Está en la página 1de 28

Multi-Area Open Shortest Path First (Technology:

CCNA )

A project report submitted in partial fulfillment of the


requirements for the award of the degree of

Bachelor of Technology
by
Sahil Prabhakar (11000712)
Session (2010-2014)

Lovely Professional University Jalandhar Delhi G. T


Road (NH-1), Phagwara, Punjab, 144402, India
1 | Page

CANDIDATES DECLARATION

I hereby certify that the work, which is being presented in the project
report on Multi-Area OSPF (Cisco certified Network Associqte) , in
partial fulfillment of the requirement for the award of the Degree of
Bachelor of Technology submitted to the institution, is an authentic
record of my own work carried out during the period 08-2014 to 102014 . I also cited the reference about the text, figure, and table from
where they have been taken.

Date:

Signature of the Candidate

This is to certify that the above statement made by the candidate is


correct to the best of my knowledge.

2 | Page

Date:

DEDICATION

I hereby certify the work which is being presented in the project entitled
MultiArea OSPF by Sahil Prabhakar in partial fulfillment of requirements for
the award of degree B.Tech (Electronics and Communication) submitted in the
Department ofElectronics and Communication at LOVELY PROFESSIONAL
UNIVERSITY , Punjab. The matter presented in this project has not been
submitted by me in any other University/ Institute for the award of B.Tech. Degree.

Sahil Prabhakar

3 | Page

OBJECTIVE OF TRAINING

The main goal of this work is to:


o To design a good, reliable and cheap network through which data can be
transmitted between two different places.
o To know about proper working of Routers and Switches.
o To have knowledge about transmission of data from one network to another
network.

4 | Page

ACKNOWLEDGEMENT

I have taken efforts in this project. However, it would not have been possible
without the kind support and help of many individuals and organizations. I would
like to extend my sincere thanks to all of them.
I am highly indebted to Jetking ( Chandigarh ) for their guidance and constant
supervision as well as for providing necessary information regarding the project &
also for their support in completing the project.
I would like to express my gratitude towards my parents & member of Jetking
(Chandigarh ) for their kind co-operation and encouragement which help me in
completion of this project.
My thanks and appreciations also go to my colleague in developing the project and
people who have willingly helped me out with their abilities.

5 | Page

TABLE OF CONTENT
Title
Candidates declaration
Dedication
Objective of training
Acknowledgement
chapter 1
About the technology
1. Introducktion
Chapter 2
2. Company profile
Chapter 3
3. Network structure
Chapter 4
4. OSI(open system interconnection) model
5. Switch
6. Routers
6.1function of router
6.2router modes
7. IP Addressing
7.1Reserve Address
7.2Private IP
7.3Public IP
7.4Addresses classes
7.5Subnetting
7.6Subnet masking
7.7DHCP
8. Routing protocol
9. Types of routing
6 | Page

9.1 the various types of routing that can be used are


9.2 rip
9.3 Igrp
9.4 Eigrp
9.5 ospf
10. Router password
11. VLAN
12. Network Address Translatio(NAT)
13. Servers
14 Coding

LIST OF FIGURES
1. Network structure

CHAPTER 1:
ABOUT THE TECHNOLOGY
7 | Page

CCNA which stands for CISCO CERTIFIED NETWORK ADMINISTRATOR is


a popular certification in computer networking developed by Cisco Systems. Cisco
created the CCNA to recognize basic competency in installation and support of
medium-sized networks. CCNA curriculum includes basic mitigation of security
threats, introduction to wireless networking concepts and terminology, and
performance-based skills. It includes the following protocols :
Enhanced Interior Gateway Routing Protocol (EIGRP)
Serial Line Interface Protocol Frame Relay
Routing Information Protocol Version 2 (RIPv2)
VLANs
Access control lists (ACLs).
SOFTWARE USED: PACKET TRACER 5.0

1. INTRODUCTION:
For a network to be designed the case study is used and helps to explain the whole
process .This case study presents a scenario in which network is designed in
8 | Page

organization for the proper flow of data. This case study requires that you
accomplish the following:
1., To set up the physical network .provided resources are used .
2. IP subnetting.
3. Routers are configured.
4. Set up and configure the switches and VLANS .
5. Verify and troubleshoot all connections.
6. Detailed documentation provided as written final report.

