You are on page 1of 65

A FEASIBILITY STUDY OF

CAN (Campus Area Network)


6 WEEKS INDUSTRIAL TRAINING
At

ACADEMY FOR IT PROFESSIONALS

(From 17/06/2013 to 31/07/2012)

Submitted by
Anjali sangwan

Maharaja Surajmal Institute

Bachelor in Computer Applications (BCA)


2011-2014

DECLARATION CERTIFICATE

This is to certify that the project work entitled CAN (Campus Area Network) is our own work carried out at AITP from 17/01/2012 to 10/05/2012 under the supervision of Mr.TULSIDAS CHOUHAN, NETWORK ADMINISTRATOR.

SIGNATURE Mr. TULSI DAS CHOUHAN

TO WHOM IT MAY CONCERN


I hereby certify that Anjali Sangwan Roll No. 01014902011 of BCA from Maharaja Surajmal Institute , has undergone 6 weeks industrial training from 17/06/2013 to 31/07/2013 at our organization AITP Noida to fulfill the requirements to be awarded a BCA degree .They worked on CAN (Campus Area Network) project during the training under my supervision. During her tenure with us we found her very sincere and hard working.

AITP NOIDA

MAHARAJA SURAJMAL INSTITUTE

BONAFIDE CERTIFICATE

Certified that this project report CAN (Campus Area Network) is the bonafide work of Anjali Sangwan (enrollment No. 01014902011) who carried out the project work under my supervision.

Mr. Kumar Gaurav Department of Computer Science Maharaja Surajmal Institute C-4, Janakpuri New Delhi 110058

ABSTRACT
The CAN network is the lifeblood of any Small to Medium Campus with more than one site or other departments. It enables access to Different information and allows for profitable and effective communication flows between employees. Network equipment is mature and ubiquitous, but the quality of services provided by similar networks varies from department to department. Planning a network in a developing a campus is almost like planning it in the middle of a desert. This project briefly discusses the architecture of a Campus network. It examines the barriers to planning, designing and implementing a Campus network. This project also covers the methods to implement external level networks. In this project we will start from working basic router configuration then covering the Routing technologies required to route data between branches. After that we have implemented eigrp, nat, vlan, trunking and Acl as it is considered a good choice to connect multiple locations using single interface of router and reduce the hardware costs. For Public connectivity we are also using DNS. In this setup NAT is very essential in which we have translated live IP into local and vice-versa. In short we can say a lot of technologies are studied and implemented for the successful completion of the project.

Acknowledgement

Gratitude is not a thing of expression; it is more matter of feeling."

There is always a sense of gratitude which one express towards others for their help and supervision in achieving the goals. This formal piece of acknowledgement is an attempt to express the feeling of gratitude towards people who helpful me in successfully completing of my training. I would like to express my deep gratitude to, my training coordinator for their constant co-operation. He was always there with his competent guidance and valuable suggestion throughout the pursuance of this research project. Having this opportunity, I would like to express my profound gratitude and deep regards to my supervisor Mr . Kumar Gaurav for his exemplary guidance, monitoring, timely suggestion, and constant encouragement throughout the course of this project and helped me to complete this project. The blessing, help and

guidance given by him time to time shall carry me a long way in the journey of life. I would also like to thank ACADEMY FOR IT PROFESSIONALS for providing me with an opportunity to pursue my industrial training, as it is an important part of BCA course and it is the one that exposes you to the industry standards & makes you adapt yourself to the latest trends and technologies. At the same time, it gives an experience of working on a project . Above all no words can express my feelings to my parents, friends all those persons who supported me during my project. I am also thankful to all the respondents whose cooperation & support has helped me a lot in collecting necessary information.

TABLE OF CONTENT
1. 1.1 1.2 1.3 1.4 1.5 2. 2.1 2.2 2.3 28 INTRODUCTION About The Project Purpose Project organization About company Objectives of projects IP ROUTING List of used devices technologies configured Scenario IP routing 2.4 Types of routing 13 14 15 16 20 22 23 26

3. 3.1

DYNAMIC ROUTING AND ITS TYPE 32 Routing 3.3

Types Of Dynamics Routing Protocols 3.2 Information Protocol 41 Routing Information Protocol version 2 44 4.
4.1 4.2 4.3 4.4 4.5

EIGRP
Link state routing Enhanced interior gateway routing protocols Dual Algorithm Configuration of Eigrp In Project Configuration Of Nat 46 47 48 50 52

5.
5.1 5.2 5.3 5.4

VLAN
Virtual lan How created Vlan Configuration Of Vlan In Project 70 71 72 73

6.
6.1 6.2 6.3

NAT & ACL


Basic Configuration Of NAT Basic Configuration Of ACL NAT 99 100 102

6.4

ACL

103

7. CONCLUSION 7.1 7.2 Career Scope Future Scope BIBLOGRAPHY 140 141 142

List of tables 1.) Show Command Table 2 .) Configuration Command Table 3. ) Ospf Routing Table 4. ) Acronyms Table 5.) Show Ip Interface Table 6.) Neighbour Ship Table

List of Symbols, Abbreviations

1.) 2.) 3.) 4.) 5.) 6.) 7.)

