Sunteți pe pagina 1din 58

Chapter-1 ABOUT THE TECHNOLOGY

Cisco Network Academy validates the ability to install, configure, operate, and troubleshoot
medium-size route and switched networks, including implementation and verification of
connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of
security threats, introduction to wireless networking concepts and terminology, and
performance-based skills. This new curriculum also includes (but is not limited to) the use of
these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line
Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2), VLANs,
Ethernet, access control lists (ACLs).

1.1 SOFTWARE USED: PACKET TRACER VER 6.2.0.005

Cisco Packet Tracer is a powerful network simulation program that allows students to
experiment with network behavior and ask “what if” questions. As an integral part of the
Networking Academy comprehensive learning experience, Packet Tracer provides simulation,
visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching
and learning of complex technology concepts. Packet Tracer supplements physical equipment
in the classroom by allowing students to create a network with an almost unlimited number of
devices, encouraging practice, discovery, and troubleshooting. The simulation based learning
environment helps students develop 21st century skills such as decision making, creative and
critical thinking, and problem solving.

Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run


on Mac OS, Linux and Microsoft Windows. A similar Android app is also available. Packet
Tracer allows users to create simulated network topologies by dragging and dropping routers,
switches and various other types of network devices. A physical connection between devices
is represented by a "cable" item. Packet Tracer supports an array of simulated Application
Layer protocols, as well as basic routing with RIP, OSPF, EIGRP, BDP, to the extents
required by the current CCNA curriculum. As of version 6.2, Packet Tracer also supports the
Border Gateway Protocol, even though; this protocol is not taught in the CCNA curriculum.
As of version 6.2, Packet Tracer supports an embedded web server with JavaScript and CSS
support. The command line can be used for creating a router-to-pc connection. Version 6.1.1

Page 1
added support for various DHCP, EIGRP and OSPF commands, improved support for Zone-
Based Firewall policies. Version 6.0 added support for IOS version 15 and Hot Standby
Routing Protocol.
1.2 Packet Tracer Features:
• Logical and Physical Workspaces
• Real-Time and Simulation Modes
• User friendly CLI
• Global event list (packet sniffer)
• LAN, switching, TCP/IP, routing, and WAN protocols
• Activity Wizard, Lab grading
• Multiple platform support

Page 2
Chapter-2 INTRODUCTION

An ideal Bank Networking system will be fully network base and easy with friendly
user interface staff task management system where any banking system manage their
networking system somehow Head office , Branch Office, and other office are maintain LAN,
MAN, WAN, VLAN, VLSM,VPN and some branch are maintain by manageable switch. LAN is
used by Local Area Networking system for example one office and a one building. And MAN
are using by the Metro Politian area Network for Example small town, and WAN are use by
the WIDE AREA NETWORK. In this networking system are used by all banking users can use
by shared their data very easily. So that every user use to take about Network Structure &
Security of Banking System instantly this way anywhere.
2.1 Objectives
1. To design and simulate a banking network system which is secure.
2. To simulate a banking network system that will easily manage any banking task.
3. To manage the banking network by a central system

2.3 Justification of study: The trend of growth of Online Banking brings many security issues
and increasing cost of implementing higher security system for both Online Banking users
and the banks. Classers said security is all about risks and associated cost in his paper .The
most critical issue of Online Banking security is to protect valuable information that is
susceptible to unauthorized access by attackers. Hence, the banks must constantly increase
security. At the same time, the banks must manage costs to make a profit. In contrast,
increasing security is increasing the cost for attackers to break into the system, and
increasing the punishment that the attackers may suffer. Hence the Internet
criminals/attackers/crackers may lose motivation for hacking a high security online banking
system.

2.4 Scopes of study

The scope of the Network Structure & Security of Banking System includes.

1. Online based day to day transmission.


2. Save time and cost because of day to day transmission.
3. Established relation between one branch to another
4. Connect all branches to head branch in same network.
5. Online based update and maintain everyday work.

The following case study is used to illustrate the process and documentation required
for a network design. This case study presents a scenario in which the Banks & ATM has
hired a Network Consultant Group to design their network. In order to help organization this
project, the scenario has been broken into eight phases listing requirements for each phase.

Page 3
A worksheet is to be completed for each part. A formal report, similar to what would
be given to the banks, will need to be created after all tasks have been completed.

This case study requires that you accomplish the following:

1. Use the resources provided, diagram and narrative, to set up the physical network.

2. Set up an IP sub-netting scheme

3. Configure the routers as required.

4. Set up and configure the switches and VLANS as required.

5. Verify and troubleshoot all connections.

6. Provide detailed documentation in the appropriate format.

7. Provide a written final report

Page 4
Chapter-3 REQUIREMENTS

The Banks & ATM has provided a partially completed logical diagram of the required
network.

The company has also provided networking equipment for development and demonstration.

• The company consists of 3 remote locations. One being the main building and other
two locations on a remote site.

• The main building consists of 6 departments with the following requirement:

Department Number Remarks


BANKS 120 Size can vary up to 255
ATM 120 Size can vary up to 255
CONTYROL 120 Size can vary up to 255

• 8 servers that distributed in all locations

• The following ip address to be used for connection with SERVER

• 198.168.0.1

• 198.168.0.2

• 198.168.0.3

• 198.168.0.4

• 198.168.0.5

• 198.168.0.6

• 198.168.0.7

• 198.163.0.1

• 198.163.0.2

• 198.163.0.3

• 198.163.0.4

• 198.163.0.5

• 198.163.0.6

• 198.163.0.7

Page 5
3.1 Following address are used for internal addressing.

