Escolar Documentos
Profissional Documentos
Cultura Documentos
Under
WEBEL INFORMATICS LIMITED
By
Ritanjan Dawn
Arindam Samanta
Suman Kumar Mishra
Indira Kar
CAMELLIA INSTITUTE OF
TECHNOLOGY
MADHYAMGRAM, KOLKATA-700129
ACKNOWLEDGEMENT
INTRODUCTION
We will use the term “Computer Network” to mean a collection of
autonomous computers interconnected by a single technology.
Two computers are said to be interconnected if they are able to
exchange information. The connection need not be via a copper
wire, fiber optics, microwaves, infrared and communication
satellites can also be used. Although it may sound strange to
some people, neither the internet nor the World Wide Web is a
Computer Network.
In a Computer Network, this coherence model and software are
absent. Users are exposed to the actual machines without any
attempt by the system to make the machines look and act in a
coherent way. If the machines have different hardware and
different operating system, that is fully visible to the users. If a
user want to run a program on a remote machine, he has to log
onto that machine and run it there.
The up gradation from the current infrastructure to the switches
and router will help in divisioning the networks but keeping them
connected the same time with enforce security policies
implemented by ACL.
OBJECTIVE
We have configured a LAN connection in WEBEL INFORMATICS
LIMITED. The main objective of our beautiful project is that with
the help of this configuration the administrator can control the
traffic between routers and can give the privilege to some specific
device to access the specific server or other device. The
administrator can deny the access privilege of any device on any
network also.
Any Small Institute:
CONTENTS
Introduction of Networks
Different Types of Topology
Device and Cable
Various Network Device and Their Utility
Various Types of Network Cable and Their Uses
Network Models
The OSI Model
Layered Architecture
Layers in The OSI Model
TCP/IP Model
IP Addressing
Types of Address
Classification of IP Address
Sub netting
VLSM
Introduction of Router and ACL
Internal Component of Router
Router Connector
Routing Protocol
Types of Routes
Configuration of Static and Dynamic Route
Router Configuration
Interface Configuration
Project Description
Diagram of Network
Used Commands
Introduction of Networks
Repeater:
1) Regenerate the signal.
2) It work in Layer 1 of the OSI Reference model.
3) Accept signal through one port and send other
port except source port.
4) Repeater has two port.
5) Repeater has no decision making power.
Hub:
1) Regenerate the signal.
2) It work in Layer 1 of the OSI Reference model.
3) Accept signal through one port and send other
port except source port.
4) Logically Hub is a multiple port Repeater.
5) Hub has no decision making power.
Bridge:
1) Bridge has two port.
2) Bridge create two segments.
3) Bridge has decision making power.
4) It maintain bridge table ie.MAC table(data can
be sent according to the bridge table).
5) Bridge is a layer 2 of the OSI reference model .
Switch:
1) Switch has multiple port.
2) Switch create multiple segments.
3)Switch has decision making power.
4) It maintain Switch table ie.CAM table(data can
be sent according to the CAM table).
5) Switch is a layer 2 of the OSI reference model .
WAN Devices:
1)Router, Communication Server are layer 3
of the OSI model device.
Router:
1) Create the connection between different network.
2) Select Best path.
3)It create Switching i.e. from one port to another.
4)It create Routing table and ARP table
NETWORK CABLING:
Network cabling are different type
I)copper cable ii)fiber optic cable
copper cable are different type:-
1)straight cable.
2)cross cable.
3) Rollover cable.
4) serial cable.
Straight-through Cable:
Unshielded twisted pair (UTP) copper cable for connecting
dissimilar networking devices. In straight cable the pin-outs of RJ-
45 connector from one end is similar to other end.
Diagram of Straight-Through cabling
Crossover Cable:
UTP copper cable for connecting similar networking devices. In
cross cable the pin no 1 of RJ-45 is connected to pin 3 of other
end. Pin 2 of one end is connected to pin 6 of other end. Pin 3 of
one end is connected to pin 1 of other end.
Diagram of Crossed-over cabling
Rollover cable:
UTP copper cable for connecting console port of router for
configuration of router.
In Rollover cable pin-outs of RJ-45 connector from one end is
opposite to other end.
TCP/IP MODEL:
TCP/IP is based on a four-layer reference model. All protocols
that belong to the TCP/IP protocol suite are located in the top
three layers of this model.
Each layer of the TCP/IP model corresponds to one or more
layers of the seven-layer Open Systems Interconnection (OSI)
reference model proposed by the International Standards
Organization (ISO).
IP
ADDRESSING
Internet Protocol addressing is known as Logical addressing.
