Upload
ajit-sangwan
View
55
Download
4
Embed Size (px)
DESCRIPTION
ccna
Citation preview
A FEASIBILITY STUDY OF
CAN (Campus Area Network)6 WEEKS INDUSTRIAL TRAINING
At
ACADEMY FOR IT PROFESSIONALS
(From 17/06/2013 to 31/07/2012)
Submitted by
Anjali sangwan
Maharaja Surajmal Institute
Bachelor in Computer Applications (BCA)2011-2014
DECLARATION CERTIFICATE
This is to certify that the project work entitled “CAN (Campus Area
Network)” is our own work carried out at “AITP” from “17/01/2012” to
“10/05/2012” under the supervision of “Mr.TULSIDAS CHOUHAN”,
“NETWORK ADMINISTRATOR”.
SIGNATURE
Mr. TULSI DAS CHOUHAN
TO WHOM IT MAY CONCERN
I hereby certify that Anjali Sangwan Roll No. 01014902011 of BCA from Maharaja
Surajmal Institute , has undergone 6 weeks industrial training from 17/06/2013 to
31/07/2013 at our organization AITP Noida to fulfill the requirements to be
awarded a BCA degree .They worked on CAN (Campus Area Network) project
during the training under my supervision. During her tenure with us we found her
very sincere and hard working.
AITP
NOIDA
MAHARAJA SURAJMAL INSTITUTE
BONAFIDE CERTIFICATE
Certified that this project report “CAN (Campus Area Network)” is the bonafide work of “Anjali Sangwan (enrollment No. – 01014902011)” who carried out the project
work under my supervision.
Mr. Kumar Gaurav
Department of Computer Science
Maharaja Surajmal Institute
C-4, Janakpuri
New Delhi – 110058
ABSTRACT
The CAN network is the lifeblood of any Small to Medium Campus with more than one site or other departments. It enables access to Different information and allows for profitable and effective communication flows between employees. Network equipment is mature and ubiquitous, but the quality of services provided by similar networks varies from department to department.
Planning a network in a developing a campus is almost like planning it in the middle of a desert. This project briefly discusses the architecture of a Campus network. It examines the barriers to planning, designing and implementing a Campus network. This project also covers the methods to implement external level networks.
In this project we will start from working basic router configuration then covering the Routing technologies required to route data between branches.
After that we have implemented eigrp, nat, vlan, trunking and Acl as it is considered a good choice to connect multiple locations using single interface of router and reduce the hardware costs.
For Public connectivity we are also using DNS. In this setup NAT is very essential in which we have translated live IP into local and vice-versa.
In short we can say a lot of technologies are studied and implemented for the successful completion of the project.
Acknowledgement
“Gratitude is not a thing of expression; it is more matter of feeling."
There is always a sense of gratitude which one express towards
others for their help and supervision in achieving the goals. This
formal piece of acknowledgement is an attempt to express the
feeling of gratitude towards people who helpful me in successfully
completing of my training.
I would like to express my deep gratitude to, my training
coordinator for their constant co-operation. He was always there
with his competent guidance and valuable suggestion throughout
the pursuance of this research project.
Having this opportunity, I would like to express my profound
gratitude and deep regards to my supervisor Mr. Kumar Gaurav
for his exemplary guidance, monitoring, timely suggestion, and
constant encouragement throughout the course of this project
and helped me to complete this project. The blessing, help and
guidance given by him time to time shall carry me a long way in
the journey of life.
I would also like to thank ACADEMY FOR IT PROFESSIONALS for
providing me with an opportunity to pursue my industrial training,
as it is an important part of BCA course and it is the one that
exposes you to the industry standards & makes you adapt
yourself to the latest trends and technologies. At the same time,
it gives an experience of working on a project.
Above all no words can express my feelings to my parents, friends
all those persons who supported me during my project. I am also
thankful to all the respondents whose cooperation & support has
helped me a lot in collecting necessary information.
TABLE OF CONTENT
1. INTRODUCTION
1.1 About The Project 13 1.2 Purpose 14
1.3 Project organization 15
1.4 About company 16 1.5 Objectives of projects 20 2. IP ROUTING
2.1 List of used devices technologies configured 222.2 Scenario 232.3 IP routing 26
2.4 Types of routing 28
3. DYNAMIC ROUTING AND ITS TYPE
3.1 Types Of Dynamics Routing Protocols 32 3.2 Routing
Information Protocol 41 3.3 Routing Information Protocol version 2 44 4. EIGRP 4.1 Link state routing 46
4.2 Enhanced interior gateway routing protocols 474.3 Dual Algorithm 48
4.4 Configuration of Eigrp In Project 504.5 Configuration Of Nat 52
5. VLAN 5.1 Virtual lan 70 5.2 How created 71 5.3 Vlan 72
5.4 Configuration Of Vlan In Project 73 6. NAT & ACL 6.1 Basic Configuration Of NAT 99 6.2 Basic Configuration Of ACL 100 6.3 NAT 102 6.4 ACL 103
7. CONCLUSION
7.1 Career Scope 1407.2 Future Scope 141
BIBLOGRAPHY 142
List of tables
1.) Show Command Table 2 .) Configuration Command Table
3. ) Ospf Routing Table
4. ) Acronyms Table
5.) Show Ip Interface Table 6.) Neighbour Ship Table
List of Symbols, Abbreviations
1.) & = And
2.) EIGRP=Enhanced Interior Gateway Routing Protocol
3.) NAT=Network Address Translation
4.) TCP=Transfer Control Protocol
5.) VTP=VLAN Trunk Protocol
6.) VLAN=Virtual Local Area Network
7.) LOAD BALANCING
INTRODUCTION
1.1 About the Project
In this project we will start from working basic router
configuration then covering the Routing technologies required to route data
between branches.
