0% found this document useful (0 votes)
21 views

Sandeepreport Final

The document is a summer internship report submitted by Gouni Sandeep for their B.E. in Electronics and Communication Engineering at Maturi Venkata Subba Rao Engineering College under Osmania University, Hyderabad. It describes a 4-week virtual internship completed through the Cisco Networking Academy where the intern learned about networking concepts like switches, VLANs, routing, and security. The internship included a mini project on port security configuration using Cisco Packet Tracer simulation software.

Uploaded by

offermint5
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Sandeepreport Final

The document is a summer internship report submitted by Gouni Sandeep for their B.E. in Electronics and Communication Engineering at Maturi Venkata Subba Rao Engineering College under Osmania University, Hyderabad. It describes a 4-week virtual internship completed through the Cisco Networking Academy where the intern learned about networking concepts like switches, VLANs, routing, and security. The internship included a mini project on port security configuration using Cisco Packet Tracer simulation software.

Uploaded by

offermint5
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

lOMoARcPSD|33226577

CCNA – Program In Networking

A Summer Internship Report


on

Bachelor of Engineering
in
Electronics & Communication Engineering
(Osmania University, Hyderabad)
By

GOUNI SANDEEP ROLL NO.2451-21-735-315

Under the guidance of


N.NAMASSIVAYA
Associate professor

Department of Electronics & Communication Engineering

MATURI VENKATA SUBBA RAO (Autonomous) ENGINEERING COLLEGE


(Sponsored by Matrusri Education Society, Estd 1981)
(Affiliated to OU: Accredited by NBA & NAAC)

2023
lOMoARcPSD|33226577

CERTIFICATE
This is to certify that the Summer Internship Report entitled “CCNA – Program In

Networking” is the Bonafide record of the summer internship carried out under my
Guidance and Supervision by
GOUNI SANDEEP (2451-21-735-315)

in partial fulfilment of requirements for the award of degree of B. E. (Electronics &

Communication Engineering) submitted in the Department of Electronics & Communication,

Maturi Venkata Subba Rao Engineering College (Autonomous), Hyderabad.

……………………… …………………………
N.KAVITHA NULU NAMASSIVAYA
Associate professor, ECED Assistant professor, ECED
Maturi Venkata Subba Rao) Maturi Venkata Subba Rao
(Autonomous) Engineering College Coordinator (Autonomous) Engineering College Coordinator

……………...…………………………
Head of the Dept.
Dr. S. Suryanarayana
Department of ECE
Maturi Venkata Subba Rao (Autonomous)
Engineering College
lOMoARcPSD|33226577
lOMoARcPSD|33226577

CANDIDATE'S DECLARATION
We hereby certify that the work which is being presented in the report
entitled “CCNA – Program In Networking” in partial fulfilment of requirements for the
award of degree of B. E. (Electronics & Communication Engineering) submitted in
the Department of Electronics & Communication at MATURI VENKATA SUBBA
RAO (MVSR) ENGINEERING COLLEGE under OSMANIA UNIVERSITY, Hyderabad,
is an authentic record of our own work carried out under the supervision of
N.KAVITHA. The matter presented in this report has not been submitted by us in
any other University / Institute for the award of any degree.

Signature of the Student


(GOUNI SANDEEP)

This is to certify that the above statement made by the candidate is correct to
the best of my knowledge.

Signature of the Guide


(N.NAMASSIVAYA)
lOMoARcPSD|33226577

ACKNOWLEDGEMENT

This is an acknowledgement of the intensive drive and technical competence of


many individuals who have contributed to the success of our Summer Internship.
This is with sincere gratitude that we would like to express our profound
thanks to our guide Mrs. E. V. Naga Lakshmi, Department of Electronics and
Communication Engineering, for her valuable guidance and support. She has been
a constant source of encouragement and inspiration for us in completing this
Summer Internship.

A special note of thanks to our Summer Internship Coordinator Mr. N.


Namassivaya and Ms. N. Kavitha, for their deep sense of involvement and for
helping us in overcoming the hurdles at various stages of the Summer Internship.

We extend our sincere thanks to Dr. S. Suryanarayana, Head, Department of


ECE, MVSR Engineering College, for his timely suggestions and co-operation in the
completion of the Summer Internship.

