Professional Documents
Culture Documents
(Pardeep sharma )
(Manik kamboj)
Registration Number:
(Navdeep singh)
Registration Number:
(Manbir singh)
DECLARATION
We hereby declare that the project work entitled (ACL In VLAN Environment) is an
authentic record of our own work carried out as requirements of Capstone Project (Part-I) for
the award of degree of B.Tech in CSE (Diploma-B.Tech-MBA) from Lovely Professional
University, Phagwara, under the guidance of Navjot Kaur(14), during August to December,
2013).
CERTIFICATE
This is to certify that the declaration statement made by this group of students is
correct to the best of my knowledge and belief. The Capstone Project Proposal
based on the technology / tool learnt is fit for the submission and partial
fulfillment of the conditions for the award of B.Tech in CSE from Lovely
Professional University, Phagwara.
Name : ..
U.ID :
Designation : .
ACKNOWLEDGEMENT
I would like to thank my guide Mrs. Navjot Kaur who guided me , taught me and
helped me completing my Six Month Capstone Project. I would also like to thank
my family and friends for supporting me completing my training. I acknowledge
thatI have completed this project report by myself and I have not copied this
report from anybody. First of all, I would like to thank the supreme power, the
Almighty God for his blessings showered on us that were able to complete this
project work in this topic relevant to the present time.
I also thank our beloved parents who supported us emotionally & financially to
prepare this project report. Their motivation is unmatchable. I pay our deep
gratitude to faculty for their motivation and supervision.
Thank You,
Reg. No.
Reg. No.
Reg. No.
ABSTRACT
Contents
1.
2.
3.
4.
5.
6.
7.
8.
Internetworking Concepts
Ip Addressing(IPv4)
Introduction to routers
Basic and Advance Configuration of router
Routing
ACL (Access Control List)
NAT(Network Address Translation)/PAT(Port Address Translation)
Switching
(a) VLAN
(b) STP
(c) VTP
9. WAN Connection
(a) SDLC
(b) Frame-Relay
10 . IPv6
INTERNETWORKING CONCEPTS
Internetworking is a combination of INTER and
Networking. It means communicating a computer in a network with other networks
through the use of gateways that provide a method of routing information between the
networks. It is simply known as internet.
INTRODUCTION TO NETWORK
A network is a system that transmits any combination of voice,
video and or data between users. A network can be defined by its geographical dimensions
and by which the user,s PC access it.
Requirement of Networking
1. Resource Sharing
2. High Reliability
3. Scalability
Types of Network
1. LAN
2. MAN
3. WAN
Two architectural models are commonly used to describe the protocols and methods used in
internetworking.
1. OSI Model
2. TCP/IP
Cables:
LAN Cable
(a)
(b)
Straight Cable
Cross Over Cable
Category of devices
(a)
(b)
White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown
W/Orange
Orange
W/Green
Blue
W/Blue
Green
W/Brown
8. Brown
IP ADDRESSING:
Every machine on the network has its own unique identity number
called the IP address. e.g 10.1.1.25.There are two versions of ip addresses that are used now a
days.i.e IPv4 and IPv6. IPv6 is used at server ends in INDIA.
Each IP address is split into two sections:1. Network Address
2. Host Address
Ip addresses are divided into five classes
1.
2.
3.
4.
Range of Classes:1.
2.
3.
4.
Class A= 0-126
Class B=128-191
Class C= 192-223
Class D= 224-239
5. Class E=240-255
Private IP
SUBNETTING:
There are lots of reasons in favor of subnetting, including the following
benefits:
Reduced network traffic
Optimized network performance
Simplified management
Facilitated spanning of large geographical distance
ROUTERS:
Establishing a computer network requires the installation of several hardware
and software components. The data is sent to the next network points in the form of packets;
this transfer of packets is carried through routers.
Types of routers:
1. 2620XM
2. 2621XM
3. 2811
Routers of 2600 series are used in IPv4 for communication and 2800 series are used
in IPv6 for communication. When multiple routers are used in interconnected networks, the
routers exchange information about destination addresses, using a dynamic routing protocol.
Each router builds up a table listing the preferred routes between any two systems on the
interconnected networks. A router has interfaces for different physical types of network
connections, (such as copper cables, fiber optic, or wireless transmission).