& = And EIGRP=Enhanced Interior Gateway Routing Protocol NAT=Network Address Translation TCP=Transfer Control Protocol VTP=VLAN Trunk Protocol VLAN=Virtual Local Area Network LOAD BALANCING

INTRODUCTION
1.1 About the Project In this project we will start from working basic router configuration then covering the Routing technologies required to route data between branches. After that we have implement CAN and EIGRP is considered a good choice because it connects multiple location using single interface of router and reduce the hardware costs. For Internet connectivity we are also using frame relay. In this setup NAT is very essential in which we have translate live IP into local and vice-versa. In short we can say a lot of technologies are studied and implemented for the successful completion of the project. Following list of technologies that are required in this project. Administration of Router ROUTING TYPES OF ROUTING BENIFITS OF STATIC AND DYNAMIC ROUTING SCALABILITY OF NETWORKS

PURPOSE Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (Circuit switching) , electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily with routing in electronic data networks using packet switching technology. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes, typically hardware devices called routers, bridges, gateways, firewalls, or switches. General-purpose computers can also forward

packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the router's memory, is very important for efficient routing. Most routing algorithms use only one network path at a time, but multipath routing techniques enable the use of multiple alternative paths. Routing, in a more narrow sense of the term, is often contrasted with bridging in its assumption that network addresses are structured and that similar addresses imply proximity within the network. Because structured addresses allow a single routing table entry to represent the route to a group of devices, structured addressing (routing, in the narrow sense) outperforms unstructured addressing (bridging) in large networks, and has become the dominant form of addressing on the Internet, though bridging is still widely used within localized environments. 1.3 Project Organization This project is divided into three main parts. In this project there are three logically area that is described following:1. Eigrp configuration area having autonomous system number 2 globally. 2. This eigrp configuration enables the for the data passing. It passes out through various paths by doing load balancing. 3.Acl is established for the reference who will be the allowed authority to enter in which link for data. NAT is also maintained for addresses translation. 1.4 About Company

ACADEMY OF IT PROFESSIONALS was founded in 2000 by a group of highly qualified Technocrats (with proven expertise in varied technology domains) as a Centre for education, training & network development at Delhi. AITP holds the distinction of being a unique group, offering a variety of services with their comprehensive training and online consultancy experiences. We not only offer our services to our direct corporates, but are also providing services on

behalf

of

well

known

organizations

We are a leading Training Institute with a mission to provide comprehensive and accurate training information to all the prospective value conscious training buyers for any domain. At Academy of IT professionals, we are your career partner, providing you with a lifetime of progressive learning products, which will ensure you have the knowledge, flexibility and interest to sustain a rewarding and exciting career. Whether youre just starting out in the IT industry, want to change jobs, looking for a promotion or set up your own consulting business, AITP has the right building blocks for your career. We recognize that your career must be built to your own specifications. Thats why AITP focuses on e-learning solutions, based on training courses from recognized global e-learning leaders, including Cisco. Wherever possible, we make learning at your own pace, in your own time (and with your own special focus) as easy as possible, with online peer forums, articles, 24/7 mentoring support and other support services. Unlike other elearning products, opening the box means only the beginning of your relationship with AITP. Practical training constitutes an integral part of engineering studies. The training gives an opportunity to the students to express themselves to the industrial environment which is quite different from the teaching classroom .The training enables the student to work in the future .It enables the student to

undergo those experiences which help them later when they join an organization. Industrial training is a major part of course. It is period in which we are introduced to the industrial environment or in other words we can say that industrial training is provided for the familiarization with the industrial environment, with the advancement in computer technologies and increased automation in the industries for increasing their production. In organization where Making Things Right in the first instance is the driving motto, perfection and accuracy are inevitable. The objective of training is to raise the level of performance on one or more of its aspects and this may be achieved by providing new knowledge and information relevant to a job. During this period, the students get the real, firsthand experience for working in the actual environment. Most of the theoretical knowledge that has been gained during the course of their studies is put to test here. It covers all that remains uncovered in the classroom i.e. without it our studies remains ineffective and incomplete. Apart from this, the students get an opportunity to learn the latest technology, which immensely helps them in building their career. Our business is dedicated to delivering good quality, inexpensive services that will improve the quality of work at all levels in an organization. We strongly believe in "Business goes where it is invited and stays where it is well treated. OUR VISION:Our business is dedicated to delivering good quality, inexpensive services that will improve the quality of work at all levels in an organization. We strongly believe in "Business goes where it is invited and stays where it is well treated.

Academy of IT professionals vision is to harness the computers to bring about a quantum change in the quality of life of each one of us. High Technologies Solutions is thus focused on three things: education, e-learning & network development. WHY AITP: Comprehensive and accurate training 10 Years of Experience More than 10,000 students trained More than 2500 students been placed in industry Trained faculty from industry 24/7 mentoring support Strives towards unearthing the hidden talent in each personality Groom the dexterity & facilitate the individual by making his/her flair to become his/her forte Strong combination of consultation and technological services Best ambience, Best Result Focus would be on practical side of knowledge, and subjects Qualified, dedicated & experienced faculty Best infrastructure Separate R&D Deppt SERVICES Services Corporate Training There is a big challenge of to be up to date with the continuous changes in technologies for the companies today. Therefore, getting their employees a training program of latest technologies is a matter of concern for the management.

Because of increased work pressure companies do not get sufficient time to develop & analyze their own training programs. We at AITP offers training programs for companies entering to new technologies or just brush up the existing one with different area of scope. We have successfully completed more than 100 corporate training programs to our valued customers . If you have the requirements relating to this scope of IT corporate training, Just click on the link & get the solution customized to your requirements.

