+ All Categories
Home > Documents > Final Report of Networking Mcitp & Ccna

Final Report of Networking Mcitp & Ccna

Date post: 14-Apr-2018
Category:
Upload: lovely-saini
View: 236 times
Download: 0 times
Share this document with a friend

of 131

Transcript
  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    1/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    2/131

    ACKNOWLEDGEMENT

    I feel deeply indedted to Mr. Baljit Singh, Microsoft trainer who delivered valuable

    lesson on MCSE, his indepth knowledge about the subject helped me understand the

    subject in better way. His method of teaching the minute details helped me a lot to

    acquire the insight into the subject.

    I am also grateful to Mr. Inder Gulati, CCNA trainer for giving best knowledge about

    CCNA.the way he instilled knowledge of the subject was undoubtly praise worthy and

    valuable.

    I am also thankful to Jetking institution as a whole that is doing yeomans service by

    teaching the learner avreast with the computer , networking and hardware knowledge that

    is the need of the day.

    I will be failing in my duty if I do not acknowledge my husband Mr. Nardev Singh Rana

    who always stood by my side during my studies. I am indepted to my sons Anirudh

    Rana and Romil Rana who never clamed my time and get bore by my long absence rather

    silent.

    Last but not the least, I thank all my classmates at Jetking for extending kind

    co-operation.

    SAROJ DOGRA

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    3/131

    List of Figures

    Figure No. Name of Figure Page No.

    1 Computer network 6

    2 Local Area Nework 9

    3 LAN Classification 9

    4 Campus Area Network 10

    5 Metropolitan Area Network 11

    6 To find location of a computer using FQDN 24

    7 Tree structure 25

    8 Structure of domain forest and domain tree 36

    9 Multi-Master Mode 37

    10 Parent child relationship model 40

    11 Direct Sharing Scenario 43

    12 ICS scenario 44

    13 Scenario of win proxy server 45

    14 NAT Server 4615 VPN server 48

    16 LAN routing 52

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    4/131

    17 Static routing 53

    18 Architecture of router 60

    19 Variable Subnet Mask 7520 Scenario of Telnet 76

    21 Scenario of Static Routing 81

    22 Routing table 86

    23 Routing table of covered networks 86

    24 Routing loops 87

    25 OSPF Scenario 99

    26 VLAN Operation105

    27 VTP Configuration 110

    28 VTP Pruning 111

    29 IEEE 802.11 Standar d 114

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    5/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    6/131

    CONTENTS

    Sr. No. Topic Page No.

    1 INTRODUCTION 11.1 Company Profile 1

    2 LITERATURE RIEVIEW 53 NETWORKING 6

    3.1 Introduction to networking 6

    3.1.1 Models of Networking 63.1.2 Categories of network 8

    3.2 IP ADDRESSES and MAC Addresses 12

    3.2.1 IPAddressClasses 12

    3.2.2 MAC Addressing 15

    3.3 NETWORKING MEDIA 15

    3.3.1 Ethernet Cabling 17

    3.4 OPERATING SYSTEM 20

    3.4.1 Types of Operating Systems 20

    3.5 DNS SERVER 22

    3.5.1 PARTS OF DNS SYSTEM 23

    3.5.2 DNS Zone 26

    3.6 DHCP SERVER 28

    3.6.1 Working of DHCP Server 29

    3.6.2 InstallationStepsofDHCPServer 31

    3.7 ACTIVE DIRECTORY 33

    3.7.1ActiveDirectoryServices 34

    3.7.2 CHILD DOMAIN 40

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    7/131

    3.8 INTERNET SHAREING 42

    3.8.1 Direct Sharing 42

    3.8.2 ICS (Internet Connection Sharing) 43

    3.8.3 Win Proxy Server 45

    3.8.4 NAT (Network Address Translation) 45

    3.9 VIRTUAL PRIVATE NETWORK (VPN) 47

    3.9.1 VPN components 48

    3.9.2 Types of VPN 49

    3.10 ROUTING 51

    3.10.1 Types of Routing 51

    3.11 EXCHANGE SERVER 56

    3.11.1 Elements of Exchange Server 56

    3.11.2 Exchange Version 56

    3.11.3 Requirements for Exchange Server 57

    3.12 Open System Interconnection (OSI) Model 57

    3.12.1 Description of Different Layers 58

    3.13 ROUTERS 60

    3.13.1 Router Architecture and its Key Component 60

    3.13.2 Router Interfaces & Ports 62 3.13.3 Modes of Router 63

    3.13.4 Configuring Password 65

    3.13.5 Managing Configuration 66

    3.14 SUBNETTING 70

    3.14.1 Advantages of subnetting 70

    3.14.2 Types of Subnetting 73

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    8/131

    3.15 TELNET 75

    3.15.1 To Access the Device Remotely 75

    3.15.2 Commands to assign IP addresses to the interfaces 76

    3.16 ROUTING 79

    3.16.1 TYPES OF ROUTING 79

    3.16.2 Routing Protocol Basics 84

    3.1.3 R IP (Routing Information Protocol) 88

    3.1.4 IGRP ( Interior Gateway Protocol) 91

    3.1.5 EIGRP(Enhanced Interior Routing Protocol) 93

    3.1.6 OSPF (Open Shortest Path First) 95

    3.17 LAN SWITCHING 100

    3.17.1 SWITCH 100

    3.17.1.1 VLAN (Virtual LAN) 103

    3.17.1.2 Vlan Trunking Protocol (VTP) 108

    3.18 Wi-Fi (WIRELESS FIDELITY) 113

    3.18.1 Wireless LAN 113

    3.18.2 Wireless Standards 114

    3.18.3 Wireless Security 115

    4 CONCLUSION 117

    5 REFRENCES 118

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    9/131

    1. INTRODUCTION

    This project report pertains to six months industrial training that I had underwent

    at JETKING, Chandigarh as part of curriculum of degree in Bachelor of technology in

    Electronics and Communication engineering as required by Swami Parmanand College of

    engineering and technology (affiliated to Punjab Technical University, Jalandhar) .

    I learnt a lot from professional managers and skilled engineers. I had a great

    learning experience as trainee in this firm. I learnt a lot about how different networks are

    controlled in the industry or any department with the help of networking processes, under

    MCSE and CCNA.I have learnt about different type of servers like DHCP Server, DNS Server, NAT

    Server. Also I have learnt how to control the LAN and MAN networks under MCSE

    (Microsoft Certified System Engineers) and how to control MAN and WAN networks

    under CCNA (CISCO Certified System Engineers).

    Justification cannot be done to whatever I have learnt in these six months within a

    few pages but I have still tried my best to cover as much as possible in this report. In this

    report I have tried to sum up the technical knowledge I have gained in my six months of

    training.

    1.1 Company Profile

    Jetking is an organization came into establishment in1947. Jetking is Indias

    number one Computer Hardware and Networking Institute.

    Birth and Evolution

    It took a lot of failure before mankind tasted technological success. Jetking evolved in

    tune with the changing face of technology. During 55 years in the field of electronic

    technology. Jetking successfully trained thousands of students to overcome failure for

    high paying careers.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    10/131

    1947 Birth

    1962 Pioneered Do-It-Yourself Kits in India

    1972 Introduced Asia- 72, Fairchild and Wildcat transistors

    1986 Became a Public Limited Company and also introduced

    entertainment electronics product-T.V sets, Two-in-ones and

    amplifiers.

    1990 Launched Jetking School of Electronics Technology

    1993 Network of Jetking training centers spread all over India

    1994 Opening of Jetking, Chandigarh

    1995 Tie-up with Heath kit Educational System (U.S.A.)

    1996 Introduced advanced courses on Pentium, Notebooks, Modems,

    Email/Internet, LAN 4.X

    1997 Novell Education Academic Partner

    1998 Representative for International Correspondence School (ICS),

    USA in India

    1999 Added cyber technology to the curriculum

    2008 ISO 9001-2000 company and Authorized Microsoft online testing

    centre (VUE) for MS, CISCO, MCSA, MCSE, CCNA, A+ etc.

    Mr. Suresh G. Bharwani is the CHAIRMAN and MANAGING Director of

    Jetking Infotrain Ltd. Indias leading Computer Hardware and Networking Institute. With

    the vision to promote and the conviction to deliver the widespread propagation of comp-

    uter hardware and networking education across the nation, Mr. Bharwani was the first to

    set up an training institute offering innovative courses in computer hardware in 1990.

    Jetkings core competency lies in providing complete training and developing hardware

    engineers and professionals with sound technical knowledge. It focuses on the overall

    development of personality of an individual with emphasis on personality development,

    presentation and communication skills, leadership skills etc.

    Jetking has established more than 125 operational centers and 250 faculties across

    the country and has trained over 3,50,000 students who have move onto the crave

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    11/131

    success- full career. With its alumni placed in the best of organizations in India and some

    abroad,

    Jetking,s vocational training and placement promises has helped build the career

    prospects of many young boys and girls.

