Documente Academic
Documente Profesional
Documente Cultură
UNIVERS
ITY
,
SIX MONTHS INDUSTRIAL TRAINING REPORT
ON
BADDI
NETWORKING (CCNA)
AT
HCL INFOTECH SEC-11,
NOIDA (U.P)
Submitted By:
Ashish Dhillon
(2012010105)
ACKNOWLEDGEMENT
I f e e l d e e p l y i n d e b t e d t o M r. As h w i n i K u ma r, w h o d e l i v e r e d
v a l u a b l e lesson on Networking, his in depth knowledge about the
subject helped me understand the s u b j e c t i n b e t t e r w a y. H i s m e t h o d
o f t e a c h i n g t h e m i n u t e d e t a i l s h e l p e d m e a l o t t o acquire the
insight into the subject.
I am also grateful to Mr. Chandan Singh Takuli, CCIE (Collabration)
for giving best knowledge about CCNA. The way he instilled
knowledge of the subject was undoubtly praise worthy and valuable.
I am also thankful to HCL Infotech as a whole that is doing yeomans
service by teaching the learner abreast with the computer, networking and
hardware knowledge that is the need of the day.
I will be failing in my duty if I do not acknowledge by Mr. Chandan Singh
Takuli who always stood by my side and encourage me during my
studies.
Last but not the least, I thank all my colleagues at HCL Infotech for
extending kind co-operation.
Ashish Dhillon
List of Figures
Figure
No.
Name of Figure
1.
Computer Network
2.
3.
LAN Classification
4.
5.
6.
7.
Tree Structure
8.
9.
Multi-Master Mode
10.
11.
12.
ICS Scenario
13.
14.
NAT Server
15.
VPN Server
16.
LAN Routing
17.
Static Routing
18.
Architecture of Router
19.
20.
21.
Scenario of Telnet
22.
Routing Table
23.
24.
Routing Loops
Page No.
25.
OSPF Scenario
26.
VLAN Operation
27.
VTP Configuration
28.
VTP Pruning
29.
List of Tables
Table No.
Name of Table
1.
2.
3.
Addresses Classes
4.
5.
6.
7.
8.
Operating systems
9.
10.
11.
12.
Router Ports
13.
14.
15.
16.
Routing Table
17.
18.
Page No.
CONTENTS
Sr. No.
Topic
1.
Introduction
1.1
Company Profile
2.
Literature Review
3.
Networking
3.1
Introduction to Networking
Networking Media
Operating System
3.4.1 Types of OS
3.5
DNS Server
DHCP Server
Active Directory
Page
No.
Internet Sharing
Routing
Exchange Server
Routers
Subnetting
3.15
Telnet
Routing
LAN Switching
3.17.1 Switch
3.17.1.1 VLAN (Virtual LAN)
3.17.1.2 VLAN Trunking Protocol (VTP)
3.18
Conclusion
5.
References
1. INTRODUCTION
This project report pertains to six months industrial training that I had
underwent at HCL Infotech, Noida as part of curriculum of degree in
Bachelor of technology in Computer Science & Engineering as required
by IEC University (affiliated to Himachal Pradesh Technical University,
Shimla).
I learnt a lot from professional managers and skilled engineers. I had a
great learning experience as trainee in this firm. I learnt a lot about how
different networks are controlled in the industry or any department with
the help of networking processes, under CCNA.
I have learnt about different type of servers like DHCP Server, DNS
Server, NAT Server. Also I have learnt how to control the LAN, MAN
and WAN networks under CCNA.
Justification cannot be done to whatever I have learnt in these six months
within a few pages but I have still tried my best to cover as much as
possible in this report. In this report I have tried to sum up the technical
knowledge I have gained in my six months of training.
HCL has made it to the prestigious Forbes annual 2013 Asias Fab 50
list. This recognition highlights the regions best-of-the-best that meets a
revenue or market capitalization threshold of $3 billion.
In 2012, for the fourth time in a row, WorldBlu lists HCL as one of the
Most Democratic Workplaces in the World.
Won the Nasscom Innovation Award 2012 for Market Facing Innovation
In 2012, it was recognized as one of Britains Top Employers for the 5th
consecutive year, for its innovative Employees First philosophy.
Won TPIs Americas Paragon Award for Innovation Excellence and was
recognized as one of the most innovative R&D players.