CHAPTER 2:
2. COMPANYS PROFILE:

Established in 1990 Jetking Info train is a Computer


Hardware and Networking Training Institute, which trains technical and non9 | Page

technical students. Jetking has trained over 6,00,000 students in its 125 centers
spread across India. The company has been awarded the ISO 9001:2000
certification in 2003. It has its presence all over India and has recently
embarked on its international venture by adding centers globally. In 2014, it
was voted as the most trusted brand in the Computer Hardware training
category by Trust Research Advisory (TRA). Jet king provides courses like
JCHNE, JCHNP and MNA which entails students education in the field of
Computer Hardware and Networking. Other courses like CCNA and Network
Security and Ethical Hacking are also provided to the students by the company

CHAPTER 3:
3.NETWORK STRUCTURE:

10 | P a g e

CHAPTER 4:
4.OSI (Open Systems Interconnection) MODEL:
.
The OSI isnt a physical model, though. Rather, its a set of guidelines that
application developers can use to create and implement applications that run on a
network. It also provides a framework for creating and implementing networking
standards, devices, and internetworking schemes.The OSI has seven different
layers, divided into two groups. The top three layers define how the applications
within the end stations will communicate with each other and with users. The
bottom four layers define how data is transmitted end to end.

11 | P a g e

5. SWITCH:
A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN). Technically, network switches
operate at layer two (Data Link Layer) of the OSI model.
Network switches appear nearly identical to network hubs, but a switch generally
contains more intelligence (and a slightly higher price tag) than a hub. Unlike hubs,
network switches are capable of inspecting data packets as they are received,
determining the source and destination device of each packet, and forwarding them
appropriately. By delivering messages only to the connected device intended, a
network switch conserves network bandwidth and offers generally better
performance than a hub.
As with hubs, Ethernet implementations of network switches are the most
common. Mainstream Ethernet network switches support either 10/100Mbps Fast
Ethernet or Gigabit Ethernet (10/100/1000) standards.
Different models of network switches support differing numbers of connected
devices. Most consumer-grade network switches provide either four or eight
connections for Ethernet devices. Switches can be connected to each other, a socalled daisy chaining method to add progressively larger number of devices to a
LAN.

6. ROUTER:
12 | P a g e

Routers have many capabilities and these are small physical devices that join
multiple networks together. Technically, a router is a Layer 3 gateway device,
meaning that it connects two or more networks and that the router operates at the
network layer of the OSI model.
.
6.1. FUNCTION OF ROUETR:
Packet Switching.
Packet Filtering.
Internetwork Communication.
Path selection.
ROUTER MODES
Cisco routers have different configuration modes
. 1. USER MODE:
In this mode we can know the series of the router.
Router>show version

2. PRIVILAGED MODE
In this mode we can know the configuration of router or we can monitor the
router.
Router>enable
Router# show ip interface brief
13 | P a g e

3. GLOBAL CONFIGURATION MODE


Commands that affect the entire system
Router>enable
Router#configure terminal
Router(config)#interface serial0/3/0
Router(config-if)

7. IP ADDRESSING:
An IP (Internet Protocol) address is a unique identifier for a node or host
connection on an IP network. An IP address is a 32 bit binary number usually
represented as 4 decimal values, each representing 8 bits, in the range 0 to 255
(known as octets) separated by decimal points. This is known as "dotted decimal"
notation.

