0% found this document useful (0 votes)
73 views35 pages

Networking Project 7 Sem

The document discusses a networking project that will simulate packet flow through different parts of India using various routing protocols. The project will demonstrate how a packet travels from Patiala to Bangalore by traversing multiple routers using OSPF, EIGRP and Frame-Relay. Access control lists, NAT and route redistribution will also be implemented.

Uploaded by

Mohammad Zeeshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views35 pages

Networking Project 7 Sem

The document discusses a networking project that will simulate packet flow through different parts of India using various routing protocols. The project will demonstrate how a packet travels from Patiala to Bangalore by traversing multiple routers using OSPF, EIGRP and Frame-Relay. Access control lists, NAT and route redistribution will also be implemented.

Uploaded by

Mohammad Zeeshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

ABSTRACT

This project is totally dedicated to the fresh Network Engineer for new and smart learning of
the Network Structure. In this concept it is possible for the networker to check the incoming &
the outgoing traffic and to maintain some security concepts as well. In this logic we use the
multiple Routing Protocols in different areas of the countrywide WAN. Now it will show the
proper movement of the packet from one part of the country to the other part of the country.
The project starts working from Northern India. The user who is sitting at Patiala location need
to access Cisco server in bangalore. The project explains that how from Patiala location’s
computer, the packet moves out and reaches the Patiala’s Local ISP. From Patiala the WAN
comes into action and reaches Chandigarh followed by Delhi following the OSPF Multi-area
concept. The Packet flows out of Delhi towards the western Region of the country including
Gujrat & Maharashtra while following the EIGRP, The multiple Administrative Unit. The
Packet moves out of the West India and reaches the South-Western Part of India, Bangalore &
Southern Part of India by following Frame-Relay Switch Technology. The Bangalore’s Local
ISP make the packet reachable to the CISCO server. The Google webserver can be accessed at
the Southern Part of India as well.
The concept of Access Control List (ACL), Network Address Translation (NAT), and
Redistribution has also been applied along with the different Routing Protocols which have
been used including Routing Information Protocol (RIP), Open Shortest Path First (OSPF) &
Enhanced Interior Gateway Routing Protocol (EIGRP) as well.
Chapter 1
INTRODUCTION
Here are some ideas of projects in the Networking area. Some of these are new, and
some are ideas that have run before but could be run again. Note that, unlike the
normal project ideas, these ideas do not have a contact listed against them. They are
there to give you ideas of the sort of things that could be done. If a project idea
seems interesting, and you would like to pursue it further, then you should discuss it
with one of the lecturers who are experienced in the Networking area: Bill Buchanan,
Gordon Russell, Ahmed Al-Dubai, Imed Romdhani, Jim Jackson, Robert Ludwiniak
or Neil Urquhart. They may not be able to help you directly, but will at least be able to
point you to somebody better placed, perhaps because their specialist knowledge is
in the area of the project.
This introduces the underlying concepts behind networking using the
Internet and its protocols as examples. There are two goals:
(1) to give you an understanding of how networks, especially the Internet, work,
(2) to teach you network programming.
We will cover the first five chapters of Kurose in detail, working our way down
the network stack from the application layer to the data-link layer. Concurrent
with the lectures, you (in groups of two) will be building a functional TCP/IP
stack and a small web server that will run on it. What you build will be “real” –
your code will interoperate with other TCP/IP stacks and you’ll be able to talk to
your web server using any browser on any TCP/IP stack.
This is a learn-by-doing kind of class. You will get your hands dirty by
examining parts of our Internet infrastructure and building other parts. It will be
a lot of work, but it will also be a lot of fun, provided you enjoy this sort of thing.
We will assume that you do and that you will make a good faith effort. We don’t
want to have to spend too much time measuring your performance. If you care
about what we’re teaching, you’ll do a better job of that yourself, and if you don’t
care, then you should take some course that you do care about.
The goal of the networking project is to enable you to do the following:
Build implementations of the Internet protocols
Generalize this knowledge to other networking protocols.
Be a competent network and systems programmer.
Think like a networking practitioner
Read and judge articles on networking in trade magazines
Begin to read and judge research and technical articles on networking
Create simplicity and reliability out of complexity and unreliability
Structure and design software systems to achieve that simplicity and
Reliability
Chapter 2
Project Specification
2.1 Hardware Specification
CPU Speed :2GHz recommended or higher
Processor :Pentium Processor or above
Memory/RAM: 1GB minimum,2GB recommended or higher
Display Properties: Greater than 256 color depth
Size of Hard Disk:60 GB minimum
NIC Card