We express our sincere thanks to Dr. G. Kanaka Durga, Principal, MVSR


Engineering College, for facilitating us to carry out our Summer Internship work
and for providing us with all the necessary facilities and for her constant
encouragement.
lOMoARcPSD|33226577

ABSTRACT
This report is to give a complete glance of four weeks of virtual industrial training that
had undergone at Cisco Network academy. I learnt a lot from this Industrial Training via the
Cisco Netacad portal and had a great learning experience as trainee in this firm. I learnt a lot
about how different networks are controlled in the industry or any department with the help of
networking processes, under the course CCNA v7: Networking Basics.

I have learnt about different types of servers like DHCP Server, and DNS Server. In today’s
world computer has become an integral part of the business sector for professional activities not
only for professional activities but for personal activities also.

Computer Network is an interconnection between computers or we can say computer network is


group of computers linked to each other which enables one computer to communicate with
another computer. Computer networking is an interesting and growing career. Organizations
across industries require computer networking professionals to develop, troubleshoot and protect
their critical computer systems. Plus, computer networking offers a wide range of potential
career opportunities for those who enjoy technology.

i
lOMoARcPSD|33226577

TABLE OF CONTENTS
CHAPTER DESCRIPTION PAGE NO

List Of Figures i

List Of Tables ii

Abbreviations iii

1 INTRODUCTION

1.1 Organization Profile 1

1.2 Internship through Cisco Networking Academy 2

2 DESCRIPTION

2.1 Outcomes of Internship 3

2.2 About Cisco packet tracer 4

2.3 Switching Concepts, VLANs, and Inter VLAN Routing 6

2.4 Available and Reliable Networks 10

2.5 L2 Security and WLANs 10

2.6 Routing Concepts and Configuration 11

3 MINI PROJECT DETAILS

3.1 Port Security 13

4 CONCLUSION 16

REFERENCES 17

ii
lOMoARcPSD|33226577

LIST OF FIGURES

Fig. No Name of the Figure Page No

1.1.1 Cisco Systems 1

1.2.1 Cisco NetAcad portal 2

2.2.1 Interface of Cisco Packet Tracer (logical mode) 4

2.2.2 Cisco Packet Tracer (Physical Mode) 5

2.3.1 OSI reference model 6

2.3.2 TCP/IP Protocol 7

2.3.3 Catalyst switch 8

2.3.4 Basic switch configuration in packet tracer 8

2.3.5 Router 9

2.3.6 Router basic configuration 10

3.1.1 Mini project network simulation 13

iii
lOMoARcPSD|33226577

ABBREVIATIONS

CCNA - Cisco Certified Network Associate

LAN - Local Area Network

MAN - Metropolitan Area Network

WAN - Wide Area Network

DHCP - Dynamic Host Configuration Protocol

DNS - Domain Name System

CLI - Command Line Interface

MAC - Media Access Control

IP - Internet Protocol

iv
lOMoARcPSD|33226577

lOMoARcPSD|33226577

1. INTRODUCTION

1.1 Organization Profile


Cisco Systems, Inc., commonly known as cisco an American based multinational digital
communications technology conglomerate corporation headquartered in San Jose, California.
Cisco Systems was developed in December 1984 by Leonard Bosack and Sandy Lerner. They
pioneered the concept of Local Area Network being used to connect distant computers over a
multiprotocol router system. Cisco develops, manufactures, and sells networking hardware,
software, telecommunications equipment and other high technology services and products. Cisco
specializes in specific tech markets, such as Internet of Things (IoT), domain security,
videoconferencing, an energy management with leading products including Webex, OpenDNS,
Jabber, Duo Security and Jasper. Cisco is one of the largest technology companies in the world
ranking 74 on the Fortune 100 with over $51 billion in revenue.

Fig. 1.1.1: Cisco Systems

Cisco also provides training for certifications via portal called the Cisco Networking Academy.
Cisco is involved with technical education in 180 countries with its Cisco Academy program.
The cisco Learning network is a social learning community on the IT industry with a mission to
provide learning tools, training resources, and industry guidance to anyone interested in building
an IT career through Cisco certifications. The certification preparation materials offered on the
Cisco Learning Network do not constitute a complete self-study program but are supplemental
materials to enhance core learning programs.

