You are on page 1of 45

CERTIFICATION This is to certify that the project report entitled computer

networking written and submitted to the School of Engineering and Technology, Department of Computer Science and Engineering is my original work and interpretation drawn therein are based on material collected by ORDU HARMONY NDUDI with registration number 10setcse !0 and roll number 1001011"#

!roject Super"isor !lace#

Date#

ACKNOWLEDGEMENT

I feel deeply indedted to Mr. Elems Ojadi, the trainer who delivered valuable lesson on PC Maintenance, his indepth knowled e about the subject helped me understand the subject in better way. !is method of teachin the minute details helped me a lot to ac"uire the insi ht into the subject. I am also rateful to Mr. E#e Odike, also my trainer for ivin best knowled e about computer networks. $he way he instilled knowled e of the subject was worthy and valuable. I am also thankful to %E&& Communication as a whole for their effort towards instillin networkin and hardware knowled e, that is the need of the day.

TA$%E OF CONTENT
'. Introduction((((((((((((((. ). *bstract(((((((((((((((( +. Introduction to networkin ((((((((( ,. Cate ories of network((((((((((.. -. IP address and M*C address(((((((( .. /etwork Medias(((((((((((((. 0. 1/2 2ervers((((((((((((((( 3. 1!CP servers((((((((((((((.. 4. 5irtual private networks((((((((((.. '6. 7outin (((((((((((((((((.. ''. E8chan er servers(((((((((((((.. '). O2I Model((((((((((((((((.. '+. 7outers(((((((((((((((((( ',. Conclusion((((((((((((((((( 7eferences(((((((

INTRODUCTION
$his project report pertains to 3weeks industrial trainin that I had underwent at %E&& communication as part of curriculum of de ree in 9achelor of technolo y in computer science en ineerin as re"uired by 2chool of En ineerin and technolo y, 2harda :niversity . I learnt a lot from professional mana ers and skilled en ineers. I had a reat learnin e8perience as trainee in this firm. I learnt a lot about system maintenance, *ssembly and troubleshootin , how different networks are controlled in the industry or any department with the help of networkin processes, under MC2E and CC/*. I have learnt about different type of servers like 1!CP 2erver, 1/2 2erver, /*$ 2erver. *lso I have learnt how to control the ;*/ and M*/ networks under MC2E <Microsoft Certified 2ystem En ineers= and how to control M*/ and >*/ networks under CC/* <CI2CO Certified 2ystem En ineers=.

ABSTRACT

Computer /etworkin is a very vast project in the present developin era of computer science. /ow a days, computers are used in a wider ran e. *ll the or ani#ations are usin multiple computers within their departments to perform their day to day work. Computer network allows the user to share data, share folders and files with other users connected in a network. Computer /etworkin has bound the world in a very small area with it wide networkin processes like ;*/, M*/, >*/.

NETWORKING
Introduction to networking
/etworkin is a practice of linkin of two or more computin devices such as PCs, printers, fa8es etc., with each other Connection between two devices is throu h physical media or lo ical media to share information, data and resources. /etworks are made with the hardware and software.

Models o Networking
Model means the connectivity of two computers. >e have many types of networkin models. <i= <ii= <iii= Client ? 2erver Model Peer to Peer Model <>ork roup Model= 1omain Model

!i"

Client #Ser$er Model In a Client server model we have one server and many clients. * Client can share

the resources of server, but a server cannot share the resources on clients. On the point of view of administrator it@s very easy to control the network because we combine with the server also at security point of view. It is very useful because it uses user level security in which users have to remember only one password to share the resources.

!ii" %eer to %eer Model !Workgrou& Model"


In Peer to Peer networkin model all computers are in e"ual status, that is we cannot mana e centrali#ation, administration security. In Peer to Peer networkin client use operatin system like >indow 43, >indow AP, >indow )666, >indow 5ista.

!iii" Do'(in Model It is a mi8ture of client server and peerBtoBpeer model. In this clients can share their resources as peerBtoBpeer but with the permission of the server as in client server model therefore it is commonly used model because in this security is more as we can put restriction on both server and clients.

C(tegories o network
/etworks can be cate ori#ed as per eo raphical area to be covered by the network. Computer network are divided into four cate ories includesC ;ocal *rea /etwork <;*/=, Campus *rea /etwork <C*/=, Metropolitan *rea /etwork <M*/= and >ide *rea /etwork <>*/=. Loc(l Are( Network !LAN" ;*/ is a computer network that is used to connect computers and work station to share data and resources such as printers or fa8es. ;*/ is restricted to a small area such as home, office or colle e. 1evices used in ;*/ are C !:9 and switch. Media for ;*/ is :$P cables. &i ure '.) shows how all work stations, server and printer are interconnected with the help of the network device.

C('&us Are( Network !CAN"


Campus *rea /etwork is a computer network made up of two or more ;*/s within a limited area. It can cover many buildin s in an area. $he main feature of C*/ is that all of the computers which are connected to ether have some relationship to each other e. . different buildin s in a campus can be connected usin different C*/. It will help to interconnect academic departments, library and computer laboratories. C*/ is lar er than ;*/ but smaller than >*/.

Metro&olit(n Are( Network !MAN"


M*/ is the interconnection of networks in a city. M*/ is not owned by a sin le or ani#ation. It act as a hi h speed network to allow sharin resources with in a city. M*/ can also be formed by connectin remote ;*/s throu h telephone lines or radio links. M*/ supports data and voice transmission. $he best e8ample of M*/ is cable $.5 network in a city.

