Documentos de Académico
Documentos de Profesional
Documentos de Cultura
CCNA )
Bachelor of Technology
by
Sahil Prabhakar (11000712)
Session (2010-2014)
CANDIDATES DECLARATION
I hereby certify that the work, which is being presented in the project
report on Multi-Area OSPF (Cisco certified Network Associqte) , in
partial fulfillment of the requirement for the award of the Degree of
Bachelor of Technology submitted to the institution, is an authentic
record of my own work carried out during the period 08-2014 to 102014 . I also cited the reference about the text, figure, and table from
where they have been taken.
Date:
2 | Page
Date:
DEDICATION
I hereby certify the work which is being presented in the project entitled
MultiArea OSPF by Sahil Prabhakar in partial fulfillment of requirements for
the award of degree B.Tech (Electronics and Communication) submitted in the
Department ofElectronics and Communication at LOVELY PROFESSIONAL
UNIVERSITY , Punjab. The matter presented in this project has not been
submitted by me in any other University/ Institute for the award of B.Tech. Degree.
Sahil Prabhakar
3 | Page
OBJECTIVE OF TRAINING
4 | Page
ACKNOWLEDGEMENT
I have taken efforts in this project. However, it would not have been possible
without the kind support and help of many individuals and organizations. I would
like to extend my sincere thanks to all of them.
I am highly indebted to Jetking ( Chandigarh ) for their guidance and constant
supervision as well as for providing necessary information regarding the project &
also for their support in completing the project.
I would like to express my gratitude towards my parents & member of Jetking
(Chandigarh ) for their kind co-operation and encouragement which help me in
completion of this project.
My thanks and appreciations also go to my colleague in developing the project and
people who have willingly helped me out with their abilities.
5 | Page
TABLE OF CONTENT
Title
Candidates declaration
Dedication
Objective of training
Acknowledgement
chapter 1
About the technology
1. Introducktion
Chapter 2
2. Company profile
Chapter 3
3. Network structure
Chapter 4
4. OSI(open system interconnection) model
5. Switch
6. Routers
6.1function of router
6.2router modes
7. IP Addressing
7.1Reserve Address
7.2Private IP
7.3Public IP
7.4Addresses classes
7.5Subnetting
7.6Subnet masking
7.7DHCP
8. Routing protocol
9. Types of routing
6 | Page
LIST OF FIGURES
1. Network structure
CHAPTER 1:
ABOUT THE TECHNOLOGY
7 | Page
1. INTRODUCTION:
For a network to be designed the case study is used and helps to explain the whole
process .This case study presents a scenario in which network is designed in
8 | Page
organization for the proper flow of data. This case study requires that you
accomplish the following:
1., To set up the physical network .provided resources are used .
2. IP subnetting.
3. Routers are configured.
4. Set up and configure the switches and VLANS .
5. Verify and troubleshoot all connections.
6. Detailed documentation provided as written final report.
CHAPTER 2:
2. COMPANYS PROFILE:
technical students. Jetking has trained over 6,00,000 students in its 125 centers
spread across India. The company has been awarded the ISO 9001:2000
certification in 2003. It has its presence all over India and has recently
embarked on its international venture by adding centers globally. In 2014, it
was voted as the most trusted brand in the Computer Hardware training
category by Trust Research Advisory (TRA). Jet king provides courses like
JCHNE, JCHNP and MNA which entails students education in the field of
Computer Hardware and Networking. Other courses like CCNA and Network
Security and Ethical Hacking are also provided to the students by the company
CHAPTER 3:
3.NETWORK STRUCTURE:
10 | P a g e
CHAPTER 4:
4.OSI (Open Systems Interconnection) MODEL:
.
The OSI isnt a physical model, though. Rather, its a set of guidelines that
application developers can use to create and implement applications that run on a
network. It also provides a framework for creating and implementing networking
standards, devices, and internetworking schemes.The OSI has seven different
layers, divided into two groups. The top three layers define how the applications
within the end stations will communicate with each other and with users. The
bottom four layers define how data is transmitted end to end.