Routers may also be used to connect two or more logical groups of computer devices known
as subnets, each with a different sub-network address. The subnets addresses recorded in the
router do not necessarily map directly to the physical interface connections.[2] A router has
two stages of operation called planes:[3]
Control plane: A router records a routing table listing what route should be used to forward a
data packet, and through which physical interface connection. It does this using internal preconfigured addresses, called static routes.
Forwarding plane: The router forwards data packets between incoming and outgoing interface
connections. It routes it to the correct network type using information that the packet header
contains. It uses data recorded in the routing table control plane.
2500 and 2600 series are also known as Middle Age Router.
2.
3.
4.
5.
RAM
NVRAM
Flash Memory
ROM
1. Processor: It is used for processing related to routing. Processors are mostly made by
Motorola Company.
4. Flash Memory: It contains the IOS of the router. IOS stands for
INTERNETWORK OPERATING SYSTEM
5.ROM: ROM contains the following
(a) POST(Power ON Self Test) Program
(b) Bootstrap Program
(c) Mini OS used for trouble shooting
POST program will check all hardware and memory status of router.
Booting files will load into the RAM from ROM
Bootstrap Program will load the IOS into RAM from Flash memory.
It will prepare a list of hardware and software components of a router.
It will copy the Startup-config into Running-config file from NVRAM to RAM
It will ask to configure Startup-config file.
FUNCTIONS OF ROUTERS:
1.
2.
3.
4.
Packet switching
Packet filtering
Internetwork communication
Path selection
Modes of Router
1. User Execution mode
Router>
2. Privilage Execution mode
Router#
3. Third Mode
Router(config)#
Router>enable
After the above command we will enter into the second mode.After entering second mode we
will type Configure terminal to enter into the third mode. After entering the third mode we
can configure new settings for the router.
Exit command is used for going back to the previous mode.
Router(config)#hostname R1
It will give output as:
R1(config)#
To show details of all the interfaces of routers
R1# show ip interface brief
In routers status of all the interfaces is by default Administratively down.
INCOMPLETE COMMAND
R1(config-if)# no shutdown
After this command a message will be displayed.
The same command can be used to configure ip addresses to other interfaces.
Enable Password
Enable Secret Password
Line Console
Telnet Password/Line vty password
Auxillary Password
1. Enable Password:
This password is applicable when we want to enter into the second mode.
R1(cconfig-line)#login
This command is used to enable the console password as the console password is by
default disabled.
5. Auxillary password:
This password is used to protect access of router through modem.
Command:R1(config)#line console 0
R1(config-line)#password pass_name
Here line console 0 is used in packet tracer and line aux 0 is used in case of real routers.
AND 0 indicates single user.
OR
R1(config)#w
ROUTING
Definition: Process of selecting best path from multiple available paths or routes and
then forwarding the data over that best route.
Types :
1. Static Routing
2. Dynamic Routing
In static routing route is decided by the administrator and it is used in small routers.
Where-else in dynamic routing route is decided by routing protocols. In dynamic routing
route can also be defined by administrator bnuut in case of complicated networks.
There are mainly two things to do in routing. i.e, Data scheduling and Data forwarding.
STATIC ROUTING:
The above commands are used for telling the router 3 that there are other ip addresses also
exists. AND same commands are used for router 4 and 5 but the ip address will change.
There is a command for checking the routing table.
Router# show ip route
DYNAMIC ROUTING
In dynamic routing there is term called AS or AUTONOMOUS SYSTEM i.e if we
have many routers in a system and only there is only one admin and only one policy for all
routers then the system is called as Autonomous system. And if we have different policies the
the system is called as autonomous system.
RIPv2
It supports subnetting.
It can understand classless IP.
It sends network ID or subnet mask
Information.
Multicast Address: 224.0.0.9 for advertising
Its network.
OSPF(Open Shortest Path First): It sends subnet status of every link with its
neighbour(s).
Features
1. It is a link state routing protocol.
2. It uses Link State Advertise message to share routing information.
3. It sends full routing update only first time after that update only related to network
changing will be sent.
4. It sends routing update message after 30 minutes but if any change occurs in the network
it can send routing update before 30 minutes also.
