Sushma Report RP 1
Sushma Report RP 1
Report
On
Industrial Training on
CCNA v7: SWITCHING, ROUTING & WIRELESS ESSENTIALS
Submitted for the partial fulfillment of requirements for the award of the
degree of
BACHELOR OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
Submitted by
K SUSHMA
19BF1A0498
2022-23
SRI VENKATESWARA COLLEGE OF ENGINEERING
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
TIRUPATI – 517507
2022-23
CERTIFICATE
This is to certify that this report is a bonafide record of the Industrial Training on CCNA v7:
Switching, Routing and Wireless Essentials through Cisco Networking Academy done and
submitted by
K SUSHMA
19BF1A0498
for the partial fulfillment of the requirements for the award of B.Tech Degree in ELECTRONICS
I would like to express my gratefulness and sincere thanks to A. Ganesh, M.Tech, for his
kind support and guidance during the course of my Industrial Training on CCNA v7:
Switching, routing and wireless essentials and in the successful completion of the
assigned project.
I would like express gratitude to Dr. G. Padma Priya, Coordinator, ECE Department for
her continuous follow up and timely guidance in completing the task effectively.
I would like to express my gratefulness and sincere thanks to Dr. D. Srinivasulu Reddy,
Head of the Department, Department of Electronics and Communication Engineering, for his kind
support and encouragement during the course of my study and in the successful completion of the
K SUSHMA
19BF1A0498
CERTIFICATE
Corporate
Social Cisco Networking Academy
Responsibility
Certificate of Course Completion
The student has successfully achieved student level credential for completing CCNAv7: Switching, Routing, and Wireless Essentials
course administered by the undersigned instructor. The student was able to proficiently:
Configure VLANs and Inter-VLAN routing applying security best Explain how to support available and reliable networks using dynamic
practices. addressing and first-hop redundancy protocols.
Troubleshoot inter-VLAN routing on Layer 3 devices. Configure dynamic address allocation in IPv6 networks.
Configure redundancy on a switched network using STP and Configure WLANs using a WLC and L2 security best practices.
EtherChannel. Configure switch security to mitigate LAN attacks.
Troubleshoot EtherChannel on switched networks. Configure IPv4 and IPv6 static routing on routers.
K Sushma
Student
A. GANESH
Instructor Instructor Signature
ABSTRACT
This report is to give a complete glance of four weeks of virtual industrial training that had
undergone at Cisco Network academy. I learnt a lot from this Industrial Training via the cisco
Netacad portal and had a great learning experience as trainee in this firm. I learnt a lot about how
different networks are controlled in the industry or any department with the help of networking
processes, under the course CCNA v7: Introduction to Networks.
I have learnt about different types of servers like DHCP Server, and DNS Server . In today’s world
computer has become an integral part of the business sector for professional activities not only for
professional activities but for personal activities also.
i
TABLE OF CONTENTS
CHAPTER DESCRIPTION PAGE NO
List Of Figures i
List Of Tables ii
Abbreviations iii
1 INTRODUCTION
2 DESCRIPTION
4 CONCLUSION 16
REFERENCES 17
ii
LIST OF FIGURES
2.3.5 Router 9
iii
ABBREVIATIONS
IP - Internet Protocol
iv
CCNA v7: SWITCHING, ROUTING & WIRELESS ESSENTIALS
1. INTRODUCTION
Cisco also provides training for certifications via portal called the Cisco Networking Academy.
Cisco is involved with technical education in 180 countries with its Cisco Academy program. The
cisco Learning network is a social learning community on the IT industry with a mission to provide
learning tools, training resources, and industry guidance to anyone interested in building an IT
career through Cisco certifications. The certification preparation materials offered on the Cisco
Learning Network do not constitute a complete self-study program but are supplemental materials
to enhance core learning programs.
The CCNA which stands for Cisco Certified Network Associate is an entry-level information
technology (IT) certification issued by networking hardware company Cisco. The CCNA is
designed to validate your knowledge on fundamental networking concepts often requested in
networking roles in IT positions.
Through this study portal, cisco had provided an elementary training on CCNA v7: Switching,
routing and wireless networks essentials for 4 weeks i.e., from 23 May to 23 June 2022.
