Escolar Documentos
Profissional Documentos
Cultura Documentos
SUBMITTED TO DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE DEGREE OF BACHELOR OF ENGINEERING (B.E.)
SUBMITTED BY:
SUMEET DEWANGAN SURYA PRAKASH SUMIT SINHA SHRIKANT CHAURASIA AKHILESH KUMAR
AGENDA
The topics to be discussed
1.
2.
NETWORK DESIGN
SECURITY IMPLEMENTATION
NETWORK DESIGN
Determining the need of the organization. Determining the hardware requirements.
IP Addressing scheme.
Routing implementataion.
NETWORK DESIGN
IP ADDRESSING SCHEME
Once the hardware requirement is met, its necessary to allot them a software address called as IP address. Its necessary to recognize end devices in the IP internetwork for communication. IP address is alotted according to the need of organization as how many network and user per networks are required. Five types of IP addresses are used for this namely CLASS A,CLASS B,CLASS C,CLASS D & CLASS E.
NETWORK DESIGN
ROUTING IMPLEMENTATION
After assigning Ip address to each and every host in a network they are not ready to send and receive packets. They are not able to do this because they dont know where the destination host is situated. Thats where a router comes in the work of the router is to determine the best possible way to the network of destination host. The Router finds the destination host network using the Routing Protocols like RIP, RIP Ver. 2, IGRP,EIGRP. Once the home network is found the routed protocol is used to the destination host.
SECURITY IMPLEMENTATION
SECURITY IMPLEMENTATION
Methods of Accessing the Router:
Console Port : This is the port situated at the back of the Router. To access the router through this port we have to use the Routers CLI(command line interface).
Auxiliary Port : This is also situated at the back of the router. To access Router through this port we have to use the modem.
Virtual Terminal(Remote Accessing) : 1. Telnet. 2. SSH(Secure shell).
SECURITY IMPLEMENTATION
TELNET:This is the method of accessing the router via
remote connection. Any end computer in the network can be used to access the router through this method.
SECURITY IMPLEMENTATION
SECURITY FEATURES PROVIDED BY ROUTER:
Password Protection Access List Privilege Level Syslog Server SSH Auto secure Banner (Warning)
SECURITY IMPLEMENTATION
The security features provided by Routers are:
BANNER-Each when a user tries to login to the Router a warning message is displayed prior to login.
SECURITY IMPLEMENTATION
The security features provided by Routers are: Access List: This is the management tool used for packet
filtering. The packet can be filtered according to its source(standard access list) or source/destination(extended access list) address.
Privilege level: In a network each and every user can be assigned a privilege level. It is the hierarchical level of accessing the
network resources. A user with higher privilege level can access more resources than a user with a lower privilege level.
SECURITY IMPLEMENTATION
Security features provided by Router are.
THANK YOU