0% found this document useful (0 votes)
182 views11 pages

CCNA Summer Training Report

The document provides information about Rohit M's summer training report on CCNA (Cisco Certified Network Associate) certification conducted at Amazing Training Basket Pvt. Ltd under the supervision of Mr. Suraj Mahato. It includes an introduction to CCNA certification, the content covered such as TCP/IP model, declaration by Rohit M, acknowledgement and certificate by the supervisor.

Uploaded by

Rohit Chaurasia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
182 views11 pages

CCNA Summer Training Report

The document provides information about Rohit M's summer training report on CCNA (Cisco Certified Network Associate) certification conducted at Amazing Training Basket Pvt. Ltd under the supervision of Mr. Suraj Mahato. It includes an introduction to CCNA certification, the content covered such as TCP/IP model, declaration by Rohit M, acknowledgement and certificate by the supervisor.

Uploaded by

Rohit Chaurasia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

JAYPEE INSTITUTE OF INFORMATION TECHNOLOGY

SUMMER TRAINING REPORT

CCNA
(CISCO CERTIFIED NETWORK ASSOCIATE)

SUBMITTED BY: Rohit M (16102038)

UNDER THE SUPERVISION OF

Mr. Suraj Mahato (Training instructor)

Amazing Training Basket Pvt. Ltd

A-40 Unit No:-A 302 3rd Floor, I-Thum Building, Sector-62, Noida Uttar Pradesh
201309 India

Submitted in partial fulfillment of the Bachelor of Technology


DEPARTMENT OF ELECTRONICS AND COMMUNICATIONS
JAYPEE INSTITUTE OF INFORMATION TECHNOLOGY, NOIDA
CERTIFICATE
This is to certify that the work titled “CCNA” submitted by Rohit M in partial
fulfillment for the award of degree of B-Tech in Electronics & Communication of
Jaypee Institute of Information Technology, Noida sector-62 has been carried
out under my supervision. This work has not been submitted partially or wholly to
any other University or Institute for the award of this or any other degree or diploma.

Signature of Supervisor …………………….......

Name of Supervisor …………………….......

Designation …………………….......

Date …………………….......
DECLARATION

I hereby declare that the Report of the Industrial Project Work entitled “CCNA” whose brief
report is being submitted to Jaypee Institute of Information Technology, Noida, in the
partial fulfilment of the requirements for the award of the Degree of B. Tech in the
Department of Electronics & Communication Engineering, is a bonafide report of the work
carried out by me. *The material contained in this Report has not been submitted to any
University or Institution for the award of any degree.

Due to Security reasons, the content provided in this report shall be devoid of pictures and
any material that might prove as a threat to company’s security related to confidential data,
and the author of this report truly understands this fact.

Therefore, any content with ASTERISK MARK (*) was CONFIDENTIAL, and was not
included in the report by the author to preserve the COMPANY’S SECURITY.

Rohit M …...…..............
ACKNOWLEDGEMENT

Writing this industrial training project report happens to be one of the satisfying
achievements of my life. Writing this report justifies the fact of my complete presence at the
work area both mentally and physically, and the love that I experience for the
telecommunication and networking is inexplicable.
I am indebted to those who provided assistance, help and support at nearly all aspects.
I am also thankful to my mentor who provided guidance at nearly all aspects Mr. Suraj
Mahato, for giving me the required information to explore and study various components
and their principles behind it.

Rohit M ………………
INTRODUCTION

CCNA (Cisco Certified Network Associate) is an information technology (IT)


certification from Cisco. CCNA certification is an associate-level Cisco Career
certification.
The Cisco exams have changed several times. In 2013, Cisco announced an
update to its certification program that "aligns certification and training curricula with
evolving industry job roles." There are now several different types of Cisco-Certified
Network Associate, with "CCNA Routing and Switching" being closest to the original
CCNA focus; other types of CCNA focus on security, cloud, collaboration, security
operations, design, data center technologies, industrial plants, service providers,
and wireless.
The content of the exams is proprietary. Cisco and its learning partners offer a
variety of different training methods, including books published by Cisco Press, and
online and classroom courses available under the title "Interconnecting Cisco
Network Devices".
To achieve CCNA Routing and Switching certification, one must earn a passing
score on Cisco exam #200-125, or combined passing scores on both the
"Interconnecting Cisco Network Devices" ICND1 #100-105 and ICND2 #200-105
exams. Passing the ICND1 grants one the Cisco Certified Entry Networking
Technician (CCENT) certification. Passing scores are set by using statistical
analysis and are subject to change. At the completion of the exam, candidates
receive a score report along with a score breakout by exam section and the passing
score for the given exam. Cisco does not publish exam passing scores because
exam questions and passing scores are subject to change without notice.
The 200-125 CCNA is the composite exam associated with the Cisco
Certified Network Associate Routing & Switching certification. This exam
tests a candidate's knowledge and skills required to install, operate, and
troubleshoot a small to medium size enterprise branch network. The
topics include connecting to a WAN; implementing network security;
network types; network media; routing and switching fundamentals; the
TCP/IP and OSI models; IP addressing; WAN technologies; operating
and configuring IOS devices; extending switched networks
with VLANs; determining IP routes; managing IP traffic with access
lists; establishing point-to-point connections; and establishing Frame Relay
connections
CONTENT