Venue facilities if you are looking to run an IT training course , Interviews, host a meeting or small conference , AITP can help with the its state of the art venue facility. Our Space is fully equipped computer training / meeting rooms and conference rooms available for hire at competitive daily and weekly rates. The rooms are ideal for computer training courses, workshops, meetings, seminars and small conferences. The facility seats 6 comfortably, but can accommodate 8 if necessary. The room is air-conditioned and is equipped with flip chart and data projector. We also have a breakaway room for teas and coffees (included), and lunches can be provided at an additional cost / person. Standard Training Room Equipment & Stationery*:

White board with whiteboard markers Data projector 1 Computer per delegate (flat screen) File/Pen/Paper *Additional equipment can be ordered on your behalf and charged accordingly

OUR TEAM

Presently we have a strong technical team of certified professionals for catering to these solutions and have presence in Delhi and Noida. We have skilled team of engineers who are experienced in design, programming. We are having more than 15 engineers who are having prestigious certifications like CCNA,CCNP,CCSP,CCSA,MCSE,RHCE,E-HACKING,JAVA &Programming.

Support Area (network solutions)

a) LINUX / UNIX networks b) SUN networks c) CISCO devices (Routers, Switches, Firewalls, Cache Engine, RAS etc) d) Bandwidth Manager software and hardware e) Radio Links f) Security Solutions

AITP provide the following Courses in given below: Network Training

a) CISCO CCNA, CCNP,CCSP,CCIE b) RED HAT LINUX

c) E-HACKING d) WINDOWS 2000, 2003 (MCP,MCSA & MCSE)

Software Training

a) JAVA

Our core strength is our commitment, technical expertise and cost effective solutions. We ensure high service levels and prompt support availability leading to lower downtime.

AITP is a leader in education services and developer of innovative embedded solutions. To meet the demands of Post PC era AITP provides complete solutions as well as design-to-order services to satisfy our customers.

For ACADEMY FOR IT PROFESSIONALS NAZIA KHAN +9717626117.

Head Office ACADEMY FOR IT PROFESSIONALS 702-7TH FLOOR SOMDATT CHAMBER 2, NEAR HAYAT AGENCY,

BHIKAJI GAMA PLACE ,NEW DELHI. 011-26182282 1.5 Objectives Of Project

IP Routing is an umbrella term for the set of protocols that determine the path that data follows in order to travel across multiple networks from its source to its destination. Data is routed from its source to its destination through a series of routers, and across multiple networks. The IP Routing protocols enable routers to build up a forwarding table that correlates final destinations with next hop addresses. These protocols include:

BGP(Border Gateway Protocol) IS-IS (Intermediate System - Intermediate System) OSPF (Open Shortest Path First) RIP (Routing Information Protocol)

When an IP packet is to be forwarded, a router uses its forwarding table to determine the next hop for the packet's destination (based on the destination IP address in the IP packet header), and forwards the packet appropriately. The next router then repeats this process using its own forwarding table, and so on until the packet reaches its destination. At each stage, the IP address in the packet header is sufficient information to determine the next hop; no additional protocol headers are required. The Internet, for the purpose of routing, is divided into Autonomous Systems (ASs). An AS is a group of routers that are under the control of a single administration and exchange routing information using a common routing protocol. For example, a corporate intranet or an ISP network can usually be regarded as an individual AS. The Internet can be visualized as a partial mesh of ASs. An AS can be classified as one of the following three types.

2.1

LIST OF USED DEVICES & TECHNOLOGIES CONFIGURED

1. CISCO ROUTER 2. CORE LAYER SWITCH 3. DISTRIBUTION LAYER SWITCH 4. ACCESS LAYER SWITCHES TECHNOLOGIES TO CREATE NETWORK Router1 IP ADDRESSING ROUTING Core Switch1 VTP server VLAN database Trunk Links Configuring IP & Gateway Vlan Port Membership Distribution Switches Configuring IP & Gateway Trunk Link Configuration Vlan Port Membership 2.2 SCENARIO

2.3

IP Routing

When we want to connect two or more networks using different n/w addresses then we have to use IP Routing technique. The router will be used to perform routing between the networks. A router will perform following functions for routing. Path determination Packet forwarding (1) Path determination The process of obtaining path in routing table is called path determination. There are three different methods to which router can learn path. i) Automatic detection of directly connected n/w. ii) Static & Default routing iii) Dynamic routing (2) Packet forwarding It is a process that is by default enable in router. The router will perform packet forwarding only if route is available in the routing table. Routing Process (i) The pc has a packet in which destination address is not same as the local n/w address. (ii) The pc will send an ARP request for default gateway. The router will reply to the ARP address and inform its Mac address to pc. (iii) The pc will encapsulate data, in which source IP is pc itself, destination IP is server, source Mac is pcs LAN interface and destination Mac is routers LAN interface.

S. MAC PC2 D. IP40.0.0.1 S. IP 45.0.0.4

D. MAC R1

The router will receive the frame, store it into the buffer. When obtain packet from the frame then forward data according to the destination IP of packet. The router will obtain a route from routing table according to which next hop IP and interface is selected (iv) According to the next hop, the packet will encapsulated with new frame and data is send to the output queue of the interface. 2.4 Types Of Routing Static Routing In this routing, we have to use IP route commands through which we can specify routes for different networks. The administrator will analyze whole internetwork topology and then specify the route for each n/w that is not directly connected to the router. Steps to perform static routing (1) Create a list of all n/w present in internetwork. (2) Remove the n/w address from list, which is directly connected to n/w. (3) Specify each route for each routing n/w by using IP route command. Router(config)#ip route <destination n/w> <mask> <next hop ip> Next hop IP it is the IP address of neighbor router that is directly connected our router. Static Routing Example: Router#conf ter Router(config)#ip route 10.0.0.0 255.0.0.0 192.168.10.2 Advantages of static routing (1) Fast and efficient. (2) More control over selected path. (3) Less overhead for router. (4) Bandwidth of interfaces is not consumed in routing updates. Disadvantages of static routing