DEPARTMENT OF ECE, MVSR, NADERGUL Page 1


lOMoARcPSD|33226577

lOMoARcPSD|33226577

1.2 Internship through Cisco Networking Academy


NetAcad programs are designed with lots of hands-on activities and that is one thing which
attracts students to the program. Cisco Networking Academy is a global platform which can be
used to inspire students and instructors to make their future brighter. Cisco Networking Academy
courses are designed to prepare you for Cisco Certification and other industry recognized
certification exams. Cisco Networking Academy transforms the lives of learners, educators and
communities through the power of technology, education and career opportunities. Available to
anyone, anywhere. The link is: https://www.netacad.com/.

The CCNA which stands for Cisco Certified Network Associate is an entry-level information
technology (IT) certification issued by networking hardware company Cisco. The CCNA is
designed to validate your knowledge on fundamental networking concepts often requested in
networking roles in IT positions.

Fig. 1.2.1 Cisco Netacad portal

Through this study portal, cisco had provided an elementary training on CCNA v7: Switching,
routing and wireless networks essentials for 4 weeks i.e., from 23 May to 23 June 2022.

DEPARTMENT OF ECE, MVSR, NADERGUL Page 2


lOMoARcPSD|33226577

lOMoARcPSD|33226577

2. DESCRIPTION

2.1 Outcomes of Internship

The outcomes of this course Switching, Routing, and Wireless Essentials (SRWE) in CCNA
curriculum series is to focuses on switching technologies and router operations that support
small- to-medium business networks and includes wireless local area networks (WLAN) and
security concepts. In addition to learning, key switching and routing concepts, learners will be
able to perform basic network configuration and troubleshooting, identify and mitigate LAN
security threats, and configure and secure a basic WLAN.

These Internship will assist in developing the skills necessary to do the following,

 Configure devices using security best practices.


 Explain how Layer 2 switches forward data.
 Implement VLANs and trunking in a switched network.
 Troubleshoot inter-VLAN routing on Layer 3 devices.
 Explain how STP enables redundancy in a layer 2 network.
 Troubleshoot EtherChannel on switched networks.
 Implement DHCPv4 to operate across multiple LANs.
 Configure dynamic address allocation in IPv6 networks.
 Explain how FHRPs provide default gateway services in a redundant network.
 Explain how vulnerabilities compromise LAN security.
 Configure switch security to mitigate LAN attacks.
 Explain how WLANs enable network connectivity.
 Implement a WLAN using a wireless router and a WLC.
 Explain how routers use information in packets to make forwarding decisions.
 Configure IPv4 and IPv6 static routes.
 Troubleshoot static and default routes.

DEPARTMENT OF ECE, MVSR, NADERGUL Page 3


lOMoARcPSD|33226577

lOMoARcPSD|33226577

2.2 Cisco Packet Tracer


Cisco Packet Tracer as the name suggests, is a tool built by Cisco. This tool provides a
network simulation to practice simple and complex networks. The main purpose of Cisco Packet
Tracer is to help students learn the principles of networking with hands-on experience as well as
develop Cisco technology specific skills. Since the protocols are implemented in software only
method, this tool cannot replace the hardware Routers or Switches. Interestingly, this tool does
not only include Cisco products but also many more networking devices.

Using this tool is widely encouraged as it is part of the curriculum like CCNA, CCENT where
Faculties use Packet Trace to demonstrate technical concepts and networking systems. Students’
complete assignments using this tool, working on their own or in teams.

Engineers prefer to test any protocols on Cisco Packet Tracer before implementing them. Also,
Engineers who would like to deploy any change in the production network prefer to use Cisco
Packet Tracer to first test the required changes and proceed to deploy if and only if everything is
working as expected.

This makes the job easier for Engineers allowing them to add or remove simulated network
devices, with a Command line interface and a drag and drop user interface. You can download
the tool from https://www.netacad.com by clicking on the Packet Tracer graphic and selecting
the appropriate OS package, then you are good to play with it.

Fig. 2.2.1 Interface of Cisco Packet Tracer (logical mode)

DEPARTMENT OF ECE, MVSR, NADERGUL Page 4


lOMoARcPSD|33226577

lOMoARcPSD|33226577

Fig. 2.2.2 Cisco Packet Tracer (Physical Mode)

Workspace:

 Logical – Logical workspace shows the logical network topology of the network the user
has built. It represents the placing, connecting and clustering virtual network devices.
 Physical –Physical workspace shows the graphical physical dimension of the logical
network. It depicts the scale and placement in how network devices such as routers,
switches and hosts would look in a real environment. It also provides geographical
representation of networks, including multiple buildings, cities and wiring closets.