    The company has been awarded the ISO 9000:2000 certification in 2008.The

    company has been awarded the Maharashtra IT Award for a key role in manpower

    activities in year 2006-07,it was felicitated with Franchise Award as Best Franchisor for

    the year 2007-08.Also,ranked 4th in the list of 26th hot franchises as per outlook money

    magazine.

    Mr. Suresh Bharwani was awarded with Pikes Peak Award by the Bob Pike

    Group USA for effective implementing smart lab plus for making technical training fun,

    faster and easier for non- technical person.

    Across all the sectors, industries are upgrading their information technology

    system. Industries ranging from plastics, chemicals, textiles and power to the automotive

    and telecom sector are now IT savy. Government and public sectors are going hi-tech

    with EDI and computer networks. The IT industry, software companies, data centers, IT-

    enabled services providers are all equipped with advance IT system and networks. The

    increasing number of call centers, BPOs etc., have given a further boost to the hardware

    and networking industry.

    The courses in jetking comprises lecture and theory session, with a great focus on

    active participation through smart lab plus ,that focuses on audio visual and learning with

    hands-on training and equips students with an in depth domain knowledge that is

    technical; it also equips students with soft skills ,to face the multi-faceted challenges of

    corporate world.

    PLACEMENT: Jetking is the first and only institute that promises the 100%

    jobs guarantee to its students. The companies that have recruited jetkings students

    include:

    Samsung, Sun Micro system, IBM, Canon, Siement, reliance, TATA, Compaq HP

    invent, IT-T solutions, Videsh Sanchar Nigam Limited, D-Link, Novell, Dell, Wipro, LG,

    ICIC Infotech and several other MNCs.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    12/131

    Any student who has qualified his or her HSC/SSC examination is eligible to take

    up a course at jetking. The one year program Jetking certified hardware and networking

    professionals give 680 hours of in-depth knowledge to a student in Basic electronics and

    computer applications. Computer hardware and peripherals, window 2008 administrator

    and network administrator (soon it will be replaced with window server 2008).Apart

    frame technical knowledge there are personality development sessions which groom the

    students personality, their ability to perform better.

    Jetking, Indias leading hardware and networking training institute has trained

    over 3,00,000 students from its 125 centers spread across India. With its alumni placed in

    the best of organizations in India and some abroad, Jetking vocational training and

    placement promises has helped build the career prospects of many young boys and girls.

    Jetking has partnered with some of the worlds most renowed names in networking

    to provide you with cutting edge courses and technologies. With academic partnerships

    with Microsoft, Comp TIA,LINUX, NOVELL, and person VUE .

    Jetking Chandigarh is a division of Hi-Tech point. Hi-Tech point is an ISO 9001-

    2000 IT company. It was established in year 1993 and run by a company of IT

    professionals. Jetking Chandigarh branch is considered to be the best centre among all

    centers. It has bagged number 1 center award consecutively for last 7 years. Here training

    on various fields is going on like Basic Electronic, Hardware, Networking, JCHNP

    Analog and Digital electronics and Hardware, RHCE, RHCSS, MNA, MCSE (Microsoft

    System Engineers), MCITP, MNA, CCNA (CISCO Certified Network Associate),

    CCNP(CISCO Certified Network Professional).

    Partnership with industry leaders like Microsoft and Red Hat Jetking ensure its

    students authentic courseware and technology.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    13/131

    2. LITERATURE RIEVIEW

    Computer Networking is a very vast project in the present developing era of electronics

    and communication. Now a days, computers are used in a wider range. All the

    organizations are using multiple computers within their departments to perform their day

    to day work. Computer network allows the user to share data , share folders and files with

    other users connected in a network. Computer Networking has bound the world in a very

    small area with it wide networking processes like LAN, MAN, WAN.

    The courses in jetking comprises lecture and theory session, with a great focus on active

    participation through smart lab plus ,that focuses on audio visual and learning with

    hands-on training and equips students with an in depth domain knowledge that is

    technical; it also equips students with soft skills ,to face the multi-faceted challenges of

    corporate world.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    14/131

    3. NETWORKING

    3.1 Introduction to networking

    Networking is a practice of linking of two or more computing devices such as

    PCs, printers, faxes etc., with each other Connection between two devices is through

    physical media or logical media to share information, data and resources. Networks are

    made with the hardware and software.

    Cable/media

    Fig 1: computer network

    3.1.1 Models of Networking

    Model means the connectivity of two computers. We have many types of

    networking models.

    (i) Client Server Model

    (ii) Peer to Peer Model (Workgroup Model)

    (iii) Domain Model

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    15/131

    (i) Client Server Model

    In a Client server model we have one server and many clients. A Client can share

    the resources of server, but a server cannot share the resources on clients.

    On the point of view of administrator its very easy to control the network

    because we combine with the server also at security point of view. It is very useful

    because it uses user level security in which users have to remember only one password to

    share the resources.

    (ii) Peer to Peer Model (Workgroup Model)

    In Peer to Peer networking model all computers are in equal status, that is we

    cannot manage centralization, administration secutity. In Peer to Perr networking client

    use operating system like Window 98, Window XP, Window 2000, Window Vista.

    (iii) Domain Model

    It is a mixture of client server and peer-to-peer model. In this clients can share

    their resources as peer-to-peer but with the permission of the server as in client server

    model therefore it is commonly used model because in this security is more as we can put

    restriction on both server and clients.

    Difference between Workgroup & Domain

    Table 1

    Workgroup Domain

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    16/131

    1. It is a peer to peer networking model.

    2. There is no client and no server. All the

    computers are in equal status.

    3. This model is recommended for small

    networks, upto 10 computers.

    4. There is no centralized administrated

    separately.

    5. In this model, low grade OS like

    2000/XP professional, WIN 98 etc. can be

    used.

    6. Users accounts are created in each PC

    and are called as Local Users.

    1. It is a server based networking model.

    2. There is a centralized dedicated server

    computer called domain controller which

    controls all other computers called clients.

    3. This model is recommended for large

    networks.

    4. There is centralized administration and

    each PC can be administrated and managed

    from the server.

    5. in this model high grade OS like WIN

    2000/2008 Server can be used.

    6. Users accounts are created on the server

    side and are called Domain Users.

    3.1.2 Categories of network

    Networks can be categorized as per geographical area to be covered by the

    network. Computer network are divided into four categories includes: Local Area

    Network (LAN), Campus Area Network (CAN), Metropolitan Area Network (MAN) and

    Wide Area Network (WAN).

    3.1.2.1 Local Area Network (LAN)

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    17/131

    LAN is a computer network that is used to connect computers and work station to

    share data and resources such as printers or faxes. LAN is restricted to a small

    area such as home, office or college. Devices used in LAN are : HUB and switch.

    Media for LAN is UTP cables. Figure 1.2 shows how all work stations, server and

    printer are interconnected with the help of the network device.

    Fig 2: Local Area Network

    Types of LAN

    In LANs, data can be transferred using techniques like token passing. As per

    techniques used for data sharing, LANS are classified into Ethernet, Token Bus, Token

    Ring and Fiber Distributed Data Interface (FDDI).Figure 3.3 shows LAN classification.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    18/131

    Fig 3: LAN classification

    Advantages of LAN

    a). Provides communication in smaller networks, easy to install and configure.

    b). many users can share data or network elements at the same time which results

    in fast work.

    Disadvantages of LAN

    a). limited number of computers are connected in a LAN.

    b). LAN cannot cover large area.

    c). Network performance degrades as the number of users exceeds.

    3.1.2.2 Campus Area Network (CAN)

    Campus Area Network is a computer network made up of two or more LANs

    within a limited area. It can cover many buildings in an area. The main feature of

    CAN is that all of the computers which are connected together have some

    relationship to each other e.g. different buildings in a campus can be connected

    using different CAN. It will help to interconnect academic departments, library

    and computer laboratories. CAN is larger than LAN but smaller than WAN.

    Figure 3.4 shows a CAN network.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    19/131

    Fig 4: Campus Area Network

    Devices used in CAN are : HUB, Switch, Layer-3 switch, Access Point .And the media

    used for CAN is Unshielded twisted pair of cables and Fiber Optics Cable.

    3.1.2.3 Metropolitan Area Network (MAN)

    MAN is the interconnection of networks in a city. MAN is not owned by a single

    organization. It act as a high speed network to allow sharing resources with in a

    city. MAN can also be formed by connecting remote LANs through telephone

    lines or radio links. MAN supports data and voice transmission. The best example

    of MAN is cable T.V network in a city.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    20/131

    Fig 5 : Metropolitan Area Network

    3.1.2.4 Wide Area Network (WAN)

    WAN covers a wide geographical area which include multiple computers or

    LANs. It connects computer networks through public networks like, telephone system,

    microwave, satellite link or leased line.