After that we have implement CAN and EIGRP is considered a good choice because it connects multiple location using single interface of router and reduce the hardware costs.
For Internet connectivity we are also using frame relay. In this setup NAT is very essential in which we have translate live IP into local and vice-versa.
In short we can say a lot of technologies are studied and implemented for the successful completion of the project. Following list of technologies that are required in this project.
• Administration of Router • ROUTING • TYPES OF ROUTING• BENIFITS OF STATIC AND DYNAMIC ROUTING • SCALABILITY OF NETWORKS
PURPOSE
Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (Circuit switching) , electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily with routing in electronic data networks using packet switching technology.
In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes, typically hardware devices called routers, bridges, gateways, firewalls, or switches. General-purpose computers can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the router's memory, is very important for efficient routing. Most routing algorithms use only one network path at a time, but multipath routing techniques enable the use of multiple alternative paths.
Routing, in a more narrow sense of the term, is often contrasted with bridging in its assumption that network addresses are structured and that similar addresses imply proximity within the network. Because structured addresses allow a single routing table entry to represent the route to a group of devices, structured addressing (routing, in the narrow sense) outperforms unstructured addressing (bridging) in
large networks, and has become the dominant form of addressing on the Internet, though bridging is still widely used within localized environments.
1.3 Project Organization
This project is divided into three main parts. In this project there are three logically area that is described following:-1. Eigrp configuration area having autonomous system number 2 globally.
2. This eigrp configuration enables the for the data passing. It passes out through various paths by doing load balancing.3.Acl is established for the reference who will be the allowed authority to enter in which link for data. NAT is also maintained for addresses translation.
1.4 About Company
ACADEMY OF IT PROFESSIONALS was founded in 2000 by a group
of highly qualified Technocrats (with proven expertise in varied technology
domains) as a Centre for education, training & network development at Delhi.
AITP holds the distinction of being a unique group, offering a variety of services
with their comprehensive training and online consultancy experiences. We not only
offer our services to our direct corporates, but are also providing services on behalf
of well known organizations
We are a leading Training Institute with a mission to provide comprehensive and
accurate training information to all the prospective value conscious training
buyers for any domain.
At Academy of IT professionals, we are your career partner, providing you with a
lifetime of progressive learning products, which will ensure you have the
knowledge, flexibility and interest to sustain a rewarding and exciting career.
Whether you’re just starting out in the IT industry, want to change jobs, looking
for a promotion or set up your own consulting business, AITP has the right
building blocks for your career. We recognize that your career must be built to
your own specifications. That’s why AITP focuses on e-learning solutions, based
on training courses from recognized global e-learning leaders, including
Cisco.
Wherever possible, we make learning at your own pace, in your own time (and
with your own special focus) as easy as possible, with online peer forums,
articles, 24/7 mentoring support and other support services. Unlike other e-
learning products, opening the box means only the beginning of your relationship
with AITP.
Practical training constitutes an integral part of engineering
studies. The training gives an opportunity to the students to express
themselves to the industrial environment which is quite
different from the teaching classroom .The training enables
the student to work in the future .It enables the student to
undergo those experiences which help them later when they join an
organization. Industrial training is a major part of course. It is period in which
we are introduced to the industrial environment or in other words we can say
that industrial training is provided for the
familiarization with the industrial environment, with the advancement in
computer technologies and increased automation in the industries for increasing
their production. In organization where Making Things Right in the first instance is
the driving motto, perfection and accuracy are inevitable.
The objective of training is to raise the level of performance on one or more
of its aspects and this may be achieved by providing new knowledge and
information relevant to a job. During this period, the students get the real, firsthand
experience for working in the actual environment. Most of the theoretical
knowledge that has been gained during the course of their studies is put to test
here. It covers all that remains uncovered in the classroom i.e. without it our
studies remains ineffective and incomplete. Apart from this, the students get an
opportunity to learn the latest technology, which immensely helps them in building
their career.
Our business is dedicated to delivering good quality, inexpensive services
that will improve the quality of work at all levels in an organization. We strongly
believe in "Business goes where it is invited and stays where it is well treated.
OUR VISION:-
Our business is dedicated to delivering good quality, inexpensive services that will improve the quality of work at all levels in an organization. We strongly believe in "Business goes where it is invited and stays where it is well treated.
Academy of IT professionals vision is to harness the computers to bring about a quantum change in the quality of life of each one of us. High Technologies Solutions is thus focused on three things: education, e-learning & network development.
WHY AITP:-
• Comprehensive and accurate training
• 10 Years of Experience
• More than 10,000 students trained
• More than 2500 students been placed in industry
• Trained faculty from industry
• 24/7 mentoring support
• Strives towards unearthing the hidden talent in each personality
• Groom the dexterity & facilitate the individual by making his/her
flair to become his/her forte
• Strong combination of consultation and technological services
• Best ambience, Best Result
• Focus would be on practical side of knowledge, and subjects
• Qualified, dedicated & experienced faculty
• Best infrastructure
• Separate R&D Deppt
SERVICES
Services Corporate Training
There is a big challenge of to be up to date with the continuous changes in technologies for the companies today. Therefore, getting their employees a training program of latest technologies is a matter of concern for the management.
Because of increased work pressure companies do not get sufficient time to develop & analyze their own training programs. We at AITP offers training programs for companies entering to new technologies or just brush up the existing one with different area of scope.
We have successfully completed more than 100 corporate training programs to our valued customers . If you have the requirements relating to this scope of IT corporate training, Just click on the link & get the solution customized to your requirements.
Venue facilities
if you are looking to run an IT training course , Interviews, host a meeting or small conference , AITP can help with the its state of the art venue facility. Our Space is fully equipped computer training / meeting rooms and conference rooms available for hire at competitive daily and weekly rates. The rooms are ideal for computer training courses, workshops, meetings, seminars and small conferences.