2. LITERATURE RIEVIEW
Computer Networking is a very vast project in the present developing era of
electronics and communication. Now a days, computers are used in a wider
range. All the organizations are using multiple computers within their
departments to perform their day to day work. Computer network allows the
user to share data, share folders and files with other users connected in a
network. Computer Networking has bound the world in a very small area with it
wide networking processes like LAN, MAN, WAN.
The courses in HCL comprises lecture and theory session, with a great focus on
active participation through smart lab plus ,that focuses on audio visual and
learning with hands-on training and equips students with an in depth domain
knowledge that is technical; it also equips students with soft skills, to face the
multi-faceted challenges of corporate world.
3. NETWORKING
3.1 Introduction to networking
Networking is a practice of linking of two or more computing devices
such as PCs, printers, faxes etc., with each other Connection between
two devices is through physical media or logical media to share
information, data and resources. Networks are made with the hardware
and software.
(ii)
(iii)
Domain Model
It is a mixture of client server and peer-to-peer model. In this clients
can share their resources as peer-to-peer but with the permission of the
server as in client server model therefore it is commonly used model
because in this security is more as we can put restriction on both server
and clients.
Domain
1. It is a server based networking model.
called clients.
3. This model is recommended for small 3. This model is recommended for large
networks, up to 10 computers.
networks.
4. There is no centralized administrated 4. There is centralized administration and
separately.
each PC can be administrated and managed
from the server.
5. In this model, low grade OS like2000/XP 5. In this model high grade OS like
professional, WIN 98 etc. can be used.
WIN2000/2003 Server can be used.
6. Users accounts are created in each PC
and are called as Local Users.
6. Users accounts are created on the
server side and are called Domain Users.
Types of LAN
In LANs, data can be transferred using techniques like token passing. As
per techniques used for data sharing, LANS are classified into Ethernet, Token
Bus, Token Ring and Fibre Distributed Data Interface (FDDI).Figure 3 shows
LAN classification.
Advantages of LAN
a). Provides communication in smaller networks, easy to install and configure.
b). Many users can share data or network elements at the same time which
results in fast work.
Disadvantages of LAN
a). limited number of computers are connected in a LAN.
b). LAN cannot cover large area.
c). Network performance degrades as the number of users exceeds.
3.1.2.2 Campus Area Network (CAN)
Campus Area Network is a computer network made up of two or more LANs
within a limited area. It can cover many buildings in an area. The main feature
of CAN is that all of the computers which are connected together have some
relationship to each other e.g. different buildings in a campus can be connected
using different CAN. It will help to interconnect academic departments, library
and computer laboratories. CAN is larger than LAN but smaller than WAN.
Figure 4 shows a CAN network.
Devices used in CAN are : HUB, Switch, Layer-3 switch, Access Point .And the
media used for CAN is Unshielded twisted pair of cables and fibre Optics
Cable.
3.1.2.3 Metropolitan Area Network (MAN)
MAN is the interconnection of networks in a city. MAN is not owned by a
single organization. It act as a high speed network to allow sharing resources
with in a city. MAN can also be formed by connecting remote LANs through
telephone lines or radio links. MAN supports data and voice transmission. The
best example of MAN is cable T.V network in a city.
Class A consists of 8-bit network ID and 24-bit host ID. Class B consists of
16- bit network ID and 16-bit of host ID. And Class C consists of 24-bit of
network ID and 8-bit of host ID.
Address Classes
Table 7
DOS
1. It is a desktop operating system.
NOS
1. It is a network operating system.
4. In this OS, all computers are 4. In this OS, there are servers and
clients.
clients.
5. In this OS, MS-DOS, GUI 5. In this OS Win NT, Win 2000,
packageWin3.1, Win 95, Win 98, Win Win2003, LINUX, UNIX, Novell and
ME comes.
MAC comes.
Window server 2003 (also referred to as WIN 2k3) is a server operating system
produced by Microsoft. Introduced in 24th April 2003 as the successor to
window 2000 server, it is considered by Microsoft to be the corner stone of its
window server system line of business server products. An update version
Window Server 2003 R2 was released manufacturing on 6 th Dec, 2005. Its
successor window 2008 was released on 4th Feb, 2008. According to Microsoft,
window server 2003 is more scalable and deliver better performance than its
predecessor window 2000.
