0% found this document useful (0 votes)
23 views

TCP Network Management

This document discusses TCP network management and provides details on: 1. The scope of the project which is to design and implement a TCP/IP network using various network devices, topologies, and protocols. 2. The hardware and software requirements needed including computers, networking equipment, and software like Windows XP, Packet Tracer, and IOS images. 3. Key aspects that will be featured in the project including topology design, VLAN configuration, subnetting, routing protocols, access control, security, and troubleshooting.

Uploaded by

Subodh Dayma
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

TCP Network Management

This document discusses TCP network management and provides details on: 1. The scope of the project which is to design and implement a TCP/IP network using various network devices, topologies, and protocols. 2. The hardware and software requirements needed including computers, networking equipment, and software like Windows XP, Packet Tracer, and IOS images. 3. Key aspects that will be featured in the project including topology design, VLAN configuration, subnetting, routing protocols, access control, security, and troubleshooting.

Uploaded by

Subodh Dayma
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 43

TCP NETWORK MANAGEMENT

SUBMITTED BY:-
PRASHANT KUMAR (07-I.T-38)
PUSHKAR SINGH BISHT (07-I.T-40)
SUBODH (07-I.T-53)
INTRODUCTION OF THE
ORGANISATION
PREFACE OF THE
PROJECT
SCOPE OF THE PROJECT
Computer networks can be used for several purposes:
Facilitating communications:-Using a network, people can
communicate efficiently and easily via email, instant
messaging, chat rooms, telephone, video telephone calls, and
video conferencing.
Sharing hardware:-In a networked environment, each
computer on a network may access and use hardware
resources on the network, such as printing a document on a
shared network printer.
Sharing files, data, and information:-In a network environment,
authorized user may access data and information stored on other
computers on the network. The capability of providing access to data and
information on shared storage devices is an important feature of many
networks.
Sharing software:-Users connected to a network may run application
programs on remote computers.
Information preservation.
Security.
Speed up.
HARDWARE
REQUIREMENTS
COLOR MONITOR
104 KEY STANDARD KEYBOARD
MOUSE
512 MB RAM OR ABOVE
DUAL CORE PROCESSOR
40 GB HARD DISK OR ABOVE
SOFTWARE
REQUIREMENTS

WINDOWS XP
PACKET TRACER 5.3
GNS-3
IOS(ROUTER,SWITCHES, HUB,BRIDGES,MODEM)
NETWORK DEVICES USED
•Clientsand Servers
•Wiring and Cable
•Network Interface Cards
•Hubs
•Modems
•Switches
•Routers
•Bridges
•Repeaters
FEATURES OF THE
PROJECT
TOPOLOGY USED
1.BUS TOPOLOGY
2.HIERARCHICAL TOPOLOGY
3.HYBRID TOPOLOGY

VLAN & INTERVLAN COMMUNICATION

SUBNETTING

ROUTING PROTOCOL
1.EIGRP(Enhanced Interior Gateway Routing Protocol)
ACCESS CONTROL SCHEME
1.STANDARD ACL
2.EXTENDED ACL

SECURITY FEATURE
1.PORT SECURITY
2.PASSWORD SCHEMES
3.ENCRYPTION

TROUBLESHOOTING
WHAT IS NETWORKING
MANAGEMENT
NETWORK
ADMINISTRATOR
COMPONENTS OF
NETWORK
Clients
TYPES OF NETWORK
LAN (Local Area Network)
MAN (Metropolitan Area Network )
WAN (Wide Area Network)
LAN
Collection of computers, printers, modems and other
devices that are able to communicate with each other
over some transmission medium, generally not separated
by more than 1,000 ft. of cabling.
Some organisations will have LANs on each floor of a
building connected by a bridge or router
All devices on the LAN communicate via network interface
cards (NICs)
WAN

Tokyo

Paris
New York
Cable or Radio
Connections

Mexico City India


Interconnects two or more LANs.
Cover large areas – may span the world
Compared to LANs – slow speed communication.
Owned by govt.
Requires co-ordination and expensive equipment

WAN DEVICES:
ROUTERS
TERMINAL SERVERS
MODEMS
DSU/CSU
NETWORK TOPOLOGY

It is a layout of the network.


There are two types of topology:
Physical topology describes how cables are run.
Logical topology describes how message is travel within the
network.

There are 6 primary topologies:-


1. Bus Topology
2. Ring Topology
3. Star Topology
4. Tree Topology
5. Mesh Topology
6. Hybrid Topology
Tree topology
HIERARCHICAL TOPOLOGY
It is also known as the tree topology.
A central 'root' node is connected to one or more other nodes
that are one level lower in the hierarchy with a point-to-point link
between each of the second level nodes.
Each node in the network having a specific fixed number being
referred to as the 'branching factor' of the hierarchical tree.
It combines the characteristics of linear bus & star topology.
It allows the future changes in existing topology.
IP ADDRESSING

It uniquely identifies each device on an ip network.