2. DESCRIPTION
The outcomes of this course Switching, Routing, and Wireless Essentials (SRWE) in CCNA
curriculum series is to focuses on switching technologies and router operations that support small-
to-medium business networks and includes wireless local area networks (WLAN) and security
concepts. In addition to learning, key switching and routing concepts, learners will be able to
perform basic network configuration and troubleshooting, identify and mitigate LAN security
threats, and configure and secure a basic WLAN.
These training will assist in developing the skills necessary to do the following,
Using this tool is widely encouraged as it is part of the curriculum like CCNA, CCENT where
Faculties use Packet Trace to demonstrate technical concepts and networking systems. Students’
complete assignments using this tool, working on their own or in teams.
Engineers prefer to test any protocols on Cisco Packet Tracer before implementing them. Also,
Engineers who would like to deploy any change in the production network prefer to use Cisco
Packet Tracer to first test the required changes and proceed to deploy if and only if everything is
working as expected.
This makes the job easier for Engineers allowing them to add or remove simulated network
devices, with a Command line interface and a drag and drop user interface. You can download the
tool from https://www.netacad.com by clicking on the Packet Tracer graphic and selecting the
appropriate OS package, then you are good to play with it.
Workspace:
• Logical – Logical workspace shows the logical network topology of the network the user
has built. It represents the placing, connecting and clustering virtual network devices.
• Physical –Physical workspace shows the graphical physical dimension of the logical
network. It depicts the scale and placement in how network devices such as routers,
switches and hosts would look in a real environment. It also provides geographical
representation of networks, including multiple buildings, cities and wiring closets.
Key Features:
• Unlimited devices
• E-learning
• Customize single/multi user activities
• Interactive Environment
• Visualizing Networks
• Real-time mode and Simulation mode
• Self-paced
• Supports majority of networking protocols
• International language support
• Cross platform compatibility
The Open Systems Interconnection model (OSI model) is a conceptual model that describes
how data is transmitted from one system to another system irrespective of distance and location.
It consists of seven-layer architecture. All seven layers contribute to the transmission of data from
one system to another system.
The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-
layer model is still widely used, as it helps visualize and communicate how networks operate, and
helps isolate and troubleshoot networking problems.
OSI was introduced in 1983 by representatives of the major computer and telecom companies, and
was adopted by ISO as an international standard in 1984.
The OSI Model we just looked at is just a reference/logical model. It was designed to describe the
functions of the communication system by dividing the communication procedure into smaller and
simpler components. But when we talk about the TCP/IP model, it was designed and developed
by Department of Defense (DoD) in 1960s and is based on standard protocols. It stands for
Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the
OSI model. It contains four layers, unlike seven layers in the OSI model.
1. Cable a network that is similar to the one in the topology diagram. Create a console
connection to the switch.
2. You can access all the switch commands in privileged mode. However, because many of
the privileged commands configure operating parameters, privileged access should be
password-protected to prevent unauthorized use.
3. The privileged EXEC command set includes those commands contained in user EXEC
mode, as well as the configure command through which access to the remaining command
modes are gained.
4. Then, rename the switch name and assign the Ip address and MAC address by entering the
EXEC mode and global mode by using the CLI of the computer that is connected through
console connection.
5. We can enable SSH service in the switch also.
Cisco Router:
Cisco 1941 builds on the best-in-class offering of the existing Cisco 1841 Integrated Services
Routers by offering 2 models - Cisco 1941 and Cisco 1941W. In addition to the support of a wide
range of wireless and wired connectivity options supported on Cisco 1941 Series, Cisco 1941W
offers integration of IEEE 802.11n access point which is backwards compatible with IEEE
802.11a/b/g access points.
All Cisco 1900 Series Integrated Services Routers offer embedded hardware encryption
acceleration, optional firewall, intrusion prevention, and application services.
Routing is always associated with the network layer, layer 3, of the Open Systems
Interconnection (OSI) model, and the internet layer of the TCP/IP model. When you see the terms
“router” or “layer 3” associated with a device from another layer, such as a switch, it is because
the manufacturer has built routing capabilities into a layer 2 device, forming a multifunction
product.