Wide Are( Network !WAN"


>*/ covers a wide eo raphical area which include multiple computers or ;*/s. It connects computer networks throu h public networks like, telephone system, microwave, satellite link or leased line. Most of the >*/s use leased lines for internet access as they provide faster data transfer. >*/ helps an or ani#ation to establish network between all its departments and offices located in the same or different cities. It also enables communication between the or ani#ation and rest world. 1evices used in >*/ is only 7outer

I% ADDRESSES (nd MAC Addresses


It is also called as lo ical addresses. IP is a +) bit lon and it is divided into , octets and dot <.= is used to separate one octet from another. It is represented in the form of decimals. $here are two versions of IP addressesC B IPv,

I% Address Cl(sses
IP address is a +) bit address. It is divided into various classes namely Class *, Class 9, Class C, Class 1 and Class E. $CPDIP defines Class 1 for e8perimental purpose. $CP DIP address contains two addresses embedded within one IP addressE /etwork address and host address as shown in fi ure +.'

/E$>O7F *117E22 6 bits

!O2$ *117E22 +' bits

Class * consists of 3Bbit network I1 and ),Bbit host I1. Class 9 consists of '.B bit network I1 and '.Bbit of host I1. *nd Class C consists of ),Bbit of network I1 and 3Bbit of host I1.

)ow to Assign I% Address to Co'&uter


*n IP address assi ned to a computer may either be permanent address or address that is assi ned to a computer on a time lease or for temporary basis. !ence, the address ranted to computers is divided into two cate ories 1ynamic IP addresses and 2tatic addresses.

D*n('ic I% Addresses
1ynamic IP addresses are assi ned to the devices that re"uire temporary connectivity to the network or nonBpermanent devices such as portable computer. $he most common protocol used for assi nin 1ynamic IP address is 1!CP also called 1ynamic !ost Confi uration Protocol. $he 1!CP rants IP address to the computer on lease basis.

St(tic I% Addresses
2tatic IP addresses are assi ned to the device on the network whose e8istence in the network remains for a lon er duration. $hese static IP addresses are semiBpermanent IP addresses which remain allocated to a specific device for lon er time e. . 2erver.

MAC Addressing
M*C address is a hardware address that is embedded in the /IC card. It is also known as hardware address or physical address. Every /IC card has a uni"ue M*C address

assi ned by IEEE. M*C address is used to identify the nodes at lower levels of O2I model. $he M*C address operates at the data link layer of the O2I model. M*C address is a ') di it he8adecimal number <,3 bit address=. It is made up of numbers from 6B4 or a letter from *B&. M*C address can be written in any one of the formatsC G G MMCMMCMMC22C22C22 MMCMMCMMC22C22C22

NETWORKING MEDIA
$o do networkin we need to use some type of media. $here are many types of media. <i= <ii= <iii= <iv= <iv= Coa8ial Cable &iber optic cable $wisted Pair of Cables MicroB wave 2atellite

Co(+i(l C(,le Coa8ial cable consists of an insulated copper conductor surrounded by a tube shaped copper braid outer copper tune and the inner conductor have the same a8is of curvature hence it called coa8ial cable. It is basically of two typesC <i= <ii= 9ase 9and Cable <7H ? -4= 9road 9and Cable <7H ? -3=

>e used 9ase 9and si nal cable in /etworkin of Computers, It is so called because it carries sin le fre"uency. Its speed is '6 Mbps and impedance is -6 I. >here as 9road 9and Cables carries multiple fre"uencies. Connector used for Coa8ial cable is 9/C<9ritish /ovel Connector= connector. *7Cnet uses 7HB.) coa8ial cable. It has an

impedance of 4+ I and has a comparatively lesser attenuation, hence yield distances. $hese cables are e8pensive and provide hi h propa ation factor.

reater

-i,er O&tic(l C(,le &iber optic cable consists of a very fine fiber made from two types of lass, one for the inner core and the other for the outer layer. !ere si nal is transmitted in the form of li ht. 1ifferent varieties of fiber optics is used dependin on the si#e of the network. 2in le mode fiber optics is used for networks spannin lon er distance. &iber Optics has lower propa ation factor than coa8ial cable. It is a costly but more secure transmission media. Twisted %(ir C(,le $here are two wires, which are twisted with each other to avoid EMI <Electro Ma netic Induction=.these cables are easy to terminate. !owever they have a sli htly hi her value of attenuation value and hence have limited distance coverin capacity. Connector used for $wisted Pair of Cable is <7e istered %ack= 7%B,- and 7%B''. $here are two types of twisted pair of cablesC 2$P <2hielded $wisted Pair=. In this an e8tra wire which is called shielded wire is wrapped over the inner cover which holds copper in pairs. $his protection is used to protect si nal from e8ternal noise. :$P <:nshielded $wisted Pair= In this type of wire no shielded cover is there for e8tra protection from noise. $here are different cate ories of :$P cablesC

Et/ernet C(,ling
$here are three types of Ethernet cablesC 2trai ht cable

Crossover cable 7olled cable

Str(ig/t c(,le
It is used when we have to connect PC $O 2witch PC to !ub !ub to 7outer 2witch to 7outer

Crosso$er C(,le
It is used when we have to connectC PC to PC !ub to !ub 2witch to switch 7outer to 7outer PC to 7outer !ub to 2witch

Rollo$er C(,le
7ollover cable isn@t used to connect any Ethernet connections to ether, but 7ollover cable can be used to connect a host to a router console serial communication <com= port. /O$EC 2trai ht cable and Cross cables are used for data transfer but 7ollover cables are not used for data transfer. $here are two methods for manufacturin 7ollover cablesC

DNS SER0ER
1/2 stands for domain name system. 1/2 system is a standard technolo y for mana in the names of websites and other internet domains. 1/2 techni"ues allows you to type names into your web browser like computer networkin , about computer and allow your computer to automatically find that address on internet. 1/2 is the resolution mechanism used by >indow 2erver )66+ clients to find other computers and services runnin on those computers for computers in a window )66+ network infrastructure to talk to one another, one of the key in redients is the 1/2 server .!ost name alone do not communicate lobally but communicate locally, but if domain name is added alon with it then the host name can communicate lobally. 1/2 is use for name reservation i.e. to convert IP address to host name and host name to IP address or the function of 1/2 is to resolve host name such as www.yahoo.com to an IP address. :ser identify only user friendly name and all computers and technolo ies identify IP address and M*C address 1/2 is use to solve this problem because 1/2 is used to convert host name &J1/ <fully "ualified domain name= to IP address and IP address to host name .