Key Features:

 Unlimited devices
 E-learning
 Customize single/multi user activities
 Interactive Environment
 Visualizing Networks
 Real-time mode and Simulation mode
 Self-paced
 Supports majority of networking protocols
 International language support
 Cross platform compatibility

DEPARTMENT OF ECE, MVSR, NADERGUL Page 5


lOMoARcPSD|33226577

lOMoARcPSD|33226577

2.3 Switching Concepts, VLANs, and Inter VLAN Routing


In this week, through this module I learnt about basic device configuration such as
switches, routers. And, also introduced with Cisco Packet Tracer through the lab-1: Packet tracer
exploration of physical and logical mode. I learnt about some networking related topics such as,
OSI reference model, TCP/IP model.

Fig. 2.3.1 OSI reference model

The Open Systems Interconnection model (OSI model) is a conceptual model that
describes how data is transmitted from one system to another system irrespective of distance and
location. It consists of seven-layer architecture. All seven layers contribute to the transmission of
data from one system to another system.

The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-
layer model is still widely used, as it helps visualize and communicate how networks operate,
and helps isolate and troubleshoot networking problems.

OSI was introduced in 1983 by representatives of the major computer and telecom companies,
and was adopted by ISO as an international standard in 1984.

DEPARTMENT OF ECE, MVSR, NADERGUL Page 6


lOMoARcPSD|33226577

lOMoARcPSD|33226577

The OSI Model we just looked at is just a reference/logical model. It was designed to describe
the functions of the communication system by dividing the communication procedure into
smaller and simpler components. But when we talk about the TCP/IP model, it was designed and
developed by Department of Defense (DoD) in 1960s and is based on standard protocols. It
stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise
version of the OSI model. It contains four layers, unlike seven layers in the OSI model.

Fig. 2.3.2 TCP/IP Protocol

Cisco 2960 catalyst Switch:


Cisco Catalyst 2960 Series Intelligent Ethernet switches are a new family of fixed-
configuration standalone devices that provide desktop 10/100 Fast Ethernet and 10/100/1000
Gigabit Ethernet connectivity, enabling enhanced LAN services for entry-level enterprise, mid-
market, and branch office networks. The Cisco Catalyst 2960 Series offers integrated security,
including network admission control (NAC), advanced quality of service (QoS), and resiliency to
deliver intelligent services for the network edge.

DEPARTMENT OF ECE, MVSR, NADERGUL Page 7


lOMoARcPSD|33226577

lOMoARcPSD|33226577

Fig. 2.3.3 Catalyst switch

Basic Switch configuration:

I learnt about the basic switch configuration in packet tracer,

 Create a basic switch configuration, including a name and an IP address


 Configure passwords to ensure that access to the CLI is secured
 Configure switch port speed and duplex properties for an interface
 Configure basic switch port security
 Manage the MAC address table
 Assign static MAC addresses
 Add and remove hosts on a switch

Fig. 2.3.4 Basic switch configuration in packet tracer

DEPARTMENT OF ECE, MVSR, NADERGUL Page 8


lOMoARcPSD|33226577

lOMoARcPSD|33226577

1. Cable a network that is similar to the one in the topology diagram. Create a console
connection to the switch.
2. You can access all the switch commands in privileged mode. However, because many of
the privileged commands configure operating parameters, privileged access should be
password-protected to prevent unauthorized use.
3. The privileged EXEC command set includes those commands contained in user EXEC
mode, as well as the configure command through which access to the remaining
command modes are gained.
4. Then, rename the switch name and assign the Ip address and MAC address by entering
the EXEC mode and global mode by using the CLI of the computer that is connected
through console connection.
5. We can enable SSH service in the switch also.

Cisco Router:
Cisco 1941 builds on the best-in-class offering of the existing Cisco 1841 Integrated Services
Routers by offering 2 models - Cisco 1941 and Cisco 1941W. In addition to the support of a
wide range of wireless and wired connectivity options supported on Cisco 1941 Series, Cisco
1941W offers integration of IEEE 802.11n access point which is backwards compatible with
IEEE 802.11a/b/g access points.

All Cisco 1900 Series Integrated Services Routers offer embedded hardware encryption
acceleration, optional firewall, intrusion prevention, and application services.