The problem of determining the reliability of systems, whose components can have one or more
failure modes, often arises in variety of applications, ranging from telecommunication,
transportation, power systems, and mechanical systems to integrated circuits and computer
communication systems or large software structure. Therefore, all such systems can naturally be
expressed as in the form of a network, arising from the interconnections of various system
subdivisions. For instance, a telecommunication or a computer communication network may have
vertices representing the physical locations of computers or transmitters/receivers and may have
several edges representing the communication links between different sites. Depending on whether
vertices or edges work or fail, the network itself can be considered to be either working or failed.
ARP is a network layer protocol used to map an IP address to a physical machine address
recognizable in the local network, such as an Ethernet address. When a host machine wishes to
find a physical address for an IP address, it broadcasts an ARP request, which includes the IP
address, on to the network. The host that owns the IP address sends an ARP reply message with
its physical address. Each host machine maintains a table, called ARP cache, used to convert IP
addresses to MAC addresses. Since ARP is a stateless protocol, every time a host gets an ARP
reply from another host, even though it has not sent an ARP request for that reply, it accepts that
ARP entry and updates its ARP cache. The process of updating a target host’s ARP cache with a
forged entry is referred to as poisoning.
The IEEE 802.11 (wireless LAN medium access control (MAC) and physical layer (PHY)
specifications) defines an optional Wired Equivalent Privacy (WEP) protocol, which is based on
a stream cipher RC4 encryption algorithm. The objective of the WEP in wireless networks was to
provide comparable confidentiality to a traditional wired network.
To improve security in wireless LANs, the IEEE 802.11i, an amendment of MAC security
enhancements for the IEEE 802.11 standard, was ratified in 2004. The IEEE 802.11i, also known
as Wi-Fi Protected Access 2 (WPA2), introduces a new security architecture called Robust
Security Network (RSN). In this amendment, the proposed improvements to the 802.11
architecture focus on two areas: the IEEE 802.1X standard (EAPOL) and Advanced 40 Encryption
Standard (AES), for access control and encryption, respectively. The subset of the RSN
architecture is also called WPA.
• Interior gateway routing via link state routing protocols, such as OSPF and IS-IS
• Interior gateway routing via path vector or distance vector protocols, such as IGRP and
EIGRP
• Exterior gateway routing. BGP v4 is the routing protocol used by the public Internet.
3. MINI PROJECT
3.1 Port Security
As a part of skill development through CCNA, I did a mini project on Port Security. A
growing challenge for network administrators is to be able to control who is allowed - and who
isn't - to access the organization's internal network. This access control is mandatory for critical
infrastructure protection in your network. It is not on public parts of the network where guest
users should be able to connect.
Port security is a feature implemented in Cisco Catalyst switches that helps network engineers in
implementing network security on network boundaries.
In its most basic form, the Port Security feature remembers the MAC address of the device
connected to the switch edge port and allows only that MAC address to be active on that port. If
any other MAC address is detected on that port, the port security feature shut down the switch
port.
The switch can be configured to send an SNMP trap to a network monitoring solution to alert
that a port is disabled for security reasons.
The port-security restrict mode drops packets with unknown source addresses until you remove a
sufficient number of secure MAC addresses to drop below the maximum value and causes
the Security violation counter to increment.
Port security with sticky MAC addresses provides many of the same benefits as port security
with static MAC addresses, but sticky MAC addresses can be learned dynamically. Port security
with sticky MAC addresses retains dynamically learned MAC addresses during a link-down
condition.
interface FastEthernet0/1
switchport port-security
When the rogue laptop is connected to the hub and tries to communicate with 192.168.1.4, the
number of mac-addresses learned ont the fastethernet 0/1 interface exceeds 3. The interface
drops traffic with the new mac-address (not learned by the switch because 3 mac addresses have
already been registered on the fa0/1 interface) and increases the security viloation counter based
on the 'restrict' port-security configuration of the interface.
interface FastEthernet0/2
switchport port-security
interface FastEthernet0/3
switchport port-security
4. CONCLUSION
In conclusion, I can infer that this Industrial Training helped me a lot to understand the
essence of networking, how actually end devices communicate, and how to configure network
devices such as switches, routers, servers, etc. I am able to understand the routing concepts such
qas RIP, EIGRP, etc and the cisco packet tracer helps a lot to visualize the communication between
networks through CCNA v7: Switching, routing, and wireless networks. In the future, I could like
to explore more in computer networks to establish a strong career out of this industrial training.
4. REFERENCES
https://www.netacad.com/
https://www.cisco.com/c/en_in/index.html