%ARTS O- DNS S1STEM


<i= <ii= <iii= <iv= <v= !ost name 1omain name &J1/ /amespace 1/2 server

)OST NAME
!ost name is a computer name and is also called is /et9IO2 <network basic InputD output system= name. /et9IO2 is actually an application layer protocol that can use the transport services of $CPD IP when used in routed network. * /et9IO2 name is '.B byte addresses that identify a /et9IO2 resource on the network.

DOMAIN NAME
1omain name is used to identifies the internet site one can identifies the location without havin to remember the IP address of every location e. . yahoo.com or mail.com

Do'(in N('es&(ce
1/2 operates in what is known as 1/2 namespace. $he 1/2 namespace is an or ani#ed, hierarchical division of 1/2 names. 1omain namespace enable users to easily locate the network services and resources. $he domain namespace include the root domain, the top level domain of the or ani#ation and or ani#e these domain in a hierarchical tree structure. /amespace works on the hierarchical tree structure of root domain. $here are total '+ root domain workin in the internet, they are *, 9, C, 1, E, &, H, !, I, %, F, ; and M. $here is one root domain, which acts as the startin point of the fully "ualified domain names. $his root domain is desi nated with a dot <.=. &i ..) shows the tree structure or domain namespace.

Tree structure or Do'(in N('es&(ce DNS ser$er *ny computer providin domain namespace is a 1/2 server. 1/2 server is used to convert host name &J1/ into IP address and IP address into host name &J1/. $o store the nameBtoBIPBaddresses mappin s so crucial to network communication, name server uses #one files.

DNS 2one
Kone is the part of 1/2 database that contain record of domain or multiple domain. If the domains represents lo ical division of the 1/2 namespace, #ones represents the physical separation of the 1/2 namespace. In other words information about records of the resources within 1/2 domain is stored in a #one files, and this #one files e8ist on hard drive of server. Kone files are divided into one of two basic typesC

-orw(rd looku& 3one. Provides hostBnameBtoBIPBaddress resolution Re$erse looku& 3one. Provides IPBaddressBtoBhostBname resolution

Resource record stored in ( 3one ile


Each record stored in a #one file has a specific purpose. 2ome of the records set the behavior of the name serverE others have the job of resolvin a host name or service into an IP table. !i" NS !N('e Ser$er". $hese specify the name servers that are authoritative for a iven portion of 1/2 namespace. $hese records are essential when 1/2 servers are performin iterative "ueries to perform name resolution. !ii" SOA !St(rt o Aut/orit*". $his resource record indicates the name of ori in for the #one contains the name of the server that is the primary source for information about the #one. $he information in an 2O* record affect how often transfer of the #one are done between servers authoritative for the #one. It is also used to store other properties such as version information and timin s that affect #one renewal or e8piration. !iii" CNAME !C(nonic(l N('e".

C/*ME can be used to assi n multiple names of a sin le IP address. &or e8ample, the server hostin the site www.abc.com is probably not named www, but a C/*ME record e8ist resolution of www to an IP address all the same. $he C/*ME record actually points not to an IP address, but to an e8istin * record in the #one.

D)C% 2E75E7
1!CP <1ynamic !ost Confi uration Protocol= is a protocol that allocates IP address to computer on a network. 1!CP centrali#ed the mana ement of IP address allocation and reduces human error associated with manual IP confi uration. 1!CP server supplies all the necessary networkin parameters. $wo thin s are always handed out as a part of 1!CP confi urationC IP address and subnet mask. &urther 1!CP will fre"uently confi ure clients with optional values, such as a default ateway, 1/2 server address, and the address of a >indow Internet /amin 2erver, if one is present. 2cenario showin 1!CP server IP addresses allocation.

Working o D)C% Ser$er


<i= <ii= <iii= <iv= <v= 1!CP 2cope 1!CP 2uper 2cope E8clusion IP 7an e 1!CP ;ease $ime IP 7eservation 2cope havin the ran e of IP address for providin dynamic IP address to other computer. * roup of IP address within a scope is called as 1!CP scope. D)C% Su&er Sco&e * super scope is used to combine two or more scopes each servin different subnets, and can make the administration of several scopes on window )66+ 1!CP server more mana eable. :sin super scope you can roup multiple scopes as a sin le administrative entity that allows the client to lease from either one. >ith this feature, a 1!CP server canC 2upport 1!CP clients on a sin le physical network se ment where multiple lo ical IP networks are used. >hen more than one lo ical IP network is used on each physical subnet or network, such confi uration is called multinets. 2upport 1!CP clients located on the far side of 1!CP and 9OO$P relay a ent.

D)C% Sco&e

In multinet confi uration, 1!CP super scope can be used to roup and activate individual scope ran es of IP addresses used on your network. In this way , a 1!CP server computer can activate and provide leases from more than one scope to clients on a sin le physical network.

