vishnu intern .report
vishnu intern .report
vishnu intern .report
Submitted by
VISHNU S- 412422106124
Of
BACHELOR OF ENGINEERING
In
ELECTRONICS AND COMMUNICATION ENGINEERING
i
BONAFIDE CERTIFICATE
Certified that this internship report “NETWORKING” are the Bonafide works
of “VISHNU S” (412422106124)” who carried out the internship works in the
“VI MICROSYSTEMS PVT. LTD., PERUNGUDI”.
ii
DETAILS OF INTERNSHIP
I VI OFFILINE III/V
MICROSYSTEM
PVT.LTD
iii
TABLE OF CONTENTS
S.NO. CONTENTS PG. NO.
ABSTRACT ii
1 ABOUT THE COMPANY 1
2 GENERAL NETWORKING CONCEPTS 2
3 NETWORKING DEVICES 8
4 ROUTING TYPES 10
5 ROUTING PROTOCOLS 12
6 NETWORK SERVICES 16
7 IMPACT OF TRAINING 19
8 PROOF OF COMPLETION 20
LIST OF FIGURES
1 DHCP NETWORK 18
iv
ABSTRACT
v
CHAPTER 1
ABOUT THE COMPANY
1
CHAPTER 2
2
A WAN can be defined one of two ways. The book definition of a WAN is a
network that spans large geographical locations, usually to connect multiple LANs. This
is a general definition, and not always accurate.
A MAN (Metropolitan Area Network) is another category of network, though
the term is not prevalently used. A MAN is defined as a network that connects LANs across
a city-wide geographic area.
A VPN (Virtual Private Network) allows for information to be securely sent
across a public or unsecure network, such as the Internet. Common uses of a VPN are to
connect branch offices or remote users to a main office.
2.2 TOPOLOGIES
1)Bus Topology:
• All nodes are connected to a single central cable.
• Easy to install & extend and requires less cable.
• Limited number of nodes.
• Difficult to troubleshoot.
• Central cable failure brings down the entire network.
2) Star Topology:
• All nodes are connected to a central hub or switch.
• Easy to install and detect faults.
• If central hub fails the entire network is down.
• Requires more cables.
• Each node is connected to exactly two other nodes, forming a circular pathway for
signals.
• Data packets travel in one direction, reducing chances of packet collisions; each
node has equal access.
3
• A failure in any single cable or node can disrupt the entire network; difficult to
troubleshoot.
4) Mesh Topology:
• Every node is connected to every other node.
• Highly reliable, provides multiple paths for data transmission, failure of one node
generally doesn't affect the network.
• Expensive due to the high number of cables and ports required, complex to install
and manage.
5) Tree Topology:
• A hybrid topology combining characteristics of star and bus topologies. Nodes are
connected in a hierarchical manner.
• Easily scalable, easy to manage and troubleshoot, suitable for large networks.
• If the root node fails, the entire network can be affected, requires a lot of cable.
4
The OSI model itself is now somewhat deprecated – modern protocol suites, such
as the TCP/IP suite, are difficult to fit cleanly within the OSI model’s seven layers. This is
especially true of the upper three layers.
The bottom (or lower) four layers are more clearly defined, and terminology from
those layers is still prevalently used. Many protocols and devices are described by which
lower layer they operate at.
Subnet Mask:
Part of an IP address identifies the network. The other part of the address
identifies the host. A subnet mask is required to provide this distinction: 158.80.164.3
255.255.0.0 The above IP address has a subnet mask of 255.255.0.0. The subnet mask
follows two rules:
• If a binary bit is set to a 1 (or on) in a subnet mask, the corresponding bit in the address
identifies the network.
5
• If a binary bit is set to a 0 (or off) in a subnet mask, the corresponding bit in the address
identifies the host.
Looking at the above address and subnet mask in binary:
IP Address: 10011110.01010000.10100100.00000011
Subnet Mask: 11111111.11111111.00000000.00000000
The first 16 bits of the subnet mask are set to 1. Thus, the first 16 bits of the address
(158.80) identify the network. The last 16 bits of the subnet mask are set to 0. Thus, the
last 16 bits of the address (164.3) identify the unique host on that network. The network
portion of the subnet mask must be contiguous. For example, a subnet mask of 255.0.0.255
is not valid.