The facility seats 6 comfortably, but can accommodate 8 if necessary. The room is air-conditioned and is equipped with flip chart and data projector. We also have a breakaway room for teas and coffees (included), and lunches can be provided at an additional cost / person.Standard Training Room Equipment & Stationery*:
White board with whiteboard markers Data projector
1 Computer per delegate (flat screen)
File/Pen/Paper*Additional equipment can be ordered on your behalf and charged accordingly
OUR TEAM
Presently we have a strong technical team of certified professionals for catering to these solutions and have presence in Delhi and Noida. We have skilled team of engineers who are experienced in design, programming. We are having more than 15 engineers who are having prestigious certifications like CCNA,CCNP,CCSP,CCSA,MCSE,RHCE,E-HACKING,JAVA &Programming.
• Support Area (network solutions)
a) LINUX / UNIX networks
b) SUN networks
c) CISCO devices (Routers, Switches, Firewalls, Cache Engine, RAS etc)
d) Bandwidth Manager software and hardware
e) Radio Links
f) Security Solutions
AITP provide the following Courses in given below:
• Network Training
a) CISCO CCNA, CCNP,CCSP,CCIE
b) RED HAT LINUX
c) E-HACKING
d) WINDOWS 2000, 2003 (MCP,MCSA & MCSE)
Software Training
a) JAVA
Our core strength is our commitment, technical expertise and cost effective solutions. We ensure high service levels and prompt support availability leading to lower downtime.
AITP is a leader in education services and developer of innovative embedded solutions. To meet the demands of Post PC era AITP provides complete solutions as well as design-to-order services to satisfy our customers.
For ACADEMY FOR IT PROFESSIONALS
NAZIA KHAN
+9717626117.
Head Office
ACADEMY FOR IT PROFESSIONALS
702-7TH FLOOR
SOMDATT CHAMBER 2,
NEAR HAYAT AGENCY,
BHIKAJI GAMA PLACE ,NEW DELHI.
011-26182282
1.5 Objectives Of Project
IP Routing is an umbrella term for the set of protocols that determine the path that data follows in order to travel across multiple networks from its source to its destination. Data is routed from its source to its destination through a series of routers, and across multiple networks. The IP
Routing protocols enable routers to build up a forwarding table that correlates final destinations with next hop addresses.
These protocols include:
• BGP (Border Gateway Protocol)
• IS-IS (Intermediate System - Intermediate System)
• OSPF (Open Shortest Path First)
• RIP (Routing Information Protocol)
When an IP packet is to be forwarded, a router uses its forwarding table to determine the next hop for the packet's destination (based on the destination IP address in the IP packet header), and forwards the packet appropriately. The next router then repeats this process using its own forwarding table, and so on until the packet reaches its destination. At each stage, the IP address in the packet header is sufficient information to determine the next hop; no additional protocol headers are required.
The Internet, for the purpose of routing, is divided into Autonomous Systems (ASs). An AS is a group of routers that are under the control of a single administration and exchange routing information using a common routing protocol. For example, a corporate intranet or an ISP network can usually be regarded as an individual AS. The Internet can be visualized as a partial mesh of ASs. An AS can be classified as one of the following three types.
2.1 LIST OF USED DEVICES & TECHNOLOGIES CONFIGURED
1. CISCO ROUTER
2. CORE LAYER SWITCH
3. DISTRIBUTION LAYER SWITCH
4. ACCESS LAYER SWITCHES
TECHNOLOGIES TO CREATE NETWORKRouter1IP ADDRESSING ROUTING
Core Switch1 VTP serverVLAN databaseTrunk LinksConfiguring IP & GatewayVlan Port Membership
Distribution SwitchesConfiguring IP & GatewayTrunk Link ConfigurationVlan Port Membership
2.2 SCENARIO
2.3 IP Routing
When we want to connect two or more networks using different n/w addresses then we have to use IP Routing technique. The router will be used to perform routing between the networks. A router will perform following functions for routing.• Path determination• Packet forwarding
(1) Path determination The process of obtaining path in routing table is called path determination. There are three different methods to which router can learn path.i) Automatic detection of directly connected n/w.ii) Static & Default routingiii) Dynamic routing
(2) Packet forwarding It is a process that is by default enable in router. The router will perform packet forwarding only if route is available in the routing table.
Routing Process
(i) The pc has a packet in which destination address is not same as the local n/w address.(ii) The pc will send an ARP request for default gateway. The router will reply to the ARP address and inform its Mac address to pc.(iii) The pc will encapsulate data, in which source IP is pc itself, destination IP is server, source Mac is pc’s LAN interface and destination Mac is router’s LAN interface.
S. MAC D. MACPC2 R1
D. IP40.0.0.1S. IP 45.0.0.4
The router will receive the frame, store it into the buffer. When obtain packet from the frame then forward data according to the destination IP of packet. The router will obtain a route from routing table according to which next hop IP and interface is selected (iv) According to the next hop, the packet will encapsulated with new frame and data is send to the output queue of the interface.
2.4 Types Of Routing
Static Routing
In this routing, we have to use IP route commands through which we can specify routes for different networks. The administrator will analyze whole internetwork topology and then specify the route for each n/w that is not directly connected to the router.
Steps to perform static routing(1) Create a list of all n/w present in internetwork.(2) Remove the n/w address from list, which is directly connected to n/w.(3) Specify each route for each routing n/w by using IP route command.
Router(config)#ip route <destination n/w> <mask> <next hop ip>
Next hop IP it is the IP address of neighbor router that is directly connected our router.
Static Routing Example: -Router#conf terRouter(config)#ip route 10.0.0.0 255.0.0.0 192.168.10.2
Advantages of static routing(1) Fast and efficient.(2) More control over selected path.(3) Less overhead for router.(4) Bandwidth of interfaces is not consumed in routing updates.