E+clusion I% r(nge If you want to reserve some IP for any computer i.e. if we want that from the series of '4).'.3.6.) to '4).'.3.6.'66 if we want that a series of IP addresses must not be assi ned automatically then at can be done usin e8clusive IP ran e. I% Reser$(tion $here are some 1!CP clients that you want to be the 1!CP clients, but you will also want to make sure that they et same IP address every time. $his can be done by statically fillin the IP address. >e can reserve IP address with the help of M*C address for a particular computer.

0IRT4AL %RI0ATE NETWORK !0%N"


* virtual private network is used to convert public network address to private network. *ll the clients of 5P/ dial to public IP address of 5P/ server and receive private IP from virtual 5P/ dynamic host protocol <1!CP=.in 5P/ one can have multiple virtual connections to a sin le IP address. $his way ,one network card can host several inbound connections, rather than re"uire a modem and telephone line for each simultaneous remote user.

:sin 5P/ server we can connect many private networks to internet services i.e the remote connection. >e can create a private network throu h public network, we can use firewall for security and data encryption in 5P/ server.

0%N co'&onents
<i= <ii= <iii= <iv= 0%N Ser$er 5P/ server, serve as the end points of a 5P/ connection. >hen confi urin a 5P/ server, you can allow access to just that server, or pass traffic throu h 5P/ server so that the remote user ain access the resources of the entire network. 0%N Client 5P/ clients establish connection to 5P/ server. $hey can also be routers that obtain the routerBtoBrouter secure connection. 5P/ client software is included in all the modern window operatin systems, includin >indow )66+ server. 7outerBto router 5P/ connection can be made from computers runnin server)66+ and >indows )666 runnin 7outin and 7emote *ccess. *dditionally, any client that support PP$P or ;)$P connections can be 5P/ clients of a window server )66+ system. 5P/ server 5P/ Clients >*/ Option 2ecurity Options

WAN O&tions $hese provide the physical mechanism for passin data back and forth. $hese connections typically include such similar network technolo ies such as $'or frame relay. In order for 5P/ connections to be successful, the 5P/ client and 5P/ server must be connected to each other usin either permanent >*/ connection or by dialin into an internet server provider <I2P=. Securit* O&tions 2ince a 5P/ uses a network that is enerally open to the public, it is important that the data passed over the connection remain secure. $o aid with secure communication routin and remote access supports such security measure as lo on and domain security, data encryption, smart cards, IP packet filterin and caller I1.

T*&es o 0%N
<i= <ii= PP$P <Point to Point $unnelin Protocol = ;)$P <;ayer ) $unnelin Protocol= accordin to CC/*.

%oint to %oint Tunneling %rotocol !%%T%" PP$P is Microsoft@s le acy protocol for supportin 5P/. It was developed in conjunction with other communications companies such as 7obotics as an e8tension to the PPP protocol. PP$P encapsulates IP or IPA packets inside of PPP data ram@s. $his means that you can remotely run pro rams that are dependent upon particular network protocols. One of the keys to remember about PP$P is that the protocol provides encryption capabilities, makin networks. L(*er Two Tunneling %rotocol !L5T%" ;)$P is a standard based encapsulation protocol with rou hly the same functionality as a PointBtoBPoint $unnelin Protocol <PP$P=. One of the key differences between >indow@s server )66+ implementation of ;)$Pand it cousin PP$P is that it much safer to send information over nonsecure

;)$Pis desi ned to run natively over IP networks only. $his implementation of ;)$P does not support native tunnelin over A.)-, frame relay, or *$M networks. ;ike PP$P, ;)$Pencapsulates PointBtoBPoint Protocol <PPP= frames, which then encapsulate IP or IPA protocols, allowin users to remotely run pro rams that are dependent on specific network protocols . 9ut unlike the PP$P protocol, ;)$P does not provide encryption of the data. &or data security ;)$Prelies on the services of another standardsB based protocol, IP2ec.

RO4TING
It is a process of transferrin information throu h an inter network i.e from one network to another. 7outin connect different networks havin I1 help in process of routin . $he dialBin properties also allow for specific IP address to be assi ned to a user. $his is the only way in >indow 2erver )66+ that you can assi n a specific IP to a user. $o assi n a specific IP to a user, check the bo8 ne8t to assi n * 2tatic IP *ddress and enter a valid IP in the space provided. 2tatic routin can also be specified as per user. 9y definin static routes, users can be limited to only specific parts of networks. In an internetwork a router must then about all the networks present in the for effort websites, there are hardware routers like CI2CO. Even win )66+ server computer confi ured as router. In simple words 7outer is a computer with two network cards. $hese two network cards, then, are attached to two different lo ical IP networks. $he routin table helps direct traffic that is passed throu h the router. /ow when there is a router, also there is a routin table, there is a need to confi ure the router in order for that router to pass alon traffic to the proper network. $here are two ways the routin table can be built and modifiedC either manually or automatically.

67879

T*&es o Routing
<i= <ii= 2tatic 7outin 1ynamic 7outin

St(tic Routing
In this routin information re"uired for routin is manually entered into the router by administrator.

