shatrudhan ccna project

43
2 0 1146552 INDUSTRIAL TRAINING PROJECT REPORT On CCNA At Jetking Submitted in partial fulfillment of the requirement for Bachelor of Te Electronics !ommunication Engineering course of "un#ab Technical $ni 'alandhar Submitted To:- Submitted By:- E! "om#$ B#bb# A!P S%#tud%#n"um# ECE De&tt! ''()**+,ECE,*t% "C COLLEGE O ENGG! . IT NA/ANS0A0R (!!E)T& *a+anshahr ,"B-

Upload: suman-dey

Post on 05-Oct-2015

4 views

Category:

Documents


0 download

DESCRIPTION

its is a ccna project

TRANSCRIPT

Acknowledgement

1146552

INDUSTRIAL TRAINING PROJECT REPORTOnCCNAAtJetkingSubmitted in partial fulfillment of the requirement for Bachelor of Technology in Electronics & Communication Engineering course of Punjab Technical University, JalandharSubmitted To:-

Submitted By:- Er. Komal BabbarA.P

Shatrudhan Kumar

ECE Deptt.

1146552/ECE/5th

KC COLLEGE OF ENGG. & IT

NAWANSHAHRDECLARATION

I hereby certify that the work which is being presented in the project report entitled The cloud computing network by Shatrudhan Kumar in partial fulfillment of requirements for the award of degree of B.Tech submitted in the department of Electronics & Communication Engineering at KC COLLEGE OF ENGINEERING & IT under PUNJAB TCCHNICAL UNIVERSITY, JALANDHAR is an authentic record of my own work carried out during a period from 05/04/2013 to 20/05/2013 under the supervision of.

Signature of the student

This is to certify that the above statement made by the candidate is correct to the best of my /our knowledge.

Signature of the training coordinator

The B.Tech viva voice Examination of Shatrudhan kumar has been held on 06/10/2013 and accepted.

Signature of H.O.D.ACKNOWLEDGEMENTI would like to thank KC College of Engg. & IT, Nawanshahr for providing me this opportunity to carry out the 45 days industrial training in Jetking, Patna.

The constant guidance and encouragement received from Head of ECE dept., KCCEIT has been of great help in carrying out the project work and its acknowledged with the reverential thanks.

I would like to thank the project coordinator Mr. Rajeev Kumar for providing all the material possible and encouraging throughout the course. It is great pleasure for me to acknowledge the assistance and contributions for his prompt and timely help in the official clearances and valuable suggestions during the development of this projectLast but not least, I express my heartiest gratitude to Almighty god, our Parents for their love and blessings to complete the project successfully.PROJECT SUMMARY

An MNC company has been setup in India with its headquaters at UAE. It has started through its main offices at Delhi and Mumbai. Mumbai office is futher connected to offices at Banglore and Chandigarh. Delhi office to Jalandhar and Ludhiana main office at UAE is connected to Mumbai office through SERIAL connection which support static routing and is also connected to Delhi office through leased line which supports dynamic routing .Both offices at Delhi and Mumbai have routers acting as child routers so that the user cannot connect directly to main office at UAE for further security reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection .Mumbai branch is also connected to Banglore and Chennai branches by frame relay connection. These branches are to switches which are further connected to users via Ethernet port and users are accessing to various facilities provided to them ACL (Access control list) is also configured to switches for further security.

COMPANY PROFILEJetking is an organization came into establishment in 1947.Jetking is India's number one Computer Hardware and Networking Institute.

Birth and Evolution

It took a lot of failure before mankind tasted technological success. Jetking evolved in tune with the changing face of technology. During 55 years in the field of electronic technology. Jetking successfully trained thousands of students to overcome failure for

High paying careers.

Mr. Suresh G.Bharwani is the CHAIRMAN and

MANAGING Director of Jetking Infotrain Ltd. India's leading Computer Hardware and Networking Institute. With the vision to promote and the conviction to deliver the widespread propagation of computer hardware and networking education across the nation, Mr. Bharwani was the first to set up a training institute offering innovative courses in computer hardware in 1990. Jetking's core competency lies in providing complete training and developing hardware engineers and professionals with sound technical knowledge. It focuses on the overall development of personality of an individual with emphasis on personality development, presentation and communication skills, leadership skills etc. Jetking has established more than 125 operational centers and 250 faculties across the country and has trained over 3, 50,000 students who have move onto the crave successful career. With its alumni placed in the best of organizations in India and some abroad, Jetking's vocational training and placement promises has helped build the career prospects of many young boys and girls.