IPV4- Is a 32 bit ip address version 4. i.e. 32bit Special format of
IPV4 is dotted decimal.
Address are three type 1) Unicast 2) Multicast 3) Broadcast.
1.Unicast- Unicast means one to one communication.
2.Multicast- Group of computer is domain and multicast is used
for domain.
3.Broadcast- Broad cast is used for all.
Network address- When all host bit are zero then this
address is called network address.
Host address- When host bit are zero & one then this
address is called host address.
Broadcast address- when all host bit are one then this
address is called broadcast address.
Subnet mask- How many 1bit are Present in the network
portion is called subnet mask.
Sub netting:
Host bits must are reassigned(or “borrowed”) as network bits.
The starting point is always the leftmost host bit.
Introduction of Router
RAM- RAM store the routing table, Hold ARP Cache, Provide
temporary memory for the configuration file.
It is a volatile memory ie. When router is power down or Restarted
then all contain of RAM are losses. RAM config file is running-
config.
ROUTED PROTOCOLS-
ROUTED PROTOCOLS are nothing more than data being
transported across the networks. Routed protocols include:
Internet Protocol
Novell IPX
AppleTalk
Outside a network, specialized devices called ROUTERS are
used to perform the routing process of forwarding packets
between networks.
Routes of router are two type
1) Static 2) Dynamic.
Static Routes - A static route is a route that is created
manually by a network administrator.
Default Routes- A default route, also known as the gateway
of last resort, is the network route used by a router when no other
known route exists .
Configuration of Static Routes:-
RT1(config)# ip route <unknown destination network><destination
mask><next hop router interface address>/ <own out bound
interface name><administrative distance> where AD-0 for exit
interface. And AD=1 for next hop.
RIP Version 2:
Defined by RFC 1388. It passes further information in some of the
fields that are set to 0 for the RIP protocol. These additional fields
include a 32 bit subnet mask and a next hop IP address,
There are two classifications of protocols:
IGP - Interior Gateway Protocol. The name used to describe the
fact that each system on the internet can choose its own routing
protocol. RIP and OSPF are interior gateway protocols.
EGP - Exterior Gateway Protocol. Used between routers of
different systems. There are two of these, the first having the
same name as this protocol description:
EGP - Exterior Gateway Protocol.
BGP - Border Gateway Protocol.
Routing cost:
Counting route cost is based on one of the following calculations:
Hop count - How many routers the message must go through to
reach the recipient.
Interface Configuration:-
Serial Interface:
RT# configure terminal
RT(config)#
RT(config)# Interface s slot/port (s0/0)
RT(config-if)#
RT(config-if)# ip address 192.168.1.1 255.255.255.0
RT(config-if)# Bandwidth 56 i.e. In kbps.
RT(config-if)# clock rate 56000 i.e. In bps.
RT(config-if)# No Shutdown
Introduction of ACL:
ACL is the short form for Access Control List .It is a listing
containing one or more ACE that tells a computer operating
system or other network device what rights a users has to each
item on a computer or network device. For example an ACL may
specify if a user or the group the user belongs to has access to a
file or folder on that computer or network.ACL filter IP packets
based on:
Source address
Destination address
Type of packet
Any combination of these items
In order to filter network traffic, ACLs control whether routed
packets are forwarded or blocked at the router interface.ACL
criteria include:
Standard ACLs
Extended ACLs
Dynamic (lock and key) ACLs
IP-named ACLs
Reflexive ACLs
Time-based ACLs that use time ranges
Commented IP ACL entries
Context-based ACLs
Authentication proxy
Turbo ACLs
Distributed time-based ACLs
But most commonly used ACLs are Standard ACLS and
Extended ACLS.
Standard ACLs control traffic by comparing the source address
of the IP packets to the address configured in the ACL.
The command syntax format of a standard ACL is access-list
access-list-number {permit|deny} {host|source source-wildcard|
any}.
Extended ACLs control traffic by comparing the source and
destination addresses of the IP packets to the addresses
configured in the ACL. You can also make extended ACLs more
granular and configured to filter traffic by criteria such as:
Protocol
Port numbers
Precedence value
IP
access-list access-list-number [dynamic dynamic-name
[timeout minutes]]
{deny | permit} protocol source source-wildcard
destination
destination-wildcard
[precedence precedence] [tos tos] [log | log-input]
[time-range time-range-name][fragments]
…………………………………….
…………………………………….
192.168.10.000|11101
192.168.10.000|11110
192.168.10.000|11111
So subnet mask will be 255.255.255.224
Network address will be 192.168.10.0/27
Broadcast address will be 192.168.10.31/27
No of host in Kolkata router are 9.So we need 4 bits for host
address.