TCP\IP model

The OSI Model we just looked at is just a reference/logical model. It was designed
to describe the functions of the communication system by dividing the
communication procedure into smaller and simpler components. But when we talk
about the TCP/IP model, it was designed and developed by Department of Defense
(DoD) in 1960s and is based on standard protocols. It stands for Transmission
Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the
OSI model. It contains four layers, unlike seven layers in the OSI model. The layers
are:

1. Network Access Layer –


This layer corresponds to the combination of Data Link Layer and Physical Layer of
the OSI model. It looks out for hardware addressing and the protocols present in
this layer allows for physical transmission of data. We just talked about ARP being
a protocol of Internet layer, but there is a conflict about declaring it as a protocol of
Internet Layer or Network access layer. It is described as residing in layer 3, being
encapsulated by layer 2 protocols.

2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols
which are responsible for logical transmission of data over the entire network. The
main protocols residing at this layer are :

1. IP –stands for Internet Protocol and it is responsible for delivering packets


from the source host to the destination host by looking at the IP addresses in
the packet headers. IP has 2 versions: IPv4 and IPv6. IPv4 is the one that
most of the websites are using currently. But IPv6 is growing as the number
of IPv4 addresses are limited in number when compared to the number of
users.
2. ICMP –stands for Internet Control Message Protocol. It is encapsulated
within IP datagrams and is responsible for providing hosts with information
about network problems.

3. ARP –stands for Address Resolution Protocol. It’s job is to find the hardware
address of a host from a known IP address. ARP has several types: Reverse
ARP, Proxy ARP, Gratituous ARP and Inverse ARP.

3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for
end-to-end communication and error-free delivery of data. It shields the upper-layer
applications from the complexities of data. The two main protocols present in this
layer are :

1. Transmission Control Protocol (TCP) –It is known to provide reliable and


error-free communication between end systems. It performs sequencing and
segmentation of data. It also has acknowledgement feature and controls the
flow of the data through flow control mechanism. It is a very effective protocol
but has a lot of overhead due to such features. Increased overhead leads to
increased cost.

2. User Datagram Protocol (UDP) –On the other hand does not provide any
such features. It is the go to protocol if your application does not require
reliable transport as it is very cost-effective. Unlike TCP, which is connection-
oriented protocol, UDP is connectionless.

4. Process Layer –
This layer performs the functions of top three layers of the OSI model: Application,
Presentation and Session Layer. It is responsible for node-to-node communication
and controls user-interface specifications. Some of the protocols present in this
layer are : HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS,
DHCP, NFS, X Window, LPD. Have a look at Protocols in Application Layer for
some information about these protocols. Protocols other than those present in the
linked article are :

1. HTTP and HTTPS –HTTP stands for Hyper-text transfer protocol. It is


used by the World Wide Web to manage communications between web
browsers and servers. HTTPS stands for HTTP-Secure. It is a combination
of HTTP with SSL(Secure Socket Layer). It is efficient in cases where the
browser need to fill out forms, sign in, authenticate and carry out bank
transactions.

2. SSH –SSH stands for Secure Shell. It is a terminal emulations software


similar to Telnet. The reason SSH is more preferred is because of its ability
to maintain encrypted connection. It sets up a secure session over a
TCP/IP connection.

3. NTP –NTP stands for Network Time Protocol. It is used to synchronize the
clocks on our computer to one standard time source. It is very useful in
situations like bank transactions. Assume the following situation without the
presence of NTP. Suppose you carry out a transaction, where your
computer reads the time at 2:30 PM while the server records it at 2:28 PM.
The server can crash very badly if it’s out of sync.
ACRONYMS

1. CCNA: Cisco Certified Network Associate


2. IT: Information Technology
3. ICND: Interconnecting Cisco Network Devices
4. CCENT: Cisco Certified Entry Networking Technician
5. WAN: Wide Area Networks
6. TCP: Transmission Control Protocol
7. IP: Internet Protocol
8. OSI: Open Systems Interconnection
9. VLAN: Virtual Local Area Network
10. ARP: Address Resolution Protocol
11. ICMP: Internet Control Message Protocol
12. UDP: User Datagram Protocol
13. HTTP: Hyper Text Transfer Protocol
14. FTP: File Transfer Protocol
15. TFTP: Trivial File Transfer Protocol
16. SSH: Secure Shell
17. SMTP: Simple Mail Transfer Protocol
18. SNMP: Simple Network Management Protocol
19. NTP: Network Time Protocol
20. DNS: Domain Name System
21. DHCP: Dynamic Host Configuration Protocol
22. NFS: National Financial Switch
23. LPD: Label Distribution Protocol
24. SSL: Secure Sockets Layer
AUTHOR’S ACKNOWLEDGEMENT
In short, training institute is like an extended college life and in our college and school days,
we make friends, maintain a healthy relation and help each other when needed, similar
algorithm applies in the institute as well. You need to maintain a good relation and be
informative about everything, there must be a joy and a passion of doing your own projects
and other out of the field projects as well (I’m very grateful to Mr. Suraj Mahato for
refreshing this fact (which I know) to me again. Golden rule according to him: “Never say
No to any task assigned to you, do it with your full integrity and learn something new out of
it as we are continuously in learning state”).

You might also like