(1) More overheads on administrator. (2) Load balancing is not easily possible. (3) In case of topology change routing table has to be change manually. Alternate command to specify static route Static route can also specify in following syntax: Old Router(config)#ip route 172.16.0.0 255.255.0.0 172.25.0.2 Or Router(config)#ip route 172.16.0.0 255.255.0.0 serial 0 Backup route or loading static route If more than one path are available from our router to destination then we can specify one route as primary and other route as backup route. Administrator Distance is used to specify one route as primary and other route as backup. Router will select lower AD route to forward the traffic. By default static route has AD value of 1. With backup path, we will specify higher AD so that this route will be used if primary route is unavailable. Protocols AD Directly Connected Static 1 BGP 20 EIGRP 90 IGRP 100 OSPF 110 RIP 120 0

Syntax: - To set backup path Router(config)#ip route <dest. n/w> <mask> <next hop> <AD> Or <exit interface> Example: Router#conf ter Router(config)#ip route 150.10.0.0 255.255.0.0 150.20.0.5 Router(config)#ip route 150.10.0.0 25.255.0.0 160.20.1.1 8 (below 20) Router(config)#exit

Default Routing Default routing means a route for any n/w. these routes are specify with the help of following syntax: Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop> Or <exit interface> This type of routing is used in following scenario.

Scenario 1: Stub network A n/w which has only one exit interface is called stub network.

If there is one next hop then we can use default routing. Scenario 2 Internet connectivity On Internet, million of n/ws are present. So we have to specify default routing on our router. Default route is also called gateway of last resort. This route will be used when no other routing protocol is available.

Router9(config)#ip route 10.0.0.0 255.0.0.0 172.16.0.5 Router9(config)#ip route 0.0.0.0 0.0.0.0 200.100.100.11 To display routing table Router#sh ip route

To display static routes only Router#sh ip route static S 192.168.10.0/28 [1/0] via 172.16.0.5 To display connected n/ws only Router#sh ip route connected To check all the interface of a router Router#sh interface brief Dynamic Routing In dynamic routing, we will enable a routing protocol on router. This protocol will send its routing information to the neighbor router. The neighbors will analyze the information and write new routes to the routing table. The routers will pass routing information receive from one router to other router also. If there are more than one path available then routes are compared and best path is selected. Some examples of dynamic protocol are: RIP, IGRP, EIGRP, OSPF

3.1

Types of Dynamic Routing Protocols

According to the working there are two types of Dynamic Routing Protocols.

(1) Distance Vector (2) Link State According to the type of area in which protocol is used there are again two types of protocol: (1) Interior Routing Protocol (2) Exterior Routing Protocol Autonomous system Autonomous system is the group of contiguous routers and n/w, which will share their routing information directly with each other. If all routers are in single domain and they share their information directly with each other then the size of routing updates will depend on the no. of n/w present in the Internetwork. Update for each n/w may take 150 200 bytes information. For example: - if there are 1000 n/ws then size of update will be 200*1000 = 200000 bytes The routing information is send periodically so it may consume a large amount of bandwidth in our n/w.

Protocols Interior Routing RIP

Exterior Routing BGP

IGRP EIGRP OSPF

EXEIGRP

Distance Vector Routing The Routing, which is based on two parameters, that is distance and direction is called Distance Vector Routing. The example of Distance Vector Routing is RIP & IGRP. Operation: (1) Each Router will send its directly connected information to the neighbor router. This information is send periodically to the neighbors.

(2) The neighbor will receive routing updates and process the route according to following conditions: (i) If update of a new n/w is received then this information is stored in routing table. (ii) If update of a route is received which is already present in routing table then route will be refresh that is route times is reset to zero. (iii) If update is received for a route with lower metric then the route, which is already present in our routing table. The router will discard old route and write the new route in the routing table. (iv) If update is received with higher metric then the route that is already present in routing table, in this case the new update will be discard. (3) A timer is associated with each route. The router will forward routing information on all interfaces and entire routing table is send to the neighbor. There are three types of timers associated with a route. (i) Route update timer It is the time after which the router will send periodic update to the neighbor.

(ii) Route invalid timer It is the time after which the route is declared invalid, if there are no updates for the route. Invalid route are not forwarded to neighbor routers but it is still used to forward the traffic. (iii) Route flush timer It is the time after which route is removed from the routing table, if there are no updates about the router. Metric of Dynamic Routing Metric are the measuring unit to calculate the distance of destination n/w. A protocol may use a one or more than one at a time to calculate the distance. Different types of metric are: (1) Hop Count (2) Band Width (3) Load (4) Reliability (5) Delay (6) MTU Hop Count It is the no. of Hops (Routers) a packet has to travel for a destination n/w. Bandwidth Bandwidth is the speed of link. The path with higher bandwidth is preferred to send the data. Load Load is the amount of traffic present in the interface. Paths with lower load and high throughput are used to send data. Reliability Reliability is up time of interface over a period of time. Delay Delay is the time period b/w a packet is sent and received by the destination. MTU Maximum Transmission Unit It is the maximum size of packet that can be sent in a frame mostly MTU is set to 1500.

Problems of Distance Vector There are two main problems of distance vector routing Bandwidth Consumption Routing Loops Bandwidth Consumption The problem of accessive bandwidth consumption is solved out with the help of autonomous system. It exchanges b/w different routers. We can also perform route summarization to reduce the traffic. Routing Loops It may occur b/w adjacent routers due to wrong routing information. Distance Vector routing is also called routing by Rumor. Due to this the packet may enter in the loop condition until their TTL is expired. Method to solve routing loops There are five different methods to solve or reduce the problem of routing loop. Maximum Hop Count Flash Updates/Triggered Updates Split Horizon Poison Reverse Hold Down Maximum Hop Count This method limits the maximum no. of hops a packet can travel. This method does not solve loop problem. But it reduce the loop size in the n/w. Due to this method the end to end size of a n/w is also limited. Flash Updates/Triggered Updates In this method a partial update is send to the all neighbors as soon as there is topology change. The router, which receives flash updates, will also send the flash updates to the neighbor routers.

