Sandeepreport Final
Sandeepreport Final
Bachelor of Engineering
in
Electronics & Communication Engineering
(Osmania University, Hyderabad)
By
2023
lOMoARcPSD|33226577
CERTIFICATE
This is to certify that the Summer Internship Report entitled “CCNA – Program In
Networking” is the Bonafide record of the summer internship carried out under my
Guidance and Supervision by
GOUNI SANDEEP (2451-21-735-315)
……………………… …………………………
N.KAVITHA NULU NAMASSIVAYA
Associate professor, ECED Assistant professor, ECED
Maturi Venkata Subba Rao) Maturi Venkata Subba Rao
(Autonomous) Engineering College Coordinator (Autonomous) Engineering College Coordinator
……………...…………………………
Head of the Dept.
Dr. S. Suryanarayana
Department of ECE
Maturi Venkata Subba Rao (Autonomous)
Engineering College
lOMoARcPSD|33226577
lOMoARcPSD|33226577
CANDIDATE'S DECLARATION
We hereby certify that the work which is being presented in the report
entitled “CCNA – Program In Networking” in partial fulfilment of requirements for the
award of degree of B. E. (Electronics & Communication Engineering) submitted in
the Department of Electronics & Communication at MATURI VENKATA SUBBA
RAO (MVSR) ENGINEERING COLLEGE under OSMANIA UNIVERSITY, Hyderabad,
is an authentic record of our own work carried out under the supervision of
N.KAVITHA. The matter presented in this report has not been submitted by us in
any other University / Institute for the award of any degree.
This is to certify that the above statement made by the candidate is correct to
the best of my knowledge.
ACKNOWLEDGEMENT
ABSTRACT
This report is to give a complete glance of four weeks of virtual industrial training that
had undergone at Cisco Network academy. I learnt a lot from this Industrial Training via the
Cisco Netacad portal and had a great learning experience as trainee in this firm. I learnt a lot
about how different networks are controlled in the industry or any department with the help of
networking processes, under the course CCNA v7: Networking Basics.
I have learnt about different types of servers like DHCP Server, and DNS Server. In today’s
world computer has become an integral part of the business sector for professional activities not
only for professional activities but for personal activities also.
i
lOMoARcPSD|33226577
TABLE OF CONTENTS
CHAPTER DESCRIPTION PAGE NO
List Of Figures i
List Of Tables ii
Abbreviations iii
1 INTRODUCTION
2 DESCRIPTION
4 CONCLUSION 16
REFERENCES 17
ii
lOMoARcPSD|33226577
LIST OF FIGURES
2.3.5 Router 9
iii
lOMoARcPSD|33226577
ABBREVIATIONS
IP - Internet Protocol
iv
lOMoARcPSD|33226577
lOMoARcPSD|33226577
1. INTRODUCTION
Cisco also provides training for certifications via portal called the Cisco Networking Academy.
Cisco is involved with technical education in 180 countries with its Cisco Academy program.
The cisco Learning network is a social learning community on the IT industry with a mission to
provide learning tools, training resources, and industry guidance to anyone interested in building
an IT career through Cisco certifications. The certification preparation materials offered on the
Cisco Learning Network do not constitute a complete self-study program but are supplemental
materials to enhance core learning programs.
lOMoARcPSD|33226577
The CCNA which stands for Cisco Certified Network Associate is an entry-level information
technology (IT) certification issued by networking hardware company Cisco. The CCNA is
designed to validate your knowledge on fundamental networking concepts often requested in
networking roles in IT positions.
Through this study portal, cisco had provided an elementary training on CCNA v7: Switching,
routing and wireless networks essentials for 4 weeks i.e., from 23 May to 23 June 2022.
lOMoARcPSD|33226577
2. DESCRIPTION
The outcomes of this course Switching, Routing, and Wireless Essentials (SRWE) in CCNA
curriculum series is to focuses on switching technologies and router operations that support
small- to-medium business networks and includes wireless local area networks (WLAN) and
security concepts. In addition to learning, key switching and routing concepts, learners will be
able to perform basic network configuration and troubleshooting, identify and mitigate LAN
security threats, and configure and secure a basic WLAN.
These Internship will assist in developing the skills necessary to do the following,
lOMoARcPSD|33226577
Using this tool is widely encouraged as it is part of the curriculum like CCNA, CCENT where
Faculties use Packet Trace to demonstrate technical concepts and networking systems. Students’
complete assignments using this tool, working on their own or in teams.