11 | P a g e
5. SWITCH:
A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN). Technically, network switches
operate at layer two (Data Link Layer) of the OSI model.
Network switches appear nearly identical to network hubs, but a switch generally
contains more intelligence (and a slightly higher price tag) than a hub. Unlike hubs,
network switches are capable of inspecting data packets as they are received,
determining the source and destination device of each packet, and forwarding them
appropriately. By delivering messages only to the connected device intended, a
network switch conserves network bandwidth and offers generally better
performance than a hub.
As with hubs, Ethernet implementations of network switches are the most
common. Mainstream Ethernet network switches support either 10/100Mbps Fast
Ethernet or Gigabit Ethernet (10/100/1000) standards.
Different models of network switches support differing numbers of connected
devices. Most consumer-grade network switches provide either four or eight
connections for Ethernet devices. Switches can be connected to each other, a socalled daisy chaining method to add progressively larger number of devices to a
LAN.
6. ROUTER:
12 | P a g e
Routers have many capabilities and these are small physical devices that join
multiple networks together. Technically, a router is a Layer 3 gateway device,
meaning that it connects two or more networks and that the router operates at the
network layer of the OSI model.
.
6.1. FUNCTION OF ROUETR:
Packet Switching.
Packet Filtering.
Internetwork Communication.
Path selection.
ROUTER MODES
Cisco routers have different configuration modes
. 1. USER MODE:
In this mode we can know the series of the router.
Router>show version
2. PRIVILAGED MODE
In this mode we can know the configuration of router or we can monitor the
router.
Router>enable
Router# show ip interface brief
13 | P a g e
7. IP ADDRESSING:
An IP (Internet Protocol) address is a unique identifier for a node or host
connection on an IP network. An IP address is a 32 bit binary number usually
represented as 4 decimal values, each representing 8 bits, in the range 0 to 255
(known as octets) separated by decimal points. This is known as "dotted decimal"
notation.
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
7.3 Public IP: Remaining addresses are all public IPs.
7.5 Subnetting:
Subnetting an IP Network can be done for a variety of reasons, including
organization, use of different physical media (such as Ethernet, WAN, etc.),
preservation of address space, and security. The most common reason is to control
network traffic. In an Ethernet network, all nodes on a segment see all the packets
transmitted by all the other nodes on that segment. Performance can be adversely
15 | P a g e
affected under heavy traffic loads, due to collisions and the resulting
retransmissions. A router is used to connect IP networks to minimize the amount of
traffic each segment must receive.
7.7DHCP:
The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for
automating the configuration of computers that use TCP/IP. DHCP can be used to
automatically assign IP addresses, to deliver TCP/IP stack configuration
parameters such as the subnet mask and default router, and to provide other
configuration information such as the addresses for printer, time and news
8. ROUTING PROTOCOL:
Routing is the act of moving information across an internetwork from a source to a
destination.Routing involves two basic activities: determining optimal routing
16 | P a g e
9. Types of routing
STATIC ROUTING ALGORITHMS are hardly algorithms at all, but are table
mappings established by the network administrator before the beginning of routing.
These mappings do not change unless the network administrator alters them.
Algorithms that use static routes are simple to design and work well in
environments where network traffic is relatively predictable and where network
design is relatively simple.
DYNAMIC ROUTING ALGORITHMS which adjust to changing network
circumstances by analyzing incoming routing update messages. If the message
indicates that a network change has occurred, the routing software recalculates
routes and sends out new routing update messages. These messages permeate the
network, stimulating routers to rerun their algorithms and change their routing
tables accordingly.
17 | P a g e
A router running EIGRP stores all its neighbors' routing tables so that it can
quickly adapt to alternate routes. If no appropriate route exists, EIGRP
queries its neighbors to discover an alternate route.
EIGRP does not make periodic updates. Instead, it sends partial updates only
when the metric for a route changes.
4. OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LSAs) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables is
included in OSPF LSAs. As OSPF routers accumulate link-state
information, they use the SPF algorithm to calculate the shortest path to
each node.
19 | P a g e
6. Line password
This password is asked before the user mode.
I.
Console password
Password used for the console port. And there is only 1 console port
so therefore we use console 0.
How to set console password:
Router>enable
20 | P a g e
Router#config terminal
Router<config>line console 0
Router<config-line>password AKASH
Router<config-line>login
Router<config-line>exit
II.
Auxiliary password
This password is used for auxiliary port in a router.
How to set auxiliary password:
Router>enable
Router#config terminal
Router#<config>line auxiliary 0
Router#<config-line>password AKASH
Router#<config-line>login
Router<config-line>exit
III.
Telnet password
This password is set to access router through telnet.To set the usermode password for Telnet access into the router, use the line vty
command. For vty password you must enable secret password.
11. VLAN
21 | P a g e
22 | P a g e
13. SERVERS
7. HTTP/HTTPS SERVERS
Hypertext Transfer Protocol Secure (HTTPS) is a communications
protocol for secure communication over a computer network, with especially
wide deployment on the Internet. Technically, it is not a protocol in and of
itself; rather, it is the result of simply layering the Hypertext Transfer
Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security
capabilities of SSL/TLS to standard HTTP communications.
23 | P a g e
8. DNS SERVER
The Domain Name System (DNS) is a standard technology for managing the
names of Web sites and other Internet domains. DNS technology allows you
to type names into your Web browser like compnetworking.about.com and
your computer to automatically find that address on the Internet.
A DNS server is any computer registered to join the Domain Name System.
A DNS server runs special-purpose networking software, features a public IP
address, and contains a database of network names and addresses for other
Internet hosts.
9. TFTP SERVER
TFTP stands for Trivial File Transfer Protocol. As the name suggests, TFTP
is a mechanism to transfer files from one device to another. It is typically
used by network administrator to copy configuration file, log file and
firmware to/from networking devices.
TFTP was designed to be small, simple and easy to implement. It uses UDP
port 69 and runs on IP networks. It doesnt provide any kind of error
handling capability so all the error handling has to be done at Layer 7 the
Application Layer.
10.FTP SERVER
24 | P a g e
14
ROUTER 2
Router>en
Router>conf terminal
Router(config)#ip dhcp pool jet
Router(dhcp-config)#network 11.0.0.0 255.0.0.0
Router(dhcp-config)#default-route 11.0.0.1
Router(dhcp-config)#dns-server 11.0.0.1
Router(dhcp-config)#^z
Router#conf ter
Router(config)#int f0/0
Router(config)#ip add 11.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#^z
Router#int s0/1/0
Router(config)#ip add 13.0.0.2 255.0.0.0
Router#int fs/0/1/1
Router(config)#ip add 14.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#router ospf 1
Router(config-router)#network 11.0.0.0 0.255.255.255 area 0
Router(config-router)#network 13.0.0.2 0.255.255.255 area 0
Router(config-router)#network 14.0.0.1 0.255.255.255 area 0
26 | P a g e
ROUTER 3
Router>en
Router>conf terminal
Router(config)#ip dhcp pool jet
Router(dhcp-config)#network 12 .0.0.0 255.0.0.0
Router(dhcp-config)#default-route 12.0.0.1
Router(dhcp-config)#dns-server 12.0.0.1
Router(dhcp-config)#^z
Router#conf ter
Router(config)#int f0/0
Router(config)#ip add 12.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#^z
Router#int s0/1/0
Router(config)#ip add 14.0.0.2 255.0.0.0
Router(config)#no shut
Router(config)#router ospf 1
Router(config-router)#network 12.0.0.0 0.255.255.255 area 2
Router(config-router)#network 14.0.0.2 0.255.255.255 area 0
Appendices
Refreence:
27 | P a g e
28 | P a g e