Disadvantages of static routing(1) More overheads on administrator.
(2) Load balancing is not easily possible.(3) In case of topology change routing table has to be change manually.
Alternate command to specify static routeStatic route can also specify in following syntax: -Old Router(config)#ip route 172.16.0.0 255.255.0.0 172.25.0.2OrRouter(config)#ip route 172.16.0.0 255.255.0.0 serial 0
Backup route or loading static route If more than one path are available from our router to destination then we can specify one route as primary and other route as backup route.
Administrator Distance is used to specify one route as primary and other route as backup. Router will select lower AD route to forward the traffic. By default static route has AD value of 1. With backup path, we will specify higher AD so that this route will be used if primary route is unavailable.
Protocols ADDirectly Connected 0Static 1BGP 20EIGRP 90IGRP 100OSPF 110RIP 120
Syntax: - To set backup path
Router(config)#ip route <dest. n/w> <mask> <next hop> <AD> Or<exit interface>
Example: -Router#conf terRouter(config)#ip route 150.10.0.0 255.255.0.0 150.20.0.5Router(config)#ip route 150.10.0.0 25.255.0.0 160.20.1.1 8 (below 20)Router(config)#exit
Default Routing
Default routing means a route for any n/w. these routes are specify with the help of following syntax: -
Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop>Or
<exit interface>This type of routing is used in following scenario.
Scenario 1: -Stub networkA n/w which has only one exit interface is called stub network.
If there is one next hop then we can use default routing.
Scenario 2Internet connectivityOn Internet, million of n/ws are present. So we have to specify default routing on our router. Default route is also called gateway of last resort. This route will be used when no other routing protocol is available.
Router9(config)#ip route 10.0.0.0 255.0.0.0 172.16.0.5Router9(config)#ip route 0.0.0.0 0.0.0.0 200.100.100.11
To display routing tableRouter#sh ip route
To display static routes onlyRouter#sh ip route static
S 192.168.10.0/28 [1/0] via 172.16.0.5
To display connected n/ws onlyRouter#sh ip route connected
To check all the interface of a routerRouter#sh interface brief
Dynamic Routing
In dynamic routing, we will enable a routing protocol on router. This protocol will send its routing information to the neighbor router. The neighbors will analyze the information and write new routes to the routing table.
The routers will pass routing information receive from one router to other router also. If there are more than one path available then routes are compared and best path is selected. Some examples of dynamic protocol are: -RIP, IGRP, EIGRP, OSPF
3.1 Types of Dynamic Routing Protocols
According to the working there are two types of Dynamic Routing Protocols.
(1) Distance Vector(2) Link State
According to the type of area in which protocol is used there are again two types of protocol: -
(1) Interior Routing Protocol(2) Exterior Routing Protocol
Autonomous systemAutonomous system is the group of contiguous routers and n/w, which will share their routing information directly with each other. If all routers are in single domain and they share their information directly with each other then the size of routing updates will depend on the no. of n/w present in the Internetwork. Update for each n/w may take 150 – 200 bytes information. For example: - if there are 1000 n/ws then size of update will be
200*1000 = 200000 bytesThe routing information is send periodically so it may consume a large amount of bandwidth in our n/w.
ProtocolsInterior Routing Exterior RoutingRIP BGPIGRP EXEIGRP
EIGRPOSPF
Distance Vector RoutingThe Routing, which is based on two parameters, that is distance and direction is called Distance Vector Routing. The example of Distance Vector Routing is RIP & IGRP.
Operation: -(1) Each Router will send its directly connected information to the neighbor router. This information is send periodically to the neighbors.
(2) The neighbor will receive routing updates and process the route according to following conditions: - (i) If update of a new n/w is received then this information is stored in routing table. (ii) If update of a route is received which is already present in routing table then route will be refresh that is route times is reset to zero. (iii) If update is received for a route with lower metric then the route, which is already present in our routing table. The router will discard old route and write the new route in the routing table. (iv) If update is received with higher metric then the route that is already present in routing table, in this case the new update will be discard.
(3) A timer is associated with each route. The router will forward routing information on all interfaces and entire routing table is send to the neighbor. There are three types of timers associated with a route. (i) Route update timer It is the time after which the router will send periodic update to the neighbor. (ii) Route invalid timer
It is the time after which the route is declared invalid, if there are no updates for the route. Invalid route are not forwarded to neighbor routers but it is still used to forward the traffic. (iii) Route flush timer It is the time after which route is removed from the routing table, if there are no updates about the router.
Metric of Dynamic RoutingMetric are the measuring unit to calculate the distance of destination n/w. A protocol may use a one or more than one at a time to calculate the distance. Different types of metric are: -(1) Hop Count(2) Band Width(3) Load(4) Reliability(5) Delay(6) MTU
Hop CountIt is the no. of Hops (Routers) a packet has to travel for a destination n/w.
BandwidthBandwidth is the speed of link. The path with higher bandwidth is preferred to send the data.
LoadLoad is the amount of traffic present in the interface. Paths with lower load and high throughput are used to send data.
ReliabilityReliability is up time of interface over a period of time.
DelayDelay is the time period b/w a packet is sent and received by the destination.
MTU Maximum Transmission UnitIt is the maximum size of packet that can be sent in a frame mostly MTU is set to 1500.
Problems of Distance Vector
There are two main problems of distance vector routing• Bandwidth Consumption• Routing LoopsBandwidth ConsumptionThe problem of accessive bandwidth consumption is solved out with the help of autonomous system. It exchanges b/w different routers. We can also perform route summarization to reduce the traffic.
Routing LoopsIt may occur b/w adjacent routers due to wrong routing information. Distance Vector routing is also called routing by Rumor. Due to this the packet may enter in the loop condition until their TTL is expired.