The company has been awarded the ISO 9000:2000 certification in 2003.The company has been awarded the " Maharashtra IT Award" for a key role in manpower activities in year 2006-2007,it was felicitated with Franchise Award as Best Franchisor for the year 2007-2008.Also,ranked 4th in the list of 26th hot franchises as per outlook money magazine.

Mr. Suresh Bharwani was awarded with "Pike's Peak Award" by the Bob Pike Group USA for effective implementing smart lab plus for making technical training fun, faster and easier for non-technical person.

Across all the sectors, industries are upgrading their information technology system. Industries ranging from plastics, chemicals, textiles and power to the automotive and telecom sector are now IT savy.Government and public sectors are going hi-tech with EDI and computer networks.The IT industry, software companies, data centers, IT-enabled services providers are all equipped with advance IT system and networks.The increasing number of call centers, BPOs etc., have given a further boost to the hardware and networking industry.

The courses in jetking comprises lecture and theory session, with a great focus on active participation through smart lab plus, that focuses on audio visual and learning with hands-on training and equips students with an in depth domain knowledge that is technical; it also equips students with soft skills, to face the multi-faceted challenges of corporate world.

PLACEMENT: Jetking is the first and only institute that promises the 100% jobs guarantee to its students. The companies that have recruited jetkings students include: Samsung, Sun Micro System, IBM,Canon, Siemen, Reliance, TATA, Compaq HP invent, IT-T Solutions,Videsh Sanchar Nigam Limted,D-link,Novell,Dell,Wipro,

LG, ICIC Ifotech and several other MNCs.

Any student who has qualified his or her HSC/SSC examination is eligible to take up a course at jetking. The one year program Jetking certified hardware and networking professionals give 680 hours of in-depth knowledge to a student in Basic electronics and computer applications.Computer hardware and peripherals, window 2003 administrator and network administrator(soon it will be replaced with window server 2008).Apart frame technical knowledge there are personality development sessions which groom the student's personality, their ability to perform better.

Jetking, Indias leading hardware and networking training institute has trained over 3,00,000 students from its 125 centers spread across India. With its alumni placed in the best of organizations in India and some abroad, Jetking vocational training and placement promises has helped build the career prospects of many young boys and girls.

Jetking has partnered with some of the worlds most renowned names in networking to provide you with cutting edge courses and technologies. With academic Partnerships with Microsoft, Comp TIA, LINUX, NOVELL, and person VUE.

Jetking Patna is a division of Hi-Tech point. Hi-Tech point is an ISO 9001-2000 IT Company. It was established in year 1993 and run by a company of IT professionals. Jetking Patna branch is considered to be the best center among all centres.It has bagged number 1 center award consecutively for last 7 years. Here training on various fields in going on like Basic Electronics, Hardware, Networking, JCHNP Analog and Digital electronics and Hardware,RHCE, RHCSS, MNA, MCSE(Microsoft system Engineers),MCITP, MNA, CCNA (Cisco Certified Network Associate),CCNP (Cisco Certified Network Professional).

Partnership with industry leaders like Microsoft and Red Hat Jetking ensure its Students Authentic courseware and technology. TABLE OF CONTENTS:

CH-1 INTRODUCTION

1.1 BACKGROUND

1.2 IMPORTANCE

1.3 OBJECTIVE

CH-2 SYSTEM ANALYSIS

2.1 ANALYSIS OF EXISTING NETWORK

2.2 REQUIREMENT SPECIFICATION OF EXISTING NETWORK

2.3 FEASIBILITY STUDY

CH-3 SYSTEM DESIGN

3.1 LAYOUT OF PROPOSED NETWORK

3.2 DESIGN PARAMETERSCH-4 SYSTEM IMPLEMENTATION

4.1 SOFTWARE AND TECHNOLOGIES USED IN THE PROJECT

4.2 PROJECT CONFIGURATIONCH-5 SYSTEM TESTING AND TROUBLESHOOTING

5.1 PING AND TRACEROUTE

CH-6 CONCLUSION AND FUTURE SCOPE

REFERENCES:

CHAPTER 1

INTRODUCTION1.1 BACKGROUND.