Usable host address for kolkata are
192.168.10.0010|0000
…….……….
192.168.10.0010|1111
So subnet mask will be 255.255.255.32
Network address will be 192.168.10.32/28
Broadcast address will be 192.168.10.47/28
No of host in Delhi router are 4.So we need 3 bits for host
address.
Usable host address for Delhi are
192.168.10.00110|000
…….……….
192.168.10.00110|111
So subnet mask will be 255.255.255.48
Network address will be 192.168.10.48/29
Broadcast address will be 192.168.10.55/29
No of host in Chennai router are 5.So we need 3 bits for host
address.
Usable host address for Chennai are
192.168.10.00111|000
…….……….
192.168.10.00111|111
So subnet mask will be 255.255.255.56
Network address will be 192.168.10.56/29
Broadcast address will be 192.168.10.63/29
For serial connection between Kolkata & Delhi, the addresses will
be
192.168.10.010000|00
…..
192.168.10.010000|11
So the usable addresses will be 192.168.10.65/30 &
192.168.10.66/30
PROJECT SCENARIO
The following devices are taken in this Router Configuration:
1.Four 2620 Cisco Routers.
2 Six Switches.
3.9 PCs for Kolkata, 4 servers for Delhi ,5 PCs for Chennai and
17 PCs for Banglore.
We have used serial cable for connection between Routers,
straight cable for connection Router-Switch and Switch-PC and
Switch-Server, and cross cable for Switch-Switch connection.
Every PC and Router has been given unique IP address. During
the Router configuration we have given unique host name,
console password, enable secret password and VTY password
for each Router. Every Router is connected with their neighbor
Router through the serial interface(s0/0 or s0/1) using IP address,
subnet mask, bandwidth(128 kbps) and clock rate(128000).
Delhi Router :
Network Address:192.168.10.48/29
Broadcast Address:192.168.10.55
Fast Ethernet:192.168.10.49/29(Fa0/0)
Connections: Delhi →Switch(Delhi)→Servers(4)
Serial Interface:192.168.10.66/30 (Se0/0)
192.168.10.69/30(Se0/1)
Chennai Router :
Network Address:192.168.10.56/29
Broadcast Address:192.168.10.63
Fast Ethernet:192.168.10.57/29(Fa0/0)
Connections: Chennai →Switch(Chennai)→PCs(5)
Serial Interface:192.168.10.70/30 (Se0/0)
192.168.10.73/30(Se0/1)
Banglore Router :
Network Address:192.168.10.0/27
Broadcast Address:192.168.10.31
Fast Ethernet:192.168.10.1/27(Fa0/0)
Connections: Banglore →Switch(Banglore)→PCs(8)
↓
Switch(level I)→PCs (9)
Serial Interface:192.168.10.73/30 (Se0/0)
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname kolkata
kolkata(config)#line console 0
kolkata(config-line)#password cit1
kolkata(config-line)#login
kolkata(config-line)#exit
kolkata(config)#enable password cit1
kolkata(config)#enable secret kolkata
kolkata(config)#line vty 0 4
kolkata(config-line)#password cit1
kolkata(config-line)#login
kolkata(config-line)#exit
kolkata(config)#service password-encryption
kolkata(config)#interface fa0/0
kolkata(config-if)#ip address 192.168.10.33 255.255.255.240
kolkata(config-if)#no shutdown
Password:
kolkata>enable
Password:
kolkata#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
kolkata(config)#router rip
kolkata(config-router)#version 2
kolkata(config-router)#network 192.168.10.32
kolkata(config-router)#network 192.168.10.64
kolkata(config-router)#exit
kolkata(config)#exit
Configuring ACL:
kolkata#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname delhi
delhi(config)#line console 0
delhi(config-line)#password cit2
delhi(config-line)#login
delhi(config-line)#exit
delhi(config)#enable password cit2
delhi(config)#enable secret delhi
delhi(config)#line vty 0 4
delhi(config-line)#password cit2
delhi(config-line)#login
delhi(config-line)#exit
delhi(config)#service password-encryption
delhi(config)#interface fa0/0
delhi(config-if)#ip address 192.168.10.49 255.255.255.248
delhi(config-if)#no shutdown
delhi(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0,
changed state to up
delhi(config-if)#bandwidth 128
delhi(config-if)#clock rate 128000
delhi(config-if)#exit
delhi(config)#interface s0/1
delhi(config-if)#ip address 192.168.10.69 255.255.255.252
delhi(config-if)#no shutdown
Password:
delhi>enable
Password:
delhi#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
delhi(config)#router rip
delhi(config-router)#version 2
delhi(config-router)#network 192.168.10.48
delhi(config-router)#network 192.168.10.64
delhi(config-router)#network 192.168.10.68
delhi(config-router)#exit
delhi(config)#exit
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname chennai
chennai(config)#line console 0
chennai(config-line)#password cit3
chennai(config-line)#login
chennai(config-line)#exit
chennai(config)#enable password cit3
chennai(config)#enable secret chennai
chennai(config)#line vty 0 4
