Documente Academic
Documente Profesional
Documente Cultură
Cisco Network Academy validates the ability to install, configure, operate, and troubleshoot
medium-size route and switched networks, including implementation and verification of
connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of
security threats, introduction to wireless networking concepts and terminology, and
performance-based skills. This new curriculum also includes (but is not limited to) the use of
these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line
Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2), VLANs,
Ethernet, access control lists (ACLs).
Cisco Packet Tracer is a powerful network simulation program that allows students to
experiment with network behavior and ask “what if” questions. As an integral part of the
Networking Academy comprehensive learning experience, Packet Tracer provides simulation,
visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching
and learning of complex technology concepts. Packet Tracer supplements physical equipment
in the classroom by allowing students to create a network with an almost unlimited number of
devices, encouraging practice, discovery, and troubleshooting. The simulation based learning
environment helps students develop 21st century skills such as decision making, creative and
critical thinking, and problem solving.
Page 1
added support for various DHCP, EIGRP and OSPF commands, improved support for Zone-
Based Firewall policies. Version 6.0 added support for IOS version 15 and Hot Standby
Routing Protocol.
1.2 Packet Tracer Features:
• Logical and Physical Workspaces
• Real-Time and Simulation Modes
• User friendly CLI
• Global event list (packet sniffer)
• LAN, switching, TCP/IP, routing, and WAN protocols
• Activity Wizard, Lab grading
• Multiple platform support
Page 2
Chapter-2 INTRODUCTION
An ideal Bank Networking system will be fully network base and easy with friendly
user interface staff task management system where any banking system manage their
networking system somehow Head office , Branch Office, and other office are maintain LAN,
MAN, WAN, VLAN, VLSM,VPN and some branch are maintain by manageable switch. LAN is
used by Local Area Networking system for example one office and a one building. And MAN
are using by the Metro Politian area Network for Example small town, and WAN are use by
the WIDE AREA NETWORK. In this networking system are used by all banking users can use
by shared their data very easily. So that every user use to take about Network Structure &
Security of Banking System instantly this way anywhere.
2.1 Objectives
1. To design and simulate a banking network system which is secure.
2. To simulate a banking network system that will easily manage any banking task.
3. To manage the banking network by a central system
2.3 Justification of study: The trend of growth of Online Banking brings many security issues
and increasing cost of implementing higher security system for both Online Banking users
and the banks. Classers said security is all about risks and associated cost in his paper .The
most critical issue of Online Banking security is to protect valuable information that is
susceptible to unauthorized access by attackers. Hence, the banks must constantly increase
security. At the same time, the banks must manage costs to make a profit. In contrast,
increasing security is increasing the cost for attackers to break into the system, and
increasing the punishment that the attackers may suffer. Hence the Internet
criminals/attackers/crackers may lose motivation for hacking a high security online banking
system.
The scope of the Network Structure & Security of Banking System includes.
The following case study is used to illustrate the process and documentation required
for a network design. This case study presents a scenario in which the Banks & ATM has
hired a Network Consultant Group to design their network. In order to help organization this
project, the scenario has been broken into eight phases listing requirements for each phase.
Page 3
A worksheet is to be completed for each part. A formal report, similar to what would
be given to the banks, will need to be created after all tasks have been completed.
1. Use the resources provided, diagram and narrative, to set up the physical network.
Page 4
Chapter-3 REQUIREMENTS
The Banks & ATM has provided a partially completed logical diagram of the required
network.
The company has also provided networking equipment for development and demonstration.
• The company consists of 3 remote locations. One being the main building and other
two locations on a remote site.
• 198.168.0.1
• 198.168.0.2
• 198.168.0.3
• 198.168.0.4
• 198.168.0.5
• 198.168.0.6
• 198.168.0.7
• 198.163.0.1
• 198.163.0.2
• 198.163.0.3
• 198.163.0.4
• 198.163.0.5
• 198.163.0.6
• 198.163.0.7
Page 5
3.1 Following address are used for internal addressing.
• 10.0.0.0
• 20.0.0.0
• 30.0.0.0
• 40.0.0.0
• 11.0.0.0
• 21.0.0.0
• 31.0.0.0
• 41.0.0.0
• Device details
Page 6
Page 7
Chapter-4 NETWORK STRUCTURE
Figure-1
Page 8
Figure-2
Page 9
Chapter-5 IP ADDRESSING
Address Classes
There are 5 different address classes. You can determine which class any IP address is in by
examining the first 4 bits of the IP address.
· Class A addresses begin with 0xxx, or 1 to 126 decimal.
· Class B addresses begin with 10xx, or 128 to 191 decimal.
· Class C addresses begin with 110x, or 192 to 223 decimal.
· Class D addresses begin with 1110, or 224 to 239 decimal.
· Class E addresses begin with 1111, or 240 to 254 decimal.
Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for
internal testing on a local machine Class D addresses are reserved for multicasting. Class E
addresses are reserved for future use.
Subnetting
Subnetting an IP Network can be done for a variety of reasons, including organization, use of
different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space,
and security. The most common reason is to control network traffic. In an Ethernet network,
all nodes on a segment see all the packets transmitted by all the other nodes on that
segment. Performance can be adversely affected under heavy traffic loads, due to collisions
and the resulting retransmissions. A router is used to connect IP networks to minimize the
amount of traffic each segment must receive.
Subnet Masking
Applying a subnet mask to an IP address allows you to identify the network and node parts of
the address. Performing a bitwise logical AND operation between the IP address and the
subnet mask results in the Network Address or Number.
DHCP
The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating the
configuration of computers that use TCP/IP. DHCP can be used to automatically assign IP
addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and
default router, and to provide other configuration information such as the addresses for
printer, time and news servers.
Page 10
Chapter-6 INTERNAL IP ADDRESSING
NOTE:
• Overlapping subnets in sales, marketing department etc is note done as more hosts
can be accommodated in the given domain whenever required
Page 11
SERVER IP ADDRESS LOCATION
DNS 198.168.0.6 CENTER
HTTP 198.168.0.2
HTTP 198.168.0.3 CENTER
HTTP 198.168.0.4 CENTER
HTTP 198.163.0.3
HTTP 198.163.0.4 CENTER
Type/Number
Page 12
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Number address
Interface
Type/Number
Page 13
CONTROL ROUTER (DTE)
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to SBI 193.168.0.12 193.168.0.13 /30
Page 14
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 193.168.0.4 194.168.0.5 /30
Page 15
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 194.168.0.4 194.168.0.5 /30
Page 16
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Number address
Interface
Type/Number
Page 17
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
S0/2 Link to South bank 192.163.0.4 192.163.0.6 /30
Page 18
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to HDFC 122.122.0.4 122.122.0.5 /30
Page 19
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 122.122.0.12 122.122.13 /30
Page 20
Chapter-8 ROUTING PROTOCOL
Routing protocols use metrics to evaluate what path will be the best for a packet to
travel. A metric is a standard of measurement, such as path bandwidth, that is used by
routing algorithms to determine the optimal path to a destination. To aid the process of path
determination, routing algorithms initialize and maintain routing tables, which contain route
information. Route information varies depending on the routing algorithm used.
Routing algorithms often have one or more of the following design goals:
• Optimality
• Simplicity and low overhead
• Robustness and stability
• Rapid convergence
• Flexibility
Page 21
8.2 The various routing protocol that can be used are:
RIP Configuration:
The command syntax is as follows:
Router (config) #router rip
Router (config-router) #network network-number net-mask
2. IGRP is a distance vector Interior Gateway Protocol (IGP). IGRP uses a composite
metric that is calculated by factoring weighted mathematical values for internetwork
delay, bandwidth, reliability, and load. Network administrators can set the weighting
factors for each of these metrics, although great care should be taken before any
default values are manipulated.
IGRP Configuration:
To configure the IGRP routing process use the router igrp configuration command.
The command syntax is as follows:
Router A (config) #router igrp as-number
Router A (config) #network network-number net-mask
There as number identifies the IGRP process. To specify a list of networks for IGRP
routing process, se the network router configuration command. To remove an entry,
use the no form of the command.
3. EIGRP Key capabilities that distinguish EIGRP from other routing protocols include
fast convergence, support for variable-length subnet mask, support for partial
updates, and support for multiple network layer protocols.
A router running EIGRP stores all its neighbors' routing tables so that it can quickly
adapt to alternate routes. If no appropriate route exists, EIGRP queries its neighbors
to discover an alternate route.
EIGRP does not make periodic updates. Instead, it sends partial updates only when
the metric for a route changes.
EIGRP Configuration:
EIGRP is an ideal choice for large, multi-protocol networks built primary on Cisco
routers.
RouterA(Config)#router eigrp as-number
RouterA(Config)#network network-number net-mask.
4. OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LSAs) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables is included in
OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF
algorithm to calculate the shortest path to each node.
Page 22
OSPF Configuration:
To enable OSPF routing, use the global configuration command syntax:
Router (configure) #router ospf process-id
Router (configure-router) #network address wildcard-mask area area-id.