• 10.0.0.0

• 20.0.0.0

• 30.0.0.0

• 40.0.0.0

• 11.0.0.0

• 21.0.0.0

• 31.0.0.0

• 41.0.0.0

• Use VLSM for IP addressing.

• Device details

DEVICE MODEL NUMBER


Router 2811 4
Switches 2960 10
Server - 11

Page 6
Page 7
Chapter-4 NETWORK STRUCTURE

Figure-1
Page 8
Figure-2

Page 9
Chapter-5 IP ADDRESSING

An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP


network. An IP address is a 32 bit binary number usually represented as 4 decimal values,
each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal
points. This is known as "dotted decimal" notation.

Address Classes
There are 5 different address classes. You can determine which class any IP address is in by
examining the first 4 bits of the IP address.
· Class A addresses begin with 0xxx, or 1 to 126 decimal.
· Class B addresses begin with 10xx, or 128 to 191 decimal.
· Class C addresses begin with 110x, or 192 to 223 decimal.
· Class D addresses begin with 1110, or 224 to 239 decimal.
· Class E addresses begin with 1111, or 240 to 254 decimal.
Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for
internal testing on a local machine Class D addresses are reserved for multicasting. Class E
addresses are reserved for future use.

Subnetting
Subnetting an IP Network can be done for a variety of reasons, including organization, use of
different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space,
and security. The most common reason is to control network traffic. In an Ethernet network,
all nodes on a segment see all the packets transmitted by all the other nodes on that
segment. Performance can be adversely affected under heavy traffic loads, due to collisions
and the resulting retransmissions. A router is used to connect IP networks to minimize the
amount of traffic each segment must receive.

Subnet Masking
Applying a subnet mask to an IP address allows you to identify the network and node parts of
the address. Performing a bitwise logical AND operation between the IP address and the
subnet mask results in the Network Address or Number.

DHCP
The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating the
configuration of computers that use TCP/IP. DHCP can be used to automatically assign IP
addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and
default router, and to provide other configuration information such as the addresses for
printer, time and news servers.

Page 10
Chapter-6 INTERNAL IP ADDRESSING

Number of Network Subnet Max In Use Network


host Mask Number of Name
Address (Yes/No)
addresses Hosts
required Possible

30 10.0.0.0 /27 30 Yes PNB Control

60 10.0.0.32 /26 30 Yes PNB Bank

6 10.0.0.66 /29 30 Yes PNB ATM

30 20.0.0.0 /27 30 Yes SBI Control

25 20.0.0.32 /24 30 Yes SBI Bank

24 20.0.0.64 /24 30 Yes SBI ATM

20 30.0.0.0 /24 30 Yes HDFC control

30 30.0.0.32 /27 30 Yes HDFC BANK

30 30.0.0.64 /27 30 Yes HDFC ATM

255 40.0.0.0 /27 30 Yes ICICI Bank

NOTE:
• Overlapping subnets in sales, marketing department etc is note done as more hosts
can be accommodated in the given domain whenever required

• All devices are assigned ip address using DHCP

Chapter-7 SERVER ADDRESSING

Page 11
SERVER IP ADDRESS LOCATION
DNS 198.168.0.6 CENTER
HTTP 198.168.0.2
HTTP 198.168.0.3 CENTER
HTTP 198.168.0.4 CENTER

HTTP 198.168.0.5 CENTER


FTP 198.168.0.7 CENTER
TFTP 198.168.0.8 CENTER
HTTP 198.163.0.2 CENTER

HTTP 198.163.0.3
HTTP 198.163.0.4 CENTER

HTTP 198.163.0.5 CENTER

DNS 198.163.0.6 CENTER

TFTP 198.163.0.7 CENTER

7.1 Router Configuration:


NORTH BANKING ROUTER (DCE Speed 64000)
Interface/Sub Description and Network Interface IP Subnet Mask
Purpose Number address
Interface

Type/Number

S0/3/0 Link to PNB 192.168.0.0 192.168.0.1 /30

S0/3/1 Link to SBI 192.168.0.4 192.168.0.5 /30

Se0/0/0 Link to HDFC 192.168.0.8 192.168.0.9 /30

Se0/1/0 Link to ICICI 192.168.0.12 192.168.0.13 /30

Fa0/0 Link to servers 198.168.0.0 198.168.0.1 /30

PNB ROUTER (DTE)

Page 12
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Number address
Interface

Type/Number

SE0/1 Link To Bank 193.168.0.32 193.168.0.33 /27

Se0/2 Link to north banking 192.168.0.0 192.168.0.2 /30

Se0/3 Link to Contorl 193.168.0.0 193.168.0.1 /27

Se0/0 Link to ATM 193.168.0.65 193.168.0.65 /27

BANK ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 193.168.0.4 193.168.0.6 /30

Fa0/0 Link to Switch 10.0.0.32 10.0.0.1 /27

CONTROL ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 193.168.0.0 193.168.0.1 /30

Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27

ATM ROUTER (DTE)