chennai(config-line)#password cit3
chennai(config-line)#login
chennai(config-line)#exit
chennai(config)#service password-encryption
chennai(config)#interface fa0/0
chennai(config-if)#ip address 192.168.10.57 255.255.255.248
chennai(config-if)#no shutdown
chennai(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0,
changed state to up
chennai(config-if)#bandwidth 128
chennai(config-if)#clock rate 128000
chennai(config-if)#exit
chennai(config)#interface s0/1
chennai(config-if)#ip address 192.168.10.73 255.255.255.252
chennai(config-if)#no shutdown
Password:
delhi>enable
Password:
delhi#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
delhi(config)#router rip
delhi(config-router)#version 2
delhi(config-router)#network 192.168.10.56
delhi(config-router)#network 192.168.10.68
delhi(config-router)#network 192.168.10.72
delhi(config-router)#exit
delhi(config)#exit
Configuring ACL:
kolkata#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
chennai(config)#access-list 100 permit tcp 192.168.10.56 0.0.0.7
host 192.168.10.50 eq 80
chennai(config)#access-list 100 permit tcp 192.168.10.56 0.0.0.7
host 192.168.10.51 eq 80
chennai(config)#access-list 100 permit tcp 192.168.10.56 0.0.0.7
host 192.168.10.53 eq 80
chennai(config)#access-list 100 permit ip 192.168.10.56 0.0.0.7
192.168.10.32 0.0.0.15
chennai(config)#access-list 100 permit ip 192.168.10.56 0.0.0.7
192.168.10.0 0.0.0.31
chennai(config)#access-list 100 permit ip 192.168.10.56 0.0.0.7
host 192.168.10.52
chennai(config)#access-list 100 deny ip any any
chennai(config)#interface fa0/0
chennai(config-if)#ip access-group 100 in
chennai(config-if)#exit
chennai(config)#exit
banglore(config-if)#exit
banglore(config)#interface s0/0
banglore(config-if)#ip address 192.168.10.74 255.255.255.252
banglore(config-if)#no shutdown
banglore(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0,
changed state to up
banglore(config-if)#bandwidth 128
banglore(config-if)#clock rate 128000
banglore(config-if)#exit
banglore(config)#exit
Password:
kolkata>enable
Password:
kolkata#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
kolkata(config)#router rip
kolkata(config-router)#version 2
kolkata(config-router)#network 192.168.10.0
kolkata(config-router)#network 192.168.10.72
kolkata(config-router)#exit
kolkata(config)#exit
Configuring ACL:
kolkata#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
chennai(config)#access-list 100 permit ip 192.168.10.0 0.0.0.31
host 192.168.10.52
chennai(config)#access-list 100 permit ip 192.168.10.0 0.0.0.31
host 192.168.10.53
chennai(config)#access-list 100 deny tcp 192.168.10.2 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.3 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.4 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.5 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.6 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.7 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.8 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.9 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.10 0.0.0.31
host 192.168.10.51 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.11 0.0.0.31
host 192.168.10.50 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.12 0.0.0.31
host 192.168.10.50 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.13 0.0.0.31
host 192.168.10.50 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.14 0.0.0.31
host 192.168.10.50 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.15 0.0.0.31
host 192.168.10.50 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.16 0.0.0.31
host 192.168.10.50 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.17 0.0.0.31
host 192.168.10.50 eq 80
chennai(config)#access-list 100 deny tcp 192.168.10.18 0.0.0.31
host 192.168.10.50 eq 80
chennai(config)#access-list 100 permit ip any any
chennai(config)#interface fa0/0
chennai(config-if)#ip access-group 100 in
chennai(config-if)#exit
chennai(config)#exit
Conclusion:
Router generally used for connecting networks for exchanging of
packets between them. Routers can be used to implement
network security and supports various other function .In this
project we have implemented for small group of computers using
VLSM and allocated different routers and switch. This particular
project can be used to implement a larger network. We have
shown subnetting of Ip’s ,configuration of the router.we have
configured dynamic route using (rip v2) also configured the ACL.
This project has helped us to learn various technical aspects of
networks and its configurations, which we think will help us greatly
in years to come.We are thankful to everyone who has helped us
in preparing our project.