SlideShare a Scribd company logo
Cisco Network Academy validates the ability to install, configure, operate, and troubleshoot
medium-size route and switched networks, including implementation and verification of
connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of
security threats, introduction to wireless networking concepts and terminology, and
performance-based skills. This new curriculum also includes (but is not limited to) the use of
these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line
Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2), VLANs,
Ethernet, access control lists (ACLs).
1.1 SOFTWARE USED: PACKET TRACER VER 6.2.0.005
Cisco Packet Tracer is a powerful network simulation program that allows students to
experiment with network behavior and ask “what if” questions. As an integral part of the
Networking Academy comprehensive learning experience, Packet Tracer provides simulation,
visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching
and learning of complex technology concepts. Packet Tracer supplements physical equipment
in the classroom by allowing students to create a network with an almost unlimited number of
devices, encouraging practice, discovery, and troubleshooting. The simulation based learning
environment helps students develop 21st century skills such as decision making, creative and
critical thinking, and problem solving.
Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run
on Mac OS, Linux and Microsoft Windows. A similar Android app is also available. Packet
Tracer allows users to create simulated network topologies by dragging and dropping routers,
switches and various other types of network devices. A physical connection between devices
is represented by a "cable" item. Packet Tracer supports an array of simulated Application
Layer protocols, as well as basic routing with RIP, OSPF, EIGRP, BDP, to the extents
required by the current CCNA curriculum. As of version 6.2, Packet Tracer also supports the
Border Gateway Protocol, even though; this protocol is not taught in the CCNA curriculum.
As of version 6.2, Packet Tracer supports an embedded web server with JavaScript and CSS
support. The command line can be used for creating a router-to-pc connection. Version 6.1.1
Page 1
Chapter-1 ABOUT THE TECHNOLOGY
added support for various DHCP, EIGRP and OSPF commands, improved support for Zone-
Based Firewall policies. Version 6.0 added support for IOS version 15 and Hot Standby
Routing Protocol.
1.2 Packet Tracer Features:
• Logical and Physical Workspaces
• Real-Time and Simulation Modes
• User friendly CLI
• Global event list (packet sniffer)
• LAN, switching, TCP/IP, routing, and WAN protocols
• Activity Wizard, Lab grading
• Multiple platform support
Page 2
An ideal Bank Networking system will be fully network base and easy with friendly
user interface staff task management system where any banking system manage their
networking system somehow Head office , Branch Office, and other office are maintain LAN,
MAN, WAN, VLAN, VLSM,VPN and some branch are maintain by manageable switch. LAN is
used by Local Area Networking system for example one office and a one building. And MAN
are using by the Metro Politian area Network for Example small town, and WAN are use by
the WIDE AREA NETWORK. In this networking system are used by all banking users can use
by shared their data very easily. So that every user use to take about Network Structure &
Security of Banking System instantly this way anywhere.
2.1 Objectives
1. To design and simulate a banking network system which is secure.
2. To simulate a banking network system that will easily manage any banking task.
3. To manage the banking network by a central system
2.3 Justification of study: The trend of growth of Online Banking brings many security issues
and increasing cost of implementing higher security system for both Online Banking users
and the banks. Classers said security is all about risks and associated cost in his paper .The
most critical issue of Online Banking security is to protect valuable information that is
susceptible to unauthorized access by attackers. Hence, the banks must constantly increase
security. At the same time, the banks must manage costs to make a profit. In contrast,
increasing security is increasing the cost for attackers to break into the system, and
increasing the punishment that the attackers may suffer. Hence the Internet
criminals/attackers/crackers may lose motivation for hacking a high security online banking
system.
2.4 Scopes of study
The scope of the Network Structure & Security of Banking System includes.
1. Online based day to day transmission.
2. Save time and cost because of day to day transmission.
3. Established relation between one branch to another
4. Connect all branches to head branch in same network.
5. Online based update and maintain everyday work.
The following case study is used to illustrate the process and documentation required
for a network design. This case study presents a scenario in which the Banks & ATM has
hired a Network Consultant Group to design their network. In order to help organization this
project, the scenario has been broken into eight phases listing requirements for each phase.
Page 3
Chapter-2 INTRODUCTION
A worksheet is to be completed for each part. A formal report, similar to what would
be given to the banks, will need to be created after all tasks have been completed.
This case study requires that you accomplish the following:
1. Use the resources provided, diagram and narrative, to set up the physical network.
2. Set up an IP sub-netting scheme
3. Configure the routers as required.
4. Set up and configure the switches and VLANS as required.
5. Verify and troubleshoot all connections.
6. Provide detailed documentation in the appropriate format.
7. Provide a written final report
Page 4
The Banks & ATM has provided a partially completed logical diagram of the required
network.
The company has also provided networking equipment for development and demonstration.
• The company consists of 3 remote locations. One being the main building and other
two locations on a remote site.