Engineers prefer to test any protocols on Cisco Packet Tracer before implementing them. Also,
Engineers who would like to deploy any change in the production network prefer to use Cisco
Packet Tracer to first test the required changes and proceed to deploy if and only if everything is
working as expected.
This makes the job easier for Engineers allowing them to add or remove simulated network
devices, with a Command line interface and a drag and drop user interface. You can download
the tool from https://www.netacad.com by clicking on the Packet Tracer graphic and selecting
the appropriate OS package, then you are good to play with it.
lOMoARcPSD|33226577
Workspace:
Logical – Logical workspace shows the logical network topology of the network the user
has built. It represents the placing, connecting and clustering virtual network devices.
Physical –Physical workspace shows the graphical physical dimension of the logical
network. It depicts the scale and placement in how network devices such as routers,
switches and hosts would look in a real environment. It also provides geographical
representation of networks, including multiple buildings, cities and wiring closets.
Key Features:
Unlimited devices
E-learning
Customize single/multi user activities
Interactive Environment
Visualizing Networks
Real-time mode and Simulation mode
Self-paced
Supports majority of networking protocols
International language support
Cross platform compatibility
lOMoARcPSD|33226577
The Open Systems Interconnection model (OSI model) is a conceptual model that
describes how data is transmitted from one system to another system irrespective of distance and
location. It consists of seven-layer architecture. All seven layers contribute to the transmission of
data from one system to another system.
The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-
layer model is still widely used, as it helps visualize and communicate how networks operate,
and helps isolate and troubleshoot networking problems.
OSI was introduced in 1983 by representatives of the major computer and telecom companies,
and was adopted by ISO as an international standard in 1984.
lOMoARcPSD|33226577
The OSI Model we just looked at is just a reference/logical model. It was designed to describe
the functions of the communication system by dividing the communication procedure into
smaller and simpler components. But when we talk about the TCP/IP model, it was designed and
developed by Department of Defense (DoD) in 1960s and is based on standard protocols. It
stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise
version of the OSI model. It contains four layers, unlike seven layers in the OSI model.
lOMoARcPSD|33226577
lOMoARcPSD|33226577
1. Cable a network that is similar to the one in the topology diagram. Create a console
connection to the switch.
2. You can access all the switch commands in privileged mode. However, because many of
the privileged commands configure operating parameters, privileged access should be
password-protected to prevent unauthorized use.
3. The privileged EXEC command set includes those commands contained in user EXEC
mode, as well as the configure command through which access to the remaining
command modes are gained.
4. Then, rename the switch name and assign the Ip address and MAC address by entering
the EXEC mode and global mode by using the CLI of the computer that is connected
through console connection.
5. We can enable SSH service in the switch also.
Cisco Router:
Cisco 1941 builds on the best-in-class offering of the existing Cisco 1841 Integrated Services
Routers by offering 2 models - Cisco 1941 and Cisco 1941W. In addition to the support of a
wide range of wireless and wired connectivity options supported on Cisco 1941 Series, Cisco
1941W offers integration of IEEE 802.11n access point which is backwards compatible with
IEEE 802.11a/b/g access points.
All Cisco 1900 Series Integrated Services Routers offer embedded hardware encryption
acceleration, optional firewall, intrusion prevention, and application services.
Routing is always associated with the network layer, layer 3, of the Open Systems
Interconnection (OSI) model, and the internet layer of the TCP/IP model. When you see the
terms “router” or “layer 3” associated with a device from another layer, such as a switch, it is
because
lOMoARcPSD|33226577
the manufacturer has built routing capabilities into a layer 2 device, forming a multifunction
product.