Interface/Sub Description and Purpose Network Interface IP Subnet Mask


Interface Number address
Type/Number
SE0/2 Link to PNB 193.168.0.8 193.168.0.9 /30

Fa0/0 Link to Switch 10.0.0.64 10.0.0.65 /27

SBI ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
S0/2 Link to North bank 192.168.0.4 192.168.0.5 /30

Se0/3 Link to Bank 193.168.0.12 193.168.0.13 /27

Se0/1 Link to Control 193.168.0.16 193.168.0.17 /27

Se0/0 Link to Atm 192.168.0.20 193.168.0.21 /27

Page 13
CONTROL ROUTER (DTE)
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to SBI 193.168.0.12 193.168.0.13 /30

Fa0/0 Link to Switch 20.0.0.0 20.0.0.1 /27

BANK ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to SBI 193.168.0.16 193.168.0.17 /30

Fa0/0 Link to Switch 20.0.0.32 20.0.0.33 /27

ATM ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to SBI 193.168.0.20 193.168.0.21 /30

Fa0/0 Link to Switch 20.0.0.64 20.0.0.65 /27

HDFC ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
S0/2 Link to North bank 192.168.0.8 192.168.0.9 /30

Se0/3 Link to Bank 194.168.0.0 194.168.0.1 /27

Se0/1 Link to Control 194.168.0.4 194.168.0.5 /27

Se0/0 Link to Atm 194.168.0.8 194.168.0.9 /27

CONTROL ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to HDFC 194.168.0.0 194.168.0.1 /30

Fa0/0 Link to Switch 30.0.0.0 30.0.0.1 /27

BANK ROUTER (DTE)

Page 14
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 193.168.0.4 194.168.0.5 /30

Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27

ATM ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 194.168.0. 194.168.0.5 /30

Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27

ICICI ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
S0/2 Link to North bank 192.168.0.8 192.168.0.5 /30

Se0/3 Link to Bank 194.168.0.12 193.168.0.13 /27

Se0/1 Link to Control 194.168.0.16 193.168.0.17 /27

Se0/0 Link to Atm 194.168.0.20 193.168.0.21 /27

CONTROL ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to HDFC 194.168.0.12 194.168.0.13 /30

Fa0/0 Link to Switch 40.0.0.0 30.0.0.1 /27

BANK ROUTER (DTE)

Page 15
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 194.168.0.4 194.168.0.5 /30

Fa0/0 Link to Switch 40.0.0.32 40.0.0.33 /27

ATM ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 194.168.0.20 194.168.0.21 /30

Fa0/0 Link to Switch 40.0.0.64 40.0.0.65 /27

SOUTH BANKING ( DCE Speed 64000)


Interface/SubInterface Description and Purpose Network Number Interface IP Subnet
address Mask
Type/Number

S0/1/1 Link to SBI 192.163.0.4 192.163.0.5 /30

SE0/1/0 Link to PNB 192.163.0.0 192.163.0.1 /30

SE0/0/0 Link to HDFC 192.163.0.8 192.163.0.8 /30

SE0/3/0 Link to ICICI 192.163.0.12 192.163.0.13 /30

SE0/3/1 Link to Server 198.163.0.0 198.163.0.1 /30

PNB ROUTER (DTE)

Page 16
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Number address
Interface

Type/Number

SE0/1 Link To Control 122.168.0.32 122.168.0.33 /27

Se0/2 Link to South banking 192.16.0.0 192.168.0.2 /30

Se0/3 Link to Bnak 122.168.0.0 122.168.0.1 /27

Se0/0 Link to ATM 122.168.0.64 12.168.0.65 /27

BANK ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/0 Link to PNB 122.168.0.0 122.168.0.2 /30

Fa0/0 Link to Switch 11.0.0.32 11.0.0.33 /27

CONTROL ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 122.168.0.64 122.168.0.65 /30

Fa0/0 Link to Switch 11.0.0.64 11.0.0.65 /27

ATM ROUTER (DTE)

Interface/Sub Description and Purpose Network Interface IP Subnet Mask


Interface Number address
Type/Number
SE0/2 Link to PNB 122.168.0.0 122.168.0.1 /30

Fa0/0 Link to Switch 11.0.0.0 11.0.0.0 /27

SBI ROUTER (DTE)

Page 17
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
S0/2 Link to South bank 192.163.0.4 192.163.0.6 /30

Se0/3 Link to Bank 122.168.0.14 122.168.0.12 /27

Se0/1 Link to Control 122.168.0.16 122.168.0.17 /27

Se0/0 Link to Atm 122.168.0.20 122.168.0.21 /27

CONTROL ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to SBI 122.168.0.12 122.168.0.13 /30

Fa0/0 Link to Switch 21.0.0.32 21.0.0.33 /27

BANK ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to SBI 122.168.0.16 122.168.0.17 /30

Fa0/0 Link to Switch 21.0.0.0 21.0.0.1 /27

ATM ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to SBI 122.168.0.20 122.168.0.21 /30

Fa0/0 Link to Switch 21.0.0.64 21.0.0.65 /27

HDFC ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
S0/2 Link to South bank 192.163.0.8 192.163.0.9 /30

Se0/3 Link to Bank 122.122.0.0 122.122.0.1 /27

Se0/1 Link to Control 122.122.0.4 122.122.0.5 /27

Se0/0 Link to Atm 122.122.0.8 122.122.0.9 /27

CONTROL ROUTER (DTE)

