For adding ports in router, click on the router, off the router by clicking
on the button and then add the WIC-2T port into the empty port (which
is black in color) by dragging it from the left section of the screen. And
then again turn on the button by clicking on the same button.
20
GU-2021-4212
21
GU-2021-4212
Modes of router –
There are mainly 5 modes in the router:
1. User execution mode –
As soon as the interface up message appears and press enter, the router>
prompt will pop up. This is called user execution mode. This mode is
limited to some monitoring commands.
2. Privileged mode –
As we type enable to user mode, we enter into Privileged mode where we
can view and change the configuration of the router. Different commands
like show running-configuration, show IP interface brief, etc can run on
this mode which is used for troubleshooting purposes. Here commands are
sh run, sh history, write and so on.
Configuration –
22
GU-2021-4212
Assigning the IP address is the first step while creating a network in packet
tracer. Before proceeding with any other configuration, we must assign the
appropriate IP address and design the correct IP addressing scheme for the
network.
23
GU-2021-4212
CONFIGURE PC IP ADDRESS
To configure the IP address on a PC, laptop, or server, we have to open the IP
configuration utility provided in the packet tracer.
To assign the static IP address, we will select the static option available and
then we will configure the IP address manually.
If we have configured the devices with the correct IP addresses then we can
further develop our network in the packet tracer.
24
GU-2021-4212
ROUTING PROTOCOLS
Routing is the process of forwarding network traffic from one network location
to another. It involves making decisions about the best path for data packets to
reach their destination based on network topology and routing protocols.
In simple terms, routing is like finding the best directions to reach a destination
in a network, and routing protocols are the rul
rules
es and methods used by routers to
share information and decide the most efficient paths for data to travel through
the network.
25
GU-2021-4212
26
GU-2021-4212
REDISTRIBUTION
27
GU-2021-4212
CONFIGURE REDIST
REDISTRIBUTION ON ROUTER
28
GU-2021-4212
Step 2:
Now, go to physical mode and put the power adapter.
29
GU-2021-4212
Step 3:
Go to router and put these commands:
Step 4:
Now, configure the phone directory from IPphone0 to IPphone1.
30
GU-2021-4212
In Cisco Packet Tracer, you can use Telnet to remotely access and manage
networking devices such as routers and switches. Here's a step to use Telnet in
Cisco Packet Tracer.
Double-click the router or switch you want to access via Telnet to open
its configuration window.
Go to the CLI tab to access the command-line interface of the device.
Enter the following commands to enable Telnet:
31
GU-2021-4212
Once connected via Telnet, you can access the command-line interface
(CLI) of the router or switch. You can then configure and manage the
device remotely as if you were physically connected to it.
32
GU-2021-4212
33
GU-2021-4212
34
GU-2021-4212
WIFI SERVER
The central device that provides wireless connectivity to Wi-Fi-enabled devices
is typically referred to as a "Wireless Access Point" (AP) or "Wi-Fi Access
Point." The AP acts as a bridge between the wired network and the wireless
network, allowing devices such as laptops, smartphones, and tablets to connect
to the network wirelessly. The Access Point broadcasts the Wi-Fi signal and
provides a wireless connection to clients within its range. It serves as a gateway
for Wi-Fi-enabled devices to access network resources and the internet
The steps for WiFi server in cisco packet tracer:
There are varieties of wireless devices given in the packet tracer so we
will select the wireless router WRT300N from the list and two laptop’s:
Now, we have to configure the wireless router. Most of the settings are already
configured on the wireless router required to establish a wireless network
however, we can change the configuration as per our requirement.
35
GU-2021-4212
Now connect wifi in laptop and put the password the wifi will
connected to laptop.
36
GU-2021-4212
37
GU-2021-4212
SUBNETTING
Start
Determine the number of required subnets
Choose an appropriate subnet mask
Calculate the number of subnet bits needed
Calculate the remaining host bits
Create the subnet address range
Assign IP addresses to devices within each subnet
End
38
GU-2021-4212
Example: 194.162.1.1/30
2^5 = 30
n=5
On rearranging 11111000 =
(1*128)+(1*64)+(1*32)+(1*16)+(1*8)+(0*4)+(0*2)+(0*1)
=128+64+32+16+8
= 248
Now, all previous operations should done for new IP, subnet mask and also
routing protocol.
39
GU-2021-4212
SUBNETTING NETWORK
40