)ow to con igure LAN routing


Enter the static IP in the router Ad'inistr(tor tools Routing (nd Re'ote (ccess 7i ht click on computer name <pcc'= Con igure (nd en(,le routing (nd re'ote (ccess ne+t: custo' con igur(tion select LAN routing:ne+t: inis/ *es and lo on to see IP table route

Enable ;*/ routin Interface >*/ IP '0).'-.6.6 2/M )--.)--.6.6 H> )6.6.6.)

enable ;*/ routin Interface >*/ '6.6.6.6 IP '6.6.6.6 2/M )--.6.6.6 H> )6.6.6.' -ig 9; . scen(rio or LAN routing

)ow to con igure st(tic routing


At Router R9. At Router R5. En(,le LAN routing 7i ht click on st(tic route Inter (ce WAN Destin(tion 9>7>7>7> M(sk 5==7>7>7> GW 5>7>7>79 en(,le LAN routing ri ht click on st(tic route inter (ce WAN destin(tion 9<579=7>7> '(sk 5==75==7>7> GW 5>7>7>75

-ig 9< . st(tic routing

679>7975 D*n('ic Routing


$he other way to mana e a router routin tables is to let the computer do it for you. %ust like 1!CP allocate IP addresses, confi urin the dynamic routin protocol usually means less errors due to human error, and less administrative overhead. In dynamic routin , routin information is automatically entered in the router usin protocols like 7IP */1 O2P&. $hese routin protocols used by >indow 2erver )66+ use one of two kinds of al orithms to determine the best possible path for a packet to et to its destination, either distance vector or link state. 7IP is used for small networks where as O2P& is used for lar e networks.

Routing In or'(tion %rotocol !RI%"


$he distance vector protocol in use on >indow )66+ is called 7outin Information Protocol <7IP= for IP. $his protocol was desi ned for the e8chan e of the routin information within a small to medium si#e IP network. >hen 7outer is enabled on >indow )66+ machine, the routin table includes entries only for the networks that are physically connected. >hen 7IP is enabled for an interface, the router will periodically send an announcement of its routin table to inform other 7IP routers of the networks it can reach. 7IP version' uses broadcast packets for its announcement. 7IP version) offers an improvement and can be confi ured to use either multicast or broadcast packets when communicatin with other routers. *lso, 7IP version) offers more fle8ibility in subnetted and classless inter domain routin <CI17= environments. O&en S/ortest %(t/ -irst !OS%-" >here 7IP is built to work to work in smaller networks, the Open 2hortest Path &irst <O2P&= routin protocol is desi ned for lar e or very lar e networks. $he oal is the

sameC information about connection to other networks is shared from one router to another. It offers several advanta es over 7IP, especially si nificant in lar e networksC

E?C)ANGE SER0ER
E8chan e server is a mail server, we can send and receive mail from one user to another user. E8chan e server is the mail server of Microsoft.

Ele'ents o E+c/(nge Ser$er


M(il Ser$er * server which helps to the users to send and receive mail is called mail server. M(il Bo+ * stora e place where senders and receivers mails are stored.

E+c/(nge 0ersion
$able '6C E8chan e 2erver with different operatin systems >here 2P stands for 2ervice Pack. 2ervice Pack are the services which are loaded e8ternally to remove some bu s that come durin installation of server C1.

Re@uire'ents or E+c/(nge Ser$er %rotocols Re@uired


%O%6 !%ost O ice %rotocol" $his protocol is used for receivin eB mails. IMAEA !Internet Mess(ging Access %rotocol" $his protocol is advance version of POP, this is also used to receive mail. LMT% !Loc(l M(il Tr(ns er %rotocol"BSMT% !Si'&le M(il Tr(ns er %rotocol" $his protocol is used to send mails. NNT% !Network News Tr(ns er &rotocol" $his protocol is used for transferrin messa es on internet.

)(rdw(re Re@uire'ents
ProcessorC min. '++M!# 7ec. 0++M!# 7*MC min. )-.M9 7ec. -')M9

Ot/er Re@uire'ents
O2C )k or )k+ 2erver /$&2 partition 2tatic IP address *ctive 1irectory 1/2 installation with *1 #one II2 installed with *2P.net, 2M$P, //$P and www service

Open &'stem Interconnection (O&I) Mo*e+


O2I model is the layer approach to desi n, develop and implement network. O2I provides followin advanta esC B <i= <ii= <iii= 1evelopment of new technolo y will be faster. 1evices from multiple vendors can communicate with each other. Implementation and troubleshootin of network will be easy.

Descri&tion o Di erent L(*ers


A&&lic(tion L(*er *pplication layer accepts data and forward into the protocol stack. It creates user interface between application software and protocol stack. %resent(tion L(*er $his layer decides presentation format of the data. It also able to performs other function like compressionDdecompression and encryptionDdecryption. Session L(*er

$his layer initiate, maintain and terminate sessions between different applications. 1ue to this layer multiple application software can be e8ecuted at the same time. Tr(ns&ort L(*er $ransport layer is responsible for connection oriented and connection less communication. $ransport layer also performs other functions like <i= <ii= Error checkin &low Control 9ufferin >indowin Multiple8in <iii= <iv= <v= <vi= Network L(*er $his layer performs function like lo ical addressin determination. Each networkin and path device has a physical address that is M*C 2e"uencin Positive *cknowled ement 7esponse

address. 9ut lo ical addressin is easier to communicate on lar e si#e network. ;o ical addressin defines network address and host address. $his type of addressin is used to simplify implementation of lar e network. 2ome e8amples of lo ical addressin areC B IP addresses, IPA addresses etc. /etwork layer has different routin protocols like 7IP, EIH7P, 9HP, and *7P etc. to perform the path determination for different routin fra mentation and protocol identification. D(t( Link L(*er $he functions of 1ata ;ink layer are divided into two sub layers ;o ical ;ink Control Media *ccess Control protocol. /etwork layer also perform other responsibilities like definin "uality of service,

<i=

;o ical ;ink Control defines the encapsulation that will be used by the /IC to delivered data to destination. 2ome e8amples of ;o ical ;ink Control are *7P* <Ethernet=, 36).'' wiBfi.