Page 18
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to HDFC 122.122.0.4 122.122.0.5 /30

Fa0/0 Link to Switch 31.0.0.4 31.0.0.5 /27

BANK ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 122.122.0.0 122.122.0.1 /30

Fa0/0 Link to Switch 31.0.0.0 31.0.0.1 /27

ATM ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 122.122.0.8 122.122.0.9 /30

Fa0/0 Link to Switch 31.0.0.64 31.0.0.65 /27

ICICI ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
S0/2 Link to North bank 122.122.012 122.122.0.13 /30

Se0/3 Link to Bank 122.122.0.20 122.122.0.21 /27

Se0/1 Link to Control 122.122.0.16 122.122.0.17 /27

Se0/0 Link to Atm 122.122.0.12 122.122.0.13 /27

CONTROL ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to HDFC 122.122.0.16 122.122.0.17 /30

Fa0/0 Link to Switch 41.0.0.32 41.0.0.33 /27

BANK ROUTER (DTE)

Page 19
Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 122.122.0.12 122.122.13 /30

Fa0/0 Link to Switch 41.0.0.0 41.0.0.1 /27

ATM ROUTER (DTE)


Interface/Sub Description and Purpose Network Interface IP Subnet Mask
Interface Number address
Type/Number
SE0/2 Link to PNB 122.122.0.20 122.122.0.21 /30

Fa0/0 Link to Switch 41.0.0.64 41.0.0.65 /27

Page 20
Chapter-8 ROUTING PROTOCOL

Routing is the act of moving information across an internetwork from a source to a


destination. Routing involves two basic activities: determining optimal routing paths and
transporting information groups (typically called packets) through an internetwork.

Routing protocols use metrics to evaluate what path will be the best for a packet to
travel. A metric is a standard of measurement, such as path bandwidth, that is used by
routing algorithms to determine the optimal path to a destination. To aid the process of path
determination, routing algorithms initialize and maintain routing tables, which contain route
information. Route information varies depending on the routing algorithm used.

Routing algorithms fill routing tables with a variety of information. Destination/next


hop associations tell a router that a particular destination can be reached optimally by
sending the packet to a particular router representing the "next hop" on the way to the final
destination. When a router receives an incoming packet, it checks the destination address
and attempts to associate this address with a next hop.

Routing algorithms often have one or more of the following design goals:

• Optimality
• Simplicity and low overhead
• Robustness and stability
• Rapid convergence
• Flexibility

8.1 Types of routing:


8.1.1 STATIC ROUTING ALGORITHMS are hardly algorithms at all, but are table mappings
established by the network administrator before the beginning of routing. These mappings
do not change unless the network administrator alters them. Algorithms that use static
routes are simple to design and work well in environments where network traffic is relatively
predictable and where network design is relatively simple.

8.1.2 DYNAMIC ROUTING ALGORITHMS which adjust to changing network circumstances by


analyzing incoming routing update messages. If the message indicates that a network change
has occurred, the routing software recalculates routes and sends out new routing update
messages. These messages permeate the network, stimulating routers to rerun their
algorithms and change their routing tables accordingly.

Page 21
8.2 The various routing protocol that can be used are:

1. RIP (routing information protocol) is a distance vector routing protocol. It sends


complete routing table out to all other members in an interval of 30 seconds. It uses
hop count as a metric and by default hop count is set to 15.

RIP Configuration:
The command syntax is as follows:
Router (config) #router rip
Router (config-router) #network network-number net-mask

2. IGRP is a distance vector Interior Gateway Protocol (IGP). IGRP uses a composite
metric that is calculated by factoring weighted mathematical values for internetwork
delay, bandwidth, reliability, and load. Network administrators can set the weighting
factors for each of these metrics, although great care should be taken before any
default values are manipulated.

IGRP Configuration:
To configure the IGRP routing process use the router igrp configuration command.
The command syntax is as follows:
Router A (config) #router igrp as-number
Router A (config) #network network-number net-mask
There as number identifies the IGRP process. To specify a list of networks for IGRP
routing process, se the network router configuration command. To remove an entry,
use the no form of the command.
3. EIGRP Key capabilities that distinguish EIGRP from other routing protocols include
fast convergence, support for variable-length subnet mask, support for partial
updates, and support for multiple network layer protocols.
A router running EIGRP stores all its neighbors' routing tables so that it can quickly
adapt to alternate routes. If no appropriate route exists, EIGRP queries its neighbors
to discover an alternate route.
EIGRP does not make periodic updates. Instead, it sends partial updates only when
the metric for a route changes.
EIGRP Configuration:
EIGRP is an ideal choice for large, multi-protocol networks built primary on Cisco
routers.
RouterA(Config)#router eigrp as-number
RouterA(Config)#network network-number net-mask.
4. OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LSAs) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables is included in
OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF
algorithm to calculate the shortest path to each node.

