Project Report
Project Report
ABSTRACT
The report is prepare during industrial training as a part of summer internship program conducted after the end term of 6th semester B.Tech program. This period provided me an opportunity to give theoretical knowledge a practical implementation. The report is a result of seven weeks industrial training that I underwent at CDAC, Mohali. Joining CDAC as a trainee gave me an excellent platform at the onset of my professional carrier. I whole heartedly thank the organization and especially their Network Department for provided me an opportunity to work on the Router, switches (layer 2 and layer 3) & hubs and hence bringing out the best in me, alongside developing my talents & improving my skills, not just technically but also laying a firm foundation for all round personality development. Co-operating and working with a team helped me explore my potential & perform better. This report deals with the network scenario and how the connection is made in the university and organizations. The report also includes the pictorial scenario of network using Edraw.
SEC, Sikar
Page 1
1.2) Network Classification: A network is classified into three parts according to geographical area they occupies:a)LAN:-Local Area Network:-It is a high speed data network that covers a relatively small geographic area it typically connects workstation,PC,printers,servers and other devices. LANs offer computer user may advantages including shared access to device and applications, file exchange between connected users. Its range is 10 km. b) WAN:- Wide Area Network:-A computer network that shared a relative large geographical areas. Typically a WAN consists of two or more Local Area Network.
SEC, Sikar
Page 2
Network Topologies
Physical
Logical
Bus
Star
Ring
Mash
Hybrid
Ethernet
Token Ring
FDDI
Its a 2 level hierarchical Structure in which the diagrammatic view of each and every network is shown and its types are shown in fig 1.1. Two types of topologies are present 1.)Physical: Physical is also divided into 5 types as shown in above fig. 2.)Logical: Logical is divided into 3 types as shown in fig.
SEC, Sikar
Page 3
Presentation Layer: Data representation Ensures data is readable by receiving system Format of data
SEC, Sikar
Page 4
Session Layer: - Inter-host communication Establishes, manages, and terminates sessions between applications
Transport Layer: End-to-end connection reliability Concerned with data transport issues between hosts Data transport reliability Establishes, maintains, and terminates virtual circuits Fault detection and recovery Information flow control
Network Layer: Addresses and best path Provides connectivity and path selection between two end systems Domain of routing
Data Link Layer: Access to media Provides reliable transfer of data across media Physical addressing, network topology, error notification, flow control
SEC, Sikar
Page 5
2.2) TCP/IP
A suite of protocols Rules of that information dictate are how sent packets across
SEC, Sikar
Page 6
TCP/IP Layer: Application layer File Transfer Protocol (FTP) Remote Login (Telnet) E-mail (SMTP)
Transport layer Transport Control Protocol (TCP) User Datagram Protocol (UDP)
Data link & physical layer LAN Ethernet, Token Ring, FDDI, etc. WAN Serial lines, Frame Relay, X.25, etc.
SEC, Sikar
Page 7
3) Transmission Media: -Means through which data are transmitted and received.
Transmission media can be understood by the following hierarchy.
Transmission Media
Wired
Wire Less
Twisted Pair
Coaxial
Fiber Optic
Infra-red
Radio Wave
Fig.3.1 Transmission
SEC, Sikar
Page 8
4.1) Public and Private IP address: It is mainly classified into two parts as given below hierarchy: -
IP address
Public
Private
4.2) Class of IP Address: It is divided into various classes namely Class A, Class B, Class C, Class D and Class E. TCP/IP defines Class D for experimental purpose. TCP /IP address contains two addresses embedded within one IP address; Network address and host address as shown in figure
NETWORK ADDRESS
HOST ADDRESS
0 BIT
32 BIT
SEC, Sikar
Page 9
Class A consists of 8-bit network ID and 24-bit host ID. Class B consists of 16bit network ID and 16-bit of host ID. And Class C consists of 24-bit of network ID and 8-bit of host ID.