Split Horizon Split Horizon states a route that update receive from an interface can not be send back to same interface.

3.2

Routing Information Protocol

Features of RIP: * Distance Vector * Open standard * Broadcast Updates (255.255.255.255) * Metric Hop Count *Timers Update 30 sec Invalid 180 sec Hold 180 sec Flush 240 sec * Loop Control Split Horizon Triggered Updates Maximum Hop Count Hold Down * Maximum Hop Count 15 * Administrative Distance 120 * Equal Path Cost Load Balancing * Maximum Load path 6 Default 4 * Does not support VLSM * Does not support Autonomous system

Configuring RIP Router#conf ter Router(config)#router rip Router(config-router)#network <own net address> Router(config-router)#network <own net address> --------------------------Router(config-router)#exit Router(config-router)#network 10.0.0.0 Router(config-router)#network 172.16.0.0 Router(config-router)#network 200.100.100.0

175.2.0.0 via 172.16.0.6 Display RIP Routers Router#sh ip route rip R 192.168.75.0/24 [120/5] via 172.30.0.2 00:00:25 serial 1/0 RIP Dest. n/w mask AD Metric Next Hop Timer own Interface RIP advanced configuration Passive Interfaces An interface, which is not able to send routing updates but able to receive routing update only is called Passive Interface. We can declare an interface as passive with following commands: Router#conf ter Router(config)#router rip Router(config-router)#Passive-interface <type> <no> Router(config-router)#exit Configuring Timers Router(config)#router rip Router(config-router)#timers basic <update> <invalid> <hold down> <flush> Router(config-router)#exit Example: Router(conf-router)#timer basic 50 200 210 300 Update 50 sec Invalid 200 sec Hold 210 sec Flush 300 sec To change Administrative Distance Router(config)#router rip Router(config-router)#distance <value> Router(config-router)#exit 95 or 100 To configure Load Balance

RIP is able to perform equal path cost Load Balancing. If multiple paths are available with equal Hop Count for the destination then RIP will balance load equally on all paths. Load Balancing is enabled by default 4 paths. We can change the no. of paths. It can use simultaneously by following command: Router(config)#router rip Router(config-router)#maximum-path <1-6> To display RIP parameters Router#sh ip protocol This command display following parameters: (i) RIP Timers (ii) RIP Version (iii) Route filtering (iv) Route redistribution (v) Interfaces on which update send (vi) And receive (vii) Advertise n/w (viii) Passive interface (ix) Neighbor RIP Routing information sources Administrative Distance

3.3

RIP version 2

RIP version 2 supports following new features: (1) Support VLSM (send mask in updates) (2) Multicast updates using address 224.0.0.9 Support authentication

Commands to enable RIP version 2 We have to change RIP version 1 to RIP version 2. Rest all communication will remain same in RIP version 2. Router(config)#Router RIP Router(config-router)#version 2 Router(config-router)#exit To debug RIP routing Router#debug ip rip

To disable debug routing Router#no debug ip ripl

4.1 Link State Routing This type of routing is based on link state. Its working is explain as under (1) Each router will send Hello packets to all neighbors using all interfaces. (2) The router from which Hello reply receive are stored in the neighborship table. Hello packets are send periodically to maintain the neighbor table. (3) The router will send link state information to the all neighbors. Link state information from one neighbor is also forwarded to other neighbor. (4) Each router will maintain its link state database created from link state advertisement received from different routers. (5) The router will use best path algorithm to store the path in routing table. Problems of Link State Routing The main problems of link state routing are: (1) High bandwidth consumption. (2) More hardware resources required that is processor and memory (RAM) The routing protocols, which use link state routing are: OSPF

4.2

Enhanced Interior Gateway Routing Protocol

Features: * Cisco proprietary * Hybrid protocol Link State Distance Vector * Multicast Updates using Address 224.0.0.10 * Support AS * Support VLSM * Automatic Route Summarization * Unequal path cost load balancing

* Metric (32 bit composite) Bandwidth Delay Load Reliability MTU * Neighbor Recovery * Partial updates * Triggered updates * Backup Route * Multi Protocol Routing

EIGRP Protocols & Modules (1) Protocol depended module Reliable Transport Protocol (Quiet Protocol) RTP is used to exchange routing updates with neighbor routers. It will also maintain neighbor relationship with the help of Hello packet. RTP has following features: (1) Multicast updates (224.0.0.10) (2) Neighbor recovery If neighbor stops responding to the Hello packets then RTP will send unicast Hello packet for that neighbor. (3) Partial updates (4) No updates are send if there is no topology change. 4.3 Diffusing Update Algorithm (DUAL) DUAL is responsible for calculating best path from the topology table. Dual has following features: * Backup Path * VLSM * Route queries to neighbor for unknown n/w. Configuring EIGRP Router(config)#router eigrp <as no> Router(config-router)#network <net addr.> Router(config-router)#network <net addr.>

Router(config-router)#exit Advanced Configuration EIGRP Configuring following options are same as configuring IGRP (1) Bandwidth on Interfaces (2) Neighbor (3) Load balancing Max path Variance Configuring EIGRP Metric If we want our router to use additional metric then we can use following command: Router(config)#Router eigrp <as no> Router(config-router)#metric weights 0 <k1> <k2> <k3> <k4> <k5> Type of service (default) 1 Router(config-router)#exit 0 1 0 0