    Most of the WANs use leased lines for internet access as they provide faster data transfer.

    WAN helps an organization to establish network between all its departments and offices

    located in the same or different cities. It also enables communication between the

    organization and rest world.

    Devices used in WAN is only Router

    3.2 IP ADDRESSES and MAC Addresses

    It is also called as logical addresses. IP is a 32 bit long and it is divided into 4

    octets and dot (.) is used to separate one octet from another. It is represented in the

    form of decimals. There are two versions of IP addresses:

    - IPv4

    - IPv6

    Table 2 Comparison between IPv4 and IPv6

    IPv4 IPv6

    - It is 32 bit long.

    - It is divided into 4 octets.

    - Ipv4 performs broadcasting,

    multicasting and unicasting.- IPv4 is divided into 5 classes:

    A to E.

    IPv4 is in decimal form.

    - It is 128 bit long.

    - It is divided into 16 octets.

    - IPv6 doesnt support

    broadcasting, it performsmulticasting and unicasting.

    - Ipv6 doesnt support classes.

    - IPv6 is in hexadecimal form.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    21/131

    3.2.1 IP Address Classes

    IP address is a 32 bit address. It is divided into various classes namely Class A, Class

    B, Class C, Class D and Class E. TCP/IP defines Class D for experimental purpose.

    TCP /IP address contains two addresses embedded within one IP address; Network

    address and host address as shown in figure 3.1

    NETWORK

    ADDRESS

    HOST ADDRESS

    0 bits 31 bits

    Class A consists of 8-bit network ID and 24-bit host ID. Class B consists of 16-

    bit network ID and 16-bit of host ID. And Class C consists of 24-bit of network

    ID and 8-bit of host ID.

    Address Classes

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    22/131

    Table 3: Address Classes

    `

    Addres

    s

    Class

    Starting

    Bits

    (first-byte)

    Range of First

    Octet

    Mask Value Valid Hosts

    Class A 0 1to 127 255.0.0.0 256*256*256-2=

    16,777,214

    Class B 10 128 to 191 255.255.0.0 256*256-2=65,534

    Class C 110 192 to 223 255.255.255.0 256-2

    Class D 1110 224 to 239 Reserved for multicasting

    Class E 1111 240 to 255 Reserved for research and

    development

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    23/131

    3.2.1.1 How to Assign IP Address to Computer

    An IP address assigned to a computer may either be permanent address or address

    that is assigned to a computer on a time lease or for temporary basis. Hence, the address

    granted to computers is divided into two categories Dynamic IP addresses and Static

    addresses.

    Dynamic IP Addresses

    Dynamic IP addresses are assigned to the devices that require temporary

    connectivity to the network or non-permanent devices such as portable computer. The

    most common protocol used for assigning Dynamic IP address is DHCP also called

    Dynamic Host Configuration Protocol. The DHCP grants IP address to the computer on

    lease basis.

    Static IP Addresses

    Static IP addresses are assigned to the device on the network whose existence in

    the network remains for a longer duration. These static IP addresses are semi-permanent

    IP addresses which remain allocated to a specific device for longer time e.g. Server.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    24/131

    3.2.1.2 How to Configure IP Address in window 2008

    Right click on My Network Places- properties

    right click on working LAN card- properties

    select internet protocol (TCP/IP) -properties

    Tick on- Use the following IP addresses - now fill the IP address e.g

    10.0.0.1

    Tick on Use the following DNS server address

    Fill the preferred DNS server 10.0.0.1

    Ok

    Close

    Now check the connectivity of computer with itself with command

    Start-run-cmd-ping 10.0.0.1

    3.2.2 MAC Addressing

    MAC address is a hardware address that is embedded in the NIC card. It is also known

    as hardware address or physical address. Every NIC card has a unique MAC address

    assigned by IEEE. MAC address is used to identify the nodes at lower levels of OSI

    model. The MAC address operates at the data link layer of the OSI model.

    MAC address is a 12 digit hexadecimal number (48 bit address). It is made up of

    numbers from 0-9 or a letter from A-F. MAC address can be written in any one of the

    formats:

    MM:MM:MM:SS:SS:SS

    MM:MM:MM:SS:SS:SS

    T o identify the MAC address in window:

    ClickStart Run

    Entercmd in the Open text book

    Type ipconfig /all

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    25/131

    Press Enter

    The 12 digit MAC address will be shown as say 00:11:11:EA:8D:F6

    3.3 NETWORKING MEDIA

    To do networking we need to use some type of media. There are many types of media.

    (i) Coaxial Cable

    (ii) Fiber optic cable

    (iii) Twisted Pair of Cables

    (iv) Micro- wave

    (iv) Satellite

    Coaxial Cable

    Coaxial cable consists of an insulated copper conductor surrounded by a tube

    shaped copper braid outer copper tune and the inner conductor have the same axis of

    curvature hence it called coaxial cable. It is basically of two types:

    (i) Base Band Cable (RG 59)

    (ii) Broad Band Cable (RG 58)

    We used Base Band signal cable in Networking of Computers, It is so called because

    it carries single frequency. Its speed is 10 Mbps and impedance is 50 . Where as Broad

    Band Cables carries multiple frequencies. Connector used for Coaxial cable is

    BNC(British Novel Connector) connector. ARCnet uses RG-62 coaxial cable. It has animpedance of 93 and has a comparatively lesser attenuation, hence yield greater

    distances. These cables are expensive and provide high propagation factor.

    Fiber Optical Cable

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    26/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    27/131

    CAT-1

    CAT-2

    CAT-3CAT-4

    CAT-5

    CAT-6

    CAT-7

    56 Kbps

    4 Mbps

    10 Mbps

    16-20 Mbps

    100 Mbps

    1Gbps

    1Gbps

    3.3.1 Ethernet Cabling

    There are three types of Ethernet cables:

    Straight cable

    Crossover cable

    Rolled cable

    3.3.1.1 Straight cable

    It is used when we have to connect

    PC TO Switch

    PC to Hub

    Hub to Router

    Switch to Router

    Colour Coding for straight Cable

    TABLE 5

    568A 568B

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    28/131

    (one end) (other end) (one end) (other end)

    Green/white

    Green

    Orange/white

    Blue

    Blue/white

    Orange

    Brown/white

    Brown

    Green/white

    Green

    Orange/white

    Blue

    Blue/white

    Orange

    Brown/white

    Brown

    Orange/white

    Orange

    Green/white

    Blue

    Blue/white

    Green

    Brown/white

    Brown

    Orange/white

    Orange

    Green/white

    Blue

    Blue/white

    Green

    Brown/white

    Brown

    3.3.1.2 Crossover Cable

    It is used when we have to connect:

    PC to PC

    Hub to Hub

    Switch to switch Router to Router

    PC to Router

    Hub to Switch

    Colour Coding for Crossover cable

    Table 6 Colour Coding for Crossover cable

    (one end) (other end)

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    29/131

    Orange/white

    Orange

    Green/white

    Blue

    Blue/white

    Green

    Brown/white

    Brown

    Green/white

    Green

    Orange/white

    Blue

    Blue/white

    Green

    Brown/white

    Brown

    3.3.1.3 Rollover CableRollover cable isnt used to connect any Ethernet connections together, but

    Rollover cable can be used to connect a host to a router console serial communication

    (com) port.

    NOTE: Straight cable and Cross cables are used for data transfer but Rollover

    cables are not used for data transfer.

    There are two methods for manufacturing Rollover cables:

    Table 7 Colour Coding for Rollover Cable

    568A

    (one end) (other end)

    568B

    (one end) (other end)

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    30/131

    Green/white

    Green

    Orange/white

    Blue

    Blue/white

    Orange

    Brown/white

    Brown

    Brown

    Brown/white

    Orange

    Blue/white

    Blue

    Orange/white

    Green

    Green/white

    Orange/white

    Orange

    Green/white

    Blue

    Blue/white

    Green

    Brown/white

    Brown

    Brown

    Brown/white

    Green

    Blue/white

    Blue

    Green/white

    Orange

    Orange/white

    3.4 OPERATING SYSTEM

    3.4.1 Types of Operating Systems

    (i) DOS (Desktop Operating System) (ii) NOS (Network Operating System)

    Table 8: Operating Systems

    DOS

    1. It is a desktop operating system.

    2. It is used in small networks.

    3. In this OS, there is less security.

    4. In this OS, all computers are clients.

    5. In this OS, MS-DOS, GUI package

    Win

    3.1, Win 95, Win 98, Win ME comes.

    NOS

    1. It is a network operating system.

    2. It is used for large networks.

    3. In this OS, there is more security.

    4. In this OS, there are servers and

    clients.