7.1 Reserve Address: 0.0.0.0 to 0.255.255.255.255 (broadcast address)


127.0.0.0 To127.255.255.255 ( loop back address)
255.255.255.255 (limited broadcast" destination address)
7.2 Private IP: 10.0.0.0 to 10.255.255.255
14 | P a g e

172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
7.3 Public IP: Remaining addresses are all public IPs.

7.4 Address Classes:


There are 5 different address classes. You can determine which class any IP address
is in by examining the first 4 bits of the IP address.
Class A addresses begin with 0xxxxxxx, or 1 to 126 decimal.
Class B addresses begin with 10xxxxxx, or 128 to 191 decimal.
Class C addresses begin with 110xxxxx, or 192 to 223 decimal.
Class D addresses begin with 1110xxxx, or 224 to 239 decimal.
Class E addresses begin with 1111xxxx, or 240 to 254 decimal.
Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and
for internal testing on a local machine.
Class D addresses are reserved for multicasting.
Class E addresses are reserved for future use.

7.5 Subnetting:
Subnetting an IP Network can be done for a variety of reasons, including
organization, use of different physical media (such as Ethernet, WAN, etc.),
preservation of address space, and security. The most common reason is to control
network traffic. In an Ethernet network, all nodes on a segment see all the packets
transmitted by all the other nodes on that segment. Performance can be adversely
15 | P a g e

affected under heavy traffic loads, due to collisions and the resulting
retransmissions. A router is used to connect IP networks to minimize the amount of
traffic each segment must receive.

7.6 Subnet Masking:


Applying a subnet mask to an IP address allows you to identify the network and
node parts of the address. Performing a bitwise logical AND operation between the
IP address and the subnet mask results in the Network Address or Number.

7.7DHCP:
The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for
automating the configuration of computers that use TCP/IP. DHCP can be used to
automatically assign IP addresses, to deliver TCP/IP stack configuration
parameters such as the subnet mask and default router, and to provide other
configuration information such as the addresses for printer, time and news

8. ROUTING PROTOCOL:
Routing is the act of moving information across an internetwork from a source to a
destination.Routing involves two basic activities: determining optimal routing

16 | P a g e

paths and transporting information groups (typically called packets) through an


internetwork.
Routing protocols use metrics to evaluate what path will be the best for a packet to
travel. A metric is a standard of measurement, such as path bandwidth, that is used
by routing algorithms to determine the optimal path to a destination. To aid the
process of path determination, routing algorithms initialize and maintain routing
tables, which contain route information. Route information varies depending on the
routing algorithm used.

9. Types of routing

STATIC ROUTING ALGORITHMS are hardly algorithms at all, but are table
mappings established by the network administrator before the beginning of routing.
These mappings do not change unless the network administrator alters them.
Algorithms that use static routes are simple to design and work well in
environments where network traffic is relatively predictable and where network
design is relatively simple.
DYNAMIC ROUTING ALGORITHMS which adjust to changing network
circumstances by analyzing incoming routing update messages. If the message
indicates that a network change has occurred, the routing software recalculates
routes and sends out new routing update messages. These messages permeate the
network, stimulating routers to rerun their algorithms and change their routing
tables accordingly.
17 | P a g e

9.1The various routing protocol that can be used are

1. RIP (routing information protocol) is a distance vector routing protocol. It


sends complete routing table out to all other members in an interval of 30
seconds. It uses hop count as a metric and by default hop count is set to 15.
There are two types of RIP:

RIP V.1- It updates routing table by broadcast address


255.255.255.255 and it support class full address. It cannot send the
routing information to RIP V.2 but it can receive form it.

RIP V.2- It updates the routing table by multinetwork address


224.0.0.9 and it support classless address. RIP V2 can send the routing
information to RIP V1 but cannot receive form it.
2. IGRP is a distance vector Interior Gateway Protocol (IGP).IGRP uses a
composite metric that is calculated by factoring weighted mathematical
values for internetwork delay, bandwidth, reliability, and load. Network
administrators can set the weighting factors for each of these metrics,
although great care should be taken before any default values are
manipulated.
18 | P a g e

3. EIGRP Key capabilities that distinguish EIGRP from other routing


protocols include fast convergence, support for variable-length subnet mask,
support for partial updates, and support for multiple network layer protocols.