Property 1 Property 2 Property 3 Property 4 Property 5 Property 6 Total
Routing
Protocol Supports Scalable Uses Has view Easy to Proprietary
VLSM multicast of configure
updates complete
toplology
RIP V1 - - - - - - 2
RIP v2 - - - - - - 4
IGRP - - - - - - 2
EIGRP - - - - - - 3
OSPF + + + + - + 5
Our configuration
*****OSPF protocol in all routers with process id 10 in single area 0*****
Page 23
Chapter-9 Automated Teller Machine:
Now it’s making peoples life very easy as they get their money when they need. So, they do
not need to carry either big amount of money or the checked book all the time. To get rid
from this burden they need to deposit money in the bank by opening an account and then
the bank will be given a Card i.e. an ATM card with a PIN number to them. By using that they
can withdraw money from any ATM machine of that bank. When they insert the card in the
machine and the PIN number the machine will show few instructions on the screen. By that
time verification (PIN Number and Account Number) will be done with the main bank
computer as they are connected. If the verification is correct then the user will choose an
instruction and the ATM will dispense money to the card holder.
9.1 Internal Structure of ATM In the following pictures we have the internal structure of two
different type of ATM machine. And also it can be divided into two different parts: - Upper
Unit, -Lower Unit
9.2 Interactive components of ATM Card Reader:
Customer inserts their card in it when there is written “Please Insert Your card” on the
screen.
Keypad: Use for PIN code input, choices, amount of money etc as the input to The
ATM machine.
Display Screen: This screen shows all the instructions or options for the customers
„convenience.
Screen Buttons: When options are given on the screen one user can choose any of
the options accordingly by the use of button on left or right side of the screen. These
buttons select the option from the screen.
Cash Dispenser: Withdrawal money is given by this slot. Deposit Slot: To deposit
money this slot is use.
Speaker: Speaker provides the facilities to the customer by giving auditory feedback.
ATM Card: ATM card is also like magnetic strip card. It is also a data carrier which
electronically reads and writes data. ATM cards mainly a debit card.
Ways of Transaction:
In Bank transactions are divided into three main categories
Page 24
Chapter-10 SECURITY
Security is most important part for online banking system. We use the different method
for provide strong online banking security system and use owasp top ten project provide
online banking security. Ensuring comprehensive network security visibility is no easy task.
Uncover expert tips on how to improve network security visibility with network flow analysis
tools, cloud security monitoring solutions, and anomaly-based monitoring technology.
Page 25
10.4 ACLs can be used to perform the following task
Page 26
Chapter-11 VLAN
.
We can assign each switch port to a VLAN. Ports in a VLAN share broadcast traffic. Ports that
do not belong to that VLAN do not share the broadcast traffic.
Page 27
Chapter-12 NETWORK ADDRESS TRANSLATION (NAT)
Network Address Translation allows a single device, such as a router, to act as agent
between the Internet (or "public network") and a local (or "private") network. This means
that only a single unique IP address is required to represent an entire group of computers to
anything outside their network.
The shortage of IP addresses is only one reason to use NAT. Two other good reasons are:
• Security
• Administration
Page 28
Chapter-13 DEVICE CONFIGURATION
North BANKING:-
Rou Router#sh run
Building configuration...
version 12.4
no service password-encryption
interface FastEthernet0/0
duplex au
to
speed auto
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
no ip address
shutdown
interface Serial0/0/1
Page 29
no ip address
shutdown
interface Serial0/1/0
bandwidth 325435
interface Serial0/1/1
bandwidth 325435
interface Serial0/2/0
no ip address
shutdown
interface Serial0/2/1
no ip address
shutdown
interface Serial0/3/0
bandwidth 4545
interface Serial0/3/1
bandwidth 4545
Page 30
interface Vlan1
no ip address
shutdown
log-adjacency-changes
ip classless
line con 0
line vty 0 4
login
end
ters
PNB SERVER:-
Router#SH run
Building configuration...
version 12.2
no service password-encryption
hostname Router
Page 31
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
interface Serial0/1
interface Serial0/2
interface Serial0/3
log-adjacency-changes
Page 32
network 193.168.0.8 0.0.0.3 area 0
ip classless
line con 0
line vty 0 4
login
end
SBI SERVER:-
Router#Sh run
Building configuration...
version 12.2
no service password-encryption
hostname Router
default-router 20.0.0.1
dns-server 198.168.0.6
interface FastEthernet0/0
ip nat inside
duplex auto
speed auto
interface FastEthernet0/1
Page 33
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
no ip address
shutdown
interface Serial0/1
no ip address
shutdown
interface Serial0/2
ip nat outside
interface Serial0/3
no ip address
shutdown
log-adjacency-changes
ip classless
Page 34
access-list 10 permit 20.0.0.32 0.0.0.31
line con 0
line vty 0 4
login
end
HDFC ROUTER:-
Router#sh run
Building configuration...
version 12.2
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 67767
Page 35
ip address 194.168.0.5 255.255.255.252
interface Serial0/1
bandwidth 78989
interface Serial0/2
interface Serial0/3
log-adjacency-changes
ip classless
line con 0
line vty 0 4
login
end
ICICI ROUTER:-
Router#SH RUN
Building configuration...