Method to solve routing loopsThere are five different methods to solve or reduce the problem of routing loop.• Maximum Hop Count• Flash Updates/Triggered Updates• Split Horizon• Poison Reverse• Hold Down
Maximum Hop Count This method limits the maximum no. of hops a packet can travel. This method does not solve loop problem. But it reduce the loop size in the n/w. Due to this method the end to end size of a n/w is also limited.
Flash Updates/Triggered UpdatesIn this method a partial update is send to the all neighbors as soon as there is topology change. The router, which receives flash updates, will also send the flash updates to the neighbor routers.
Split Horizon
Split Horizon states a route that update receive from an interface can not be send back to same interface.
3.2 Routing Information ProtocolFeatures of RIP: -* Distance Vector* Open standard* Broadcast Updates
(255.255.255.255)* Metric
Hop Count*Timers
Update 30 secInvalid 180 secHold 180 sec
Flush 240 sec* Loop Control
Split HorizonTriggered UpdatesMaximum Hop CountHold Down
* Maximum Hop Count 15* Administrative Distance 120* Equal Path Cost Load Balancing* Maximum Load path 6
Default 4* Does not support VLSM* Does not support Autonomous system
Configuring RIPRouter#conf terRouter(config)#router ripRouter(config-router)#network <own net address>Router(config-router)#network <own net address>----------------------------Router(config-router)#exitRouter(config-router)#network 10.0.0.0Router(config-router)#network 172.16.0.0Router(config-router)#network 200.100.100.0
175.2.0.0 via 172.16.0.6
Display RIP RoutersRouter#sh ip route rip
R 192.168.75.0/24 [120/5] via 172.30.0.2 00:00:25 serial 1/0
RIP Dest. n/w mask AD Metric Next Hop Timer own Interface
RIP advanced configurationPassive Interfaces
An interface, which is not able to send routing updates but able to receive routing update only is called Passive Interface. We can declare an interface as passive with following commands: -Router#conf terRouter(config)#router ripRouter(config-router)#Passive-interface <type> <no>Router(config-router)#exit
Configuring TimersRouter(config)#router ripRouter(config-router)#timers basic <update> <invalid> <hold down> <flush>Router(config-router)#exit
Example: -Router(conf-router)#timer basic 50 200 210 300
Update 50 secInvalid 200 secHold 210 secFlush 300 sec
To change Administrative DistanceRouter(config)#router ripRouter(config-router)#distance <value>Router(config-router)#exit 95 or 100
To configure Load BalanceRIP is able to perform equal path cost Load Balancing. If multiple paths are available with equal Hop Count for the destination then RIP will balance load equally on all paths.
Load Balancing is enabled by default 4 paths. We can change the no. of paths. It can use simultaneously by following command: -Router(config)#router ripRouter(config-router)#maximum-path <1-6>
To display RIP parameters Router#sh ip protocol
This command display following parameters: -(i) RIP Timers(ii) RIP Version (iii) Route filtering(iv) Route redistribution(v) Interfaces on which update send(vi) And receive(vii) Advertise n/w(viii) Passive interface(ix) Neighbor RIP• Routing information sources• Administrative Distance
3.3 RIP version 2
RIP version 2 supports following new features: -(1) Support VLSM (send mask in updates)(2) Multicast updates using address 224.0.0.9• Support authentication
Commands to enable RIP version 2We have to change RIP version 1 to RIP version 2. Rest all communication will remain same in RIP version 2.
Router(config)#Router RIPRouter(config-router)#version 2Router(config-router)#exit
To debug RIP routingRouter#debug ip rip
To disable debug routingRouter#no debug ip ripl
4.1 Link State Routing
This type of routing is based on link state. Its working is explain as under
(1) Each router will send Hello packets to all neighbors using all interfaces.(2) The router from which Hello reply receive are stored in the neighborship table. Hello packets are send periodically to maintain the neighbor table. (3) The router will send link state information to the all neighbors. Link state information from one neighbor is also forwarded to other neighbor.
(4) Each router will maintain its link state database created from link state advertisement received from different routers.(5) The router will use best path algorithm to store the path in routing table.
Problems of Link State RoutingThe main problems of link state routing are: -(1) High bandwidth consumption.(2) More hardware resources required that is processor and memory (RAM)
The routing protocols, which use link state routing are: -OSPF
4.2 Enhanced Interior Gateway Routing Protocol
Features: -* Cisco proprietary
* Hybrid protocol Link StateDistance Vector
* Multicast Updates usingAddress 224.0.0.10
* Support AS* Support VLSM* Automatic Route Summarization* Unequal path cost load balancing* Metric (32 bit composite)
BandwidthDelayLoadReliabilityMTU
* Neighbor Recovery* Partial updates* Triggered updates* Backup Route* Multi Protocol Routing
EIGRP Protocols & Modules(1) Protocol depended module Reliable Transport Protocol (Quiet Protocol)RTP is used to exchange routing updates with neighbor routers. It will also maintain neighbor relationship with the help of Hello packet. RTP has following features: -(1) Multicast updates (224.0.0.10)(2) Neighbor recovery If neighbor stops responding to the Hello packets then RTP will send unicast Hello packet for that neighbor.(3) Partial updates(4) No updates are send if there is no topology change.
4.3 Diffusing Update Algorithm (DUAL)DUAL is responsible for calculating best path from the topology table. Dual has following features: -* Backup Path* VLSM* Route queries to neighbor for unknown n/w.