7
CHAPTER 3
NETWORKING DEVICES
3.1 HUBS
Hubs are Layer-1 devices that physically connect network devices together for
communication. Hubs can also be referred to as repeaters.
Hubs provide no intelligent forwarding whatsoever. Hubs are incapable of processing
either Layer-2 or Layer-3 information, and thus cannot make decisions based on hardware
or logical addressing.
Thus, hubs will always forward every frame out every port, excluding the port originating
the frame. Hubs do not differentiate between frame types, and thus will always forward
unicasts, multicasts, and broadcasts out every port but the originating port.
3.2 SWITCHES
Layer-2 devices build hardware address tables, which at a minimum contain the following:
• Hardware addresses for hosts.
• The port each hardware address is associated with Using this information, Layer-2
devices will make intelligent forwarding decisions based on the frame (or data-link)
headers.
A frame can then be forwarded out only the appropriate destination port, instead of all
ports. Layer-2 forwarding was originally referred to as bridging. Bridging is a largely
deprecated term (mostly for marketing purposes), and Layer-2 forwarding is now
commonly referred to as switching.
There are some subtle technological differences between bridging and switching. Switches
usually have a higher port-density, and can perform forwarding decisions at wire speed,
due to specialized hardware circuits called ASICs (Application-Specific Integrated
Circuits). Otherwise, bridges and switches are nearly identical in function.
8
Ethernet switches build MAC address tables through a dynamic learning process. A switch
behaves much like a hub when first powered on. The switch will flood every frame,
including unicasts, out every port but the originating port.
3.3 ROUTERS
Layer-3 routing is the process of forwarding a packet from one network to another
network, based on the Network-layer header. Routers build routing tables to perform
forwarding decisions, which contain the following:
• The destination network and subnet mask.
• The next hop router to get to the destination network.
• Routing metrics and Administrative Distance.
Note that Layer-3 forwarding is based on the destination network, and not the destination
host. It is possible to have host routes, but this is less common.
The routing table is concerned with two types of Layer-3 protocols:
• Routed protocols - assigns logical addressing to devices, and routes packets between
networks. Examples include IP and IPX.
• Routing protocols - dynamically builds the information in routing tables. Examples
include RIP, EIGRP, and OSPF.
Each individual interface on a router belongs to its own collision domain. Thus, like
switches, routers create more collision domains, which results in fewer collisions.
Unlike Layer-2 switches, Layer-3 routers also separate broadcast domains. As a rule, a
router will never forward broadcasts from one network to another network (unless, of
course, you explicitly configure it to).
Routers will not forward multicast either, unless configured to participate in a multicast
tree.Traditionally, a router was required to copy each individual packet to its buffers, and
perform a route-table lookup. Each packet consumed CPU cycles as it was forwarded by
the router, resulting in latency. Thus, routing was generally considered slower than
switching.
9
CHAPTER 4
ROUTING TYPES
The following briefly outlines the advantages and disadvantages of static routing:
10
Advantages of Static Routing:
• Minimal CPU/Memory overhead.
• No bandwidth overhead (updates are not shared between routers).
• Granular control on how traffic is routed.
The following briefly outlines the advantages and disadvantages of dynamic routing:
Advantages of Dynamic Routing:
• Simpler to configure on larger networks.
• Will dynamically choose a different (or better) route if a link goes down.
• Ability to load balance between multiple links.
Disadvantages of Dynamic Routing:
• Updates are shared between routers, thus consuming bandwidth.
• Routing protocols put additional load on router CPU/RAM.
• The choice of the “best route” is in the hands of the routing protocol, and not the network
administrator.
4.2 CLASSFUL VS CLASSLESS ROUTING
Classful routing protocols do not send subnet mask information with their routing updates.
A router running a classful routing protocol will react in one of two ways when receiving
a route:
• If the router has a directly connected interface belonging to the same major network, it
will apply the same subnet mask as that interface.