Address Class
Starting Bits
Valid Hosts
Class A
1 TO 127
255.0.0.0
256*256*256-2 =16,777,214
Class B
10
128 TO 191
255.255.0.0
256*256-2= 65,534
255.255.255.0
256-2=254
Fig. 4.1 Class of IP Address 4.3) Sub-netting:Sub-netting is process of dividing a network into small small parts. It called subnet and the process called Sub-netting. In this process, we increase the network bit from barring the host bit. In the Sub-netting, the no. of network become more in host with reduce. Sub-netting of different class:Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.2
SEC, Sikar
Page 10
5.1) Hub: Hub is centralized device, which is used to connect multiple workstations. There are two types of Hub: (i) Active Hub (ii) Passive Hub 5.2) Repeater: Repeaters are those devices which are used in the network to amplify a weak signal into strong signal. 5.3) Bridges: -Bridge is a hardware device, which is used to provide LAN segmentation means it is used for break the collision domain. We can use bridge between two different topologies. It has fewer ports. Each port has an own buffer memory. It works on Data Link Layer of OSI model. It also read Mac address and stores it in its filter table. In case of bridge there is one broadcast domain.
5.4) Switch: -It is used to connect multiple workstations. It has special kind of memory called mac address/filter/lookup table. Switch reads mac addresses. Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the destination mac address and consult with its filter table. If he has entry in its filter table then he forwards the frame to that particular mac address, if not found then it performs broadcasting to all its connected nodes. We can perform LAN segmentation by using switches. There are two types of switches: -
SEC, Sikar
Page 11
(ii) Non-manageable switches. 5.5) Router: Router is hardware device, which is used to communicate two different networks. Router performs routing and path determination. It does not perform broadcast information. 5.6) Remote Access Device: These are those devices used if we dont want to use wire to connect our devices by the help of some physical media.
SEC, Sikar
Page 12
2) Project Goal
Our project is a project in which we are going to make a network in a college campus. The main goal of our project is to make a network which is capable of connecting the whole college in an efficient and in a well-mannered which solve out the entire problem regarding networking in a college campus. To be succeeding in this goal I use lots of latest technology like ACL, VLAN, and VTP etc. In the following network my main concern is security I give much effort in my network on the security of the network through a new concept called switch port security. To overcome the above goal hear is the following project.
SEC, Sikar
Page 13
3) Flow Chart
SEC, Sikar
Page 14
Description:The above shown flow chart is the flow chart which gives whole flow of the data in a network. In the above chart I start my flow chart with the user entity. When someone come in the network than he/she have three networks reception, account, hostel. When users communicate with the reception he/she get option to go in graduate or in post graduate. From the graduate we have mainly five networks ME, ECE, CS&IT, EE, and Library. These are used most of the time by student. While on the other hand we have post graduate network. In this network we have classified the network in four networks i.e. PGDM, M.Tech, M.B.A. and Library.
SEC, Sikar
Page 15
4) ER Diagram
SEC, Sikar
Page 16
Description:The ER diagram tells about the entities and attributes used in the project,which entity is related to another entity by the means of relationships and all the entities are having some sort of accessibility to another entity. Entities: 1) Student 2) Accounts 3) Reception 4) Library 5) Personnel 6) Hostel Attributes: 1) Graduate 2) Post Graduate 3) Girls Hostel 4) Boys Hostel 5) Engineering 6) Teaching Staff 7) Non-Teaching Staff Sub Attributes: 1) CS 2) IT 3) EE 4) ME 5) M.Tech 6) PGDM 7) MBA
SEC, Sikar
Page 17
5) Scenario
SEC, Sikar
Page 18
Description:The above shown is the original network scenario we made. This scenario is made on the simulator we used i.e. packet tracer. We used in this network mainly two routers of the series 1841 as by cisco. I used four switches in this network of the series 2950-24. I used one access point in this network to give the wi-fi network in the whole network of the series Access Point-PT-N. In the above scenario I logically divide each switch in mainly two or three parts by using VLAN where ever needed so that I neednt use an extra switch. For the security point of view I used ACL at routers. I used two servers one for the principal and other for the reception.