Configuring EIGRPRouter(config)#router eigrp <as no>Router(config-router)#network <net addr.>Router(config-router)#network <net addr.>Router(config-router)#exit
Advanced Configuration EIGRPConfiguring following options are same as configuring IGRP(1) Bandwidth on Interfaces(2) Neighbor(3) Load balancing
Max pathVariance
Configuring EIGRP MetricIf we want our router to use additional metric then we can use following command: -
Router(config)#Router eigrp <as no>Router(config-router)#metric weights 0 <k1> <k2> <k3> <k4> <k5>
Type of service (default) 1 0 1 0 0Router(config-router)#exit
Metric K Default valueBandwidth K1 1Load K2 0Delay K3 1Reliability K4 0MTU K5 0
All routers exchanging update with each other must have same AS no. and same K value.
4.4 Configurtion Of Routers OF Project Running On Eigrp Having Process 2
Configuartion of R1
R0>
R0>en
R0#CONFIG T
R0(CONFIG)#ROUTER EIGRP 1
R0(config-router)#NETWORK 11.0.0.0
R0(config-router)#NETWORK 12.0.0.0
R0(config-router)#NO AUTO-SUMMARY
R0(config-router)#EXIT
R0#show ip interface brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 unassigned YES unset up up
FastEthernet0/0.1 192.168.1.1 YES manual up up
FastEthernet0/0.2 10.0.0.1 YES manual up up
FastEthernet0/0.3 172.16.0.1 YES manual up up
FastEthernet0/1 unassigned YES unset administratively down down
Serial0/0 11.0.0.1 YES manual up up
Serial0/1 12.0.0.1 YES manual up up
Serial0/2 unassigned YES unset administratively down down
Serial0/3 unassigned YES unset administratively down down
FastEthernet1/0 unassigned YES unset administratively down down
FastEthernet1/1 unassigned YES unset administratively down down
R1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#
R1(config)#
R1(config)#router eigrp 1
R1(config-router)#network 1.1.1.1
R1(config-router)#network 200.0.0.0
R1#
*May 3 00:34:36.687: %SYS-5-CONFIG_I: Configured from console by console
R1#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
1.0.0.0/30 is subnetted, 1 subnets
C 1.1.1.0 is directly connected, Serial0/1
2.0.0.0/30 is subnetted, 1 subnets
D 2.2.2.0 [90/3193856] via 200.0.0.2, 00:04:36, Serial0/0
D 10.0.0.0/8 [90/2684416] via 1.1.1.1, 00:04:35, Serial0/1
11.0.0.0/30 is subnetted, 1 subnets
D 11.0.0.0 [90/2681856] via 1.1.1.1, 00:04:35, Serial0/1
12.0.0.0/30 is subnetted, 1 subnets
D 12.0.0.0 [90/3193856] via 1.1.1.1, 00:04:35, Serial0/1
18.0.0.0/27 is subnetted, 1 subnets
D 18.0.0.0 [90/2684416] via 200.0.0.2, 00:04:36, Serial0/0
161.30.0.0/24 is subnetted, 1 subnets
D 161.30.10.0 [90/2684416] via 200.0.0.2, 00:04:36, Serial0/0
170.0.0.0/30 is subnetted, 1 subnets
D 170.0.0.0 [90/2681856] via 200.0.0.2, 00:04:36, Serial0/0
D 172.16.0.0/16 [90/2684416] via 1.1.1.1, 00:04:35, Serial0/1
176.11.0.0/30 is subnetted, 1 subnets
D 176.11.11.0 [90/2681856] via 200.0.0.2, 00:04:36, Serial0/0
181.91.0.0/30 is subnetted, 1 subnets
D 181.91.0.0 [90/2681856] via 200.0.0.2, 00:04:36, Serial0/0
D 192.168.1.0/24 [90/2684416] via 1.1.1.1, 00:04:35, Serial0/1
D 192.168.50.0/24 [90/2684416] via 200.0.0.2, 00:04:36, Serial0/0
200.0.0.0/30 is subnetted, 1 subnets
C 200.0.0.0 is directly connected, Serial0/0
Router#show ip ?
access-lists List access lists
arp IP ARP table
dhcp Show items in the DHCP database
eigrp IP-EIGRP show commands
interface IP interface status and configuration
nat IP NAT information
ospf OSPF information
protocols IP routing protocol process parameters and statistics
rip IP RIP show commands
route IP routing table
ssh Information on SSH
Router#show ip eigrp ?
interfaces IP-EIGRP interfaces
neighbors IP-EIGRP neighbors
topology IP-EIGRP Topology Table
traffic IP-EIGRP Traffic Statistics
Router#sh ip eigrp ne
Router#sh ip eigrp neighbors
IP-EIGRP neighbors for process 1
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
0 200.0.0.2 Se0/0 13 00:10:49 40 1000 0 30
1 1.1.1.1 Se0/1 12 00:10:47 40 1000 0 38
For Router 2-
Router>ena
Router#sh ip eigrp nei?