    5. In this OS Win NT, Win 2000, Win

    2008, LINUX, UNIX, Novell and

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    31/131

    MAC comes.

    3.4.1.1 Introduction to Window 2008 Server

    Window server 2008 (also referred to as WIN 2k3) is a server operating system produced

    by Microsoft. Introduced in 24 th April 2008 as the successor to window 2000 server, it is

    considered by Microsoft to be the corner stone of its window server system line of

    business server products. An update version Window Server 2008 R2 was released

    manufacturing on 6th dec, 2005. its successor window 2008 was released on 4 th feb, 2008.

    According to Microsoft, window server 2008 is more scalable and deliver betterperformance than its predecessor window 2000.

    Features of Window 2008

    (i) A significant improved version of Internet Information Service (IIS)

    (ii) Increased default security over previous version due to the built in firewall

    and having most services disabled by default.

    (iii) Manage your server-a role management administrative tools that allow an

    administrator to choose what functionality the server should provide.

    (iv) Improvement to Active Directory.

    (v) Improvement to Group Policy handling and Administration.

    (vi) Provides a Backup system to restore lost files.

    (vii) Improved disk management, including the ability to Backup from shadows of

    files, allowing the Backup of open files.

    (viii) Improved security and command line tools which are part of Microsoft

    initiative to bring a complete command shell to the next version of window.

    (ix) Support for a hard based Watch Dog Timer, which can restart the server if

    the operating system does not suspend with in a certain amount of time.

    Removed Features

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    32/131

    The ability of creating server disk automated system recovery (ASR) is used

    instead .

    Edition of Window 2008

    Window server 2008 comes in a number of editions, each targeted towards a

    particular size and type of business. In general, all variant of window server 2008

    have the ability to share files and printers, act as application server and host

    message queue, provide email services, authenticate users, act as an X.509

    certificate server, provide LDAP (Light Weight Directory Access Protocol)

    services, serve streaming media, and to perform other server-oriented functions.

    3.5 DNS SERVER

    DNS stands for domain name system. DNS system is a standard technology

    for managing the names of websites and other internet domains. DNS techniques allows

    you to type names into your web browser like computer networking, about computer and

    allow your computer to automatically find that address on internet. DNS is the resolution

    mechanism used by Window Server 2008clients to find other computers and services

    running on those computers for computers in a window 2008 network infrastructure to

    talk to one another, one of the key ingredients is the DNS server .Host name alone do not

    communicate globally but communicate locally, but if domain name is added along with

    it then the host name can communicate globally. DNS is use for name reservation i.e. to

    convert IP address to host name and host name to IP address or the function of DNS is to

    resolve host name such as www.yahoo.com to an IP address. User identify only user

    friendly name and all computers and technologies identify IP address and MAC address

    DNS is use to solve this problem because DNS is used to convert host name FQDN (fullyqualified domain name) to IP address and IP address to host name .

    http://www.yahoo.com/http://www.yahoo.com/
  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    33/131

    3.5.1 PARTS OF DNS SYSTEM

    (i) Host name

    (ii) Domain name

    (iii) FQDN

    (iv) Namespace

    (v) DNS server

    3.5.1.1 HOST NAME

    Host name is a computer name and is also called is NetBIOS (network basic

    Input/ output system) name. NetBIOS is actually an application layer protocol that can

    use the transport services of TCP/ IP when used in routed network. A NetBIOS name is

    16- byte addresses that identify a NetBIOS resource on the network.

    3.5.1.2 DOMAIN NAMEDomain name is used to identifies the internet site one can identifies the location

    without having to remember the IP address of every location e.g. yahoo.com or

    gmail.com

    3.5.1.3 FQD

    FQDN means fully qualified domain name which represents a hostname appended to the

    parent name space in hierarchy. Also in fully qualified domain name different levels of

    namespace are visualize as in fig below this hierarchy is visualized the root level

    namespace, top level domain, and so on, in use throughout the internet today. Left most

    portion of the FQDN is the host portion of the name. A host name is alias we give to an

    IP address.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    34/131

    Fig 6:To find location of a computer using FQDN

    FQDN is a unique name in the computer on the network. We can identify host id and

    location of a computer as in fig above. Suppose we want to find location of pc1 with

    IP address 20.0.0.1, which is in lab2, 2nd floor in the organization center. The FQDN

    for this is

    Pc1.row3.lab2.floor2.center.com

    But this address is very lengthy to locate pc1 so to simplify this we use c name

    technique as:

    Pc1.center.com=20.0.0 .1

    3.5.1.4 Domain Namespace

    DNS operates in what is known as DNS namespace. The DNS namespace is an

    organized, hierarchical division of DNS names. Domain namespace enable users to easily

    locate the network services and resources. The domain namespace include the root

    domain, the top level domain of the organization and organize these domain in a

    hierarchical tree structure. Namespace works on the hierarchical tree structure of root

    domain. There are total 13 root domain working in the internet, they are A, B, C, D, E, F,

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    35/131

    G, H, I, J, K, L and M. There is one root domain, which acts as the starting point of the

    fully qualified domain names. This root domain is designated with a dot (.). Fig 6.2

    shows the tree structure or domain namespace.

    Fig 7: Tree structure or Domain Namespace

    3.5.1.5 DNS server

    Any computer providing domain namespace is a DNS server. DNS server is used to

    convert host name FQDN into IP address and IP address into host name FQDN. To store

    the name-to-IP-addresses mappings so crucial to network communication, name server

    uses zone files.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    36/131

    3.5.2 DNS Zone

    Zone is the part of DNS database that contain record of domain or multiple domain.

    If the domains represents logical division of the DNS namespace, zones represents the

    physical separation of the DNS namespace. In other words information about records of

    the resources within DNS domain is stored in a zone files, and this zone files exist on

    hard drive of server. Zone files are divided into one of two basic types:

    Forward lookup zone: Provides host-name-to-IP-address resolution

    Reverse lookup zone: Provides IP-address-to-host-name resolution

    3.5.2.1 Resource record stored in a zone fileEach record stored in a zone file has a specific purpose. Some of the records set the

    behavior of the name server, others have the job of resolving a host name or service into

    an IP table.

    (i) NS (Name Server):

    These specify the name servers that are authoritative for a given portion

    of DNS namespace. These records are essential when DNS servers are performing

    iterative queries to perform name resolution.

    (ii) SOA (Start of Authority):

    This resource record indicates the name of origin for the zone contains the name

    of the server that is the primary source for information about the zone. The information in

    an SOA record affect how often transfer of the zone are done between servers

    authoritative for the zone. It is also used to store other properties such as version

    information and timings that affect zone renewal or expiration.

    (iii) CNAME (Canonical Name):

    CNAME can be used to assign multiple names of a single IP address.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    37/131

    For example, the server hosting the site www.abc.comis probably not named www, but a

    CNAME record exist resolution of www to an IP address all the same. The CNAME

    record actually points not to an IP address, but to an existing A record in the zone.

    3.5.2.2 Steps to Install and configure DNS server

    Start control panel add and remove program

    Add remove window components

    Select networking services and click on detail button

    Check box ofDNS server

    Okand finish

    3.5.2.3 Creating a Forward Lookup Zone

    Statically fill the IP address

    Start administrator tools

    DNS right click on forward lookup zone

    New zone next

    Select primary zone next

    Enterzone name (abc.com) next

    Tick Allow both secure and non secure updates and secure dynamic

    updated

    next next

    now click on created zone (abc.com)

    new host enter host name for global level (i.e by entering www) fill IP

    address of the web server , click on addbutton

    enter another host name, a blank host with same IP i.e do not fill its host name

    steps to change SOA and NS records

    Right click on SOA records properties

    Fill primary server e.g (www.abc.com) responsible person

    http://www.abc.com/http://www.abc.com/http://www.abc.com/
  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    38/131

    host master.abc.com apply ok

    right click on NS records

    click on add button enter FQDN www.abc.com

    resolve ok apply ok

    Now go to start menu ping abc.com

    On Client Side To access DNS server fill IP address of server then use ping command

    e.g ping www.abc.com

    3.5.2.3 Creating a Reverse Lookup Zone

    Right click on reverse lookup zone

    New zone next select primary zone next

    fill Network ID next next

    Select allow both non secure and non secure dynamic updates

    Finish

    Right click on created reverse zone new pointer

    enterhost IP number e.g (50.0.0.50)

    enterFQDN (www.chd.com)

    3.5.2.4 Some DNS Commands

    (i) c:>tracert www.yahoo.com

    command is used to check the path , a data packet follow from one router

    to another router.

    (ii) c:>nslookup

    command display the domain name with IP (works only when reverse lookup

    zone is set up).

    (iv) c:>ipconfig /all

    This command display FQDN, IP address, MAC address.