SEC, Sikar
Page 19
Software need:1.) Cisco Packet Tracer 2.) Edraw soft Cisco Packet Tracer
It is a packet tracer given by Cisco to overcome the problem of cost for learning the ciscodeviced Networks If we have to experiment with the original devices then It will be very costly and a new learner may also damage an expensive equipment, so simulator is the idea to solve this problem. Packet tracer simulation software can be used to teach complex CCNA level networking concepts and to supplement classroom equipment.With Packet Tracer 5.3 instructors and students can design build configure And troubleshoot networks using virtual equipment It provides a common environment for instructors to demonstrate technologies and configurations making it extremely useful for lectures group and individual labs homework and competitions
Logical and physical workspace Real time mode Simulation mode Global event list Improved GUI Multiple languages Physical Interfaces Knowledge representation
Page 20
SEC, Sikar
Activity wizard
2)EdrawSoft:A component is an object designed for a particular requirement. It is that constituent of a system that offers a predefined service or event and is able to connect to other components. A software component is a part of composition with contractually specified interfaces, can also be arranged autonomously and is subject to composition by third parties. The purpose of designing component software is to homogenize the interfaces between softwares so that they are able to work without any glitch. A Library is an anthology of subroutines that are used to develop software. A library usually comprises of code and data that provides services to various individual programs thus allowing code and data to be shared and modified in a modular fashion. Executables and libraries create references known as links to each other via a process known as linking done by a linker. Network Diagram is ideal for network engineers and network designers who need to draw detail network documentation. Edraw Network Diagram is rather a lightweight yet incredibly powerful, who works in the following network diagram fields: basic network diagrams, Cisco network topology, logical network diagrams, physical network diagrams, LAN diagrams, WAN diagrams, LDAP, active directory and more. Build-in network diagram icons representing computers, network devices plus smart connectors help design diagram network, create accurate network diagrams and documentation to be used in your network diagram project. Quickly and easily draw detailed computer network diagrams. Edraw is the idea network drawing software that helps to create professional-looking network diagrams in minutes. It provides special libraries of templates and detailed symbols, graphics and shapes for devices such as switches, hubs, printers, servers, mainframes, routers, and face plates for computer and telecommunications network. It can also export to graphics formats, PDF, and HTML with hyperlinks. It can create customized libraries of network components, and can draw detailed network diagram showing placements of network equipment and their logical and physical connection and arrangement. Edraw enables sharing network diagrams on the web or in a business presentation enhancing business communication. It provide four sets of network diagram icons. Logical network diagram symbols, physical network devices, vertical view network diagrams and Cisco network diagram icons.
SEC, Sikar
Page 21
It Include thousands of ready-made graphics and templates for computers, servers, hubs, switches, printers, mainframes, routers, cables, fax and more. A bundle of network diagram examples and templates. Network drawing does not need to start a new. Just drag the ready-made network symbols from the libraries and drop them on your page. Network drawing couldn't be easier! we don't need to be an artist to create great-looking results! Edraw helps us align and arrange everything perfectly. Distinct colors, fonts, shapes, styles, pictures, text and symbol for each object of the diagram are available.
SEC, Sikar
Page 22
SEC, Sikar
Page 23
User mode, same as a router Privileged mode Leaves privileged mode Leaves user mode Command Mode:-
1.2 )Setting Host Names: config t (config)#hostname Switch Switch(config)# 2) VLAN: Short for virtual LAN, a network of computers that behave as if they are connected to the same wire even though they may actually be physically located on different segments of a LAN. VLANs are configured through software rather than hardware, which make them extremely flexible. One of the biggest advantages of VLANs is that when a computer is physically moved to another location, it can stay on the same VLAN without any hardware reconfiguration. Vlan Configuration is given below:Same method as the router
SEC, Sikar
Page 24
3) VTP: VTP is a VLAN Trunking protocol. It is a Layer 2 Messaging Protocol. We need it for:-