Metric Bandwidth Load Delay Reliability MTU

K K1 K2 K3 K4 K5 1 0 1 0 0

Default value

All routers exchanging update with each other must have same AS no. and same K value. 4.4 Configurtion Of Routers OF Project Running On Eigrp Having Process 2 Configuartion of R1

R0>

R0>en R0#CONFIG T R0(CONFIG)#ROUTER EIGRP 1 R0(config-router)#NETWORK 11.0.0.0 R0(config-router)#NETWORK 12.0.0.0 R0(config-router)#NO AUTO-SUMMARY R0(config-router)#EXIT

R0#show ip interface brief Interface IP-Address OK? Method Status Protocol

FastEthernet0/0

unassigned

YES

unset up

up

FastEthernet0/0.1

192.168.1.1

YES

manual up

up

FastEthernet0/0.2

10.0.0.1

YES

manual up

up

FastEthernet0/0.3

172.16.0.1

YES

manual up

up

FastEthernet0/1

unassigned

YES unset administratively down down

Serial0/0

11.0.0.1

YES manual up

up

Serial0/1

12.0.0.1

YES manual up

up

Serial0/2

unassigned

YES unset administratively down down

Serial0/3

unassigned

YES unset administratively down down

FastEthernet1/0

unassigned

YES unset administratively down down

FastEthernet1/1 R1#conf t

unassigned

YES unset administratively down down

Enter configuration commands, one per line. End with CNTL/Z. R1(config)# R1(config)# R1(config)#router eigrp 1 R1(config-router)#network 1.1.1.1 R1(config-router)#network 200.0.0.0 R1# *May 3 00:34:36.687: %SYS-5-CONFIG_I: Configured from console by console R1#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP

i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

1.0.0.0/30 is subnetted, 1 subnets C 1.1.1.0 is directly connected, Serial0/1 2.0.0.0/30 is subnetted, 1 subnets D 2.2.2.0 [90/3193856] via 200.0.0.2, 00:04:36, Serial0/0

D 10.0.0.0/8 [90/2684416] via 1.1.1.1, 00:04:35, Serial0/1 11.0.0.0/30 is subnetted, 1 subnets D 11.0.0.0 [90/2681856] via 1.1.1.1, 00:04:35, Serial0/1 12.0.0.0/30 is subnetted, 1 subnets D 12.0.0.0 [90/3193856] via 1.1.1.1, 00:04:35, Serial0/1 18.0.0.0/27 is subnetted, 1 subnets D 18.0.0.0 [90/2684416] via 200.0.0.2, 00:04:36, Serial0/0 161.30.0.0/24 is subnetted, 1 subnets D 161.30.10.0 [90/2684416] via 200.0.0.2, 00:04:36, Serial0/0 170.0.0.0/30 is subnetted, 1 subnets D 170.0.0.0 [90/2681856] via 200.0.0.2, 00:04:36, Serial0/0

D 172.16.0.0/16 [90/2684416] via 1.1.1.1, 00:04:35, Serial0/1 176.11.0.0/30 is subnetted, 1 subnets

176.11.11.0 [90/2681856] via 200.0.0.2, 00:04:36, Serial0/0 181.91.0.0/30 is subnetted, 1 subnets

181.91.0.0 [90/2681856] via 200.0.0.2, 00:04:36, Serial0/0

D 192.168.1.0/24 [90/2684416] via 1.1.1.1, 00:04:35, Serial0/1 D 192.168.50.0/24 [90/2684416] via 200.0.0.2, 00:04:36, Serial0/0 200.0.0.0/30 is subnetted, 1 subnets C 200.0.0.0 is directly connected, Serial0/0

Router#show ip ? access-lists List access lists arp dhcp eigrp interface nat ospf protocols rip route ssh IP ARP table Show items in the DHCP database IP-EIGRP show commands IP interface status and configuration IP NAT information OSPF information IP routing protocol process parameters and statistics IP RIP show commands IP routing table Information on SSH

Router#show ip eigrp ? interfaces IP-EIGRP interfaces neighbors IP-EIGRP neighbors

topology traffic

IP-EIGRP Topology Table IP-EIGRP Traffic Statistics

Router#sh ip eigrp ne Router#sh ip eigrp neighbors IP-EIGRP neighbors for process 1 H Address Interface (sec) 0 200.0.0.2 1 1.1.1.1 Se0/0 Se0/1 Hold Uptime (ms) SRTT RTO Q Seq

Cnt Num 1000 0 30 1000 0 38

13 00:10:49 40 12 00:10:47 40

For Router 2-

Router>ena Router#sh ip eigrp nei? neighbors Router#sh ip eigrp nei Router#sh ip eigrp neighbors IP-EIGRP neighbors for process 1 H Address Interface (sec) 0 176.11.11.2 1 2.2.2.2 Se0/0 Se0/1 Hold Uptime (ms) SRTT RTO Q Seq

Cnt Num 1000 0 29 1000 0 26

14 00:14:28 40 13 00:14:28 40

Router#sh ip int brief Interface IP-Address OK? Method Status Protocol

FastEthernet0/0

161.30.10.10

YES manual up

up

FastEthernet0/1

unassigned

YES unset administratively down down

Serial0/0

176.11.11.1

YES manual up

up

Serial0/1

2.2.2.1

YES manual up

up

Serial0/2

unassigned

YES unset administratively down down

Serial0/3

unassigned

YES unset administratively down down

FastEthernet1/0

unassigned

YES unset administratively down down

FastEthernet1/1

unassigned

YES unset administratively down down

Configuration for nat

Router#show ip nat tran Router#show ip nat translations Router#show ip nat translations