2.2 Software Specification


Software Used: Packet Tracer 5.3.2
Operating System: Microsoft Windows XP,Vista,7

2.2.1Packet Tracer

Packet Tracer is a Cisco router simulator that can be utilized in training and education, but
also in research for simple computer network simulations. The tool is created by Cisco
Systems and provided for free distribution to faculty, students, and alumni who are or have
participated in the Cisco Networking Academy. The purpose of Packet Tracer is to offer
students and teachers a tool to learn the principles of networking as well as develop Cisco
technology specific skills.

Features

The current version of Packet Tracer supports an array of simulated Application Layer
protocols, as well as basic routing with RIP,OSPF, and EIGRP, to the extent required by the
current CCNA curriculum. While Packet Tracer aims to provide a realistic simulation of
functional networks, the application itself utilizes only a small number of features found
within the actual hardware running a current CiscoIOS version. Thus, Packet Tracer is
unsuitable for modeling production networks. With the introduction of version 5.3, several
new features were added, including BGP. BGP is not part of the CCNA curriculum, but part
of the CCNP curriculum.
2.3PROJECT DETAIL

2.3.1Description:
Here we have 6 branches of a company in different cities, they are accessing internet through
ISP

2.3.2DEVICES USED
1. 16 SERIAL CABLES
2. 12 COPPER CROSS OVER
3. 22 COPPER STRAIGHT THROUGH
4. 7 ROUTERS
5. 6 SWITCHES(LAYER 2)
6. 13 PCs
7. 2 SERVERs- PT

2.3.3 PROTOCOLS USED


1. EIGRP 50 between Delhi, Mumbai & Chennai
2. EIGRP 100 between Chennai & bang lore
3. OSPF Area 1 at Patiala branch
4. OSPF Area 0 at Chandigarh Delhi branch.
5. VTP(VLAN TRUNKING PROTOCOL) at all SWITCHES
6. INTER VLAN at SWITCH 0 & 6 with the help of ROUTER(LAYER 3)
7. ACCESS LISTS
8. SUBNET MASKING
9. WILD CARD MASKING
10. STP(SPANNING TREE PROTOCOL)
11. NAT(NETWORK ADDRESS TRANSLATION)
Chapter 3
SYSTEM DESIGN
(TECHNOLOGY AND TOOLS USED)

3.1 Networking Technologies


Networks using a Star topology require a central point for the devices to connect. Originally
this device was called a concentrator since it consolidated the cable runs from all network
devices. The basic form of concentrator is the hub.

As shown in Figure; the hub is a hardware device that contains multiple, independent ports that
match the cable type of the network. Most common hubs interconnect Category 3 or 5 twisted-
pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs also exist. The hub
is considered the least common denominator in device concentrators. Hubs offer an
inexpensive option for transporting data between devices, but hubs don't offer any form of
intelligence. Hubs can be active or passive.

3.2SWITCHES

Switches are a special type of hub that offers an additional layer of intelligence to basic,
physical-layer repeater hubs. A switch must be able to read the MAC address of each frame it
receives. This information allows switches to repeat incoming data frames only to the computer
or computers to which a frame is addressed. This speeds up the network and reduces
congestion.

Switches operate at both the physical layer and the data link layer of the OSI Model.

3.3 BRIDGES

A bridge is used to join two network segments together, it allows computers on either segment
to access resources on the other. They can also be used to divide large networks into smaller
segments. Bridges have all the features of repeaters, but can have more nodes, and since the
network is divided, there is fewer computers competing for resources on each segment thus
improving network performance.

3.4 ROUTERS

Routers Are networking devices used to extend or segment networks by forwarding packets
from one logical network to another. Routers are most often used in large internetworks that
use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs)
to the Internet using dedicated leased lines.

Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI)
reference model for networking to move packets between networks using their logical
addresses (which, in the case of TCP/IP, are the IP addresses of destination hosts on the
network). Because routers operate at a higher OSI level than bridges do, they have better
packet-routing and filtering capabilities and greater processing power, which results in routers
costing more than bridges.