2. Security. Its function is to pass information Of VLAN into a VTP Domain. VTP stands for Vlan Trunking Protocol. Its used for saving time if multiple switches having same vlan to configure. There are 3 parts 1) Client 2) Server 3) Transparent To understand VTP we have the following configuration: -
Switch(config)#intfa 0/1 Switch(config-if)#switchport trunk Switch(config-if)#switchport encapsulation dot1q Switch(config)#vtp client Switch(config)#vtp server trunk mode
Sets encapsulation type to Dot1Qthis is the default encapsulation type Changes the switch to VTP client mode Changes the switch to default VTP server mode
Switch(config)#vtp transparent
SEC, Sikar
Page 25
domain to CNAP Switch(config)#vtp password cisco Switch#showvtp Sets the VTP password to Cisco Displays all VTP information
Inter-VLAN Communication: Router-on-a-Stick Router(config)#intfa 0/0 Router(config-if)#no shut Router(config-if)#intfa 0/0.1 Enters interface mode for interface fa 0/0 Turns the interface on Creates subinterface 0/0.1
Router(config-subif)#encapsulation dot1q 1 Assigns the native VLAN (usually VLAN 1) native Router(config-subif)#ip 192.168.1.1 255.255.255.0 Router(config-subif)#intfa 0/0.10 Router(config-subif)#encapsulation 10 Router(config-subif)#ip 192.168.10.1 255.255.255.0 Router(config-subif)# Router# address Assigns an IP address to the subinterface Creates subinterface 0/0.10 dot1q Assigns VLAN 10 to this subinterface to this logical subinterface address Assigns an IP address to the subinterface
SEC, Sikar
Page 26
SEC, Sikar
Page 27
Location-A# Routes in the routing table are learned from either static routes (entered by you) or dynamic routes. Using the routing table, the router tries to find the best route for your traffic. There may be only one route. Often, this is a "default route" (a.k.a. "gateway of last resort"). The default route just says: "If there are no better routes to send this traffic, send it here." Just about every home and small business user has just a single Internet connection. In that case, they have a default route and all traffic is sent to their Internet service provider (ISP). In the case of ISPs, however, there may be many places they can send this traffic. Their routers must compare many hundreds of thousands of routes and select the best one for your traffic. This happens in milliseconds. And to get your traffic through the Internet and back, it may pass through hundreds of routers. To you, it appears almost instantaneously (depending on many factors). If it doesn't find a valid route for your traffic, the router discards (yes, throws away) your traffic and sends an ICMP "destination unreachable" message back to you. When the router does find the best route and is ready to send your traffic, it has to do a number of things: 1. Perform Network Address Translation (NAT). NAT isn't a traditional router function, but many routers today perform NAT. This is especially true for home and small business routers that function as "all in one" devices. Many companies have dedicated firewalls that also perform NAT. With NAT, your private source IP address is translated into a public source IP address. If the router is performing PAT (NAT overload), then the public source IP address is shared among many devices. 2. Replace your source MAC address with the router's MAC address. The ARP protocol is used to connect your computer's source MAC address to your IP address. The ARP protocol is a broadcast-oriented protocol, and routers discard broadcasts. This means that ARP
SEC, Sikar Page 28
doesn't work through routers. Because of this, the router must replace your source MAC address with the router's MAC address. The router also adds the destination host or nexthop router's MAC address to the data link header. 3. Encapsulate the packet for the protocol of the WAN. Routers often perform protocol conversion. Say, for example, you have a router that has a PPP T1 connection to the Internet and is connected to the LAN using Ethernet. The Ethernet frames must be de-encapsulated, modified, then re-encapsulated in Ethernet, then PPP, before they can be sent across the PPP link. On the other side of the link, the destination router is performing all of these same tasks, but in reverse. This happens for every packet sent and every response received. To see a real production routing table from an ISP, you can telnet to public Cisco route servers around the world. From here, you can do a show ip route and see what a real ISP's routing table looks like.
SEC, Sikar
Page 29
Function Performed on Router: 1) Basic Configuration: 1.1) Router Modes User mode Privileged mode Global configuration mode Interface mode Subinterface mode Line mode Router configuration mode
Enters console-line mode Sets console-line mode password to console Enables password checking at login
Router(config)#line vty 0 4
Enters vty line mode for all five vty lines Sets vty password to telnet
SEC, Sikar
Page 30
1.4)
Show Commands
Router#show ?