An MNC company has been set up in India with its head quarters at UAE. It has started through its main offices at Delhi and Mumbai. Mumbai office is further connected to offices at Bangalore and Chandigarh. Delhi office to Jalandhar and Ludhiana main office at U.A.E is connected to Mumbai office through SERIAL connection which supports static routing and is also connected to Delhi office through leased lines which supports dynamic routing. Both offices at Delhi and Mumbai have routers acting as child routers so that the user can not connect directly to main office at U.A.E for security reasons. Delhi office is further connected to Jalandhar and Ludhiana through frame relay connection. Mumbai branch is also connected to Bengaluru and Chandigarh branches by frame relay connections. These branches to switches which are further connected to users via ETHERNET port and users are accessing to various facilities provided to them. ACL (access control list) is also configured to switches for further security.

1.2 IMPORTANCE OF PROJECT.

Wide Area Networks are spread over a (very) wide area so that companies and institutes that are located far from each other are directly connected via the network. Wide Area Networks have mostly on more than one location external connections with other big networks. Internet Service Providers (ISPs) and multinationals with many offices frequently own a WAN themselves. Regional education networks and company networks between several establishments are also examples of Wide Area Networks. Two great advantages of WAN are allowing secure and fast data transmission between the different nodes in the network. The data transmission is also reliable and inexpensive. The characteristics of the transmission facilities lead to an emphasis on efficiency of communications techniques in the design of WANs. Controlling the volume of traffic and avoiding excessive delays is important. Since the topologies of WANs are likely to be more complex than those of LANs, routing algorithms also receive more emphasis. Many WANs also implement sophisticated monitoring procedures to account for which users consume the network resources. This is, in some cases, used to generate billing information to charge individual users.

1.3 OBJECTIVE OF PROJECT.

Objective of the project is to connect various offices of the MNC Company by using LAN and WAN technologies.

CHAPTER 2

SYSTEM ANALYSIS

2.1 Analysis of Existing NetworkThe existing network consists of hubs and there are dial up connections in between various offices of the MNC Company because of which both LAN and WAN links are very slow and users regularly face problem in transmitting their data over the links. Most of the time there is network conjestion in the network because of which the work is suffering and users are not able to perform up expectation.

2.2 Requirement Specification of proposed Network.

In the proposed design, hubs will be replaced with switches so as to improve the LAN connectivity. Switches would be operating at 100 Mbps as compared to hubs which operate at 10 Mbps. Moreover switches are manageable so VLANS can be created on them so as to decrease broadcast traffic and to enhance security as well. As far as WAN is concerned all the dial up links would be replaced with ISDN, Frame-Relay and Leased Line connection so as to improve WAN connectivity and users dont face network congestion during working hours.

2.3 FEASIBILITY STUDYEconomic feasibilityEconomic analysis is the most frequently used method for evaluating the effectiveness of a new system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. An entrepreneur must accurately weigh the cost versus benefits before taking an action

Cost Based: No special investment is needed to manage the tool. No specific training is required for employees to use the tool. Investment requires only once at the time of installation. The software used in this project is freeware so the cost of developing the tool is minimal

Legal feasibilityDetermines whether the proposed system conflicts with legal requirements e.g. a Data Processing system must comply with the local Data Protection Acts.

Operational feasibilityIs a measure of how well a proposed system solves the problems, and takes advantages of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.

Schedule feasibilityA project will fail if it takes too long to be completed before it is useful. Typically this means estimating how long the system will take to develop, and if it can be completed in a given time period using some methods like payback period. Schedule feasibility is a measure of how reasonable the project timetable is. Given our technical expertise, are the project deadlines reasonable? Some projects are initiated with specific deadlines. You need to determine whether the deadlines are mandatory or desirable.