3.4.1 Routing tables

Routers contain internal tables of information called routing tables that keep track of all known
network addresses and possible paths throughout the internetwork, along with cost of reaching
each network. Routers route packets based on the available paths and their costs, thus taking
advantage of redundant paths that can exist in a mesh topology network.

Because routers use destination network addresses of packets, they work only if the configured
network protocol is a routable protocol such as TCP/IP or IPX/SPX. This is different from
bridges, which are protocol independent. The routing tables are the heart of a router; without
them, there's no way for the router to know where to send the packets it receives.

Unlike bridges and switches, routers cannot compile routing tables from the information in the
data packets they process. This is because the routing table contains more detailed information
than is found in a data packet, and also because the router needs the information in the table to
process the first packets it receives after being activated. A router can't forward a packet to all
possible destinations in the way that a bridge can.

Static routers: These must have their routing tables configured manually with all network
addresses and paths in the internetwork.
Dynamic routers: These automatically create their routing tables by listening to network
traffic.
Routing tables are the means by which a router selects the fastest or nearest path to the next
"hop" on the way to a data packet's final destination. This process is done through the use of
routing metrics.
Routing metrics which are the means of determining how much distance or time a packet will
require to reach the final destination. Routing metrics are provided in different forms.
hop is simply a router that the packet must travel through.
Ticks measure the time it takes to traverse a link. Each tick is 1/18 of a second. When the router
selects a route based on tick and hop metrics, it chooses the one with the lowest number of ticks
first.

You can use routers, to segment a large network, and to connect local area segments to a single
network backbone that uses a different physical layer and data link layer standard. They can
also be used to connect LAN's to a WAN's.

3.5 GATEWAYS

A gateway is a device used to connect networks using different protocols. Gateways operate at
the network layer of the OSI model. In order to communicate with a host on another network,
an IP host must be configured with a route to the destination network. If a configuration route
is not found, the host uses the gateway (default IP router) to transmit the traffic to the
destination host. The default gateway is where the IP sends packets that are destined for remote
networks. If no default gateway is specified, communication is limited to the local network.
Gateways receive data from a network using one type of protocol stack, removes that protocol
stack and repackages it with the protocol stack that the other network can use.

Examples
 E-mail gateways-for example, a gateway that receives Simple Mail Transfer Protocol
(SMTP) e-mail, translates it into a standard X.400 format, and forwards it to its
destination
 Gateway Service for NetWare (GSNW), which enables a machine running Microsoft
Windows NT Server or Windows Server to be a gateway for Windows clients so that
they can access file and print resources on a NetWare server
 Gateways between a Systems Network Architecture (SNA) host and computers on a
TCP/IP network, such as the one provided by Microsoft SNA Server
 A packet assembler/disassembler (PAD) that provides connectivity between a local area
network (LAN) and an X.25 packet-switching network
3.6 NICs (Network Interface Card)

Network Interface Card, or NIC is a hardware card installed in a computer so it can


communicate on a network. The network adapter provides one or more ports for the network
cable to connect to, and it transmits and receives data onto the network cable.

Wireless Lan card

Every networked computer must also have a network adapter driver, which controls the
network adapter. Each network adapter driver is configured to run with a certain type of
network adapter.

3.6.1Network card

3.6.2Adapter Functions Network Interface


Network interface adapters perform a variety of functions that are crucial to getting data to and
from the computer over the network.

These functions are as follows:


3.6.2.1 Data encapsulation
The network interface adapter and its driver are responsible for building the frame around the
data generated by the network layer protocol, in preparation for transmission. The network
interface adapter also reads the contents of incoming frames and passes the data to the
appropriate network layer protocol.
3.6.2.2 Signal encoding and decoding
The network interface adapter implements the physical layer encoding scheme that converts
the binary data generated by the network layer-now encapsulated in the frame-into electrical
voltages, light pulses, or whatever other signal type the network medium uses, and converts
received signals to binary data for use by the network layer.
3.6.2.3 Transmission and reception
The primary function of the network interface adapter is to generate and transmit signals of the
appropriate type over the network and to receive incoming signals. The nature of the signals
depends on the network medium and the data-link layer protocol. On a typical LAN, every
computer receives all of the packets transmitted over the network, and the network interface
adapter examines the destination address in each packet, to see if it is intended for that
computer.