Router#show ip nat translations Router#show ip nat translations Pro Inside global Inside local 20.0.0.1:13 20.0.0.1:14 20.0.0.1:15 20.0.0.1:16 Outside local Outside global 200.168.0.2:13 200.168.0.2:14 200.168.0.2:15 200.168.0.2:16

icmp 192.168.50.1:13 icmp 192.168.0.1:14 icmp 192.168.0.1:15 icmp 192.168.0.1:16

200.168.0.2:13 200.168.0.2:14 200.168.0.2:15 200.168.0.2:16

Debug EIGRP Router#debug ip eigrp IP-EIGRP: Processing incoming UPDATE packet

IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960 IP-EIGRP: Ext 192.168.0.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960 IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960 IP-EIGRP: 172.69.43.0 255.255.255.0, - do advertise out Ethernet0/1 IP-EIGRP: Ext 172.69.43.0 255.255.255.0 metric 371200 - 256000 115200 IP-EIGRP: 192.135.246.0 255.255.255.0, - do advertise out Ethernet0/1 IP-EIGRP: Ext 192.135.246.0 255.255.255.0 metric 46310656 - 45714176 596480 IP-EIGRP: 172.69.40.0 255.255.255.0, - do advertise out Ethernet0/1 IP-EIGRP: Ext 172.69.40.0 255.255.255.0 metric 2272256 - 1657856 614400 IP-EIGRP: 192.135.245.0 255.255.255.0, - do advertise out Ethernet0/1 Router#debug ip eigrp summary For few debug

5.1 VLAN When mapping VLANs onto the new hierarchical network design, keep these parameters in mind. Examine the subnetting scheme that has been applied to the network and associate a VLAN to each subnet. Configure routing between VLANs at the distribution layer using multilayer switches. Make end-user VLANs and subnets local to a specific switch block. Ideally, limit a VLAN to one access switch or switch stack. However, it may be necessary to extend a VLAN across multiple access switches within a switch block to support a capability such as wireless mobility. 5.2 DEFINING VLAN The term end-to-end VLAN refers to a single VLAN that is associated with switch ports that are widely dispersed throughout an enterprise network. Traffic for this VLAN is carried throughout the switched network. If many VLANs in a network are end-to-end, special links (trunks) are required between switches to carry the traffic of all the different VLANs. An end-to-end VLAN has these characteristics: The VLAN is geographically dispersed throughout the network. Users are grouped into the VLAN regardless of physical location. As a user moves throughout a campus, the VLAN membership of that user remains the same. Users are typically associated with a given VLAN for network management reasons. All devices on a given VLAN typically have addresses on the same IP subnet. 5.3 VLAN CONFIGURATION MODE

Global Mode Switch# configure terminal Switch(config)# vlan 1 Switch(config-vlan)# name Vlan1 Switch(config-vlan)# exit

Switch(config)# end

6)CCNA / CCNP Tutorial: Introduction To NAT

By Chris Bryant, CCIE #12933 A Free Excerpt From The Bryant Advantage Ultimate CCNA Study Guide Network Address Translation (NAT) is not only an important topic for CCNA and CCNP exams, but its also a very commonly used technique for allowing end users access to the Internet while not revealing the end users true IP address. CCNA and CCNP candidates need to know how to configure NAT, and so does anyone who works in network administration. NAT is one of the most commonly used network technologies out there, and understanding how and why it is used is vital to all network personnel. Why Do We NAT? NAT allows private networks all over the world to use the same internal network numbers, while still allowing their users (or perhaps just some users) access to the Internet. In this way, NAT serves as a form of IP address conservation. Imagine how many IP addresses would be necessary if every single office around the world required IP addresses that were not duplicated anywhere else in the world! The addresses that private networks around the world use are the RFC 1918 private addresses, sometimes referred to as 1918 addresses. A word to the wise: Know these, and know them cold. I should be able to call you at 2AM and ask you what these are, and get an immediate response. :)

The RFC 1918 Private Addresses Class A 10.0.0.0 / 8 Class B 172.16.0.0 / 12 Class C 192.168.0.0 /16
Note that the masks used with the RFC 1918 private addresses are NOT the default masks for Class A, B, and C. These IP addresses are not used on any public networks. By public networks, we mean networks connected to the Internet. Its my experience that the Class C 1918 addresses are the most commonly used by offices, banks, and other organizations. If a bank and a school in your home city are both using the 192.168.0.0 /16 network on their internal networks, theres no problem until some of the users on either network

want to access the Internet.


Internet Access and RFC 1918 Addresses Using private addresses is fine until a host using a private address wants to communicate with a device on the Internet. Consider what happens if a workstation with a private IP address attempts to contact www.cisco.com. Ciscos web server would receive a packet from a host with a source address on an RFC 1918 network. How would the server know how to respond to the private address if its not used anywhere on the internet? This illustration shows us where the problem would come in on a network that is not running NAT. In this situation, no user on a private network can successfully communicate with an Internet host. These networks can communicate with Internet hosts by using NAT. NAT stands for Network Address Translation, and that's exactly what is going to happen: the RFC 1918 source address is going to be translated to another address as it leaves the private