    (iv) c:>ipconfig /flushdns

    http://www.abc.com/http://www.abc.com/http://www.yahoo.com/http://www.abc.com/http://www.abc.com/http://www.yahoo.com/
  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    39/131

    This command flush or clear all the information in the cache that is retrieved

    from DNS server.

    (v) c:>ipconfig /displaydns

    Display the current contents or entries in the cache.

    (vi) c:>ip config /register

    register any DNS name

    3.6 DHCP SERVER

    DHCP (Dynamic Host Configuration Protocol) is a protocol that allocates IP address to

    computer on a network. DHCP centralized the management of IP address allocation and

    reduces human error associated with manual IP configuration. DHCP server supplies all

    the necessary networking param-eters. Two things are always handed out as a part of

    DHCP configuration: IP address and subnet mask. Further DHCP will frequently

    configure clients with optional values, such as a default gateway, DNS server address,

    and the address of a Window Internet Naming Server, if one is present. Scenario showing

    DHCP server IP address allocation.

    3.6.1 Working of DHCP Server

    (i) DHCP Scope

    (ii) DHCP Super Scope

    (iii) Exclusion IP Range

    (iv) DHCP Lease Time

    (v) IP Reservation

    DHCP Scope

    Scope having the range of IP address for providing dynamic IP address to other

    computer. A group of IP address within a scope is called as DHCP scope.

    DHCP Super Scope

    A super scope is used to combine two or more scopes each serving different subnets, and

    can make the administration of several scopes on window 2008 DHCP server more

    manageable. Using super scope you can group multiple scopes as a single administrative

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    40/131

    entity that allows the client to lease from either one. With this feature, a DHCP server

    can:

    Support DHCP clients on a single physical network segment where multiple

    logical IP networks are used. When more than one logical IP network is used on

    each physical subnet or network, such configuration is called multinets.

    Support DHCP clients located on the far side of DHCP and BOOTP relay agent.

    In multinet configuration, DHCP superscope can be used to group and activate

    individual scope ranges of IP addresses used on your network. In this way , a

    DHCP server computer can activate and provide leases from more than one scope

    to clients on a single physical network.

    Exclusion IP range

    If you want to reserve some IP for any computer i.e if we want that from the series of

    192.168.0.2 to 192.168.0.100 if we want that a series of IP addresses must not be

    assigned automatically then at can be done using exclusive IP range.

    DHCP Leased Time

    DHCP lease time is validity of IP address. By default DHCP lease time is 8 days

    minimum,1 day maximum 999 days, 23 hours to53 day.

    With in 8 days:-

    After 80% of day clients demand new IP some times server refuse the client request.

    After 87.5% of days it will retry, and if the server did not give the new IP address then

    the client will receive APIPA address (Automatic Private IP Address).

    When a DHCP client is unable to locate a DHCP server, the client picks out a random IP

    address from the private APIPA address range of 169.254.*.*, with a subnet mask of

    255.255.0.0. The 169.254.*.* IP range is private because that network number is not in

    use on the internet, it is random because the client generates an arbitrary host number for

    that network.

    The significance of APIPA is that DHCP client computers that cannot find a

    DHCP server can still be assigned an IP address and communicate with other computers

    on the same subnet mask that also cannot find DHCP server. It allows communication

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    41/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    42/131

    After DHCP server is configured, it is required to be authorized and DHCP scope

    should be active. For that select DHCP server and click on authorize in action menu.

    Then right click on scope name and click on active.

    3.6.2.2 On Client Side

    Go to LAN card properties select TCP/IP protocol properties

    Select obtain IP address automatically

    Go to command prompt (cmd)

    Give command

    3.6.2.3 Backup of DHCP Server

    We can take backup of all the configuration in DHCP server with the help of

    administrator. Backup means to export the DHCP database to another system, as it is

    helpful in case due to any reason our data is corrupted or deleted, we can take our

    database from the place where it is stored. Steps of taking backup :

    Stop the DHCP server and disable the DHCP server services

    Copy the DHCP server directory to a temporary location, say pen drive or

    on a new DHCP server.

    3.6.3 DHCP Relay Agent

    The DHCP relay agent is a software that listen DHCP discover packet and forward to

    DHCP server. In window 2008 server system the DHCP relay agent can be enabled as a

    part of Routing and Remote Access (RRAS).

    3.6.3.1 Steps To Configure DHCP Relay Agent

    Set the network, fill the IP address and select two LAN cards

    Open Routing and Remote Access enable Routing and Remote Access

    Right click on general new routing protocols

    Select DHCP relay agent

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    43/131

    New interface

    Select LAN card which is to be connected to the cross cable i.e L1

    Ok

    Right click on relay agent properties

    Enter IP address of DHCP server

    add apply ok

    3.7 ACTIVE DIRECTORY

    With the release of Windows 2000, Microsoft introduced Active Directory, a scalable,

    robust directory service. Active Directory is used to create server based networking.

    Active Directorys job is to store and make available a Directory database i.e information

    about the user, its class, name, address, mails, phone numbers, location.

    Active Directory is a technology created by Microsoft that provides a variety of

    network services like Directory Services, DNS based naming and other network

    information. Active Directory also allows administrator to assign policies, deploy

    software and apply critical updates to an organizations. Active Directory was previewed

    in 1999, released first with window 2000 server edition and revised to extend functionally

    and improve administration in Window 2008. Additional improvements were made inWindow server 2008 and Window server 2008.

    The fundamental building block of Microsofts Directory services continues to be a

    domain. A domain is logically grouping of network resources, including shares, printers,

    groups and users accounts. The user account represents the individual to domain, and

    allows for different type of access and different types of tasks. Every users account is

    unique. It has uniqueness of the user account that allows administrator to control access

    for every member of domain.

    There are two types of users accounts: local account and domain account. Local

    accounts are maintained in the local database of a computer and cannot be used to grant

    access to network resources. Local users are primarily used to administer a computer or

    to allow several people to share a single computer that is not a member of a domain.

    Whereas domain users accounts are much more widely used in organizations that local

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    44/131

    user accounts because they allow for central administration and user can log onto any

    computer in the domain. Domain users accounts are stored in Active Directory.

    3.7.1 Active Directory Services

    A computer network can be divided logically into two networking models.

    Workgroup

    Domain

    Difference Between Workgroup and Domain

    Table 9

    Workgroup Domain

    1. It is a peer-to-peer networking

    model.

    2. There is no client and no server.All computers are in equal status.

    3.This model is recommended for

    small networks (upto 10 pcs).

    4. There is no centralized Admin-

    istration and each PC is

    administrated separately.

    5.In this model, low grade operating

    system like 2000/xp professional,

    win 98 etc can be used.

    1. It is a server based networking model.

    2.there is a centralized dedicated server

    computer called domain controller(DC)which controls all other computers

    called clients.

    3. This model is recommended for large

    networks.

    4. There is centralized administration

    and each PC can be administrated and

    managed from the server.

    5.In this model high grade operating

    system ,like win2000/2008 server are

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    45/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    46/131

    A domain tree is made up when there is a parent child relationship between the domain

    in the forest. The child domain includes the complete parent domain name. a tree is a set

    of two or more domains sharing common namespace e.g we can create a parent domain

    and then child domain like mail.yahoo.com; where mail- child domain, yahoo- parent

    domain.

    Fig 8: Structure of domain forest and domain tree

    Organization Unit (OU)

    Organization unit is the smallest unit in a domain network that can contain users,

    computer groups, shared folders, printers and group policy object in simple words. OU

    means department like sale department, accounts department like sales, accounts in a

    company OU can be used to apply different security policies to computer and users in

    different department. OU also helps in dividing administration among different

    administrator of managing only computer and users of sales department.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    47/131

    3.7.1.2 Types of Domain Controller

    (i) PDC : Primary domain controller

    (ii) ADC : Additional domain controller(iii) BDC : Backup domain controller

    Primary Domain Controller (PDC)

    This is the first domain controller, in this domain all entries are created in it like

    users account, group policy, Organization unit etc. All FSMO role are done in PDC.

    Additional Domain Controller (ADC)

    It is a domain network, it is important to have more than one DC so that if one

    DC fails, the other DC will continue serving the client. There is also load balancing of

    Active Directory Service if we have more than one DC.

    The first DC we create is simply called PDC and if we create an extra DC then

    that DC is known as ADC. ADC has same configuration of AD as primary domain

    controller.

    All domain controllers in a domain networking are masters. We can make a

    change in the active directory of any domain controller and that change is replicated to all

    other domain controllers. Replication takes place among all the domain controllers and it

    is controlled automatically. If we create a user in the first domain controller, it is

    automatically created in the ADC because of replication.

    All the domain controllers in the domain networking are peers and this model is

    called as multi- master model .

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    48/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    49/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    50/131

    start run ping gmail.com

    Backup of Active Director

    Active Directory backupcome in use when there is some problem in active directory. Ifthere is any problem in active directory then remove it and restore the backup.