3.6.2.4 Data buffering


Network interface adapters transmit and receive data one frame at a time, so they have built-in
buffers that enable them to store data arriving either from the computer or from the network
until a frame is complete and ready for processing.
3.6.2.5 Serial/parallel conversion
The communication between the computer and the network interface adapter runs in parallel,
that is, either 16 or 32 bits at a time, depending on the bus the adapter uses. Network
communications, however, are serial (running one bit at a time), so the network interface
adapter is responsible for performing the conversion between the two types of transmissions.
3.6.2.6 Media access control
The network interface adapter also implements the MAC mechanism that the data-link layer
protocol uses to regulate access to the network medium. The nature of the MAC mechanism
depends on the protocol used.
3.7 MODEMS

A modem is a device that makes it possible for computers to communicate over telephone lines.
The word modem comes from Modulate and Demodulate. Because standard telephone lines
use analog signals, and computers digital signals, a sending modem must modulate its digital
signals into analog signals. The computers modem on the receiving end must then demodulate
the analog signals into digital signals.

Modems can be external, connected to the computers serial port by an RS-232 cable or internal
in one of the computers expansion slots. Modems connect to the phone line using standard
telephone RJ-11 connectors.
3.8 FIREWALLS

In computing, a firewall is a piece of hardware and/or software which functions in a networked


environment to prevent some communications forbidden by the security policy, analogous to
the function of firewalls in building construction.
A firewall has the basic task of controlling traffic between different zones of trust. Typical
zones of trust include the Internet (a zone with no trust) and an internal network (a zone with
high trust). The ultimate goal is to provide controlled connectivity between zones of differing
trust levels through the enforcement of a security policy and connectivity model based on the
least privilege principle.

There are three basic types of firewalls depending on:

 whether the communication is being done between a single node and the network, or
between two or more networks
 whether the communication is intercepted at the network layer, or at the application
layer
 whether the communication state is being tracked at the firewall or not

3.9 Network protocols

A networked computer must also have one or more protocol drivers (sometimes called a
transport protocol or just a protocol). The protocol driver works between the upper-level
network software and the network adapter to package data to be sent on the network.

In most cases, for two computers to communicate on a network, they must use identical
protocols. Sometimes, a computer is configured to use multiple protocols. In this case, two
computers need only one protocol in common to communicate. For example, a computer
running File and Printer Sharing for Microsoft Networks that uses both NetBEUI and TCP/IP
can communicate with computers using only NetBEUI or TCP/IP.

In this project we are using three protocols:-

 RIPV2

 OSPF

 EIGRP
3.9.1 RIPV2

The Routing Information Protocol (RIP) is a distance-vector routing protocol, which


employs the hop count as a routing metric. RIP prevents routing loops by implementing a
limit on the number of hops allowed in a path from the source to a destination. The maximum
number of hops allowed for RIP is 15. This hop limit, however, also limits the size of
networks that RIP can support. A hop count of 16 is considered an infinite distance and used
to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process.
RIP version 2 (RIPv2) was developed in 1993 and last standardized in 1998. It included the
ability to carry subnet information, thus supporting Classless Inter-Domain Routing (CIDR).
To maintain backward compatibility, the hop count limit of 15 remained. RIPv2 has facilities
to fully interoperate with the earlier specification if all Must Be Zero protocol fields in the
RIPv1 messages are properly specified. In addition, a compatibility switch feature allows
fine-grained interoperability adjustments.
In an effort to avoid unnecessary load on hosts that do not participate in routing,
RIPv2 multicasts the entire routing table to all adjacent routers at the address 224.0.0.9, as
opposed to RIPv1 which uses broadcast. Unicast addressing is still allowed for special
applications.