Router#show interfaces Displays statistics for all interfaces Router#show interface Displays statistics for a specific interface, in this case Serial 0 serial 0 Router#showip interface brief Router#show controllers serial 0 Router#show clock Router#show hosts Displays a summary of all interfaces, including status and IP address assigned Displays statistics for interface hardware. Statistics display if the clock rate is set and if the cable is DCE, DTE, or not attached Displays time set on device Displays local host-to-IP address cache. These are the names and addresses of hosts on the network to which you can connect Router#show users Router#show history Router#show flash Router#show version Displays all users connected to device Displays history of commands used at this edit level Displays info about Flash memory Displays info about loaded software version
SEC, Sikar
Page 31
Moves to interface Serial 0/0 mode Optional descriptor of the link is locally significant
Router(config-if)#ip 255.255.255.0
address
2.2) Configuring an Ethernet/Fast Ethernet Interface Router(config)#int fa0/0 Router(config-if)#description Accounting LAN Moves to Fast Ethernet 0/0 interface mode Optional descriptor of the link is locally significant Router(config-if)#ip address 192.168.20.1 Assigns address and subnet mask to interface
SEC, Sikar
Page 32
Access Control List:An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation. For instance, if a file has an ACL that contains (Alice, delete), this would give Alice permission to delete the file. The Cisco access control list (ACL) is probably the most commonly used object in the IOS. It is not only used for packet filtering (a type of firewall) but also for selecting types of traffic to be analyzed, forwarded, or influenced in some way. 3.1) ACL Keywords:-
Any Used in place of 0.0.0.0 255.255.255.255, will match any address that it is compared against Host Used in place of 0.0.0.0 in the wildcard mask; this will match only one specific address
3.2) Access Control List Types:Cisco ACLs are divided into types. Standard IP, Extended IP,IPX, Appletalk, etc. Here we will just go over the standard and extended access lists for TCP/IP.As you create ACLs you assign a number to each list, however, each type of list is limited to an assigned range of numbers. This makes it very easy to determine what type of ACL you will be working with. 3.2.1) Standard ACLs:
SEC, Sikar
Page 33
A standard IP ACL is simple; it filters based on source address only. You can filter a source network or a source host, but you cannot filter based on the destination of a packet, the particular protocol being used such as the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), or on the port number. You can permit or deny only source traffic. Creating Standard ACLs Router(config)#access-list 10 permit Read this line to say: All packets with a source IP address of 172.16.0.0 0.0.255.255 172.16.x.x will be permitted to continue through the internetwork access-list 10 ACL command Arbitrary number between 1 and 99, designating this as a standard IP ACL Permit 172.16.0.0 0.0.255.255 Packets that match this statement will be allowed to continue Source IP address to be compared to Wildcard mask
Router(config)#access-list 10 deny host Read this line to say: All packets with a source IP address of 172.17.0.1 access-list 10 172.17.0.1 will be dropped and discarded ACL command Number between 1 and 99, designating this as a standard IP ACL Deny Host 172.17.0.1 Packets that match this statement will be dropped and discarded Keyword Specific host address
SEC, Sikar
Page 34
Router(config)#access-list 10 permit Read this line to say: All packets with a source IP address of 172.16.0.0 0.0.255.255 172.16.x.x will be permitted to continue through the internetwork Router(config)#access-list 10 permit Read this line to say: All packets with any source IP address any access-list 10 will be permitted to continue through the internetwork ACL command Number between 1 and 99, designating this as a standard IP ACL Permit Any Packets that match this statement will be allowed to continue Keyword to mean all IP addresses Applying a Standard ACL to an Interface Router(config)#int fa0/0 Router(config-if)#ip access-group 10 in Takes all access list lines that are defined as being part of group 10 and applies them in an inbound manner. Packets going into the router from FA0/0 will be checked
3.2.2) Extended ACLs: An extended ACL gives you much more power than just a standard ACL. Extended IP ACLs check both the source and destination packet addresses. They can also check for specific protocols, port numbers, and other parameters, which allow administrators more flexibility and control. Creating Extended ACLs
SEC, Sikar
Page 35
Router(config)#access-list 110 permit tcp Read this line to say: HTTP packets with a 172.16.0.0 0.0.0.255 192.168.100.0 source IP address of 172.16.0.x will be permitted to travel to destination address of 192.168.100.x access-list 110 ACL command Number is between 100 and 199, designating this as an extended IP ACL Permit Packets that match this statement will be allowed to continue Tcp 172.16.0.0 0.0.0.255 192.168.100.0 0.0.0.255 Eq 80 Protocol must be TCP Source IP address to be compared to Wildcard mask Destination IP address to be compared to Wildcard mask Operand, means "equal to" Port 80, indicating HTTP traffic
0.0.0.255 eq 80
Router(config)#access-list
110
deny Read this line to say: Telnet packets with any source IP address will be dropped if they are addressed to specific host 192.168.100.7
access-list 110
ACL command Number is between 100 and 199, designating this as an extended IP ACL
Deny
SEC, Sikar
Page 36
Router(config)#access-list 110 permit tcp Read this line to say: HTTP packets with a 172.16.0.0 0.0.0.255 192.168.100.0 source IP address of 172.16.0.x will be permitted to travel to destination address of 192.168.100.x Tcp Any 192.168.100.7 0.0.0.0 Eq 23 Protocol must be TCP protocol Any source IP address Destination IP address to be compared to Wildcard mask; address must match exactly Operand, means "equal to" Port 23, indicating Telnet traffic
0.0.0.255 eq 80
3.2.3)Named ACLs: One of the disadvantages of using IP standard and IP extended ACLs is that you reference them by number, which is not too descriptive of its use. With a named ACL, this is not the case because you can name your ACL with a descriptive name. The ACL named DenyMike is a lot more meaningful than an ACL simply numbered 1. There are both IP standard and IP extended named ACLs.