    Start runntbackupok

    Select advance mode and untick that is already ticked

    Select backup

    Selsct system state

    Change backup path browse keep in your hardware and then send it to the

    pen drive

    D:\adbackup

    3.7.2 CHILD DOMAIN

    A domain is created say xyz.com. this domain is known as parent domain or the

    root domain. Now chd.xyz.com will be the child domain or the sub domain of xyz.com.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    51/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    52/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    53/131

    Now logoff start and then write user name - Tom

    Domain name - mcse.com

    Again logoff and check the other user

    Start-user name- abc

    Domain name mail.mcse.com

    3.8 INTERNET SHAREING

    We can share a single internet connection to multiple computers with the help of

    networking or internet sharing. There are four ways to share internet.

    (i) Direct sharing

    (ii) ICS Internet connection sharing

    (iii) Win Proxy

    (iv) NAT Network Address Translation

    3.8.1 Direct Sharing

    Internet sharing can be done between computers directly, just by taking internet

    connection directly from ISP (Internet Server provider), then it is provided to ADSL

    model, ADSL modem is connected to the ISP through RJ-11 connector. Then it is

    connected to the switch with RJ-45 connector. Switch, further connects computers those

    have to be provided with internet connection. The scenario for direct sharing is as shown

    in figure:

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    54/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    55/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    56/131

    Fig 13: scenario of win proxy server

    In win proxy as shown in the scenario above we can share internet. First of all a ADSL

    modem is connected to the ISP (Internet Service Provider) by a RJ-11 connector and

    other end of ADSL modem is connected to the PC1 through RJ-45. Assign IP address

    192.168.1.1 to the ADSL modem also enable the DHCP server and set the start IP

    address of 192.168.1.2 and end IP address of 192.168.1.254. Then after ADSL modem

    connect PC1, assign GW 192.168.1.1 and

    3.8.4 NAT (Network Address Translation)

    If we have to connect many computers with a single IP address then we will use NAT.

    NAT exchange IP packet between local network and internet. The routing and remote

    access server of window 2K3 server provide us with a component known as NAT. By

    enabling NAT on a Server 2008 system, you allow connected users on a private system to

    share a single connection to access a public network such as the internet i.e. NAT enable

    multiple client computer to connect the internet through a single publicly registered IPaddress. A NAT server translate private IP address to public addresses. NAT eliminates

    the need for large number of IP addresses by mapping externally assigned IP addresses.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    57/131

    Fig 14: NAT server

    When deploying NAT, it is needed to configure setting on both the client sideand the server side. On the server side of NAT fill the IP address statically.

    3.8.4.1 Steps to enable NAT server

    Open internet Tools Internet options

    connections LAN settings

    untick the IP and port address

    ok ok give site name

    . On the client side of NAT, client side is configured to obtain IP addresses

    automatically and then restart the client system. Assuming NAT is used for address

    assignment, the client system will receive TCP/IP information from the NAT server. The

    client information includes:

    IP address from 192.168.0.0 private addressing range

    Subnet mask (255.255.255.0)

    DNS server address, which would be the address of the NAT interface

    on the server.

    With the client side configured, there are few things to do on NAT server:

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    58/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    59/131

    Fig 15 : scenario of VPN server

    Using VPN server we can connect many private networks to internet services i.e the

    remote connection. We can create a private network through public network, we can use

    firewall for security and data encryption in VPN server.

    3.9.1 VPN components

    (i) VPN server

    (ii) VPN Clients

    (iii) WAN Option

    (iv) Security Options

    VPN Server

    VPN server, serve as the end points of a VPN connection. When configuring a

    VPN server, you can allow access to just that server, or pass traffic through VPN server

    so that the remote user gain access the resources of the entire network.

    VPN ClientVPN clients establish connection to VPN server. They can also be routers that

    obtain the router-to-router secure connection. VPN client software is included in all the

    modern window operating systems, including Window 2008 server. Router-to router

    VPN connection can be made from computers running server2008 and Windows 2000

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    60/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    61/131

    between Windows server 2008 implementation of L2TPand it cousin PPTP is that

    L2TPis designed to run natively over IP networks only. This implementation of L2TP

    does not support native tunneling over X.25, frame relay, or ATM networks. Like PPTP,

    L2TPencapsulates Point-to-Point Protocol (PPP) frames, which then encapsulate IP or

    IPX protocols, allowing users to remotely run programs that are dependent on specific

    network protocols . But unlike the PPTP protocol, L2TP does not provide encryption of

    the data. For data security L2TPrelies on the services of another standards- based

    protocol, IPSec.

    3.9.3 How to configure VPN

    startadministrative tools

    Routing and Remote access

    Right click on computer name configure and enable Routing and Remote

    access

    next select remote access (dial up or VPN)

    next VPN next

    select LAN card which is connected to internet (172.15.15.50)public IP

    disable enable security next

    from a specific range of address nextnew

    enter the required range

    oknext no radius

    next finish

    3.9.4 Create users in VPN server

    open userproperties dial in allow access

    apply ok

    3.9.5 Working on Client Side

    Right click on My Network Places properties

    Double click on New Network Wizard next

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    62/131

    Connect to networkat my work place next

    Virtual private network connection next

    Enter company name (abc) next

    Enter public IP address of VPN server next

    Any one use next

    finish

    3.10 ROUTING

    It is a process of transferring information through an inter network i.e from one

    network to another. Routing connect different networks having ID help in process of

    routing. The dial-in properties also allow for specific IP address to be assigned to a user.

    This is the only way in Window Server 2008 that you can assign a specific IP to a user.

    To assign a specific IP to a user, check the box next to assign A Static IP Address and

    enter a valid IP in the space provided. Static routing can also be specified as per user. By

    defining static routes, users can be limited to only specific parts of networks.

    In an internetwork a router must then about all the networks present in the for

    effort websites, there are hardware routers like CISCO. Even win 2008 server computer

    configured as router. In simple words Router is a computer with two network cards.

    These two network cards, then, are attached to two different logical IP networks. The

    routing table helps direct traffic that is passed through the router.

    Now when there is a router, also there is a routing table, there is a need to

    configure the router in order for that router to pass along traffic to the proper network.

    There are two ways the routing table can be built and modified: either manually or

    automatically.

    3.10.1 Types of Routing(i) Static Routing

    (ii) Dynamic Routing

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    63/131

    3.10.1.1 Static Routing

    In this routing information required for routing is manually entered into the router

    by administrator.How to configure LAN routing

    Enter the static IP in the router

    Administrator tools

    Routing and Remote access

    Right click on computer name (pcc1)

    Configure and enable routing and remote access

    next custom configuration

    select LAN routingnext finish

    yes and logon to see IP table route

    Enable LAN routing enable LAN routingInterface WAN Interface WAN 10.0.0.0IP 172.15.0.0 IP 10.0.0.0SNM 255.255.0.0 SNM 255.0.0.0GW 20.0.0.2 GW 20.0.0.1

    Fig 16 : scenario for LAN routing

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    64/131

    How to configure static routing

    At Router R1:

    enable LAN routing

    right click on static route

    interface WAN

    destination 172.15.0.0

    mask 255.255.0.0

    GW 20.0.0.2

    At Router R2:

    Enable LAN routing

    Right click on static route

    Interface WAN

    Destination 10.0.0.0

    Mask 255.0.0.0

    GW 20.0.0.1

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    65/131

    Fig 17 : static routing

    3.10.1.2 Dynamic Routing

    The other way to manage a router routing tables is to let the computer do it

    for you. Just like DHCP allocate IP addresses, configuring the dynamic routing

    protocol usually means less errors due to human error, and less administrative

    overhead.

    In dynamic routing, routing information is automatically entered in the

    router using protocols like RIP AND OSPF. These routing protocols used by

    Window Server 2008 use one of two kinds of algorithms to determine the best

    possible path for a packet to get to its destination, either distance vector or link

    state. RIP is used for small networks where as OSPF is used for large networks.

    Routing Information Protocol (RIP)

    The distance vector protocol in use on Window 2008 is called Routing

    Information Protocol (RIP) for IP. This protocol was designed for the exchange of

    the routing information within a small to medium size IP network.

    When Router is enabled on Window 2008 machine, the routing table includes

    entries only for the networks that are physically connected. When RIP is enabled

    for an interface, the router will periodically send an announcement of its routing

    table to inform other RIP routers of the networks it can reach. RIP version1 uses

    broadcast packets for its announcement. RIP version2 offers an improvement and

    can be configured to use either multicast or broadcast packets when

    communicating with other routers. Also, RIP version2 offers more flexibility in

    subnetted and classless inter domain routing (CIDR) environments.