3.9.2 OSPF

Open Shortest Path First (OSPF) is a link-state routing protocol for Internet Protocol (IP)
networks. It uses a link state routing algorithm and falls into the group of interior routing
protocols, operating within a single autonomous system (AS). It is defined as OSPF Version
2 in (1998) for IPv4 The updates for IPv6 are specified as OSPF Version 3
OSPF is perhaps the most0 widely used interior gateway protocol (IGP) in large enterprise
networks. IS-IS, another link-state dynamic routing protocol, is more common in large
service provider networks. The most widely used exterior gateway protocol is the Border
Gateway Protocol (BGP), the principal routing protocol between autonomous systems on the
Internet
.OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets solely within
a single routing domain (autonomous system). It gathers link state information from available
routers and constructs a topology map of the network. The topology determines the routing
table presented to the Internet Layer which makes routing decisions based solely on the
destination IP address found in IP packets. OSPF was designed to support variable-length
subnet masking (VLSM) or Classless Inter-Domain Routing (CIDR) addressing models.
OSPF detects changes in the topology, such as link failures, and converges on a new loop-
free routing structure within seconds. It computes the shortest path tree for each route using a
method based on Dijkstra's algorithm, a shortest path first algorithm.
The OSPF routing policies to construct a route table are governed by link cost factors
(external metrics) associated with each routing interface. Cost factors may be the distance of
a router (round-trip time), network throughput of a link, or link availability and reliability,
expressed as simple unitless numbers. This provides a dynamic process of traffic load
balancing between routes of equal cost.
An OSPF network may be structured, or subdivided, into routing areas to simplify
administration and optimize traffic and resource utilization. Areas are identified by 32-bit
numbers, expressed either simply in decimal, or often in octet-based dot-decimal notation,
familiar from IPv4 address notation.

3.9.3 EIGRP
Enhanced Interior Gateway Routing Protocol - (EIGRP) is an open routing
protocol loosely based on their original IGRP created by Cisco. EIGRP is an
advanced distance-vector routing protocol, with optimizations to minimize both
the routing instability incurred after topology changes, as well as the use of bandwidth and
processing power in the router. Routers that support EIGRP will automatically redistribute
route information to IGRP neighbors by converting the 32 bit EIGRP metric Update
Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a
mechanism for fast convergence
CHAPTER 4
SNAPSHOTS

4.1PROJECT SCENARIO

4.2 RUNNING COFGURATION


RUNNING CONFIG (PATIALA BRANCH)

hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
!
interface FastEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.1.9 255.255.255.248
!
interface FastEthernet0/0.20
encapsulation dot1Q 20
ip address 192.168.1.17 255.255.255.248
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 192.168.2.1 255.255.255.0
!
interface Serial0/0/1
no ip address
shutdown
!
interface Vlan1
no ip address
shutdown
!
router ospf 1
router-id 1.1.1.1
log-adjacency-changes
network 192.168.1.0 0.0.0.255 area 1
network 192.168.2.0 0.0.0.255 area 0
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login

RUNNING CONFIGUATION(CHANDIGARH BRANCH)

hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
ipv6 unicast-routing
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
!
interface Serial0/0/0
ip address 192.168.2.2 255.255.255.0
clock rate 64000
!
interface Serial0/0/1
ip address 172.16.1.2 255.255.255.0
clock rate 64000
!
interface Vlan1
no ip address
shutdown
!
router ospf 1
router-id 2.2.2.2
log-adjacency-changes
network 172.16.1.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 0
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login

RUNNING CONFIG (DELHI BRANCH)


hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
ip address 172.16.2.1 255.255.255.0
ip access-group 100 in
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 172.16.3.3 255.255.255.0
clock rate 64000
!
interface Serial0/0/1
ip address 172.16.1.3 255.255.255.0
!
interface Vlan1
no ip address
shutdown
!
router eigrp 100
redistribute ospf 1 metric 1000 1 1 255 1500
network 172.16.3.0 0.0.0.255
no auto-summary
!
router ospf 1
router-id 3.3.3.3
log-adjacency-changes
redistribute eigrp 100 subnets
network 172.16.1.0 0.0.0.255 area 0
network 172.16.2.0 0.0.0.255 area 0
default-information originate
!
ip classless
!
!
access-list 100 deny tcp 172.16.2.0 0.0.0.255 host 10.1.5.2 eq www
access-list 100 deny tcp 172.16.2.0 0.0.0.255 host 200.10.40.200 eq
www
access-list 100 permit ip any any
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login