Page 22
OSPF Configuration:
To enable OSPF routing, use the global configuration command syntax:
Router (configure) #router ospf process-id
Router (configure-router) #network address wildcard-mask area area-id.
Property 1 Property 2 Property 3 Property 4 Property 5 Property 6 Total
Routing
Protocol Supports Scalable Uses Has view Easy to Proprietary
VLSM multicast of configure
updates complete
toplology

RIP V1 - - - - - - 2

RIP v2 - - - - - - 4

IGRP - - - - - - 2

EIGRP - - - - - - 3

OSPF + + + + - + 5

Our configuration
*****OSPF protocol in all routers with process id 10 in single area 0*****

Page 23
Chapter-9 Automated Teller Machine:

Now it’s making peoples life very easy as they get their money when they need. So, they do
not need to carry either big amount of money or the checked book all the time. To get rid
from this burden they need to deposit money in the bank by opening an account and then
the bank will be given a Card i.e. an ATM card with a PIN number to them. By using that they
can withdraw money from any ATM machine of that bank. When they insert the card in the
machine and the PIN number the machine will show few instructions on the screen. By that
time verification (PIN Number and Account Number) will be done with the main bank
computer as they are connected. If the verification is correct then the user will choose an
instruction and the ATM will dispense money to the card holder.

9.1 Internal Structure of ATM In the following pictures we have the internal structure of two
different type of ATM machine. And also it can be divided into two different parts: - Upper
Unit, -Lower Unit
9.2 Interactive components of ATM Card Reader:
Customer inserts their card in it when there is written “Please Insert Your card” on the
screen.
 Keypad: Use for PIN code input, choices, amount of money etc as the input to The
ATM machine.
 Display Screen: This screen shows all the instructions or options for the customers
„convenience.
 Screen Buttons: When options are given on the screen one user can choose any of
the options accordingly by the use of button on left or right side of the screen. These
buttons select the option from the screen.
 Cash Dispenser: Withdrawal money is given by this slot. Deposit Slot: To deposit
money this slot is use.
 Speaker: Speaker provides the facilities to the customer by giving auditory feedback.

ATM Card: ATM card is also like magnetic strip card. It is also a data carrier which
electronically reads and writes data. ATM cards mainly a debit card.

Ways of Transaction:
In Bank transactions are divided into three main categories

 My bank to others bank A customer of a bank uses other banks ATM.


 Others bank to my bank other banks customer uses ATM of Bank Asia.
 My bank to my bank a customer uses its own bank ATM machine.

Page 24
Chapter-10 SECURITY

Security is most important part for online banking system. We use the different method
for provide strong online banking security system and use owasp top ten project provide
online banking security. Ensuring comprehensive network security visibility is no easy task.
Uncover expert tips on how to improve network security visibility with network flow analysis
tools, cloud security monitoring solutions, and anomaly-based monitoring technology.

10.1 AUTHENTICATION MECHANISM :


Authentication is the process of establishing whether a client is who or what it claims
to be in a particular context. A client can be an end user, a machine, or an application. The
authentication mechanism is responsible for creating a credential, which is an internal
product representation of a successfully authenticated client user. The abilities of the
credential are determined by the configured authentication mechanism.

10.2 Challenge handshake Authentication Protocol (Chap):


CHAP is an authentication scheme used by point to point servers to validate the
identity of remote clients. CHAP periodically verifies the identity of the client by using a
three-way handshake. CHAP provides protection against playback attack by the peer through
the use of an incrementally changing identifier and of a variable challenge-value. CHAP
requires that the client make the secrete available in in plaintext form.

10.3 ACCESS CONTROL LIST (ACL):


ACLs are lists of conditions used to test network traffic that tries to travel across a router
interface. These lists tell the router what types of packets to accept or deny.
 ACLs can be created for all routed network protocols such as IP and Internet
 Packet Exchange (IPX).
 ACLs can be configured at the router to control access to a network or subnet.
 To filter network traffic, ACLs determine if routed packets are forwarded or blocked
at the router interfaces.

Page 25
10.4 ACLs can be used to perform the following task

 Limited network traffic and increase network performance


 Provide traffic follow control
 Provide a basic level of security for network access.
 Decide which types of traffic are forwarded or blocked at the router interfaces.
 Control which areas a client can access on a network.
 Script hosts to permit or deny access to a network.

Page 26
Chapter-11 VLAN
.

VLAN is a switched network that is logically segmented by functions, project teams, or


applications. Without regard to the physical location of users. For example, several end
stations might be grouped as a department, such as engineering or accounting. When the
end stations are physically located close to one another, you can group them into a LAN
segment. If any of the end stations are in different buildings (not the same physical LAN
segment), you can then group them into a VLAN.

We can assign each switch port to a VLAN. Ports in a VLAN share broadcast traffic. Ports that
do not belong to that VLAN do not share the broadcast traffic.

VLANs provide the following features:

• Simplification of end-station moves, adds, and


changes
When an end station is physically moved to a new location, its attributes can be reassigned
from a network management station through Simple Network Management Protocol (SNMP)
or through the user interface menus. When an end station is moved within the same VLAN, it
retains its previously assigned attributes in its new location. When an end station is moved to
a different VLAN, the attributes of the new VLAN are applied to the end station.

• Controlled traffic activity


VLANs allow ports on the same or different switches to be grouped so that traffic is confined
to members of only that group. This feature restricts broadcast, unicast, and multicast traffic
(flooding) only to ports included in a certain VLAN. The management domain is a group of
VLANs that are managed by a single administrative authority.

• Workgroup and network security


You can increase security by segmenting the network into distinct broadcast domains. To this
end, VLANs can restrict the number of users in a broadcast domain. You can also control the
size and composition of the broadcast domain by controlling the size and composition of a
VLAN.