It is 32-bit binary number, usually expressed as 4
“dotted decimal” values.
It has two parts:
Net id:
•We can find class of the address,the block, & the range
of the address.
•It describes the ip address as a part of the network.
Host id:
•Identifies individual host.
•Is assigned by organizations to individual devices.
CLASSES OF IP
ADDRESSES
CLASSLESS ADDRESSING
CLASSFULL ADDRESSING
PRIVATE IP ADDRESS &
PUBLIC IP ADDRESS
PUBLIC IP ADDRESSES:
CLASS PUBLIC IP RANGE
A 1.0.0.0 TO 9.255.255.255
11.0.0.0 TO 126.255.255.255
B 128.0.0.0 TO 172.15.255.255
172.32.0.0 TO 191.255.255.255
C 192.0.0.0 TO 192.167.255.255
192.169.0.0 TO 223.255.255.255
PRIVATE IP ADDRESSES
CLASS PRIVATE ADRESS RANGE
A 10.0.0.0 TO 10.255.255.255
B 172.16.0.0 TO 172.31.255.255
C 192.168.0.0 TO 192.168.255.255
SUBNETTING
Subnetting is a way of taking an existing class license
and breaking it down to create more Network Addresses.
This will always reduce the number of host addresses
for a given network.
Subnetting makes more efficient use of the address or
addresses assigned to you.
To calculate the number of subnets (networks) and/or
hosts, we need to do some math:
Use the formula 2n-2 where the n can represent either
how many subnets (networks) needed OR how many
hosts per subnet needed.
SUBNET MASK
A subnet mask allows you to identify which part of an
IP address is reserved for the network, and which part is
available for host use.
IT TELLS ROUTER THE NUMBER OF BITS TO LOOK AT
WHEN ROUTING.
Default Subnet Masks
Class A - 255.0.0.0
11111111.00000000.00000000.00000000
Class B - 255.255.0.0
11111111.11111111.00000000.00000000
Class C - 255.255.255.0
11111111.11111111.11111111.00000000
VLAN & INTERVLAN
COMMUNICATION

VLAN's allow a network manager to logically segment a


LAN into different broadcast domains.
Benefits of VLANs
Formation of Virtual Workgroups
Easily move workstations on the LAN
Easily add workstations to the LAN
Easily change the LAN configuration
Easily control network traffic
Improve security
VLAN TRUNKING PROTOCOL
(VTP)

VTP MODES:
SERVER
1.CREATE VLANS
2.MODIFY VLANS
3.DELETE VLANS

CLIENT TRANSPARENT

1.SEND & FWD 1.CREATE LOCAL VLANs


ADVERTISEMENTS 2.MODIFY LOCAL VLANs
2.SYNCHRONIZES 3.DELETE LOCAL VLANs
4.FWD ADVERTISEMENTS
ROUTING & ROUTING
PROTOCOL
Itis the rpocess of determining where to send data
packets that are destined for addresses outside the local
network.
Routing information are stored in the routing table.
Routes are of three types:
1. Static routing
2. Dynamic routing
3. Default routing
Routing protocols
CLASSES OF ROUTING
PROTOCOLS
OSPF(OPEN SHORTEST
PATH FIRST)

ITCRETAES A NEIGHBOR RELATIONSHIP BY


EXCHANGING HELLO PACKETS.
FLOOD LSA’s(LINK STATE ADVERTISEMENT) TO ALL
OSPF ROUTER IN THE AREA.NOT JUST DIRECTLY
CONNECTED ROUTERS.
OSPF
AUTHENTICATION
OSPF SUPPORTS THE FOLLOWING TYPES OF
AUTHENTICATION:
NULL
PLAINTEXT PASSWORD AUTHENTICATION
MD5 AUTHENTICATION
ADRESS TRANSLATION
SCHEME
Itis a scheme in which we translate the private ip into
public & vice versa.
Ther are two methods for the address translation:
1. NAT
2. PAT.
PAT:

PAT uses unique source port numbers on the inside global


IP address to distinguish between translations.
Outside 202.6.3.2

10.0.0.3 SA
SA
10.0.0.3:2333 179.9.8.80:1345 Internet
SA

179.9.8.80:2333
SA
10.0.0.2:1456
126.23.2.2
NAT Table
Inside Local IP Inside Global IP Outside Local IP Outside Global
Address Address Address IP Address
10.0.0.2:1456 179.9.8.80:1456 202.6.3.2:80 202.6.3.2:80
10.0.0.2 10.0.0.3:2333 179.9.8.80:2333 126.23.2.2:80 126.23.2.2:80
ACCESS CONTROL SCHEME

 ACLs are lists of conditions used to test network traffic that


tries to travel across a router interface. These lists tell the
router what types of packets to accept or deny.
ACL TYPES

 THER ARE TWO TYPES ACL:


1. STANDARD ACL
2. EXTENDED ACL

STANDARD ACL:
 ACCESS LIST NUMBER RANGE OF 1-99 AND 1300-
1999.
 FILTER ONLY ON SOURCE IP ADDRESS.
 WILDCARD MASK.
 APPLIED TO INTERFACE CLOSEST TO DESTINATION.
TELNET
DIFF BETWEEN TELNET
& RLOGIN
SECURITY SCHEME
TROUBLESHOOTING
ANY QUERY ?????
???? ??
THANKS ……

You might also like