RUNNING CONFIG (MUMBAI BRANCH)

hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
ip address 172.16.4.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 172.16.3.4 255.255.255.0
!
interface Serial0/0/1
ip address 172.16.5.4 255.255.255.0
clock rate 64000
!
interface Vlan1
no ip address
shutdown
!
router eigrp 100
network 172.16.5.0 0.0.0.255
network 172.16.4.0 0.0.0.255
network 172.16.3.0 0.0.0.255
no auto-summary
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login

RUNNING CONFIG (CHENNAI BRANCH)

hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
ip address 10.1.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 10.1.2.5 255.255.255.0
encapsulation frame-relay
frame-relay map ip 10.1.2.6 506 broadcast
!
interface Serial0/0/1
ip address 172.16.5.5 255.255.255.0
!
interface Vlan1
no ip address
shutdown
!
router eigrp 100
redistribute eigrp 50
network 172.16.5.0 0.0.0.255
no auto-summary
!
router eigrp 50
redistribute eigrp 100
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
no auto-summary
!
router ospf 1
log-adjacency-changes
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login

RUNNING CONFIG (BANGALORE BRANCH)

hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 10.1.5.2
!
!
spanning-tree mode pvst
!
!
!
!
interface FastEthernet0/0
ip address 10.1.3.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 10.1.5.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface Serial0/0/0
ip address 200.10.10.1 255.255.255.0
ip nat outside
!
interface Serial0/0/1
ip address 10.1.2.6 255.255.255.0
encapsulation frame-relay
frame-relay map ip 10.1.2.5 605 broadcast
ip nat inside
!
interface Vlan1
no ip address
shutdown
!
router eigrp 50
redistribute rip metric 1000 0 1 255 1500
redistribute static
network 10.1.2.0 0.0.0.255
no auto-summary
!
router rip
version 2
redistribute eigrp 50 metric 2
network 10.0.0.0
default-information originate
no auto-summary
!
ip nat inside source list 10 interface Serial0/0/0 overload
ip nat inside source static 10.1.5.2 200.10.10.2
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
!
!
access-list 10 permit 192.168.1.8 0.0.0.7
access-list 10 permit 192.168.1.16 0.0.0.7
access-list 10 permit 192.168.2.0 0.0.0.255
access-list 10 permit 172.16.1.0 0.0.0.255
access-list 10 permit 172.16.3.0 0.0.0.255
access-list 10 permit 172.16.2.0 0.0.0.255
access-list 10 permit 172.16.4.0 0.0.0.255
access-list 10 permit 172.16.5.0 0.0.0.255
access-list 10 permit 10.1.1.0 0.0.0.255
access-list 10 permit 10.1.2.0 0.0.0.255
access-list 10 permit 10.1.3.0 0.0.0.255
access-list 10 permit 10.1.4.0 0.0.0.255
access-list 10 permit 10.1.5.0 0.0.0.255
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login
RUNNING CONFIG (ISP)

hostname Router
!
!
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
!
!
!
!
!
!
!
!
!
ip name-server 0.0.0.0
!
!
spanning-tree mode pvst
!
!
!
!
interface Loopback0
ip address 200.10.20.200 255.255.255.0
!
interface Loopback1
ip address 200.10.30.200 255.255.255.0
!
interface FastEthernet0/0
ip address 200.10.40.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 200.10.50.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 200.10.10.200 255.255.255.0
clock rate 64000
!
interface Serial0/0/1
no ip address
shutdown
!
interface Vlan1
no ip address
shutdown
!
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
password cisco
login
VLAN (SWITCH 1)
Switch>sh vlan

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6
Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/18
Fa0/19, Fa0/20, Fa0/21, Fa0/22
10 VLAN0010 active Fa0/1
20 VLAN0020 active Fa0/2
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup

VLAN Type SAID MTU Parent RingNo BridgeNo Stp


BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0

Remote SPAN VLANs


------------------------------------------------------------------------------

Primary Secondary Type Ports


------- --------- ----------------- ----------------------------------------
CHAPTER 5
COMMANDS USED
BASIC COMMANDS
 ENABLE : To go in priviledge mode
 CONFIGURE TERMINAL : To go in global configuration mode
 ENABLE PASSWORD <VALUE> : To give password
 ENABLE SECRET <VALUE> : To give secret password
 LINE CONSOLE 0 : To go in line console mode
 EXECUTION TIMEOUT 0 : To make console never go to sleep in line console
mode
 LOGGING SYNCHRONOUS : To avoid the messages it also run in line console
mode
 SHOW RUNNING CONFIGURATION:
 SHOW IP INTERFACE BRIEF : To show the IP configuration
 INTERFACE FASTETHERNET0/0 : To give the IP configuration of fast ethernet
 INTERFACE SERIAL0/0 : To give the IP configuration of serial interface
 NO SHUTDOWN : To make interface up
 CLOCKRATE 64000 : To provide clock rate to DCE end of serial cable