Features of Window 2003
(i)
(ii)
FQDN is a unique name in the computer on the network. We can identify host id
and location of a computer as in fig above. Suppose we want to find location of
pc1 with IP address 20.0.0.1, which is in lab2, 2 nd floor in the organization
centre. The FQDN for this is
Pc1.row3.lab2.floor2.center.com
But this address is very lengthy to locate pc1 so to simplify this we use c
name technique as:
Pc1.center.com=20.0.0.1
values, such as a default gateway, DNS server address, and the address of a
Window Internet Naming Server, if one is present.
3.6.1 Working of DHCP Server
(i)DHCP Scope
(ii)DHCP Super Scope
(iii)Exclusion IP Range
(iv)DHCP Lease Time
(v)IP Reservation
DHCP Scope
Scope having the range of IP address for providing dynamic IP address to
other computer. A group of IP address within a scope is called as DHCP scope.
DHCP Super Scope
A super scope is used to combine two or more scopes each serving different
subnets, and can make the administration of several scopes on window 2003
DHCP server more manageable. Using super scope you can group multiple
scopes as a single administrative entity that allows the client to lease from either
one. With this feature, a DHCP server can:
Support DHCP clients on a single physical network segment where multiple
logical IP networks are used. When more than one logical IP network is used on
each physical subnet or network, such configuration is called multinets.
Support DHCP clients located on the far side of DHCP and BOOTP relay
agent.
In multinet configuration, DHCP super scope can be used to group and
activate individual scope ranges of IP addresses used on your network. In this
way, a DHCP server computer can activate and provide leases from more than
one scope to clients on a single physical network.
Exclusion IP range
If you want to reserve some IP for any computer i.e. if we want that from the
series of 192.168.0.2 to 192.168.0.100 if we want that a series of IP addresses
must not be assigned automatically then at can be done using exclusive IP
range.
and the trees in a single organization are called a forest. All domains in the
forest share same schema.
3.7.1.1 Types of Domain
Domain Forest
Domain Tree
Organization unit
Domain Forest
A forest is created when window 2k3 server computer is configured as a domain
controller. A forest is a collection of multiple domain link together and
relationship between the domains.
Domain Tree
A domain tree is made up when there is a parent child relationship between the
domain in the forest. The child domain includes the complete parent domain
name. a tree is a set of two or more domains sharing common namespace e.g we
can create a parent domain and then child domain like mail.yahoo.com; where
mail- child domain, yahoo- parent domain.
This command is also used to remove active directory, if after this command the
active directory is not removed then type
start run
cmd dcpromo /forceremoval
Ok
How to identify Active Directory installation
Start administrator tool
After that if three options specified if come, it means that Active Directory has
been installed
Active Directory domain and trusts
Active Directory sites and services
Active Directory users and computer
Open DNS console by
Administrator tools DNS
Forward lookup zone msdcs.exam.edu
start of authority (SOA)
name server (NS) Now ping active directory with domain name like
start run ping gmail.com
Backup of Active Directory
Active Directory backup come in use when there is some problem in active
directory. If there is any problem in active directory then remove it and restore
the backup.
Start run ntbackup ok
Select advance mode and untick that is already ticked
Select backup
Select system state
Change backup path browse keep in your hardware and then send it to the pen
drive
D:\adbackup
3.7.2CHILD DOMAIN
A domain is created say xyz.com. This domain is known as parent domain or
the root domain. Now chd.xyz.com will be the child domain or the sub
domain of xyz.com.
First of all install the active directory on pc1 i.e. on the parent domain. Now
make Tom user on it. On pc2 create the child domain, then make users on it,
user- Ram Below are the steps to create child domain.
Fill the IP address in the child domain
Now ping to the parent domain with the domain name (xyz.com)
Run dcpromo ok
next select domain controller for a new domain
next select child domain and existing domain name (mcse.com)
next
enter username, password and domain name
enter user parent domain name also enter child domain name
enter complete DNS name i.e. xyz.mcse.com
next next next next
It should be noted that parent domain can logon into child domain but on the
other hand child domain cannot logon to the parent domain. Also parent domain
can apply policies or security on the child domain. Make the client member by
entering particular user with its domain name.
First right click on My Computer
Properties
Computer name
Change
Write domain name ok
Now logoff start and then write user name Tom
Domain name - mcse.com
Again logoff and check the other user
Start-user name- abc
Domain name mail.mcse.com
3.8 INTERNET SHAREING
We can share a single internet connection to multiple computers with the help
of networking or internet sharing. There are four ways to share internet.