neighbors
Router#sh ip eigrp nei
Router#sh ip eigrp neighbors
IP-EIGRP neighbors for process 1
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
0 176.11.11.2 Se0/0 14 00:14:28 40 1000 0 29
1 2.2.2.2 Se0/1 13 00:14:28 40 1000 0 26
Router#sh ip int brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 161.30.10.10 YES manual up up
FastEthernet0/1 unassigned YES unset administratively down down
Serial0/0 176.11.11.1 YES manual up up
Serial0/1 2.2.2.1 YES manual up up
Serial0/2 unassigned YES unset administratively down down
Serial0/3 unassigned YES unset administratively down down
FastEthernet1/0 unassigned YES unset administratively down down
FastEthernet1/1 unassigned YES unset administratively down down
Configuration for nat
Router#show ip nat tran
Router#show ip nat translations
Router#show ip nat translations
Router#show ip nat translations
Router#show ip nat translations
Pro Inside global Inside local Outside local Outside global
icmp 192.168.50.1:13 20.0.0.1:13 200.168.0.2:13 200.168.0.2:13
icmp 192.168.0.1:14 20.0.0.1:14 200.168.0.2:14 200.168.0.2:14
icmp 192.168.0.1:15 20.0.0.1:15 200.168.0.2:15 200.168.0.2:15
icmp 192.168.0.1:16 20.0.0.1:16 200.168.0.2:16 200.168.0.2:16
Debug EIGRPRouter#debug ip eigrp
IP-EIGRP: Processing incoming UPDATE packet
IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960
IP-EIGRP: Ext 192.168.0.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960
IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960
IP-EIGRP: 172.69.43.0 255.255.255.0, - do advertise out Ethernet0/1
IP-EIGRP: Ext 172.69.43.0 255.255.255.0 metric 371200 - 256000 115200
IP-EIGRP: 192.135.246.0 255.255.255.0, - do advertise out Ethernet0/1
IP-EIGRP: Ext 192.135.246.0 255.255.255.0 metric 46310656 - 45714176 596480
IP-EIGRP: 172.69.40.0 255.255.255.0, - do advertise out Ethernet0/1
IP-EIGRP: Ext 172.69.40.0 255.255.255.0 metric 2272256 - 1657856 614400
IP-EIGRP: 192.135.245.0 255.255.255.0, - do advertise out Ethernet0/1
Router#debug ip eigrp summaryFor few debug
5.1 VLANWhen mapping VLANs onto the new hierarchical network design, keep these parameters in mind.
• Examine the subnetting scheme that has been applied to the network and associate a VLAN to each subnet.
• Configure routing between VLANs at the distribution layer using multilayer switches.
• Make end-user VLANs and subnets local to a specific switch block. • Ideally, limit a VLAN to one access switch or switch stack. However, it may
be necessary to extend a VLAN• across multiple access switches within a switch block to support a capability
such as wireless mobility.
5.2 DEFINING VLAN
The term end-to-end VLAN refers to a single VLAN that is associated with switch ports that are widely dispersed throughout an enterprise network. Traffic for this VLAN is carried throughout the switched network. If many VLANs in a network
are end-to-end, special links (trunks) are required between switches to carry the traffic of all the different VLANs. An end-to-end VLAN has these characteristics:
• The VLAN is geographically dispersed throughout the network.• Users are grouped into the VLAN regardless of physical location.• As a user moves throughout a campus, the VLAN membership of that user
remains the same.• Users are typically associated with a given VLAN for network management
reasons.• All devices on a given VLAN typically have addresses on the same IP
subnet.
5.3 VLAN CONFIGURATION MODE
Global ModeSwitch# configure terminal Switch(config)# vlan 1Switch(config-vlan)# name Vlan1Switch(config-vlan)# exit Switch(config)# end
6)CCNA / CCNP Tutorial: Introduction To NATBy Chris Bryant, CCIE #12933A Free Excerpt From The Bryant Advantage Ultimate CCNA Study GuideNetwork Address Translation (NAT) is not only an important topic for CCNA and CCNPexams, but it’s also a very commonly used technique for allowing end users access to theInternet while not revealing the end user’s true IP address.CCNA and CCNP candidates need to know how to configure NAT, and so does anyonewho works in network administration. NAT is one of the most commonly used networktechnologies out there, and understanding how and why it is used is vital to all networkpersonnel.Why Do We NAT?NAT allows private networks all over the world to use the same internal networknumbers, while still allowing their users (or perhaps just some users) access to theInternet.In this way, NAT serves as a form of IP address conservation. Imagine how many IPaddresses would be necessary if every single office around the world required IPaddresses that were not duplicated anywhere else in the world!The addresses that private networks around the world use are the RFC 1918 privateaddresses, sometimes referred to as “1918 addresses”. A word to the wise: Know these,and know them cold. I should be able to call you at 2AM and ask you what these are, andget an immediate response. :)The RFC 1918 Private AddressesClass A 10.0.0.0 / 8Class B 172.16.0.0 / 12
Class C 192.168.0.0 /16Note that the masks used with the RFC 1918 private addresses are NOT the defaultmasks for Class A, B, and C.These IP addresses are not used on any public networks. By public networks, we meannetworks connected to the Internet. It’s my experience that the Class C 1918 addressesare the most commonly used by offices, banks, and other organizations.If a bank and a school in your home city are both using the 192.168.0.0 /16 network ontheir internal networks, there’s no problem until some of the users on either networkwant to access the Internet.Internet Access and RFC 1918 AddressesUsing private addresses is fine until a host using a private address wants to communicatewith a device on the Internet. Consider what happens if a workstation with a private IPaddress attempts to contact www.cisco.com. Cisco’s web server would receive a packetfrom a host with a source address on an RFC 1918 network. How would the server knowhow to respond to the private address if it’s not used anywhere on the internet? Thisillustration shows us where the problem would come in on a network that is not runningNAT.In this situation, no user on a private network can successfully communicate withan Internet host.These networks can communicate with Internet hosts by using NAT. NAT stands forNetwork Address Translation, and that's exactly what is going to happen: the RFC 1918source address is going to be translated to another address as it leaves the privatenetwork, and it will be translated back to its original address as the return data enters theprivate network.NAT can be defined statically or dynamically. While you need to knowboth for your CCNA and CCNP exams, I recommend you use dynamicNAT whenever possible. The average office has enough users tomake configuring static NAT a royal pain.If a limited number of hosts on a private network need Internet access, static NAT may bethe appropriate choice. Static NAT maps a private address to a public one.In this example, there are three internal PCs on an RFC1918 private network. The router'sethernet0 interface is connected to this network, and the Internet is reachable via theSerial0 interface. The IP address of the serial interface is 210.1.1.1 /24, with all otheraddresses on the 210.1.1.0 /24 network available.Three static mappings are needed to use Static NAT. The interfaces must beconfigured for NAT as well.Configuring the interfaces for Network Address Translation. The Ethernet network is the“inside” network;the Serial interface leading to the Internet is the “outside” network.R3(config)#interface ethernet0R3(config-if)#ip address 10.5.5.8 255.0.0.0R3(config-if)#ip nat insideR3(config-if)#interface serial0R3(config-if)#ip address 210.1.1.1 255.255.255.0R3(config-if)#ip nat outsideThe static mappings are created and verified.