ROUTING COMMANDS

STATIC ROUTING COMMANDS:


 IN global config mode)# ip route <destination network ip><subnet mask><exit
interface><permanent>
For ex.) # ip route 10.1.1.0 255.255.255.0 20.1.1.2

DEFAULT ROUTING COMMANDS:


 In global config mode)# ip route <destination network ip><subnet mask><exit
interface><permanent>
For ex.) # ip route 0.0.0.0 0.0.0.0 20.1.1.2

DYNAMIC ROUTING COMMANDS


 RIP COMMANDS:

In global config mode) # router rip


Router) # network <directly connected n/w ip>
For ex.) # network 10.0.0.0
) # network 20.0.0.0

TO CHANGE RIP VERSION:


In global config mode) # router rip
Router) # version 2
Router) # do show ip route(to check version)
Router) # debug ip rip(shows all updates of multicasting & broadcasting)

EIGRP COMMANDS:
In global config mode) # router eigrp <AD value>
-config) # router eigrp 100
-router) # network < n/w id of directly connected><wild card mask>
-router) # network 10.1.1.0 0.0.0.255

OSPF COMMANDS:
IN global config mode) # router ospf <process id>
-config) # router ospf 100
-router) # network <network id of directly connected><subnet mask><area 0>
-router) # network 192.168.1.0 0.0.0.255 area 0
-router) # do show ip ospf neigbour(to check the neighbourship)
-router) # do show ip ospf database(to check the database of the events)

TO APPLY ACCESS LISTS:


STANDARD AND EXTENDED

1. Standard
-config) # access-list 10 deny host 10.1.1.2
-config) # access-list 10 permit any
-config) # int fa0/0
-int) # ip access-group 10 in
2. Extended
-config) # access-list 10 deny ip host 10.1.1.2 host 20.1.1.2
-config) # access-list 10 permit ip any any
-config) # int fa0/0
-Int) # ip access group 10 in
) # no access list

TO CREATE VLANs
1. To give name to vlan:
-config) # vlan 2
-config) # name xyz
2. To add interfaces to VLAN
-config) # int fa0/0
-int) # switchport mode access
-int) # switchport access vlan2

3. To do trunking
-config) # int fa0/0
-int) # switchport mode trunk
-int) # switchport mode dynamic desirable

4. TO APPLY VTP:
-config) # vtp mode server
-config) # vtp domain cisco.com
-config) # vtp cisco123
-config) # do show vtp status
-config) # debug sw-vlan vtp events
-config) # do show cdp neighbours

5. To make VLAN native:


-config) # switchport trunk native vlan 2
Chapter 6
RESULT AND FUTURE SCORE
6.1 RESULT
All the branches coumnicating with each other and access the internet via ISP using internet
and network protocls.

6.2 FUTURE SCOPE


Perhaps the greatest concern companies have in doing business over the Internet is the security
risk. Hackers, denial-of-service (DoS) attacks, identity theft, and even
cyber-terrorism are very real dangers. In addition, you may wonder how to guarantee the
performance and reliability of your Internet-based services. Or, you may not be certain that you
have the resources and support needed to deploy and manage e-commerce services and
processes.

The good news is that a sound network infrastructure can address all these issues. At the
foundation of a robust e-commerce infrastructure are the routers and switches.

An integrated approach to routing and switching lets all workers—even those at different
sites—have the same access to business applications, unified communications, and
videoconferencing as their colleagues at headquarters.
Cisco lets you grow your network over time, adding features and functionality as you need
them while ensuring complete investment protection. An added benefit of this integrated
approach is that your IT personnel can centrally
manage the network from headquarters, which keeps staffing counts low.
REFERENCES
1. www.google.com
2. www.cbtnuggets.com

You might also like