    The biggest advantage of RIPis its simplicity. With a few clicks in the Routingand Remote Access Server and MMC console, you can deploy RIP. With the RIP

    dynamic routing protocol installed on Windows Server 2008, you get the

    following features:

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    66/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    67/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    68/131

    server with SP1.

    Where SP stands for Service Pack. Service Pack are the services which are loaded

    externally to remove some bugs that come during installation of server CD.

    3.11.3 Requirements for Exchange Server

    Protocols Required

    POP3 (Post Office Protocol)

    This protocol is used for receiving e- mails.

    IMAE4 (Internet Messaging Access Protocol)

    This protocol is advance version of POP, this is also used to receive mail.

    LMTP (Local Mail Transfer Protocol)/SMTP (Simple Mail Transfer Protocol)

    This protocol is used to send mails.

    NNTP (Network News Transfer protocol)

    This protocol is used for transferring messages on internet.

    Hardware Requirements

    Processor: min. 133MHz Rec. 733MHz

    RAM: min. 256MB Rec. 512MB

    Other Requirements

    OS: 2k or 2k3 Server

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    69/131

    NTFS partition

    Static IP address

    Active Directory

    DNS installation with AD zone

    IIS installed with ASP.net, SMTP, NNTP and www service

    3.12 Open System Interconnection (OSI) Model

    OSI model is the layer approach to design, develop and implement network. OSI

    provides following advantages: -

    (i) Development of new technology will be faster.(ii) Devices from multiple vendors can communicate with each other.

    (iii) Implementation and troubleshooting of network will be easy.

    3.12.1 Description of Different Layers

    Application Layer

    Application layer accepts data and forward into the protocol stack. It creates user

    interface between application software and protocol stack.

    Presentation Layer

    This layer decides presentation format of the data. It also able to performs other

    function like compression/decompression and encryption/decryption.

    Session Layer

    This layer initiate, maintain and terminate sessions between different applications.

    Due to this layer multiple application software can be executed at the same time.

    Transport Layer

    Transport layer is responsible for connection oriented and connection less

    communication. Transport layer also performs other functions like

    (i) Error checking

    (ii) Flow Control

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    70/131

    Buffering

    Windowing

    Multiplexing

    (iii) Sequencing

    (iv) Positive Acknowledgement

    (v) Response

    (vi)

    Network Layer

    This layer performs function like logical addressing and path

    determination. Each networking device has a physical address that is MAC

    address. But logical addressing is easier to communicate on large size network.

    Logical addressing defines network address and host address. This type of

    addressing is used to simplify implementation of large network. Some

    examples of logical addressing are: - IP addresses, IPX addresses etc.

    Network layer has different routing protocols like RIP, EIGRP, BGP, and

    ARP etc. to perform the path determination for different routing protocol.

    Network layer also perform other responsibilities like defining quality of service,

    fragmentation and protocol identification.

    Data Link Layer

    The functions of Data Link layer are divided into two sub layers

    Logical Link Control

    Media Access Control

    (i) Logical Link Control defines the encapsulation that will be used by the

    NIC to delivered data to destination. Some examples of Logical Link

    Control are ARPA (Ethernet), 802.11 wi-fi.

    (ii) Media Access Control defines methods to access the shared media and

    establish the identity with the help of MAC address. Some examples of

    Media Access Control are CSMA/CD, Token Passing.

    Physical Layer

    Physical Layer is responsible to communicate bits over the media this

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    71/131

    layer deals with the standard defined for media and signals. This layer may also perform

    modulation and demodulation as required.

    3.13 ROUTERS

    13.13.1 Router Architecture and its Key Component

    IncompleteIOS

    IOS

    Startup Configuration

    Fig 18 : Architecture of router

    Processor

    Speed: - 20 MHz to 1GHz

    Architecture: - RISC

    Processor

    MemoryController

    BIOSROM

    NVRAM

    RAM

    FlashRAMO/S

    I/OController

    LAN

    WAN

    Ports

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    72/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    73/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    74/131

    AUI Attachment Unit Interface

    EPABX Electronic Private Automatic Branch

    PSTN Public Services Telephone Network

    3.13.2.2 Router Ports

    Table 12: Router Ports

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    75/131

    3 3 3 3 3 3 Modes of RouterWhen we access router command prompt the router will display different modes.

    According to the modes, privileges and rights are assigned to the user.

    User mode

    Router>

    In this mode, we can display basic parameter and status of the router we can test

    connectivity and perform telnet to other devices. In this mode we are not able to change

    and save router configuration.

    Privileged mode

    Router#

    In this mode, we can display all information, configuration, perform administration task,

    debugging, testing and connectivity with other devices. We are not able to perform here

    configuration editing of the router.

    The command to enter in this mode is enable. We have to enter enable

    password or enable secret password to enter in this mode. Enable secret has more priority

    than enable password. If both passwords are configured then only enable secret will

    work.

    Global configuration

    Route(config)#

    This mode is used for the configuration of global parameters in the router. Global

    parameters applied to the entire router. All the changes are performed in this mode. But

    here we cannot see and save the changes.

    For e.g: - router hostname or access list of router, password, Banner, Routing, Security.

    The command to enter in this mode is configure terminal

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    76/131

    Line configuration mode

    In this mode we can set the password of the user mode, i.e to set user mode

    password .This mode is used to configure lines like console, vty and auxiliary. There are

    main types of line that are configured.

    (i) Console

    Router(config)#line console 0

    (ii) Auxiliary

    Router(config)#line aux 0

    (iii) Telnet or vty

    Router(config)#line vty 0 4

    Interface configuration mode

    In this mode we can set ip addresses of the interfaces. This mode is used to

    configure router interfaces. For e.g:- Ethernet, Serial, BRI etc.

    Router(config)#interface

    Router(config)#interface serial 1

    Routing configuration mode

    This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc.

    Router(config)#router []

    Router(config)#router rip

    Router(config)#router eigrp 10

    3 3 3 3 3 3 Configuring PasswordThere are five types of password available in a router

    Console Passwordrouter#configure terminal

    router(config)#line console 0

    router(config-line)#password

    router(config-line)#login

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    77/131

    router(config-line)#exit

    To erase password do all steps with no command.

    Vty Password

    router>enable

    router#configure terminal

    router(config)#line vty 0 4

    router(config-line)#password

    router(config-line)#login

    router(config-line)#exit

    Auxiliary Password

    router#configure terminal

    router(config)#line Aux 0

    router(config-line)#password

    router(config-line)#login

    router(config-line)#exit

    Enable Password

    router>enable

    router#configure terminal

    router(config)#enable password

    router(config)#exit

    Enable Secret Password

    Enable Password is the clear text password. It is stored as clear text in

    configuration where as enable secret password is the encrypted password.

    Router>enable

    Router#configure terminal

    Router(config)#enable secret

    Router(config)#exit

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    78/131

    Encryption all passwords

    All passwords other than enable secret password are clear text password. The

    command to encrypt all password are

    Router#configure terminal

    Router(config)#service password-encryption

    3.13.5 Managing Configuration

    There are two types of configuration present in a router

    (i) Startup Configuration

    (ii) Running Configuration

    Startup configuration is stored in the NVRAM. Startup configuration is used to

    save settings in a router. Startup configuration is loaded at the time of booting in to the

    Primary RAM.

    Running Configuration is present in the Primary RAM wherever we run a

    command for configuration, this command is written in the running configuration.

    To save configuration

    Router#copy running-configuration startup-configuration

    Or

    Router#write

    To abort configuration

    Router#copy startup-configuration running-configuration

    To display running-configuration

    Router#show running-configuration

    To display startup configuration

    Router#show startup-configuration

    Configuring Host Name

    Router#configure terminal

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    79/131

    Router(config)#hostname

    #exit or end or /\z

    Router#config terminal

    Router(config)#hostname r1

    R1(config)#

    Configuration Interfaces

    Interfaces configuration is one of the most important part of the router

    configuration. By default, all interfaces of Cisco router are in disabled mode. We have to

    use different commands as our requirement to enable and configure the interface.

    Router#configure terminal

    Router(config)#interface

    Router(config-if)#ip address

    Router(config-if)#no shutdown

    Router(config-if)#exit

    To display interface status

    Router#show interfaces (to show all interfaces)

    Router#show interface

    This command will display following parameters about an interface

    (1) Status

    (2) Mac address

    (3) IP address

    (4) Subnet mask

    (5) Hardware type / manufacturer

    (6) Bandwidth

    (7) Reliability

    (8) Delay

    (9) Load ( Tx load Rx load)

    (10) Encapsulation

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    80/131

    (11) ARP type (if applicable)

    (12) Keep alive

    Configuring optional parameter on WAN interface

    Router#configure terminal

    Router(config)#interfac

    Router(config-if)#encapsulation

    Router(config-if)#clock rate

    Router(config-if)#end

    Command displaying history of Router

    To display commands present in history

    Router#show history

    To display history size

    Router#show terminal

    To change history size

    Router#config terminal

    Router(config)#line console 0

    Router(config-if)#history size

    Router(config-if)#exit

    Configuring Banners

    Banners are just a message that can appear at different prompts according to the type.