<ii=

Media *ccess Control defines methods to access the shared media and establish the identity with the help of M*C address. 2ome e8amples of Media *ccess Control are C2M*DC1, $oken Passin .

%/*sic(l L(*er Physical ;ayer is responsible to communicate bits over the media this layer deals with the standard defined for media and si nals. $his layer may also perform modulation and demodulation as re"uired.

RO4TERS
Router Arc/itecture (nd its Ke* Co'&onent

Processor IDO Controller Memory Controller 9IO2 7OM Incomplete IO2 /57*M 7*M

;*/ >*/ Ports

&lash 7*M OD2 IO2

2tartup Confi uration

Router Inter,-ces . /orts


Interface is used to connect ;*/ networks or wan networks to the router. Interface will use protocol stacks to sendDreceive data. Ports are used for the confi uration of routers. Ports are not used to connect different networks. $he primary purpose of port is the mana ement of router.

Router inter (ces (nd connectors

*:I ? *ttachment :nit Interface EP*9A ? Electronic Private *utomatic 9ranch P2$/ ? Public 2ervices $elephone /etwork

67967575 Router %orts $able ')C 7outer Ports

Mo*es o, Router
>hen we access router command prompt the router will display different modes. *ccordin to the modes, privile es and ri hts are assi ned to the user.

4ser 'ode
RouterC In this mode, we can display basic parameter and status of the router we can test connectivity and perform telnet to other devices. In this mode we are not able to chan e and save router confi uration.

%ri$ileged 'ode
RouterD In this mode, we can display all information, confi uration, perform administration task, debu in , testin and connectivity with other devices. >e are not able to perform here confi uration editin of the router.

$he command to enter in this mode is Lenable@. >e have to enter enable password or enable secret password to enter in this mode. Enable secret has more priority than enable password. If both passwords are confi ured then only enable secret will work.

Glo,(l con igur(tion


Route!con ig"D $his mode is used for the confi uration of lobal parameters in the router. Hlobal parameters applied to the entire router. *ll the chan es are performed in this mode. 9ut here we cannot see and save the chan es. &or e. C B router hostname or access list of router, password, 9anner, 7outin , 2ecurity. $he command to enter in this mode is Lconfi ure terminal@

Line con igur(tion 'ode


In this mode we can set the password of the user mode, i.e to set user mode password .$his mode is used to confi ure lines like console, vty and au8iliary. $here are main types of line that are confi ured. <i= Console Router!con ig"Dline console 6 <ii= *u8iliary Router!con ig"Dline au8 6 <iii= $elnet or vty Router!con ig"Dline vty 6 ,

Inter (ce con igur(tion 'ode


In this mode we can set ip addresses of the interfaces. $his mode is used to confi ure router interfaces. &or e. CB Ethernet, 2erial, 97I etc. Router!con ig"Dinterface MtypeN MnumberN Router!con ig"Dinterface serial '

Routing con igur(tion 'ode


$his mode is used to confi ure routin protocol like 7IP, EIH7P, O2P& etc. Router!con ig"Drouter MprotocolN OMoptionNP Router!con ig"Drouter rip Router!con ig"Drouter ei rp '6

Con,iguring /-sswor*
$here are five types of password available in a router

Console %(ssword
routerQconfi ure terminal router<confi =Qline console 6 router<confi Bline=Qpassword MwordN router<confi Bline=Qlo in router<confi Bline=Qe8it $o erase password do all steps with no command.

0t* %(ssword
routerNenable routerQconfi ure terminal router<confi =Qline vty 6 , router<confi Bline=Qpassword MwordN router<confi Bline=Qlo in router<confi Bline=Qe8it

Au+ili(r* %(ssword
routerQconfi ure terminal router<confi =Qline *u8 6 router<confi Bline=Qpassword MwordN router<confi Bline=Qlo in router<confi Bline=Qe8it

En(,le %(ssword
routerNenable routerQconfi ure terminal router<confi =Qenable password MwordN router<confi =Qe8it

En(,le Secret %(ssword


Enable Password is the clear te8t password. It is stored as clear te8t in confi uration where as enable secret password is the encrypted password. 7outerNenable 7outerQconfi ure terminal 7outer<confi =Qenable secret MwordN 7outer<confi =Qe8it

Encr*&tion (ll &(sswords


*ll passwords other than enable secret password are clear te8t password. $he command to encrypt all password are 7outerQconfi ure terminal 7outer<confi =Qservice passwordBencryption

M-n-ging Con,igur-tion
$here are two types of confi uration present in a router <i= <ii= 2tartup Confi uration 7unnin Confi uration

2tartup confi uration is stored in the /57*M. 2tartup confi uration is used to save settin s in a router. 2tartup confi uration is loaded at the time of bootin in to the Primary 7*M. 7unnin Confi uration is present in the Primary 7*M wherever we run a command for confi uration, this command is written in the runnin confi uration.

To s($e con igur(tion


7outerQcopy runnin Bconfi uration startupBconfi uration Or 7outerQwrite

To (,ort con igur(tion


7outerQcopy startupBconfi uration runnin Bconfi uration

To dis&l(* runningEcon igur(tion


7outerQshow runnin Bconfi uration

To dis&l(* st(rtu& con igur(tion


7outerQshow startupBconfi uration

Con,iguring Host N-me


7outerQconfi ure terminal 7outer<confi =Qhostname MnameN MnameNQe8it or end or DR# 7outerQconfi terminal 7outer<confi =Qhostname r' 7'<confi =Q

Con,igur-tion Inter,-ces
Interfaces confi uration is one of the most important part of the router confi uration. 9y default, all interfaces of Cisco router are in disabled mode. >e have to use different commands as our re"uirement to enable and confi ure the interface.