Fig. 2.3.5 Router

Routing is always associated with the network layer, layer 3, of the Open Systems
Interconnection (OSI) model, and the internet layer of the TCP/IP model. When you see the
terms “router” or “layer 3” associated with a device from another layer, such as a switch, it is
because

DEPARTMENT OF ECE, MVSR, NADERGUL Page 9


lOMoARcPSD|33226577

lOMoARcPSD|33226577

the manufacturer has built routing capabilities into a layer 2 device, forming a multifunction
product.

The basic configuration of router is quite similar to switch configuration,

Fig. 2.3.6 Router basic configuration

2.4 Available and Reliable Networks


As the systems grow in size and complexity, they become more prone to failures and it
becomes essential to ensure their performance by carrying out reliability analysis. Here, the word
system connotes any assemblage of functional units and may be used to denote a complete
installation or equipment. A system may be quite gigantic such as computer communication
networks or it could be as small as an integrated circuitry.

The problem of determining the reliability of systems, whose components can have one or more
failure modes, often arises in variety of applications, ranging from telecommunication,
transportation, power systems, and mechanical systems to integrated circuits and computer
communication systems or large software structure. Therefore, all such systems can naturally be
expressed as in the form of a network, arising from the interconnections of various system
subdivisions. For instance, a telecommunication or a computer communication network may
have vertices representing the physical locations of computers or transmitters/receivers and may
have several edges representing the communication links between different sites. Depending on
whether vertices or edges work or fail, the network itself can be considered to be either working
or failed.

DEPARTMENT OF ECE, MVSR, NADERGUL Page 10


lOMoARcPSD|33226577

lOMoARcPSD|33226577

2.5 L2 Security and WLANs


The data link layer (Layer 2) in IP over Ethernet networks is prone to several attacks since
the Layer 2 security has not been adequately addressed yet. Three most commonly known Layer
2 sniffing attacks are ARP poisoning, MAC flooding, and port stealing.

ARP is a network layer protocol used to map an IP address to a physical machine address
recognizable in the local network, such as an Ethernet address. When a host machine wishes to
find a physical address for an IP address, it broadcasts an ARP request, which includes the IP
address, on to the network. The host that owns the IP address sends an ARP reply message with
its physical address. Each host machine maintains a table, called ARP cache, used to convert IP
addresses to MAC addresses. Since ARP is a stateless protocol, every time a host gets an ARP
reply from another host, even though it has not sent an ARP request for that reply, it accepts that
ARP entry and updates its ARP cache. The process of updating a target host’s ARP cache with a
forged entry is referred to as poisoning.

The IEEE 802.11 (wireless LAN medium access control (MAC) and physical layer (PHY)
specifications) defines an optional Wired Equivalent Privacy (WEP) protocol, which is based on
a stream cipher RC4 encryption algorithm. The objective of the WEP in wireless networks was
to provide comparable confidentiality to a traditional wired network.

To improve security in wireless LANs, the IEEE 802.11i, an amendment of MAC security
enhancements for the IEEE 802.11 standard, was ratified in 2004. The IEEE 802.11i, also known
as Wi-Fi Protected Access 2 (WPA2), introduces a new security architecture called Robust
Security Network (RSN). In this amendment, the proposed improvements to the 802.11
architecture focus on two areas: the IEEE 802.1X standard (EAPOL) and Advanced 40
Encryption Standard (AES), for access control and encryption, respectively. The subset of the
RSN architecture is also called WPA.

2.6 Routing Concepts and Configuration


A routing protocol specifies how routers communicate with each other, disseminating
information that enables them to select routes between any two nodes on a computer network,
the choice of the route being done by routing algorithms. Each router has a priori knowledge
only of networks attached to it directly. A routing protocol shares this information first among
immediate neighbors, and then throughout the network. This way, routers gain knowledge of the
topology of the network. The term routing protocol may refer specifically to one operating at
layer three of the OSI model, which similarly disseminates topology information between
routers. Although there are many types of routing protocols, three major classes are in
widespread use on IP networks:

 Interior gateway routing via link state routing protocols, such as OSPF and IS-IS

DEPARTMENT OF ECE, MVSR, NADERGUL Page 11


lOMoARcPSD|33226577

lOMoARcPSD|33226577

 Interior gateway routing via path vector or distance vector protocols, such as IGRP and
EIGRP
 Exterior gateway routing. BGP v4 is the routing protocol used by the public

