OMD000410 Abis Interface Networking Topologies ISSUE 1.0.ppt
Networking ppt hcl
-
Upload
vishal-kumar -
Category
Engineering
-
view
170 -
download
0
Transcript of Networking ppt hcl
Bhai Gurdas Institute of Bhai Gurdas Institute of Engineering & Technology , Engineering & Technology ,
SangrurSangrur
Prepared By :-Vishal Kumar Vishal Kumar (1238755)(1238755)Ravi Ranjan Ravi Ranjan (1238741)(1238741)
NetworkingNetworking
6 Month Training at
Company ProfileCompany Profile
• The company came into existence in 1976, became
• the largest IT company in India in 1986,launched
• the CDC’s in 2006.
• HCL Info systems is one of the leading System Integration Companies in the
country.
• HCL CDC, the training arm of HCL Info systems, is an initiative that enables
individuals and organizations to benefit from HCL's deep expertise.
• CDC offers a complete spectrum of quality training programs on software,
hardware, networking as well as global certifications in association with leading IT
organizations worldwide.
Connection of two or more nodes over the physical media and sharing the resources is called as Networking.
What is Networking ?What is Networking ?
Networking DevicesNetworking DevicesHub
Router
Wifi Router
Repeater
Bridge
Switch
Icon’s of devices
Network TopologyNetwork Topology
LAN MAN WANLAN MAN WAN
Types of NetworksTypes of Networks
Network in small geographical area(Room, Building or a Campus) is called LAN(Local Area Network)
Network in a city is called MAN(Metropolitan Area Network)
Network spread geographically(Country or across Globe) is called WAN(Wide Area Network)
Reference ModelReference Model
Internet ProtocolInternet Protocol
• IP defines datagram structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram source and destination.
IP AddressingIP Addressing
Private IP Address Range (Special Purpose)
RoutingRouting
• Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks.
Routing ProtocolsRouting Protocols
Security technique in NetworkingSecurity technique in Networking
• VLAN
ACLAccess Control List
Virtual-LAN
Security technique in NetworkingSecurity technique in Networking
• VPNVirtual Private Network
Port Security
Security technique in NetworkingSecurity technique in Networking
• NATNetwork Address Translator
VoIPVoIP
• VoIP (Voice over Internet Protocol)
With VoIP, analog voice calls are converted into packets of data. The packets travel like any other type of data, such as e-mail,over the public Internet and/ or any private Internet Protocol (IP) network.Using a VoIP service, you can call landline or cell phones.
Project WorkProject Work
• Introduction of the project• Components used in the project• Networking techniques used in
the project• Working description of the
project• Actual topological view of the
project• Conclusion and future prospects
of the project
Introduction of ProjectIntroduction of Project
• Name : “Network security policy for Campus”.
In this project we have tried to draw a schematic working model of a Campus Security. The main motive of this project was to understand the Campus Networking & apply on various security
Components used in the projectComponents used in the project
• As it is a project purely based on networking so we have used all the basic components related to it. which includes
-Routers-Switches-Connecting Cables-IP phones-Servers-End devices (Laptops and Computers)-Wi-Fi
Networking techniques usedNetworking techniques used• As this project is some sort of enterprise network so we have tried to
apply most of the things that we have learnt during our training period. some of them of them are mentioned below
-Topology design-IP addressing-Routing protocols(OSPF)-VOIP-ACL-VPN-Telnet-Port Security-VLAN
General workingGeneral working
• In order to describe the general working of the project first of all we are going to explain the topology of the network.
• Here the topology consists-- Student Lab-HOD Office-Director Office-Chairman Office-Library-Account Section-Reception-Visitor Lounge
General workingGeneral working• In Student Lab the student can communicate with every student in
the Campus and their respective HOD’s. They can’t communicate with other branch HOD’s, Director office & Chairman office.
• In HOD’s office they can communicate with any student and Director office. They can’t communicate with Chairman office.
• In Director office they can communicate with any of the person in Campus.
• In Chairman office they can only communicate with Director office. There will be VPN technology will be implemented so no one can trace the route between Chairman office to Director office.
General workingGeneral working• In Library section, it consist a E-Journal Lab, Reception Counter,
Conference Hall.
• In Account Section, it consist 3 Student Help-Desk. Each desk contains a PC and there will be port security implemented, so no one can change the PC without permission of Administrative Officer.
• In Reception, It consists 2 IP Phone for communicating and a Help-Desk
• In Visitor Lounge there are a wireless router for Wi-Fi. Any visitor can access the Wi-Fi service.
Actual view of the projectActual view of the project
Conclusion and future prospectsConclusion and future prospects
• This project actually gives the overview that how enterprise networking is done and how it works.
Future prospects• As far as future prospects are concerned nothing is for ever in the
field of technology.• There is lot of space for improvement in the field of networking
like,-Better topological arrangements.- Introduction of new smart devices-Introduction of better security techniques.-The introduction of wireless networking.
ReferencesReferences
•Cisco Systems, Inc., (2003, March 14). CCNA: network media types. Retrieved from ciscopress.com
•www.wikepedia.com•www.google.com•www.youtube.com/ccna•www.hclcdc.com/networking