R3#conf tR3(config)#ip nat inside source static 10.5.5.5 210.1.1.2R3(config)#ip nat inside source static 10.5.5.6 210.1.1.3R3(config)#ip nat inside source static 10.5.5.7 210.1.1.4R3#show ip nat translationsPro Inside global Inside local Outside local Outside global--- 210.1.1.2 10.5.5.5 --- ------ 210.1.1.3 10.5.5.6 --- ------ 210.1.1.4 10.5.5.7 --- ---R3#show ip nat statisticsTotal active translations: 3 (3 static, 0 dynamic; 0 extended)Outside interfaces: Serial0Inside interfaces: Ethernet0Hits: 0 Misses: 0Expired translations: 0“show ip nat statistics” displays the number of static and dynamic mappings.If you only have a few users on your RFC 1918 network that will use the Internet(or should be allowed to), static NAT will do just fine. For most networks, though,dynamic NAT is a better solution.This article was contributed by Chris Bryant from http://www.thebryantadvantage.com
6.3)-ACL Manager Overview
ACL Manager helps you manage Access Control Lists (ACLs) on Cisco routersrunning IOS and catalyst switches. It presents a user-friendly graphical userinterface that allows you to concentrate on the security of your network withouthaving to learn the complex syntax of ACLs.ACL Manager runs as an additional component (an add-on) toResource Manager Essentials (Essentials), and provides you with the means toeasily address, solve, and reduce configuration problems related to ACLs.These topics introduce you to some of the concepts and features of ACL Manager:• ACL Terms and Definitions• What Is ACL Manager?• ACL Manager Tools• ACL Manager Privilege Levels
ACL Terms and Definitions
Access Control List (ACL, ACL Definition) and Access Control Entry(ACE): An ACL consists of one or more ACEs that collectively define thenetwork traffic profile. This profile can then be referenced by IOS features suchas traffic filtering, priority or custom queuing, dynamic access control,
encryption, Telnet access, and so on. Each ACE includes an action element(“permit” or “deny”) and a filter element based upon criteria such as sourceaddress, destination address, protocol, protocol-specific parameters, and so on.
6.4)-ACCESS-LISTS COMMAND-
Router>ENARouter#SH ACCRouter#SH ACCess-lists Extended IP access list 101 permit ip 10.0.0.0 0.0.0.255 host 18.0.0.3 permit ip 192.168.1.0 0.0.0.255 host 18.0.0.5 permit ip 172.16.0.0 0.0.0.255 host 18.0.0.4 permit ip 170.0.0.0 0.0.0.255 18.0.0.0 0.0.0.255 deny ip any any
Conclusion
7.1) Career Scope
This chapter provides me an opportunity to do self-introspection of what value We
have added to my knowledge and skill set and to the project.
7.1.1. Domain Experience
AITP is working on various technologies. Also the individual responsibilities are
more. So, we have learnt a lot.
7.1. 2. Exposure to entirely different technology
Working on CCNA.CCNP for the first time was a very enriching experience. we
had also worked on this platform earlier. So it added to my list of know how and
the computer connectivity known to me.7
7.1. 3. Implimentation Of Static Routing
We had earlier do networking but worked on GNS for the first time. We learnt
many new things about internetworking of computers, concept of ip routing and
switching etc. We learn many things theoretically as part of our curriculum but
here we got a chance to apply my knowledge practically and enhance it also at the
same time.
7.1 .4. Implementation of EIGRP ,NAT&ACL
We have implemented the EIGRP in the routing protocol, which provides the
interconnection between more than two network. This protocols contains all the
configuration commands for routing of the packet in the network.We had always
read about methods for interconnecting but this was again the first time we got to
implement the interconnection of different networks. So it was a very new and
realistic experience.
7.1.5. Implementation of EIGRP
we have also designed the network of enterprize on which running on the enhanced
interior gateway routing protocol . In this enterprize network I have also implement
the network address translation .which convert the private ip address into the
public ip address for conneting to the internet.
As this is Internetworking protocols Network of the entrprize connect the different
lan of the company with each other.for connectiviy of different lan something
methods required.this method is eigrp and use the dual algorithm for connectivity
of the lans.
After completing the eigrp on enterprize lan there are require the connectivity to
the internet and also require connection to another company through the internet
service provider rotuer .so there are require some some protocol run on the internet
service provider router.for this purpose we run the border gateway routing protocol
on the service provider network.so here our goal to design the internet model
through various elements for this we have completed the bgp cofiguration by
practically.
7.2) Future Scope
Completion of the development process will result in a cisco package that will
provide user-friendly environment, which is very easy to work with, even for
people with very little knowledge of computer.
Management of various tasks is incorporated in the configuration and will deliver
the required information in a very easy way and easy to access manner.
This network topology will run on accuracy, efficiency, speed and easiness to the end user. Since the system is verified with valid as well as invalid address and is run with an insight into the necessary modifications that may require in the future, it can be maintained successfully without much effort.
BIBLIOGRAPHY
CATALOGUES
Training sessions conducted by company itself.
BOOKS
CCNA Study Guide Todd Lammle
CCNP Route Official Certification Guide Wendell Odom
CCNP Switch Official Certification Guide David Hucaby
WEBSITES
www.ciscopress.com
www.sybex.com
www.lammle.com
www.theccertzone.com
www.boson.com