Internet. It includes the following topics –

 Connected and Static Routes


 Default Routes and their configuration
 Routing Protocol IGP and EGP and algorithms
 Auto summarization and Manual Summarization Classless and Classful Routing
Protocols and Convergence
 Basic concepts configuring and verifying RIP 2
 Different metrics used and the show Ip route command
 Administrative Distance
 Debug command and RIP

DEPARTMENT OF ECE, MVSR, NADERGUL Page 12


lOMoARcPSD|33226577

lOMoARcPSD|33226577

3. MINI PROJECT
3.1 Port Security
As a part of skill development through CCNA, I did a mini project on Port Security. A
growing challenge for network administrators is to be able to control who is allowed - and who
isn't - to access the organization's internal network. This access control is mandatory for critical
infrastructure protection in your network. It is not on public parts of the network where guest
users should be able to connect.

Port security is a feature implemented in Cisco Catalyst switches that helps network engineers in
implementing network security on network boundaries.

In its most basic form, the Port Security feature remembers the MAC address of the device
connected to the switch edge port and allows only that MAC address to be active on that port. If
any other MAC address is detected on that port, the port security feature shut down the switch
port.

The switch can be configured to send an SNMP trap to a network monitoring solution to alert
that a port is disabled for security reasons.

Fig. 3.1.1 Mini project network simulation

DEPARTMENT OF ECE, MVSR, NADERGUL Page 13


lOMoARcPSD|33226577

lOMoARcPSD|33226577

Interface FastEthernet 0/1 configuration - Restrict mode

The port-security restrict mode drops packets with unknown source addresses until you remove a
sufficient number of secure MAC addresses to drop below the maximum value and causes
the Security violation counter to increment.

Port security with sticky MAC addresses provides many of the same benefits as port security
with static MAC addresses, but sticky MAC addresses can be learned dynamically. Port security
with sticky MAC addresses retains dynamically learned MAC addresses during a link-down
condition.

interface FastEthernet0/1

switchport mode access

switchport port-security

switchport port-security maximum 3

switchport port-security mac-address sticky

switchport port-security violation restrict

When the rogue laptop is connected to the hub and tries to communicate with 192.168.1.4, the
number of mac-addresses learned ont the fastethernet 0/1 interface exceeds 3. The interface
drops traffic with the new mac-address (not learned by the switch because 3 mac addresses have
already been registered on the fa0/1 interface) and increases the security viloation counter based
on the 'restrict' port-security configuration of the interface.

Switch #show port-security


Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)

Fa0/1 3 3 5 Restrict
Fa0/2 3 1 0 Shutdown
Fa0/3 1 1 0 Protect

DEPARTMENT OF ECE, MVSR, NADERGUL Page 14


lOMoARcPSD|33226577

lOMoARcPSD|33226577

Interface Fast Ethernet 0/2 configuration - Shutdown mode (default)


The port-security shutdown mode puts the interface into the error-disabled state immediately and
sends an SNMP trap notification.

interface FastEthernet0/2

switchport mode access

switchport voice vlan 20

switchport port-security

switchport port-security maximum 3

switchport port-security mac-address sticky

Interface Fast Ethernet 0/3 configuration - Protect mode


The port-security protect mode silently drops packets with unknown source addresses until you
remove a sufficient number of secure MAC addresses to drop below the maximum value. No
counter is incremented.

interface FastEthernet0/3

switchport mode access

switchport port-security

switchport port-security violation protect

DEPARTMENT OF ECE, MVSR, NADERGUL Page 15


lOMoARcPSD|33226577

lOMoARcPSD|33226577

4. CONCLUSION
In conclusion, I can infer that this Industrial Training helped me a lot to understand the
essence of networking, how actually end devices communicate, and how to configure network
devices such as switches, routers, servers, etc. I am able to understand the routing concepts such
qas RIP, EIGRP, etc and the cisco packet tracer helps a lot to visualize the communication
between networks through CCNA v7: Switching, routing, and wireless networks. In the future, I
could like to explore more in computer networks to establish a strong career out of this industrial
training.

I am also interested to gain more practical knowledge by pursuing a career as a Network


Engineer , Network Analyst or Network Programmer. I am so happy to get this opportunity of
getting Industrially trained in Networking.

DEPARTMENT OF ECE, MVSR, NADERGUL Page 16


lOMoARcPSD|33226577

lOMoARcPSD|33226577

4. REFERENCES

https://www.netacad.com/
https://www.cisco.com/c/en_in/index.html

DEPARTMENT OF ECE, MVSR, NADERGUL Page 17

You might also like