Market and real estate feasibilityMarket Feasibility Study typically involves testing geographic locations for a real estate development project, and usually involves parcels of real estate land. Developers often conduct market studies to determine the best location within a jurisdiction, and to test alternative land uses for a given parcels. Jurisdictions often require developers to complete feasibility studies before they will approve a permit application for retail, commercial, industrial, manufacturing, housing, office or mixed-use project. Market Feasibility takes into account the importance of the business in the selected area.

Resource feasibilityThis involves questions such as how much time is available to build the new system, when it can be built, whether it interferes with normal business operations, type and amount of resources required, dependencies, etc. Contingency and mitigation plans should also be stated here.

Cultural feasibilityIn this stage, the project's alternatives are evaluated for their impact on the local and general culture. For example, environmental factors need to be considered and these factors are to be well known. Further an enterprise's own culture can clash with the results of the projectCHAPTER 3

SYSTEM DESIGN

3.1. Layout of the proposed Network

3.2 Design Parameters

The various devices that are being used in designing the network of the MNC

Company as follows:

ROUTER

A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect, and are the critical device that keeps data flowing between networks and keeps the networks connectedtotheinternet.

When data is sent between locations on one network or from one network to a second network the data is always seen and directed to the correct location by the router. The router accomplishes this by using headers and forwarding tables to determine the best path for forwarding the data packets, and they also use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

SWITCH

A switch is an electrical component that can break an electrical circuit, interrupting the current or diverting it from one conductor to another. The most familiar form of switch is a manually operated electromechanical device with one or more sets of electric contacts. Each set of contacts can be in one of two states: either 'closed' meaning the contacts are touching and electricity can flow between them, or 'open', meaning the contacts are separated and non conducting.

A switch may be directly manipulated by a human as a control signal to a system, such as a computer keyboard button, or to control power flow in a circuit, such as a light switch. Automatically-operated switches can be used to control the motions of machines, for example, to indicate that a garage door has reached its full open position or that a machine tool is in a position to accept another work piece. Switches may be operated by process variables such as pressure, temperature, flow, current, voltage, and force, acting as sensors in a process and used to automatically control a system. For example, a thermostat is an automatically-operated switch used to control a heating process. A switch that is operated by another electrical circuit is called a relay. Large switches may be remotely operated by a motor drive mechanism.

The various WAN technologies that are being used in the design of MNC network as as follows:

FRAME-RELAYFrame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. Frame Relay originally was designed for use across Integrated Services Digital Network (ISDN) interfaces. Today, it is used over a variety of other network interfaces as well. This chapter focuses on Frame Relay's specifications and applications in the context of WAN services.

Frame Relay is an example of a packet-switched technology. Packet-switched networks enable end stations to dynamically share the network medium and the available bandwidth. The following two techniques are used in packet-switching technology:

Variable-length packets

Statistical multiplexing

Variable-length packets are used for more efficient and flexible data transfers. These packets are switched between the various segments in the network until the destination is reached.

Statistical multiplexing techniques control network access in a packet-switched network. The advantage of this technique is that it accommodates more flexibility and more efficient use of bandwidth. Most of today's popular LANs, such as Ethernet and Token Ring, are packet-switched networks.

Frame Relay often is described as a streamlined version of X.25, offering fewer of the robust capabilities, such as windowing and retransmission of last data that are offered in X.25. This is because Frame Relay typically operates over WAN facilities that offer more reliable connection services and a higher degree of reliability than the facilities available during the late 1970s and early 1980s that served as the common platforms for X.25 WANs. As mentioned earlier, Frame Relay is strictly a Layer 2 protocol suite, whereas X.25 provides services at Layer 3 (the network layer) as well. This enables Frame Relay to offer higher performance and greater transmission efficiency than X.25, and makes Frame Relay suitable for current WAN applications, such as LAN interconnection.

Frame Relay Devices Devices attached to a Frame Relay WAN fall into the following two general categories:

Data terminal equipment (DTE)

Data circuit-terminating equipment (DCE)

DTEs generally are considered to be terminating equipment for a specific network and typically are located on the premises of a customer. In fact, they may be owned by the customer. Examples of DTE devices are terminals, personal computers, routers, and bridges.