network, and it will be translated back to its original address as the return data enters the private network. NAT can be defined statically or dynamically. While you need to know both for your CCNA and CCNP exams, I recommend you use dynamic NAT whenever possible. The average office has enough users to make configuring static NAT a royal pain. If a limited number of hosts on a private network need Internet access, static NAT may be the appropriate choice. Static NAT maps a private address to a public one. In this example, there are three internal PCs on an RFC1918 private network. The router's ethernet0 interface is connected to this network, and the Internet is reachable via the Serial0 interface. The IP address of the serial interface is 210.1.1.1 /24, with all other addresses on the 210.1.1.0 /24 network available. Three static mappings are needed to use Static NAT. The interfaces must be configured for NAT as well. Configuring the interfaces for Network Address Translation. The Ethernet network is the inside network; the Serial interface leading to the Internet is the outside network . R3(config)#interface ethernet0 R3(config-if)#ip address 10.5.5.8 255.0.0.0 R3(config-if)#ip nat inside R3(config-if)#interface serial0 R3(config-if)#ip address 210.1.1.1 255.255.255.0 R3(config-if)#ip nat outside The static mappings are created and verified. R3#conf t R3(config)#ip nat inside source static 10.5.5.5 210.1.1.2 R3(config)#ip nat inside source static 10.5.5.6 210.1.1.3 R3(config)#ip nat inside source static 10.5.5.7 210.1.1.4 R3#show ip nat translations Pro Inside global Inside local Outside local Outside global --- 210.1.1.2 10.5.5.5 --- ----- 210.1.1.3 10.5.5.6 --- ----- 210.1.1.4 10.5.5.7 --- --R3#show ip nat statistics

Total active translations: 3 (3 static, 0 dynamic; 0 extended) Outside interfaces: Serial0 Inside interfaces: Ethernet0 Hits: 0 Misses: 0 Expired translations: 0
show ip nat statistics displays the number of static and dynamic mappings. If you only have a few users on your RFC 1918 network that will use the Internet (or should be allowed to), static NAT will do just fine. For most networks, though, dynamic NAT is a better solution. This article was contributed by Chris Bryant from http://www.thebryantadvantage.com

6.3)-ACL Manager Overview ACL Manager helps you manage Access Control Lists (ACLs) on Cisco routers running IOS and catalyst switches. It presents a user-friendly graphical user interface that allows you to concentrate on the security of your network without having to learn the complex syntax of ACLs. ACL Manager runs as an additional component (an add-on) to Resource Manager Essentials (Essentials), and provides you with the means to easily address, solve, and reduce configuration problems related to ACLs. These topics introduce you to some of the concepts and features of ACL Manager: ACL Terms and Definitions What Is ACL Manager? ACL Manager Tools ACL Manager Privilege Levels ACL Terms and Definitions Access Control List (ACL, ACL Definition) and Access Control Entry (ACE): An ACL consists of one or more ACEs that collectively define the network traffic profile. This profile can then be referenced by IOS features such as traffic filtering, priority or custom queuing, dynamic access control, encryption, Telnet access, and so on. Each ACE includes an action element (permit or deny) and a filter element based upon criteria such as source address, destination address, protocol, protocol-specific parameters, and so on. 6.4)-ACCESS-LISTS COMMANDRouter>ENA Router#SH ACC Router#SH ACCess-lists Extended IP access list 101 permit ip 10.0.0.0 0.0.0.255 host 18.0.0.3 permit ip 192.168.1.0 0.0.0.255 host 18.0.0.5 permit ip 172.16.0.0 0.0.0.255 host 18.0.0.4 permit ip 170.0.0.0 0.0.0.255 18.0.0.0 0.0.0.255 deny ip any any

Conclusion
7.1) Career Scope This chapter provides me an opportunity to do self-introspection of what value We have added to my knowledge and skill set and to the project. 7.1.1. Domain Experience AITP is working on various technologies. Also the individual responsibilities are more. So, we have learnt a lot. 7.1. 2. Exposure to entirely different technology Working on CCNA.CCNP for the first time was a very enriching experience. we had also worked on this platform earlier. So it added to my list of know how and the computer connectivity known to me.7 7.1. 3. Implimentation Of Static Routing We had earlier do networking but worked on GNS for the first time. We learnt many new things about internetworking of computers, concept of ip routing and switching etc. We learn many things theoretically as part of our curriculum but here we got a chance to apply my knowledge practically and enhance it also at the same time.

7.1 .4. Implementation of EIGRP ,NAT&ACL

We have implemented the EIGRP in the routing protocol, which provides the interconnection between more than two network. This protocols contains all the configuration commands for routing of the packet in the network.We had always read about methods for interconnecting but this was again the first time we got to implement the interconnection of different networks. So it was a very new and realistic experience. 7.1.5. Implementation of EIGRP we have also designed the network of enterprize on which running on the enhanced interior gateway routing protocol . In this enterprize network I have also implement the network address translation .which convert the private ip address into the public ip address for conneting to the internet. As this is Internetworking protocols Network of the entrprize connect the different lan of the company with each other.for connectiviy of different lan something methods required.this method is eigrp and use the dual algorithm for connectivity of the lans. After completing the eigrp on enterprize lan there are require the connectivity to the internet and also require connection to another company through the internet service provider rotuer .so there are require some some protocol run on the internet service provider router.for this purpose we run the border gateway routing protocol on the service provider network.so here our goal to design the internet model through various elements for this we have completed the bgp cofiguration by practically.

7.2) Future Scope Completion of the development process will result in a cisco package that will provide user-friendly environment, which is very easy to work with, even for people with very little knowledge of computer. Management of various tasks is incorporated in the configuration and will deliver the required information in a very easy way and easy to access manner. This network topology will run on accuracy, efficiency, speed and easiness to the end user. Since the system is verified with valid as well as invalid address and is run with an insight into the necessary modifications that may require in the future, it can be maintained successfully without much effort.

BIBLIOGRAPHY CATALOGUES Training sessions conducted by company itself.

BOOKS CCNA Study Guide CCNP Route Official Certification Guide CCNP Switch Official Certification Guide Todd Lammle Wendell Odom David Hucaby

WEBSITES www.ciscopress.com www.sybex.com www.lammle.com www.theccertzone.com www.boson.com

You might also like