Designing, managing and maintaning corporate network ppt

1,663 views

Published on

Designing, managing and maintaning corporate network

Published in: Education, Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,663
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
95
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Designing, managing and maintaning corporate network ppt

  1. 1. DESIGNING, MANAGING AND MAINTANING CORPORATE NETWORK PRESENTED BY:TAUSEEF JAMAL CSE-100101243
  2. 2. TOPICS  WHAT IS NETWORKING  WHAT IS CISCO PACKET TRACER  TECHNOLOGY  ROUTING  DHCP  ACCESS-LIST PROTOCOL  CORPORATE NETWORK  PROJECT SCENARIO
  3. 3. NETWORKING  A computer network or data network is a telecommunications network that allows computers to exchange data.  Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications.
  4. 4.  Network devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as servers and personal computers, as well as networking hardware.  Two devices are said to be networked when a process in one device is able to exchange information with a process in another device.
  5. 5. CISCO PACKET TRACER  Cisco Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask “what if” questions.  As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts.
  6. 6. TECHNOLOGY  The project is based on corporate network and NOCs (Network Operating Centers), where we also manage stub networks (Server administration, user administration and all).  The Project is done and executed in Cisco Packet Tracer by making a corporate network scenario by using some routers, switches, PC’s and Servers and showing the inter connection between the devices
  7. 7. ROUTING  RIP means ROUTING INFORMATION PROTOCOL.  RIP is an intra-domain routing protocol used inside an independent system.  One of the most simple and earlier routing protocols based on distance vector routing.  Versions: Types:- RIPv1 and RIPv2 Static Routing and Dynamic Routing
  8. 8. RIPv1 and RIPv2  In RIPv1 it does not send subnet mask information in the routing update advertisements, which is a characteristics of classful routing protocols.  RIPv1 enabled networks are vulnerable to attacks as the RIPv1 also does not support router authentication.  Due to faults in the original RIP specification(RIPv1), RIP version 2(RIPv2) was developed in 1993 and got support for its standardization in 1998.  It included the capability to carry the subnet mask information, thus supporting Classless Inter-Domain Routing(CIDR).
  9. 9. STATIC ROUTING AND DYNAMIC ROUTING  Static Routing is simply the process in which the system network administrator manually configures the network routers with all the information necessary for successful packet forwarding.  In Dynamic Routing, the routing protocol operating on the router is responsible for the creation, maintenance and updating of the dynamic routing table.  Routing Protocols like EIGRP,OSPF etc are supported only in Dynamic Routing.
  10. 10. DYNAMIC HOST CONFIGURATION PROTCOL (DHCP)  It is a network protocol used to configure devices that are connected to a network so they can communicate on that network using the Internet Protocol (IP).  The protocol is implemented in a client-server model, in which DHCP clients request configuration data, such as an IP address, a default route, and one or more DNS server addresses from a DHCPserver.
  11. 11. ACCESS LIST PROTOCOL  It is a group of statements that defines a pattern that can be found in an IP packet.  As each packet comes through an interface with an associated access list, the list is scanned from top to bottom in the exact order that it entered for a pattern that matches the incoming packet.  A permit or deny rule associated with the pattern determines that packet’s fate.
  12. 12. CORPPORATE NETWORK  A corporate network is an enterprise's communications backbone that helps connect computers and related devices across departments and workgroup networks, facilitating insight and data accessibility.  An corporate network reduces communication protocols, facilitating system and device interoperability, as well as improved internal and external enterprise data management.
  13. 13. PROJECT SCENARIO
  14. 14. THANK YOU

×