The problem of determining the reliability of systems, whose components can have one or more
failure modes, often arises in variety of applications, ranging from telecommunication,
transportation, power systems, and mechanical systems to integrated circuits and computer
communication systems or large software structure. Therefore, all such systems can naturally be
expressed as in the form of a network, arising from the interconnections of various system
subdivisions. For instance, a telecommunication or a computer communication network may
have vertices representing the physical locations of computers or transmitters/receivers and may
have several edges representing the communication links between different sites. Depending on
whether vertices or edges work or fail, the network itself can be considered to be either working
or failed.
lOMoARcPSD|33226577
ARP is a network layer protocol used to map an IP address to a physical machine address
recognizable in the local network, such as an Ethernet address. When a host machine wishes to
find a physical address for an IP address, it broadcasts an ARP request, which includes the IP
address, on to the network. The host that owns the IP address sends an ARP reply message with
its physical address. Each host machine maintains a table, called ARP cache, used to convert IP
addresses to MAC addresses. Since ARP is a stateless protocol, every time a host gets an ARP
reply from another host, even though it has not sent an ARP request for that reply, it accepts that
ARP entry and updates its ARP cache. The process of updating a target host’s ARP cache with a
forged entry is referred to as poisoning.
The IEEE 802.11 (wireless LAN medium access control (MAC) and physical layer (PHY)
specifications) defines an optional Wired Equivalent Privacy (WEP) protocol, which is based on
a stream cipher RC4 encryption algorithm. The objective of the WEP in wireless networks was
to provide comparable confidentiality to a traditional wired network.
To improve security in wireless LANs, the IEEE 802.11i, an amendment of MAC security
enhancements for the IEEE 802.11 standard, was ratified in 2004. The IEEE 802.11i, also known
as Wi-Fi Protected Access 2 (WPA2), introduces a new security architecture called Robust
Security Network (RSN). In this amendment, the proposed improvements to the 802.11
architecture focus on two areas: the IEEE 802.1X standard (EAPOL) and Advanced 40
Encryption Standard (AES), for access control and encryption, respectively. The subset of the
RSN architecture is also called WPA.
Interior gateway routing via link state routing protocols, such as OSPF and IS-IS
lOMoARcPSD|33226577
Interior gateway routing via path vector or distance vector protocols, such as IGRP and
EIGRP
Exterior gateway routing. BGP v4 is the routing protocol used by the public
lOMoARcPSD|33226577
3. MINI PROJECT
3.1 Port Security
As a part of skill development through CCNA, I did a mini project on Port Security. A
growing challenge for network administrators is to be able to control who is allowed - and who
isn't - to access the organization's internal network. This access control is mandatory for critical
infrastructure protection in your network. It is not on public parts of the network where guest
users should be able to connect.
Port security is a feature implemented in Cisco Catalyst switches that helps network engineers in
implementing network security on network boundaries.
In its most basic form, the Port Security feature remembers the MAC address of the device
connected to the switch edge port and allows only that MAC address to be active on that port. If
any other MAC address is detected on that port, the port security feature shut down the switch
port.
The switch can be configured to send an SNMP trap to a network monitoring solution to alert
that a port is disabled for security reasons.
lOMoARcPSD|33226577
The port-security restrict mode drops packets with unknown source addresses until you remove a
sufficient number of secure MAC addresses to drop below the maximum value and causes
the Security violation counter to increment.
Port security with sticky MAC addresses provides many of the same benefits as port security
with static MAC addresses, but sticky MAC addresses can be learned dynamically. Port security
with sticky MAC addresses retains dynamically learned MAC addresses during a link-down
condition.
interface FastEthernet0/1
switchport port-security
When the rogue laptop is connected to the hub and tries to communicate with 192.168.1.4, the
number of mac-addresses learned ont the fastethernet 0/1 interface exceeds 3. The interface
drops traffic with the new mac-address (not learned by the switch because 3 mac addresses have
already been registered on the fa0/1 interface) and increases the security viloation counter based
on the 'restrict' port-security configuration of the interface.
Fa0/1 3 3 5 Restrict
Fa0/2 3 1 0 Shutdown
Fa0/3 1 1 0 Protect
lOMoARcPSD|33226577
interface FastEthernet0/2
switchport port-security
interface FastEthernet0/3
switchport port-security
lOMoARcPSD|33226577
4. CONCLUSION
In conclusion, I can infer that this Industrial Training helped me a lot to understand the
essence of networking, how actually end devices communicate, and how to configure network
devices such as switches, routers, servers, etc. I am able to understand the routing concepts such
qas RIP, EIGRP, etc and the cisco packet tracer helps a lot to visualize the communication
between networks through CCNA v7: Switching, routing, and wireless networks. In the future, I
could like to explore more in computer networks to establish a strong career out of this industrial
training.
lOMoARcPSD|33226577
4. REFERENCES
https://www.netacad.com/
https://www.cisco.com/c/en_in/index.html