Page 36
version 12.2
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
interface Serial0/1
interface Serial0/2
interface Serial0/3
bandwidth 234445
Page 37
clock rate 64000
log-adjacency-changes
ip classles
line con 0
line vty 0 4
login
end
SOUTH SERVER:-
SOUTHBANK#SH RUN
Building configuration...
version 12.4
no service password-encryption
hostname SOUTHBANK
interface FastEthernet0/0
duplex auto
speed auto
interface FastEthernet0/1
Page 38
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
interface Serial0/0/1
bandwidth 6743876
interface Serial0/1/0
bandwidth 345356
interface Serial0/1/1
interface Serial0/2/0
no ip address
shutdown
interface Serial0/2/1
no ip address
shutdown
interface Serial0/3/0
Page 39
no ip address
shutdown
interface Serial0/3/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
log-adjacency-changes
ip classless
no cdp run
line con 0
line vty 0 4
login
end
PNB SERVER :-
Router#sh run
Building configuration...
version 12.2
Page 40
no service timestamps log datetime msec
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 4534
interface Serial0/1
bandwidth 7674
interface Serial0/2
interface Serial0/3
bandwidth 766734
Page 41
ip address 122.168.0.1 255.255.255.252
log-adjacency-changes
ip classless
no cdp run
line con 0
line vty 0 4
login
end
SBI SERVER:-
SBIBANK#sh run
Building configuration...
version 12.2
no service password-encryption
hostname SBIBANK
Page 42
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 43545
interface Serial0/1
bandwidth 3454546
interface Serial0/2
interface Serial0/3
log-adjacency-changes
Page 43
network 122.168.0.16 0.0.0.3 area 0
ip classless
no cdp run
line con 0
line vty 0 4
login
end
HDFC SERVER:-
HDFCBANK#sh run
Building configuration...
version 12.2
no service password-encryption
hostname HDFCBANK
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
Page 44
speed auto
shutdown
interface Serial0/0
bandwidth 354435
interface Serial0/1
bandwidth 78433
interface Serial0/2
bandwidth 34566
interface Serial0/3
bandwidth 35455
log-adjacency-changes
ip classless
line con 0
line vty 0 4
Page 45
login
end
ICICI SERVER:-
ICICIBANK#SH RUN
Building configuration...
version 12.2
no service password-encryption
hostname ICICIBANK
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
Page 46
interface Serial0/1
bandwidth 22345
interface Serial0/2
interface Serial0/3
bandwidth 6568778
log-adjacency-changes
ip classlesS
no cdp
line con 0
line vty 0 4
login
end
Page 47
Chapter-14 RESULT
HTTP SERVER:-
Page 48
DNS SERVER:-
Page 49
FTP:-
TFTP:-
Page 50
WEB BROWSING:-
WEB BROWSING:-
Page 51
Page 52
COMMUNICATION BETWEEN TWO PC’S AND NAT TRANSLATION
Page 53
DHCP IP ADDRESS:-
Page 54
Chapter -15 SUMMARY STEP WORK DESCRIPTION
DESCRIPTION:
The aim of this system is to overcome the lacking of the manual system. All branches
of the Bank situated at District level provide the Banking services to customers and had to
send report to the central branch manually, which sometimes create problem to get up-to-
date information rapidly. But now through this system whenever any transaction will be
taking place it will store in the central database and authorized person can get necessary
information or report when they get into the system from any branches through Wide Area
Network (WAN). Routers are generally known as intermediate systems, which operates at
the network layer of the OSI reference model, routers are devices used to connect two or
more networks (IP networks) or a LAN to the Internet. A router acts as a packet filter when it
forwards or denies packets according to filtering rules. As a Layer 3 device, a packet-filtering
router uses rules to determine whether to permit or deny traffic based on source and
destination IP addresses, source port and destination port, and the protocol of the packet.
India all
These rules are defined using access control lists or ACLs. Banking system in
banks has an IT department. IT department solution all
type of IT problem and serve the core network. IT creates
a core network diagram. This diagram involves all type of
useable network mechanism (Switch, Router, Firewall,
Server) etc. Simulation is the most important of any
system. An accurate system design, accurate performance
and accurate Simulation give best performance of a
system. Now we discuss and simulate the OSPF protocol.
Open Shortest Path First (OSPF) is a routing protocol
developed for Internet Protocol (IP) networks by the
interior gateway protocol (IGP) working group of the
Internet Engineering Task Force (IETF).
Page 55
Chapter-16 CONCLUSION
Future Work:
Add time based transmission.
Security system will be upgraded .
Make the project more user friendly.
Real life implementation.
Limitations :
The main Limitation is to implement the project in real world . Because we only
simulate it via packet tracer.
Due to less time and work pressure we could not add more features which could make
the project more useful.
Page 56
Chapter-17 REFRENCES
Page 57
THANKS
@@@@@@@@@@@@@@@@@@
Page 58