DCEs are carrier-owned internetworking devices. The purpose of DCE equipment is to provide clocking and switching services in a network, which are the devices that actually transmit data through the WAN. In most cases, these are packet switches. Figure 10-1 shows the relationship between the two categories of devices.

DCEs Generally Reside Within Carrier-Operated WANs

The connection between a DTE device and a DCE device consists of both a physical layer component and a link layer component. The physical component defines the mechanical, electrical, functional, and procedural specifications for the connection between the devices. One of the most commonly used physical layer interface specifications is the recommended standard (RS)-232 specification. The link layer component defines the protocol that establishes the connection between the DTE device, such as a router, and the DCE device, such as a switch. This chapter examines a commonly utilized protocol specification used in WAN networking: the Frame Relay protocol.

Frame Relay Network Implementation

A common private Frame Relay network implementation is to equip a T1 multiplexer with both Frame Relay and non-Frame Relay interfaces. Frame Relay traffic is forwarded out the Frame Relay interface and onto the data network. Non-Frame Relay traffic is forwarded to the appropriate application or service, such as a private branch exchange (PBX) for telephone service or to a video-teleconferencing application.

A typical Frame Relay network consists of a number of DTE devices, such as routers, connected to remote ports on multiplexer equipment via traditional point-to-point services such as T1, fractional T1, or 56-Kb circuits. An example of a simple Frame Relay network is shown in Figure 10-3.

A Simple Frame Relay Network Connects Various Devices to Different Services over a WAN

The majority of Frame Relay networks deployed today are provisioned by service providers that intend to offer transmission services to customers. This is often referred to as a public Frame Relay service. Frame Relay is implemented in both public carrier-provided networks and in private enterprise networks. The following section examines the two methodologies for deploying Frame Relay. CHAPTER 4 SYSTEM IMPLEMENTATION4.1 SOFTWARE:SIMULATOR

A network simulator is a piece of software or hardware that predicts the behavior of a network, without an actual network being present.

Network simulators serve a variety of needs. Compared to the cost and time involved in setting up an entire test bed containing multiple networked computers, routers and data links, network simulators are relatively fast and inexpensive. They allow engineers to test scenarios that might be particularly difficult or expensive to emulate using real hardware- for instance, simulating the effects of a sudden burst in traffic or a DoS attack on a network service. Networking simulators are particularly useful in allowing designers to test new networking protocols or changes to existing protocols in a controlled and reproducible environment.

Network simulators, as the name suggests are used by researchers, developers and QA to design various kinds of networks, simulate and then analyze the effect of various parameters on the network performance .A typical network simulator encompasses a wide range of networking technologies and help the users to build complex networks from basic building blocks like variety of nodes and links. With the help of simulators one can design hierarchical networks using various types of nodes like computers, hubs, bridges, routers, optical cross-connects, multicast routers, mobile units, MSAUs etc.

The simulator that we have used to create a simulation of the network design of the MNC Company is CISCO PACKET TRACER.

OSPFStands for "Open Shortest Path First" OSPF is a method of finding the shortest path from one router to another in a local area network (LAN). As long as a network is IP-based, the OSPF algorithm will calculate the most efficient way for data to be transmitted. If there are several routers on a network, OSPF builds a table (or topography) of the router connections. When data is sent from one location to another, the OSPF algorithm compares the available options and chooses the most efficient way for the data to be sent. This limits unnecessary delays in data transmission and prevents infinite loops. DEFINITION: OSPF (Open Shortest Path First) is a router protocol used within larger autonomous system networks in preference to the Routing Information Protocol (RIP), an older routing protocol that is installed in many of today's corporate networks. Like RIP, OSPF is designated by the Internet Engineering Task Force (IETF) as one of several Interior Gateway Protocols (IGPs).

So that all will have the same routing table information. Unlike the RIP in which the entire routing table is sent, the host using OSPF sends only the part that has Using OSPF, a host that obtains a change to a routing table or detects a change in the network immediately multicasts the information to all other hosts in the network changed. With RIP, the routing table is sent to a neighbor host every 30 seconds. OSPF multicasts the updated information only when a change has taken place. Rather than simply counting the number of hops, OSPF bases its path descriptions on "link states" that take into account additional network information. OSPF also lets the user assign cost metrics to a given host router so that some paths are given preference. OSPF supports a variable network subnet mask so that a network can be subdivided. RIP is supported within OSPF for router-to-end station communication. Since many networks using RIP are already in use, router manufacturers tend to include RIP support within a router designed primarily for OSPF.