A router running EIGRP stores all its neighbors' routing tables so that it can
quickly adapt to alternate routes. If no appropriate route exists, EIGRP
queries its neighbors to discover an alternate route.
EIGRP does not make periodic updates. Instead, it sends partial updates only
when the metric for a route changes.

4. OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LSAs) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables is
included in OSPF LSAs. As OSPF routers accumulate link-state
information, they use the SPF algorithm to calculate the shortest path to
each node.

19 | P a g e

10. Password in Router


4. Enable password
It is a privilege level password but it stores the password in plain text.
How to set enable password:
Router>enable
Router#config terminal
Router<config>#enable password AKASH
Router<config>#exit
5. Secret password
It is also a privilege level password but it store the password in encrypted
form.
How to set secret password:
Router>enable
Router#config terminal
Router<config>#enable secret AKASH
Router<config>#exit

6. Line password
This password is asked before the user mode.
I.

Console password
Password used for the console port. And there is only 1 console port
so therefore we use console 0.
How to set console password:
Router>enable
20 | P a g e

Router#config terminal
Router<config>line console 0
Router<config-line>password AKASH
Router<config-line>login
Router<config-line>exit
II.

Auxiliary password
This password is used for auxiliary port in a router.
How to set auxiliary password:
Router>enable
Router#config terminal
Router#<config>line auxiliary 0
Router#<config-line>password AKASH
Router#<config-line>login
Router<config-line>exit

III.

Telnet password
This password is set to access router through telnet.To set the usermode password for Telnet access into the router, use the line vty
command. For vty password you must enable secret password.

How to set telnet password:


Router>enable
Rouetr#config terminal
Rouetr#<config>enable secret CCNA
Router<config>#line vty 0 4
Router<config-line>#password AKASH
Router<config-line>#login
Router<config-line>exit

11. VLAN

21 | P a g e

VLAN is a switched network that is logically segmented by functions, project


teams, or applications.
Without regard to the physical location of users. For example, several end stations
might be grouped as a department, such as engineering or accounting. When the
end stations are physically located close to one another, you can group them into a
LAN segment. If any of the end stations are in different buildings (not the same
physical LAN segment), you can then group them into a VLAN.
You can assign each switch port to a VLAN. Ports in a VLAN share broadcast
traffic. Ports that do not belong to that VLAN do not share the broadcast traffic.

12. NETWORK ADDRESS TRANSLATION (NAT)


NAT allows an Internet Protocol (IP) network to maintain public IP addresses
separately from private IP addresses. NAT is a popular technology for Internet
connection sharing. It is also sometimes used in server load balancing applications
on corporate networks.
In it's most common configuration, NAT maps all of the private IP addresses on a
home network to the single IP address supplied by an Internet Service Provider
(ISP). This allows computers on the home LAN to share a single Internet
connection. Additionally, it enhances home network security by limiting the access
of external computers into the home IP network space.

22 | P a g e

NAT works by snooping both incoming and outgoing IP datagrams. As needed, it


modifies the source or destination address in the IP header (and the affected
checksums) to reflect the configured address mapping. NAT technically supports
either fixed or dynamic mappings of one or more internal and external IP
addresses.
Network Address Translation allows a single device, such as a router, to act as
agent between the Internet (or "public network") and a local (or "private") network.
This means that only a single unique IP address is required to represent an entire
group of computers to anything outside their network.
The shortage of IP addresses is only one reason to use NAT.
Two other good reasons are:
Security
Administration