• If the router does not have any interfaces belonging to the same major network, it will
apply the classful subnet mask to the r
11
CHAPTER 5
ROUTING PROTOCOLS
12
sending an equal amount of traffic down the 9600 baud link and the T1. This will
(obviously) cause the slower link to become congested.
13
5.3 EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP is a Cisco-proprietary Hybrid routing protocol, incorporating features of both
Distance-Vector and Link-State routing protocols.
EIGRP adheres to the following Hybrid characteristics:
• EIGRP uses Diffusing Update Algorithm (DUAL) to determine the best path among all
“feasible” paths. DUAL also helps ensure a loopfree routing environment.
• EIGRP will form neighbor relationships with adjacent routers in the same Autonomous
System (AS).
• EIGRP traffic is either sent as unicasts, or as multicasts on address 224.0.0.10, depending
on the EIGRP packet type.
• Reliable Transport Protocol (RTP) is used to ensure delivery of most EIGRP packets.
• EIGRP routers do not send periodic, full-table routing updates. Updates are sent when a
change occurs, and include only the change.
• EIGRP is a classless protocol, and thus supports VLSMs.
Other characteristics of EIGRP include:
• EIGRP supports IP, IPX, and Appletalk routing.
• EIGRP applies an Administrative Distance of 90 for routes originating within the local
Autonomous System.
• EIGRP applies an Administrative Distance of 170 for external routes coming from
outside the local Autonomous System.
• EIGRP uses Bandwidth and Delay of the Line, by default, to calculate its distance metric.
It also supports three other parameters to calculate its metric: Reliability, Load, and MTU.
• EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set
to 100.
14
5.4 OSPF (OPEN SHORTEST PATH FIRST)
OSPF is a standardized Link-State routing protocol, designed to scale efficiently to support
larger networks.
OSPF adheres to the following Link State characteristics:
• OSPF employs a hierarchical network design using Areas.
• OSPF will form neighbor relationships with adjacent routers in the same Area. • Instead
of advertising the distance to connected networks, OSPF advertises the status of directly
connected links using Link-State Advertisements (LSAs).
• OSPF sends updates (LSAs) when there is a change to one of its links, and will only send
the change in the update. LSAs are additionally refreshed every 30 minutes.
• OSPF traffic is multicast either to address 224.0.0.5 (all OSPF routers) or 224.0.0.6 (all
Designated Routers).
• OSPF uses the Dijkstra Shortest Path First algorithm to determine the shortest path.
• OSPF is a classless protocol, and thus supports VLSMs.
Other characteristics of OSPF include:
• OSPF supports only IP routing.
• OSPF routes have an administrative distance is 110.
• OSPF uses cost as its metric, which is computed based on the bandwidth of the link.
OSPF has no hop-count limit.
15
CHAPTER 6
NETWORK SERVICES
16
• Time Servers
• WINS servers
6.2 DNS (DOMAIN NAME SYSTEM)
Domain Name System (DNS) translates between domain names and IP addresses, and is
supported by nearly every operating system. All Internetbased name resolution utilizes
DNS.
DNS is organized as a hierarchy. Consider the following translation: www.google.com =
209.85.225.104
The above domain name represents a Fully Qualified Domain Name (FQDN): • .com
represents a top level domain.
• .google represents a secondary level domain.
• www represents a host computer in the .google.com domain. Other top level domains
include .org, .net, and .gov. Top level domains can also include country codes, such as .ca,
.nl, and .de
17
with a public address, thus allowing that host to communicate across the Internet. It is also
possible to translate multiple privately-addressed hosts to a single public address, which
conserves the public address space.
NAT provides an additional benefit – hiding the specific addresses and addressing structure
of the internal (or private) network.
18
IMPACT 0F TRAINING
The hands-on training allowed me to apply theoretical principles to real-world
scenarios, enhancing my problem-solving skills and technical proficiency.
Working alongside experienced professionals provided valuable insights into
industry best practices and emerging technologies. This internship not only
solidified my interest in computer networks but also equipped me with the
skills and confidence needed to pursue a successful career in this dynamic and
rapidly evolving field.
19
PROOF OF COMPLETION
20