5. It uses bandwidth metrics.
6. It uses SPF/Dijkstra Algorithm.
7. It uses two addresses for multicasting 224.0.0.5 and 224.0.0.6 for advertising its
network.
8. It is also vendor neutral.
Database/Topology Table:
Entry related to all possible routers to reach destination
networks will be entered in topology table.
Routing Table:
Entry related to best route from all available route to reach a destination
network.
WILD CARD MASK: It also defines netwrk ID as same as subnet mask. If we are
having network having 8 bits then it is represented as 0.255.255.255.
We have a term called as PROCESS-ID that is used to run the OSPF running at the initial
stage. It can vary from 1 to 65535. It can be different on all routers but also can be same. We
have also got one more thing called AREA that tells about the area in which the particular
network lies.
and same commands for other routers. This is simple case when we have less number of
routers. But the situation becomes more complex when we have large number of routers then
there will be intense load on router and maximum time will be utilised in making tables only
and its original task will be ignored.
It uses Bandwidth, Delay, Load, Reliability metrics for choosing its path. But
by default it uses bandwidth and delay.
It uses DUAL or diffusing/spread update algorithm.
Multicast Address: 224.0.0.10
It is a vendor based protocol.
Basic ACL
We cannot block a particular
It uses only source address.
We should apply it near
destination address.
5. It is represented by numbers
99.
Extended
Advanced ACL
We can block a particular service service.
It uses both source & destination
We should apply it near source
address.
It is represented by numbers between 1100-199.
1. When we are connect to the internet and our hosts dont have global unique IP address
. We are using private addresses.
2. We change our network to another ISP and that require to renumber our network.
Then using the NAT we didnt need to change our IP address.
3. We need to merge two internets with duplicate addresses.
4. No any host from the foreign network can access our local network. Local network
security.
Types of NAT
1. Static NAT: It is a type of NAT that is designed to allow One-to-One mapping
between the local IP addresses and global IP address.
2. Dynamic NAT: This gives the ability to map an unregistered IP address with a
registered ip address from out of pool of ip address. We dont have to statically
configure our router to map an inside address with outside address like in static NAT.
But we have sufficient number of IP address for every user who is going to transfer
packets with internet.
PAT or PORT ADDRESS TRANSLATION:Port Address Translation (PAT) is a special kind of Network Address Translation (NAT).
It can provide an excellent solution for a company that has multiple systems that need to
access the Internet but that has only a public IP addresses. PAT is commonly known as
NAT overload (or sometimes just overload).
In this configuration, you have multiple clients on your inside network wanting to access
an outside network (usually the Internet). You have few public IP addresses, many more
than the number of clients, so you have to overload that real Internet IP address. In
other words, you are mapping many inside clients to a single Internet IP address (many to
one).
PAT Features
PAT uses unique source port numbers on the inside global IP address to distinguish
between translations.
To configure PAT/NAT correctly the first time, you need to understand the Cisco NAT
terminology and how your IP networks/addresses map to each of the entities listed below:
Inside local address The IP address assigned to a host on the inside network. This
is the address configured as a parameter of the computer OS or received via dynamic
address allocation protocols such as DHCP. The address is likely not a legitimate IP
address assigned by the Network Information Center (NIC) or service provider.
Inside global address A legitimate IP address assigned by the NIC or service
provider that represents one or more inside local IP addresses to the outside world.
Outside local address The IP address of an outside host as it appears to the inside
network. Not necessarily a legitimate address, it is allocated from an address space
routable on the inside.
Outside global address The IP address assigned to a host on the outside network
by the host owner. The address is allocated from a globally routable address or
network space.
Different switching Principles:1. Store-and-forward:- The switch fully receives all bits in the frame before forwarding
the frame .
2. Cut-through:- The switch performs the address table lookup as soon as the
destination address field in the header is received. The first bits in the frame can
be sent out the outbound port before the final bits in the incoming frame are
received.
3. Fragment Free:- This performs like cut-through switching, but the switch waits
for 64 bytes to be received before forwarding the first bytes of the outgoing
frame. According to Ethernet specifications, collisions should be detected during
the first 64 bytes of the frame; frames in error because of a collision will not be
forwarded.
References
Study Notes that were made during training and the book given by
Jetking Institute for reference.