Page 27
Chapter-12 NETWORK ADDRESS TRANSLATION (NAT)

NAT allows an Internet Protocol (IP) network to maintain public IP addresses


separately from private IP addresses. NAT is a popular technology for Internet connection
sharing. It is also sometimes used in server load balancing applications on corporate
networks. In its most common configuration, NAT maps all of the private IP addresses on a
home network to the single IP address supplied by an Internet Service Provider (ISP). This
allows computers on the home LAN to share a single Internet connection. Additionally, it
enhances home network security by limiting the access of external computers into the home
IP network space.

NAT works by snooping both incoming and outgoing IP datagrams. As needed, it


modifies the source or destination address in the IP header (and the affected checksums) to
reflect the configured address mapping. NAT technically supports either fixed or dynamic
mappings of one or more internal and external IP addresses.

Network Address Translation allows a single device, such as a router, to act as agent
between the Internet (or "public network") and a local (or "private") network. This means
that only a single unique IP address is required to represent an entire group of computers to
anything outside their network.

The shortage of IP addresses is only one reason to use NAT. Two other good reasons are:

• Security
• Administration

Page 28
Chapter-13 DEVICE CONFIGURATION

North BANKING:-
Rou Router#sh run

Building configuration...

Current configuration : 1317 bytes

version 12.4

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

interface FastEthernet0/0

ip address 198.168.0.1 255.255.255.224

duplex au

to

speed auto

interface FastEthernet0/1

no ip address

duplex auto

speed auto

shutdown

interface Serial0/0/0

no ip address

shutdown

interface Serial0/0/1

Page 29
no ip address

shutdown

interface Serial0/1/0

bandwidth 325435

ip address 192.168.0.9 255.255.255.252

clock rate 64000

interface Serial0/1/1

bandwidth 325435

ip address 192.168.0.13 255.255.255.252

clock rate 64000

interface Serial0/2/0

no ip address

shutdown

interface Serial0/2/1

no ip address

shutdown

interface Serial0/3/0

bandwidth 4545

ip address 192.168.0.1 255.255.255.252

clock rate 64000

interface Serial0/3/1

bandwidth 4545

ip address 192.168.0.5 255.255.255.252

clock rate 64000

Page 30
interface Vlan1

no ip address

shutdown

router ospf 100

log-adjacency-changes

network 192.168.0.0 0.0.0.3 area 0

network 192.168.0.4 0.0.0.3 area 0

network 192.168.0.8 0.0.0.3 area 0

network 192.168.0.12 0.0.0.3 area 0

network 198.168.0.0 0.0.0.3 area 0

network 198.168.0.0 0.0.0.31 area 0

ip classless

line con 0

line vty 0 4

login

end

ters

PNB SERVER:-

Router#SH run

Building configuration...

Current configuration : 894 bytes

version 12.2

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname Router

Page 31
interface FastEthernet0/0

no ip address

duplex auto

speed auto

shutdown

interface FastEthernet0/1

no ip address

duplex auto

speed auto

shutdown

interface Serial0/0

ip address 193.168.0.5 255.255.255.252

clock rate 64000

interface Serial0/1

ip address 193.168.0.9 255.255.255.252

clock rate 64000

interface Serial0/2

ip address 192.168.0.2 255.255.255.252

interface Serial0/3

ip address 193.168.0.1 255.255.255.252

clock rate 64000

router ospf 100

log-adjacency-changes

network 192.168.0.0 0.0.0.3 area 0

network 193.168.0.0 0.0.0.3 area 0

network 193.168.0.4 0.0.0.3 area 0

Page 32
network 193.168.0.8 0.0.0.3 area 0

ip classless

line con 0

line vty 0 4

login

end

SBI SERVER:-

Router#Sh run

Building configuration...

Current configuration : 1116 bytes

version 12.2

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname Router

ip dhcp excluded-address 20.0.0.1

ip dhcp pool abc2

network 20.0.0.0 255.255.255.224

default-router 20.0.0.1

dns-server 198.168.0.6

interface FastEthernet0/0

ip address 20.0.0.1 255.255.255.224

ip nat inside

duplex auto
speed auto

interface FastEthernet0/1

Page 33
no ip address

duplex auto

speed auto

shutdown

interface Serial0/0

no ip address

shutdown

interface Serial0/1

no ip address

shutdown

interface Serial0/2

ip address 193.168.0.14 255.255.255.252

ip nat outside

interface Serial0/3

no ip address

shutdown

router ospf 100

log-adjacency-changes

network 20.0.0.0 0.0.0.31 area 0

network 193.168.0.12 0.0.0.3 area 0

ip nat pool contorl 193.168.0.13 193.168.0.14 netmask 255.255.255.252

ip nat inside source list 1 pool contorl

ip classless

access-list 1 permit 20.0.0.0 0.0.0.31

access-list 10 deny any

Page 34
access-list 10 permit 20.0.0.32 0.0.0.31

line con 0

line vty 0 4

login

end

HDFC ROUTER:-

Router#sh run
Building configuration...