ACCESS CONTROL LISTS:

Cisco provides basic traffic filtering capabilities with access control lists (also referred to as access lists). Access lists can be configured for all routed network protocols (IP, AppleTalk, and so on.) to filter those protocols' packets as the packets pass through a router.

You can configure access lists at your router to control access to a network: access lists can prevent certain traffic from entering or exiting a network.

About Access Control Lists

This section briefly describes what access lists do; why and when you should configure access lists; and basic vs. advanced access lists. What Access Lists Do Access lists filter network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces. Your router examines each packet to determine whether to forward or drop the packet, based on the criteria you specified within the access lists. Access list criteria could be the source address of the traffic, the destination address of the traffic, the upper-layer protocol, or other information. Note that sophisticated use can sometimes successfully evade or fool basic access lists because no authentication is required..

VLSMA Variable Length Subnet Mask (VLSM) is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule. Of the IP routing protocols supported by CISCO, OSPF, Dual IS-IS, BGP-4, and EIGRP support "classless" or VLSM routes.Historically, EGP depended on the IP address class definitions, and actually exchanged network numbers (8, 16, or 24 bit fields) rather than IP addresses (32 bit numbers); RIP and IGRP exchanged network and subnet numbers in 32 bit fields, the distinction between network number, subnet number, and host number being a matter of convention and not exchanged in the routing protocols. More recent protocols (see VLSM) carry either a prefix length (number of contiguous bits in the address) or subnet mask with each address, indicating what portion of the 32 bit field is the address being routed on. A simple example of a network using variable length subnet masks is found in Cisco engineering. There are several switches in the engineering buildings, configured with FDDI and Ethernet interfaces and numbered in order to support 62 hosts on each switched subnet; in actuality, perhaps 15-30 hosts (printers, workstations, disk servers) are physically attached to each. However, many engineers also have ISDN or Frame Relay links to home, and a small subnet there. These home offices typically have a router or two and an X terminal or workstation; they may have a PC or Macintosh as well. As such, they are usually configured to support 6 hosts, and a few are configured for 14. The point to point links are generally unnumbered.

Using "one size fits all" addressing schemes, such as are found in RIP or IGRP, the home offices would have to be configured to support 62 hosts each; using numbers on the point to point links would further compound the address bloat. One configures the router for Variable Length Subnet Masking by configuring the router to use a protocol (such as OSPF or EIGRP) that supports this, and configuring the subnet masks of the various interfaces in the IP address interface sub-command. To use super nets, one must further configure the use of 'IP classless' routes.

4.2 PROJECT CONFIGURATION

MAIN OFFICE (U.A.E) CONFIGURATION

MAIN OFFICE IN U.A.ERouter>Enable

Router# Configure TerminalRouter (config)#interface serial 1/0

Router (config-if)#ip address 11.0.0.1 255.0.0.0Router(Config-If)#Clock Rate 64000

Router(Config-If)#no shutdown

Router(config)#exit

Router(config)#interface serial 1/1Router(config-if)#ip address 10.0.0.1 255.0.0.0

Router(config-if)#Clock Rate 64000

Router(config)# no shutdown

Router(config)#exit

Router(config)#interface fast Ethernet 0/0Router(config-if)#ip address 192.168.1.1 255.255.255.0Router(config-if)#no shutdownRouter(config)#exit

Router(config)#router ospf 90

Router(config-router)#network 10.0.0.0 0.255.255.255 area 50

Router(config-router)#network 11.0.0.0 0.255.255.255 area 50

Router(config-router)#network 192.168.1.0 0.0.0.255 area 50

Router(config-router)#exit

Router(config)#access-list 120 deny tcp 1.0.0.2 0.0.0.0 192.168.1.2 0.0.0.0Router(config)#access-list 120 permit ip any anyRouter(config)#interface serial 1/1

Router(config-if)#ip access-group 120 in

Router(config-if)#exit

SERVER CONFIGURATION

MUMBAI BRANCH CONFIGURATION:

MAIN BRANCH IN MUMBAI

Router >Enable Router#configure terminalRouter(config)#interface serial 1/0

Router(Config-if)#Ip address 10.0.0.2 255.0.0.0 Router(Config-if)#No Shut

Router(Config-if)#exit

Router(Config)#interface serial 1/1

Router(Config-if)#ip address 14.0.0.1 255.0.0.0Router(Config-if)#no shutdown

Router(Config-if)#exit

Router(Config)# interface serial 1/2Router(Config-if)#ip address 15.0.0.1 255.0.0.0

Router(Config-if)#No ShutdownRouter(Config-if)#exit

Router(config)#router ospf 92Router(config-router)#network 10.0.0.0 0.255.255.255 area 50Router(config-router)#network 14.0.0 0.255.255.255 area 50

Router(config-router)#network 15.0.0.0 0.255.255.255 area 50

Router(config-router)#exitRouter(config)#interface serial 1/1Router(config-if)#encapsulation frame-relay

Router(config-if)#ip ospf network broadcast

Router(config-if)#frame-relay map ip 14.0.0.2 104 broadcast

Router(config-if)#frame-relay lmi-type ansi

Router(config-if)#exit

Router(config)#interface serial 1/2Router(config-if)#encapsulation frame-relay

Router(config-if)#ip ospf network broadcastRouter(config-if)#frame-relay map ip 15.0.0.2 105 broadcast

Router(config-if)#frame-relay lmi-type ansiRouter(config-if)#exit

CLOUD BETWEEN MUMBAI BRANCH AND BANGALORE:

BANGALORE OFFICE CONFIGURATION: MAIN OFFICE BANGALORE

Router>EnableRouter #configure terminal

Router(config)#interface serial 1/0Router(Config-if)#Ip address 14.0.0.2 255.0.0.0

Router(config-if)#no shutdown

Router(config-if)#exit

Router(config)#interface fastethernet0/0Router(Config-if)#Ip address 3.0.0.1 255.0.0.0

Router(Config-if)#No ShutdownRouter(Config-if)#exit

Router(config)#router ospf 95Router(config-router)#network 14.0.0.0 0.255.255.255 area 50Router(config-router)#network 3.0.0.0 0.255.255.255 area 50

Router(config-router)#exit

Router(config)#interface serial 1/0Router(config-if)#encapsulation frame-relay

Router(config-if)#ip ospf network broadcast

Router(config-if)#frame-relay map ip 14.0.0.1 401 broadcast

Router(config-if)#frame-relay lmi-type ansi

Router(config-if)#exit

Bangalore#show interface serial 1/0

USER CONFIGURATION

USER CONFIGURATION

CHANDIGARH OFFICE CONFIGURATION

MAIN OFFICE CHANDIGARH

Router>enable

Router#Configure terminalRouter(config)#interface serial 1/0

Router(config-if)#ip address 15.0.0.2 255.0.0.0

Router(config-if)#no shutdown

Router(config-if)#exitRouter(Config)#interface fastethernet0/0Router(Config-if)#ip address 4.0.0.1 255.0.0.0Router(Config-if)#No ShutdownRouter(Config-if)#exit

Router(config)#router ospf 96

Router(config-router)#network 15.0.0.0 0.255.255.255 area 50

Router(config-router)#network 4.0.0.0 0.255.255.255 area 50

Router(config-router)#exit

Router(config)#interface serial 1/0Router(config-if)#encapsulation frame-relay

Router(config-if)#ip ospf network broadcast

Router(Config-if)#frame-relay map ip 15.0.0.1 501 broadcast

Router(config-if)#frame-relay lmi-type ansi

Router(config-if)#exit

CHANDIGARH OFFICE SWITCH CONFIGURATION

CHANDIGARH OFFICE LAN CONFIGURATIONSwitch>enable

Switch# configure terminal

Switch (config)#vlan 2

Switch (config-vlan)# name Sales

Switch (config-vlan)#vlan 3 AccountsSwitch (config-vlan)#exit

Switch(config)#interface fastethernet 0/2Switch(config-if)#switchport access vlan 2