Another advantage to named ACLs is that they allow you to remove individual lines out of an ACL. With numbered ACLs, you cannot delete individual statements. Instead, you will need to delete your existing access list and re-create the entire list. Creating Named ACLs Router(config)#ip access-list extended Creates serveraccess Router(config-ext-nacl)#permit any host 131.108.101.99 eqsmtp Router(config-ext-nacl)#permit an extended named ACL called
serveraccess tcp Permits mail packets from any source to reach host 131.108.101.99 udp Permits DNS packets from any source to reach host
SEC, Sikar
Page 37
an
extended
named
ACL
called
serveraccess 131.108.101.99
Router(config-ext-nacl)#deny ip any Denies all other packets from going anywhere. If any log any packets do get denied, then log the results for me to look at later Router(config-ext-nacl)#exit Router(config)#intfa 0/0 Router(config-if)#ip serveraccess out Applies this ACL to the Fast Ethernet interface 0/0 access-group in an outbound direction
Router#showip interface Router#show access-lists Router#show number Router#show access-listname Router#show run
Displays any ACLs applied to that interface Displays contents of all ACLs on the router
access-listaccess-list- Displays contents of ACL by the number specified Displays contents of ACL by the name specified Displays all ACLs and interface assignments
3.4) Activating an Access Control List Now that you have created these ACLs they are useless until you declare them to be used in some way. As of right now they are an inactive list doing nothing. Our next article will coverapplying ACLs on interfaces and how to specify if the ACL is for incoming or outgoing traffic on that interface.
SEC, Sikar
Page 38
3.5) Universal fact about Access control list Ls on the same interface.
3.6) Access List Ranges:1. ACLs come in two varieties: Numbered and named 2. Each of these references to ACLs supports two types of filtering: standard and extended. 3. Standard IP ACLs can filter only on the source IP address inside a packet. 4. Whereas an extended IP ACLs can filter on the source and destination IP addresses in the packet. 5. There are two actions an ACL can take: permit or deny. 6. Statements are processed top-down. 7. Once a match is found, no further statements are processedtherefore, order is important. 8. If no match is found, the imaginary implicit deny statement at the end of the ACL drops the packet. An ACL should have at least one permit statement; otherwise, all traffic will be dropped because of the hidden implicit deny statement at the end of every ACL. No matter what type of ACL you use, though, you can have only one ACL per protocol, per interface, per direction. For example, you can have one IP ACL inbound on an interface and another IP ACL outbound on an interface, but you cannot have two inbound IP AC
SEC, Sikar
Page 39
Conclusion
My experience throughout the training was a big learning curve for my career. Being with the professionals was a great opportunity for me. My utmost effort was to master the skill to as much extent as it can be. I got hands on experience this summer; working on the real equipment during their internships was as interesting as it can get. The Industrial training programme was exhaustive and covering the latest in technologies. The first week we were taught about the basics of Computer Hardware which we were already thorough with, courtesy the excellent faculty and innovative teaching style of our college. Therefore the first week was a brush upon the ideas which were somewhat weakened during the holidays. The second week was a step in the more detailed realms of Operating System. We were taken into greater depths of the knowledge pool and we were allowed to explore on our own the new possibilities and new ways to overcome our own doubts and questions. The third and fourth weeks were full of new advanced concepts of Networking that were introduced to us. It was challenging at first, but once we discovered where the root of all doubt liesit was able to make peace with the new concepts. The fifth and sixth week consisted of Project Making. It was the time to showcase everything that we have learnt past four weeks into a single project. We got much help from our supervisors at CDAC and some co-trainees. The professionalism was exemplary. Overall these six weeks have given a new direction to my career and a new direction as to how to think in the right man
SEC, Sikar
Page 40
BIBLIOGRAPHY
[1] Todd Lammle, Cisco certified Network associate Study guide , Seventh Edition. Command Guide, http://.computer.org/cspress/instruct.htm
[2]
SEC, Sikar
Page 41