13. SERVERS
7. HTTP/HTTPS SERVERS
Hypertext Transfer Protocol Secure (HTTPS) is a communications
protocol for secure communication over a computer network, with especially
wide deployment on the Internet. Technically, it is not a protocol in and of
itself; rather, it is the result of simply layering the Hypertext Transfer
Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security
capabilities of SSL/TLS to standard HTTP communications.
23 | P a g e

8. DNS SERVER
The Domain Name System (DNS) is a standard technology for managing the
names of Web sites and other Internet domains. DNS technology allows you
to type names into your Web browser like compnetworking.about.com and
your computer to automatically find that address on the Internet.
A DNS server is any computer registered to join the Domain Name System.
A DNS server runs special-purpose networking software, features a public IP
address, and contains a database of network names and addresses for other
Internet hosts.

9. TFTP SERVER
TFTP stands for Trivial File Transfer Protocol. As the name suggests, TFTP
is a mechanism to transfer files from one device to another. It is typically
used by network administrator to copy configuration file, log file and
firmware to/from networking devices.
TFTP was designed to be small, simple and easy to implement. It uses UDP
port 69 and runs on IP networks. It doesnt provide any kind of error
handling capability so all the error handling has to be done at Layer 7 the
Application Layer.

10.FTP SERVER
24 | P a g e

An FTP server is a software.html application running the File Transfer


Protocol(FTP), which is the protocol for exchanging files over the Internet.

14

CODING USED IN PROJECT


ROUTER 1
Router>en
Router>conf terminal
Router(config)#ip dhcp pool jet
Router(dhcp-config)#network 10.0.0.0 255.0.0.0
Router(dhcp-config)#default-route 10.0.0.1
Router(dhcp-config)#dns-server 10.0.0.1
Router(dhcp-config)#^z
Router#conf ter
Router(config)#int f0/0
Router(config)#ip add 10.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#^z
Router#int s0/1/0
25 | P a g e

Router(config)#ip add 13.0.0.1 255.0.0.0


Router(config)#no shut
Router(config)#router ospf 1
Router(config-router)#network 10.0.0.0 0.255.255.255 area 1
Router(config-router)#network 13.0.0.1 0.255.255.255 area 0

ROUTER 2
Router>en
Router>conf terminal
Router(config)#ip dhcp pool jet
Router(dhcp-config)#network 11.0.0.0 255.0.0.0
Router(dhcp-config)#default-route 11.0.0.1
Router(dhcp-config)#dns-server 11.0.0.1
Router(dhcp-config)#^z
Router#conf ter
Router(config)#int f0/0
Router(config)#ip add 11.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#^z
Router#int s0/1/0
Router(config)#ip add 13.0.0.2 255.0.0.0
Router#int fs/0/1/1
Router(config)#ip add 14.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#router ospf 1
Router(config-router)#network 11.0.0.0 0.255.255.255 area 0
Router(config-router)#network 13.0.0.2 0.255.255.255 area 0
Router(config-router)#network 14.0.0.1 0.255.255.255 area 0

26 | P a g e

ROUTER 3
Router>en
Router>conf terminal
Router(config)#ip dhcp pool jet
Router(dhcp-config)#network 12 .0.0.0 255.0.0.0
Router(dhcp-config)#default-route 12.0.0.1
Router(dhcp-config)#dns-server 12.0.0.1
Router(dhcp-config)#^z
Router#conf ter
Router(config)#int f0/0
Router(config)#ip add 12.0.0.1 255.0.0.0
Router(config)#no shut
Router(config)#^z
Router#int s0/1/0
Router(config)#ip add 14.0.0.2 255.0.0.0
Router(config)#no shut
Router(config)#router ospf 1
Router(config-router)#network 12.0.0.0 0.255.255.255 area 2
Router(config-router)#network 14.0.0.2 0.255.255.255 area 0

Appendices

Refreence:

27 | P a g e

1.CCNA Routing and Switches portable Command Guide by Scott


Empson
2. Implementing Cisco by Jetking

28 | P a g e

También podría gustarte