Switch(config-if)#interface fastethernet 0/3Switch(config-if)#switchport access vlan 2Switch(config-if)#interface fastethernet 0/4Switch(config-if)#switchport access vlan 3Switch(config-if)#interface fastethernet 0/5

Switch(config-if)#switchport access vlan 3

Switch(config-if)#exit

USER CONFIGURATION

DELHI OFFICE CONFIGURATION

MAIN OFICE DELHIRouter > enable

Router#configure terminalRouter(config)#interface serial 1/0

Router(config-if)#Ip address 11.0.0.2 255.0.0.0

Router(config-if)#No shutdownRouter(config-if)#Exit

Router(config)#interface serial1/1Router(config-if)#Ip address 12.0.0.1 255.0.0.0

Router(config-if)#No shutdownRouter(config-if)#exit

Router(config)#Interface serial 1/2

Router(config-if)#Ip address 13.0.0.1 255.0.0.0

Router(config-if)#No shutdownRouter(config-if)#exit

Router(config)#router ospf 91

Router(config-router)#network 11.0.0.0 0.255.255.255 area 50Router(config-router)#network 12.0.0.0 0.255.255.255 area 50

Router(config-router)#network 13.0.0.0 0.255.255.255 area 50

Router(config-router)#exit

CLOUD BETWEEN DELHI AND JALANDHAR

LUDHIANA OFFICE CONFIGURATION

MAIN OFFICE LUDHIANARouter>Enable

Router#Configure terminalRouter(Config)#Interface serial1/0

Router(Config-if)#Ip address 13.0.0.2 255.0.0.0

Router(Config-if)#No ShutdownRouter(Config-if)#exit

Router(Config)#interface fastethernet0/0 Router(Config-if)#Ip address 2.0.0.1 255.0.0.0

Router(Config-if)#No ShutdownRouter(Config-if)#exit

Router(config)#router ospf 94Router(config-router)#network 13.0.0.0 0.255.255.255 area 50Router(config-router)#network 2.0.0.0 0.255.255.255 area 50Router(config-router)#exit

LUDHIANA OFFICE SWITCH CONFIGURATION

USER CONFIGURATION

JALANDHAR OFFICE CONFIGURATION

MAIN OFFICE JALANDHAR

Router>EnableRouter#configure terminalRouter(Config)#Interface serial 1/0

Router(Config-if)#Ip address 12.0.0.2 255.0.0.0

Router(Config-if)#No ShutdownRouter(Config-if)#exit

Router(Config)#Interface fastethernet 0/0Router(Config-if)#Ip address 1.0.0.1 255.255.255.252

Router(Config-if)#No ShutdownRouter(Config-if)#exit

Router(config)#router ospf 93Router(config-router)#network 12.0.0.0 0.255.255.255 area 50Router(config-router)#network 1.0.0.0 0.255.255.255 area 50

Router(config-router)#exit

Router(config)#exit

Router>enable

Router#configure terminal

Router(config)#hostname jalandhar

Jalandhar(config)#enable password CISCOJalandhar(config)#username Delhi password CISCOJalandhar(config)#interface serial 1/0

Jalandhar(config-if)#encapsulation ppp

Jalandhar(config-if)#ppp authentication chap

Jalandhar(config-if)#exit

Jalanhar(Config)#exit

Jalandhar#show interface serial 1/0

Jalandhar#exitJALANDHAR OFFICE-SWITCH CONFIGURATION

USER CONFIGURATION

CHAPTER 5

SYSTEM TESTING &TROUBLESHOOTING

5.1 PING AND TRACEROUTE:PING

Ping can test the speed of your connection, "distance" to target, and whether or not your connection is even up and running. It tells you how long a packet of data takes to travel from your computer to a specified host, and back again(in this case, the packet is 32 bytes in size).

Ping Tests

Once you have your command prompt (or WhatRoute) open, enter ping 127.0.0.1 and press Enter. You should receive 4 responses similar to the lines below. This ping test verifies the operation of the base TCP/IP stack. If TCP/IP is working correctly, there will be no problems with the ping. If you receive a timeout or error message, there is a problem with TCP/IP in which case you may have to uninstall and reinstall TCP/IP.

C:\WINDOWS>ping 127.0.0.1

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time