Current configuration : 929 bytes

version 12.2

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname Router

interface FastEthernet0/0

no ip address

duplex auto

speed auto

shutdown

interface FastEthernet0/1

no ip address

duplex auto

speed auto

shutdown

interface Serial0/0

bandwidth 67767

Page 35
ip address 194.168.0.5 255.255.255.252

clock rate 64000

interface Serial0/1

bandwidth 78989

ip address 194.168.0.9 255.255.255.252

clock rate 64000

interface Serial0/2

ip address 192.168.0.10 255.255.255.252

interface Serial0/3

ip address 194.168.0.1 255.255.255.252

clock rate 64000

router ospf 100

log-adjacency-changes

network 192.168.0.8 0.0.0.3 area 0

network 194.168.0.0 0.0.0.3 area 0

network 194.168.0.4 0.0.0.3 area 0

network 194.168.0.8 0.0.0.3 area 0

ip classless

line con 0

line vty 0 4

login

end

ICICI ROUTER:-

Router#SH RUN

Building configuration...

Current configuration : 920 bytes

Page 36
version 12.2

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname Router

interface FastEthernet0/0

no ip address

duplex auto

speed auto

shutdown

interface FastEthernet0/1

no ip address

duplex auto

speed auto

shutdown

interface Serial0/0

ip address 194.168.0.21 255.255.255.252

clock rate 64000

interface Serial0/1

ip address 192.168.0.14 255.255.255.252

interface Serial0/2

ip address 194.168.0.13 255.255.255.252

clock rate 64000

interface Serial0/3

bandwidth 234445

ip address 194.168.0.17 255.255.255.252

Page 37
clock rate 64000

router ospf 100

log-adjacency-changes

network 192.168.0.12 0.0.0.3 area 0

network 194.168.0.12 0.0.0.3 area 0

network 194.168.0.16 0.0.0.3 area 0

network 194.168.0.20 0.0.0.3 area 0

ip classles

line con 0

line vty 0 4

login

end

SOUTH SERVER:-

SOUTHBANK#SH RUN

Building configuration...

Current configuration : 1266 bytes

version 12.4

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname SOUTHBANK

interface FastEthernet0/0

ip address 198.163.0.1 255.255.255.224

duplex auto

speed auto

interface FastEthernet0/1

Page 38
no ip address

duplex auto

speed auto

shutdown

interface Serial0/0/0

ip address 192.163.0.13 255.255.255.252

clock rate 64000

interface Serial0/0/1

bandwidth 6743876

ip address 192.163.0.9 255.255.255.252

clock rate 64000

interface Serial0/1/0

bandwidth 345356

ip address 192.163.0.1 255.255.255.252

clock rate 64000

interface Serial0/1/1

ip address 192.163.0.5 255.255.255.252

clock rate 64000

interface Serial0/2/0

no ip address

shutdown

interface Serial0/2/1

no ip address

shutdown

interface Serial0/3/0

Page 39
no ip address

shutdown

interface Serial0/3/1

no ip address

shutdown

interface Vlan1

no ip address

shutdown

router ospf 100

log-adjacency-changes

network 192.163.0.0 0.0.0.3 area 0

network 192.163.0.4 0.0.0.3 area 0

network 192.163.0.8 0.0.0.3 area 0

network 192.163.0.12 0.0.0.3 area 0

network 198.163.0.0 0.0.0.31 area 0

ip classless

no cdp run

line con 0

line vty 0 4

login

end

PNB SERVER :-

Router#sh run

Building configuration...

Current configuration : 993 bytes

version 12.2

Page 40
no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname Router

interface FastEthernet0/0

no ip address

duplex auto

speed auto

shutdown

interface FastEthernet0/1

no ip address

duplex auto

speed auto

shutdown

interface Serial0/0

bandwidth 4534

ip address 122.168.0.5 255.255.255.252

clock rate 64000

interface Serial0/1

bandwidth 7674

ip address 122.168.0.9 255.255.255.252

clock rate 64000

interface Serial0/2

ip address 192.163.0.2 255.255.255.252

interface Serial0/3

bandwidth 766734

Page 41
ip address 122.168.0.1 255.255.255.252

clock rate 64000

router ospf 100

log-adjacency-changes

network 122.168.0.0 0.0.0.3 area 0

network 122.168.0.4 0.0.0.3 area 0

network 122.168.0.8 0.0.0.3 area 0

network 192.163.0.0 0.0.0.3 area 0

network 12.168.0.12 0.0.0.3 area 0

ip classless

no cdp run

line con 0

line vty 0 4

login

end

SBI SERVER:-

SBIBANK#sh run

Building configuration...

Current configuration : 950 bytes

version 12.2

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname SBIBANK

Page 42
interface FastEthernet0/0

no ip address

duplex auto

speed auto

shutdown

interface FastEthernet0/1

no ip address

duplex auto

speed auto

shutdown

interface Serial0/0

bandwidth 43545

ip address 122.168.0.17 255.255.255.252

clock rate 64000

interface Serial0/1

bandwidth 3454546

ip address 122.168.0.21 255.255.255.252

clock rate 64000

interface Serial0/2

ip address 192.163.0.6 255.255.255.252

interface Serial0/3

ip address 122.168.0.13 255.255.255.252

clock rate 64000

router ospf 100

log-adjacency-changes

network 122.168.0.12 0.0.0.3 area 0

Page 43
network 122.168.0.16 0.0.0.3 area 0

network 122.168.0.20 0.0.0.3 area 0

network 192.163.0.4 0.0.0.3 area 0

ip classless

no cdp run

line con 0

line vty 0 4

login

end

HDFC SERVER:-

HDFCBANK#sh run

Building configuration...