7outerQconfi ure terminal 7outer<confi =Qinterface MtypeN MnoN 7outer<confi Bif=Qip address MipN MmaskN 7outer<confi Bif=Qno shutdown 7outer<confi Bif=Qe8it

To dis&l(* inter (ce st(tus


7outerQshow interfaces <to show all interfaces= 7outerQshow interface MtypeN MnoN $his command will display followin parameters about an interface <'= <)= <+= <,= <-= <.= <0= <3= <4= <'6= <''= <')= 2tatus Mac address IP address 2ubnet mask !ardware type D manufacturer 9andwidth 7eliability 1elay ;oad < $8 load 78 load= Encapsulation *7P type <if applicable= Feep alive

Con iguring o&tion(l &(r('eter on WAN inter (ce


7outerQconfi ure terminal 7outer<confi =Qinterfac MtypeN MnoN 7outer<confi Bif=Qencapsulation MprotocolN 7outer<confi Bif=Qclock rate MvalueN

7outer<confi Bif=Qend

Co''(nd dis&l(*ing /istor* o Router To dis&l(* co''(nds &resent in /istor*


7outerQshow history

To dis&l(* /istor* si3e


7outerQshow terminal

To c/(nge /istor* si3e


7outerQconfi terminal 7outer<confi =Qline console 6 7outer<confi Bif=Qhistory si#e Mvalue<6B)-.=N 7outer<confi Bif=Qe8it

To set time in router


>e can confi ure router clock with the help of two methodsC <i= <ii= default on reboot. Confi ure clock locally Confi ure clock on /$P server </etwork $ime Protocol=

7outer does not have battery to save the clock settin . 2o that clock will reset to the

To dis&l(* clock
7outerQshow clock

To con igure clock


7outerQclock set hhCmmCss day month year 7outerQclock set 0C'-C'6 4 %une )664

To con igure clock ro' NT% ser$er


7outerQconfi terminal

7outer<confi =Qntp server MIP addressN 7outer<confi =Qe8it CCRNpin pool.ntp.or $o et ntp server ip from internet CCRNroute print

RO4TING
7outin is a process or techni"ue to identify the path from one network to another. 7outers don@t really care about hostsSthey only care about networks and the best path to each network. $o route the packet the router must know the followin thin sC 1estination network /ei hbour device from witch it can learn about remote /etworkin . Possible number of routers to reach the destination. 9est route to reach the destination. !ow to maintain T verify the routin information.

T1%ES O- RO4TING
2tatic routin . 1efault routin . 1ynamic routin .

STATIC RO4TING
In static routin an administrator specifies all the routes to reach the destination. 2tatic routin occurs when you manually add routes in each router@s routin table.9y default, 2tatic routes have an *dministrative 1istance <*1= of '

&eatures
$here is no overhead on the router CP:. $here is no bandwidth usa e between routers. It adds security, because the administrator can choose to allow routin access to certain networks only.

S*nt(+ or St(tic Routing


7outer <confi =Q ip route Mdestination /DwN M2ubnet maskN M/e8t !opeB address or e8it interfaceN OMadministrative distanceNPermanentP.

2tatic routin of router <7'=


7outer<confi =Qip route )6.6.6.6 )--.6.6.6 ,6.6.6.) 7outer<confi =Qip route +6.6.6.6 )--.6.6.6 ,6.6.6.) 7outer<confi =Qip route -6.6.6.6 )--.6.6.6 ,6.6.6.) 7outer<confi =Qinterface soD'D6 7outer<confi =Q clock rate .,666 7outer Q show ip route

2tatic routin of router <7)=


7outer<confi =Qip route '6.6.6.6 )--.6.6.6 ,6.6.6.' 7outer<confi =Qip route +6.6.6.6 )--.6.6.6 -6.6.6.) 7outerQshow ip route 7outer<confi =Qinterface s'D6 7outer<confi =Q clock rate .,666 7outer<confi =Qinterface s'D' 7outer<confi =Qclock rate .,666 7outerQshow ip route

2tatic routin of router <7+=


7outer<confi =Qip route '6.6.6.6 )--.6.6.6 -6.6.6.' 7outer<confi =Qip route )6.6.6.6 )--.6.6.6 -6.6.6.' 7outer<confi =Qip route ,6.6.6.6 )--.6.6.6 -6.6.6.' 7outer<confi =Qinterface s'D6 7outer<confi =Q clock rate .,666 7outerQshow ip route

D1NAMIC RO4TING
1ynamic routin is when protocols are used to find networks and update routin table on routers. * routin protocol defines the set of rules used by router when it communicates routin information between nei hbor routers. In dynamic routin , we will enable a routin protocol on router. $his protocol will send its routin information to the nei hbor router. $he nei hbors will analy#e the information and write new routes to the routin table. $he routers will pass routin information receive from one router to other router also. If there is more than one path available then routes are compared and best path is selected. 2ome e8amples of dynamic protocol areC B 7IP, IH7P, EIH7P, O2P& $here are two type of routin protocols used in internetworksC

Interior Hateway Protocols <IHPs=


IHPs are used to e8chan e routin *utonomous 2ystem<*2= number. 7outin information with routers in the same which is performed within a sin le

autonomous system is known as interior routin . $he protocol that are used to perform this type of routin are known as IHP<Interior Hateway Protocol=. $hese protocols areCB

<i= <ii= <iii= <iv= <v=

7IPv' <7outin Information Protocol 5ersion '= 7IPv) <7outin Information Protocol 5ersion )= EIH7P <Enhanced Interior Hateway 7outin Protocol= O2P& <Open 2hortest Path &irst= I2BI2 <Intermediate 2ystem to Intermediate 2ystem=

E8terior Hateway Protocols <EHPs=


EHPs are used to communicate between different *utonomous 2ystem. Protocol that used to do this type of routin are called e8terior ateway protocols. *utonomous 2ystemCB *n autonomous system is a collection of networks under a common administrative domain, which basically means that all routers sharin the same routin table information are in the same *2.