    Different banners are: -

    Message of the day (motd)This banner appear at every access method

    Login

    Appear before login prompt

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    81/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    82/131

    To configure clock from NTP server

    Router#config terminal

    Router(config)#ntp server

    Router(config)#exit

    C:\>ping pool.ntp.org

    To get ntp server ip from internet

    C:\>route print

    3.14 SUBNETTING

    Subnetting is a process or a technique to divide large and complex networks into

    smaller parts or smaller networks and each network is called as subnet. Subnetting is

    done to reduce the wastage of IP addresses ie instead of having a single huge network for

    an organization smaller networks are created within a given huge network. Subnetting

    allows the user to create multiple logical networks within a single Class A, B or C based

    networks.

    In subnetting, the IPv4 address is broken into two parts; network id and host id.

    This process borrows bits from the host id field. In this process, the network size does not

    shrink but the size of hosts per network shrinks in order to include sub-networks within

    the network.

    3 3 3 3 33 Advantages of subnetting Size of the physical networks is reduced and hence easy to manage.

    Reduce network traffic.

    Easy to troubleshoot.

    Reduce the wastage of IP address.

    Subnet Mask

    A subnet mask specifies the part ofIP address that is to be used for identifying a

    sub network. A subnet mask when logically ANDed with IPaddress provides a 32- bit

    network address. This binary address gives the first address in the subnet block specified

    in the large network.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    83/131

    Default Mask

    Classfull addresses consists of three classes; Class A, Class B, Class C used for

    subnet.Each class has a default subnet mask C lass A consists of eight 1s in the network

    address field and 24 0s in remaining field, Class B consists of 16 1s in network address

    field and 16 0s in remaining field, and Class C cointains 24 1s in the network address

    field and remaining 8 bytes as 0s. the default address mask in binary and dotted-decimal

    is shown in the table

    To Calculate the Subnet Mask1. Identify the class of address assigned. For this example the class of IP address

    is Class B.

    2. check the default address mask for the appropriate class and convert it to

    binary format .for this example the default address mask is 255.255.0.0 and

    the equivalent binary format is; 11111111.11111111.00000000.00000000

    3. check the no. of 1s in the default mask. E.g this address contains 16 1s in class

    B, 16 bits 2 octat are for net id and the last 16 bits 2 octates are for host id.

    4. now if we need 9 subnets. This no. 9 is not a power of 2. the next no. that is

    power of 2 and greater than 2 is 16. So, we require 4 extra 4 extra 1s in the

    network field which has to be borrowed from the host id field.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    84/131

    5. the total no. of 1s is 16+4=20, as 16 1s are from network id and 4 1s are of

    additional bits required for subnetwork. The no. of 0s in the n/w is 32-20=12.

    which defines whole address.

    6. hence address is given as 11111111.11111111.11110000.00000000 and in

    decimal format can be given as 255.255.240.0

    Table 14: decimal and binary values of subnet mask

    DecimalBinary

    0

    128

    192

    224

    240

    248

    252

    254

    255

    00000000

    10000000

    11000000

    11100000

    11110000

    11111000

    11111100

    11111110

    11111111

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    85/131

    3 3 3 3 33 Types of Subnetting Fixed Length Subnet Mask (FLSM)

    Variable Length Subnet Mask (VLSM)

    Steps of Subnetting for FLSM

    For IP address 192.168.10.0 (Class C)

    Step 1:

    Identify the total no. of subnets 2^n = no.of subnets

    Where n are the no.s and borrowed bytes from host ID portion. Let we are given

    that we have to make 4 subnets. Therefore 2^n =4 i.e n=2

    Step 2:

    To idettify the total no. of the valid hosts for each subnet.

    2^m-2= no.of valid hosts. Where m are the remaining no. of bits in host ID 2^6-

    2=62

    Step 3:

    Calculate the subnet mask and range

    Subnet mask for n/w 192.168.10.0/26 is

    11111111.11111111.11111111.1100000000 ie 255.255.255.192

    range=> 256-192=64

    step 4:

    Identify the total no of subnets, no. of valid hosts and the broadcast address.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    86/131

    Table 15: showing subnet mask, valid hosts, broadcast address

    Subnetwork Valid Host Broadcast Address

    192.168.10.0

    192.168.10.64

    192.168.10.12

    8

    192.168.10.19

    2

    192.168.10.1 to

    192.168.10.63

    192.168.10.65 to

    192.168.10.126

    192.168.10.129 to

    192.168.10.190

    192.168.10.193 to

    192.168.10.254

    192.168.10.63

    192.168.10.127

    192.168.10.191

    192.168.10.255

    VLSM

    In VLSM to allocate IP addresses to subnets depending upon the no. of hosts. The

    network having more no of hosts is given priority and the one having least no of host

    comes at last and for each network the subnet is assigned separately. As in the scenario

    given:

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    87/131

    Fig 19: variable subnet mask

    3.15 TELNET

    Telnet stands for terminal network, telephone network, terminal encapsulation on

    the network. Purpose of Telnet is to access the remote device in order to configure it. It

    provides textual access of the remote device. It uses the services of TCP. Telnet service is

    used where small bandwidth is low. It provides textual access of the remote device. Port

    number of Telnet is 23.

    3.15.1 To Access the Device Remotely

    For this purpose we have to assign the IP addresses to the PCs and the interfaces.

    For Telnet the Routers are to be configured with RIP version1 , so that the device can

    ping each other. Also DCE cable is used to connect the Routers. The serial link should

    have the speed of 64K also apply vty password and enable secret password. Set up the

    Routers so that they can manage via Telnet.

    First of all select the PCs and the routers connect the ports to the router, doubleclick on router, switch off the router if it is on. Then select the serial port according to the

    routers, switch on the router. Select the cable to connect the Routers. Router to Router

    connections are made by the serial cable, so go on first Router select the serial port as

    s0/1/0 in the scenario, then go to the other Router and connect the serial cable at interface

    s1/0. Accordingly connect the third Router with interfaces s1/1 and s1/2.

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    88/131

    Now connect the PCs to the routers, to do this first select the console cable, click on the

    PC select RS232 option, then connect it on the Router and select console cable. Now

    select cross- over cable on the PC select Fast Ethernet option and on the Router select

    f0/0 option now as the PCs and Routers are connected to each other assign IP addresses

    to the PCs and the Routers. According to the fig set the IP addresses of the PCs double

    click on the PC choose the option of desktop IP configuration. Now set the IP

    address, subnet mask, and the default gateway. Like wise set the IP address of all the

    PCs. Now set the IP address of the interfaces of router.

    3.15.2 Commands to assign IP addresses to the interfaces:

    At Router1:

    Router>

    Router>enable

    Router#configure terminal

    Router(config)#interface f0/0

    Router(config-if)#ip address 10.0.0.1 255.0.0.0

    Router(config-if)#no shutdown

    Fig 20: scenario of Telnet

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    89/131

    Router#

    Router#configure terminal

    Router(config)#interface s0/1/0

    Router(config-if)#ip address 40.0.0.1 255.0.0.0

    Router(config-if)#no shutdown

    Router(config)#interface s0/1/0

    Router(config-if)#clock rate 64000

    Router(config-if)#no shutdown

    Now to check the assigned IPaddresses to the interfaces the command used is

    Router#show ip interface brief

    At router 2:

    Router#configure terminal

    Router(config)#interface f0/0

    Router(config-if)#ip address 20.0.0.1 255.0.0.0

    Router(config-if)#no shutdown

    Router#

    Router#configure terminal

    Router(config)#interface s1/0

    Router(config-if)#ip address 40.0.0.2 255.0.0.0

    Router(config-if)#no shutdown

    Router#configure terminal

    Router(config)#interface s1/1

    Router(config-if)#ip address 50.0.0.1 255.0.0.0

    Router(config-if)#no shutdown

    Router(config)#interface s1/1

    Router(config-if)#clock rate 64000

    Router(config-if)#no shutdown

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    90/131

  • 7/27/2019 Final Report of Networking Mcitp & Ccna

    91/131

    Router#disconnect

    To display connected session

    Router#show sessions

    This command shows those sessions, which are created or connected by us.

    If we want anyone can telnet our router without password then on the line vty type

    command No Login.

    3.16 ROUTING

    Routing is a process or technique to identify the path from one network to

    another. Routers dont really care about hoststhey only care about networks and the

    best path to each network.

    To route the packet the router must know the following things:

    Destination network

    Neighbour device from witch it can learn about remote Networking.

    Possible number of routers to reach the destination.

    Best route to reach the destination.

    How to maintain & verify the routing i


Recommended