Current configuration : 966 bytes

version 12.2

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname HDFCBANK

interface FastEthernet0/0

no ip address

duplex auto

speed auto

shutdown

interface FastEthernet0/1

no ip address

duplex auto

Page 44
speed auto

shutdown

interface Serial0/0

bandwidth 354435

ip address 122.122.0.1 255.255.255.252

clock rate 64000

interface Serial0/1

bandwidth 78433

ip address 122.122.0.5 255.255.255.252

clock rate 64000

interface Serial0/2

bandwidth 34566

ip address 192.163.0.10 255.255.255.252

interface Serial0/3

bandwidth 35455

ip address 122.122.0.9 255.255.255.252

clock rate 64000

router ospf 100

log-adjacency-changes

network 122.122.0.0 0.0.0.3 area 0

network 122.122.0.4 0.0.0.3 area 0

network 122.122.0.8 0.0.0.3 area 0

network 192.163.0.8 0.0.0.3 area 0

ip classless

line con 0

line vty 0 4

Page 45
login

end

ICICI SERVER:-

ICICIBANK#SH RUN

Building configuration...

Current configuration : 954 bytes

version 12.2

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption

hostname ICICIBANK

interface FastEthernet0/0

no ip address

duplex auto

speed auto

shutdown

interface FastEthernet0/1

no ip address

duplex auto

speed auto

shutdown

interface Serial0/0

ip address 122.122.0.13 255.255.255.252

clock rate 64000

Page 46
interface Serial0/1

bandwidth 22345

ip address 122.122.0.17 255.255.255.252

clock rate 64000

interface Serial0/2

ip address 192.163.0.14 255.255.255.252

interface Serial0/3

bandwidth 6568778

ip address 122.122.0.21 255.255.255.252

clock rate 64000

router ospf 100

log-adjacency-changes

network 122.122.0.12 0.0.0.3 area 0

network 122.122.0.16 0.0.0.3 area 0

network 122.122.0.20 0.0.0.3 area 0

network 192.163.0.12 0.0.0.3 area 0

ip classlesS

no cdp

line con 0

line vty 0 4

login

end

Page 47
Chapter-14 RESULT

HTTP SERVER:-

Page 48
DNS SERVER:-

Page 49
FTP:-

TFTP:-

Page 50
WEB BROWSING:-

WEB BROWSING:-

Page 51
Page 52
COMMUNICATION BETWEEN TWO PC’S AND NAT TRANSLATION

PING TO PC WITHOUT NAT

Page 53
DHCP IP ADDRESS:-

Page 54
Chapter -15 SUMMARY STEP WORK DESCRIPTION

DESCRIPTION:
The aim of this system is to overcome the lacking of the manual system. All branches
of the Bank situated at District level provide the Banking services to customers and had to
send report to the central branch manually, which sometimes create problem to get up-to-
date information rapidly. But now through this system whenever any transaction will be
taking place it will store in the central database and authorized person can get necessary
information or report when they get into the system from any branches through Wide Area
Network (WAN). Routers are generally known as intermediate systems, which operates at
the network layer of the OSI reference model, routers are devices used to connect two or
more networks (IP networks) or a LAN to the Internet. A router acts as a packet filter when it
forwards or denies packets according to filtering rules. As a Layer 3 device, a packet-filtering
router uses rules to determine whether to permit or deny traffic based on source and
destination IP addresses, source port and destination port, and the protocol of the packet.
India all
These rules are defined using access control lists or ACLs. Banking system in
banks has an IT department. IT department solution all
type of IT problem and serve the core network. IT creates
a core network diagram. This diagram involves all type of
useable network mechanism (Switch, Router, Firewall,
Server) etc. Simulation is the most important of any
system. An accurate system design, accurate performance
and accurate Simulation give best performance of a
system. Now we discuss and simulate the OSPF protocol.
Open Shortest Path First (OSPF) is a routing protocol
developed for Internet Protocol (IP) networks by the
interior gateway protocol (IGP) working group of the
Internet Engineering Task Force (IETF).

Page 55
Chapter-16 CONCLUSION

Now a days, technological development, and automated system development is more


essential and crying need for the expansion of banking services because They will need less
employers by using automated system. On top of that Security is a major issue regarding
banking issues. With this system network will be more easy to handle and it will route the
data in a shortest path in a vast distributed system. In future we will try to implement it in
real life so that banks can use it and get benefited from this project.

Future Work:
 Add time based transmission.
 Security system will be upgraded .
 Make the project more user friendly.
 Real life implementation.

Limitations :
 The main Limitation is to implement the project in real world . Because we only
simulate it via packet tracer.
 Due to less time and work pressure we could not add more features which could make
the project more useful.

Page 56
Chapter-17 REFRENCES

Computer Networks by Tanenbaum


All about Computer Network By Manohar Lodia
Data communication By Ferozon
www.cisco.com
www.education.umd.edu/EDMS/mislevy/CiscoPapers/DPs_for_Learning.pdf
www.packettracernetwork.com
www.weikipedia.com
www.routeralley.com
www.networkessential.com
www.google.com

Page 57
THANKS
@@@@@@@@@@@@@@@@@@

Page 58

S-ar putea să vă placă și