Routing %rotocol B(sics


<i= <ii= <iii= *dministrative 1istances 7outin protocol 7outin ;oops

Ad'inistr(ti$e Dist(nces $he *dministrative 1istance <*1= is used to rate the trustworthiness of routin

information received on a router from a nei hbor router. *n *dministrative 1istance is an inte er from 6 to )--, where 6 is the most trusted and )-- means no traffic will be passed via this route. If a router receives two updates listin he sane remote network, the first thin the router checks is the *1. If one of the advertised routes has lower *1 than the other, then the route with the lowest *1 will be placed in the routin table. If both advertised routes to the same network have the same *1, then routin protocol metrics <such as hop count or bandwidth of the lines= will be used to find the best path to the remote network. $he *dvertised route with the lowest metric will be placed in the routin table. 9ut if both advertised routes have the same *1 as well as the same metrics, then the routin protocol will loadBbalance in the remote network.

Route Source Connected interface 2tatic 7oute EIH7P IH7P O2P& 7IP E8ternal EIH7P :nknown )--

De (ult AD 6 ' 46 '66 ''6 ')6 '06 $his route will never be used

IGR% !Interior G(tew(* %rotocol"


Interior Hateway 7outin Protocol <IH7P= is a CiscoBproprietary distanceBvector routin protocol. $o use IH7P, all your routers must be Cisco routers. IH7P has a ma8imum hop count of )-- with a default of '66. IH7P uses bandwidth and delay of the line by default as a metric for determinin the best route to an internetwork. 7eliability, load, and ma8imum transmission unit <M$:= can also be used, althou h they are not used by default.

EIGR% !En/(nced Interior Routing %rotocol"


Enhanced IH7P <EIH7P= is a classless, enhanced distanceBvector protocol that ives us a real ed e over IH7P. ;ike IH7P, EIH7P uses the concept of an autonomous system to describe the set of conti uous routers that run the same routin protocol and share routin information. 9ut unlike IH7P, EIH7P includes the subnet mask in its route updates. $he advertisement of subnet information allows us to use 5;2M and summari#ation when desi nin our networks. EIH7P is sometimes referred to as a hybrid routin protocol because it has characteristics of both distanceBvector and linkBstate protocols. It sends traditional distanceBvector updates containin information about networks plus the cost of

reachin them from the perspective of the advertin router. EIH7P has a ma8imum hop count of )--.

OS%- !O&en S/ortest %(t/ -irst"


Open 2hortest Path &irst <O2P&= is an open standards routin protocol that@s been implemented by a wide variety of network vendors, includin Cisco. $his works by usin the 1ijkstra al orithm. &irst, a shortest path tree is constructed, and then the routin table is populated with the resultin best paths. O2P& conver es "uickly, althou h perhaps not as "uickly as EIH7P, and it supports multiple, e"ualBcost routes to the same destination. 9ut unlike EIH7P, it only supports IP routin . O2P& is an IHP protocol. It is a link state routin protocol. It is supported by many operatin systems. Its default *1 is ''6, hop count limit is unlimited. It is classless routin protocol, supports 5;2MDCI17. 9y default the hi hest IP address of interface will be elected as 7outer id.

Bro(dc(st !'ultiE(ccess" 9roadcast <multiBaccess= networks such as Ethernet allow multiple devices to connect to <or access= the same network, as well as provide a broadcast ability in which a sin le packet is delivered to all nodes on the network. In O2P&, a 17 and a 917 must be elected for each broadcast multiBaccess network. NonE,ro(dc(st 'ultiE(ccess /onB9roadcast MultiB*ccess </9M*= networks are types such as &rame 7elay, A.)-, and *synchronous $ransfer Mode <*$M=. $hese networks allow for multiBaccess, but have no broadcast ability like Ethernet. 2o, /9M* networks re"uire special O2P& confi uration to function properly and nei hbor relationships must be defined. %ointEtoE&oint PointBtoBpoint refers to a type of network topolo y consistin of a direct

connection between two routers that provides a sin le communication path. $he pointBtoB

point connection can be physical, as in a serial cable directly connectin two routers, or it can be lo ical. %ointEtoE'ulti&oint PointBtoBmultipoint refers to a type of network topolo y consistin of a series of connections between a sin le interface on one router and multiple destination routers. *ll of the interfaces on all of the routers sharin the pointBtoBmultipoint connection belon to the same network. *s with pointBtoBpoint, no 17s or 917s are needed.

CONCL4SION
Computer /etworkin is a very vast project in the present developin era of electronics and communication. /ow a days, computers are used in a wider ran e. *ll the or ani#ations are usin multiple computers within their departments to perform their day to day work. Computer network allows the user to share data, share folders and files with other users connected in a network. Computer /etworkin has bound the world in a very small area with it wide networkin processes like ;*/, M*/, >*/.

A&&lic(tions
Communication &ield Industries Medical &ield 7esearch &ield

Or ani#ations 2chool Colle es

RE-RENCES
www. oole.com www.microsoft.com www.nythimes.com www.di itechBen ineers.com /etwork Essentials module ,BinB' MC2E study material Introduction to >indow 2erver)66+ CI2CO Cretified /etwork *ssociate &aruk !usain

You might also like