• The main building consists of 6 departments with the following requirement:
Department Number Remarks
BANKS 120 Size can vary up to 255
ATM 120 Size can vary up to 255
CONTYROL 120 Size can vary up to 255
• 8 servers that distributed in all locations
• The following ip address to be used for connection with SERVER
• 198.168.0.1
• 198.168.0.2
• 198.168.0.3
• 198.168.0.4
• 198.168.0.5
• 198.168.0.6
• 198.168.0.7
• 198.163.0.1
• 198.163.0.2
• 198.163.0.3
• 198.163.0.4
• 198.163.0.5
• 198.163.0.6
• 198.163.0.7
Page 5
Chapter-3 REQUIREMENTS
3.1 Following address are used for internal addressing.
• 10.0.0.0
• 20.0.0.0
• 30.0.0.0
• 40.0.0.0
• 11.0.0.0
• 21.0.0.0
• 31.0.0.0
• 41.0.0.0
• Use VLSM for IP addressing.
• Device details
DEVICE MODEL NUMBER
Router 2811 4
Switches 2960 10
Server - 11
Page 6
Page 7
Figure-1
Page 8
Chapter-4 NETWORK STRUCTURE
Figure-2
Page 9
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP
network. An IP address is a 32 bit binary number usually represented as 4 decimal values,
each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal
points. This is known as "dotted decimal" notation.
Address Classes
There are 5 different address classes. You can determine which class any IP address is in by
examining the first 4 bits of the IP address.
· Class A addresses begin with 0xxx, or 1 to 126 decimal.
· Class B addresses begin with 10xx, or 128 to 191 decimal.
· Class C addresses begin with 110x, or 192 to 223 decimal.
· Class D addresses begin with 1110, or 224 to 239 decimal.
· Class E addresses begin with 1111, or 240 to 254 decimal.
Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for
internal testing on a local machine Class D addresses are reserved for multicasting. Class E
addresses are reserved for future use.
Subnetting
Subnetting an IP Network can be done for a variety of reasons, including organization, use of
different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space,
and security. The most common reason is to control network traffic. In an Ethernet network,
all nodes on a segment see all the packets transmitted by all the other nodes on that
segment. Performance can be adversely affected under heavy traffic loads, due to collisions
and the resulting retransmissions. A router is used to connect IP networks to minimize the
amount of traffic each segment must receive.
Subnet Masking
Applying a subnet mask to an IP address allows you to identify the network and node parts of
the address. Performing a bitwise logical AND operation between the IP address and the
subnet mask results in the Network Address or Number.
DHCP
The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating the
configuration of computers that use TCP/IP. DHCP can be used to automatically assign IP
addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and
default router, and to provide other configuration information such as the addresses for
printer, time and news servers.
Page 10
Chapter-5 IP ADDRESSING
NOTE:
• Overlapping subnets in sales, marketing department etc is note done as more hosts
can be accommodated in the given domain whenever required
• All devices are assigned ip address using DHCP
Page 11
Number of
host
addresses
required
Network
Address
Subnet
Mask
Max
Number of
Hosts
Possible
In Use
(Yes/No)
Network
Name
30 10.0.0.0 /27 30 Yes PNB Control
60 10.0.0.32 /26 30 Yes PNB Bank
6 10.0.0.66 /29 30 Yes PNB ATM
30 20.0.0.0 /27 30 Yes SBI Control
25 20.0.0.32 /24 30 Yes SBI Bank
24 20.0.0.64 /24 30 Yes SBI ATM
20 30.0.0.0 /24 30 Yes HDFC control
30 30.0.0.32 /27 30 Yes HDFC BANK
30 30.0.0.64 /27 30 Yes HDFC ATM
255 40.0.0.0 /27 30 Yes ICICI Bank
Chapter-6 INTERNAL IP ADDRESSING
Chapter-7 SERVER ADDRESSING
SERVER IP ADDRESS LOCATION
DNS 198.168.0.6 CENTER
HTTP 198.168.0.2
HTTP 198.168.0.3 CENTER
HTTP 198.168.0.4 CENTER
HTTP 198.168.0.5 CENTER
FTP 198.168.0.7 CENTER
TFTP 198.168.0.8 CENTER
HTTP 198.163.0.2 CENTER
HTTP 198.163.0.3
HTTP 198.163.0.4 CENTER
HTTP 198.163.0.5 CENTER
DNS 198.163.0.6 CENTER
TFTP 198.163.0.7 CENTER
7.1 Router Configuration:
NORTH BANKING ROUTER (DCE Speed 64000)
PNB ROUTER (DTE)
Page 12
Interface/Sub
Interface
Type/Number
Description and
Purpose
Network
Number
Interface IP
address
Subnet Mask
S0/3/0 Link to PNB 192.168.0.0 192.168.0.1 /30
S0/3/1 Link to SBI 192.168.0.4 192.168.0.5 /30
Se0/0/0 Link to HDFC 192.168.0.8 192.168.0.9 /30
Se0/1/0 Link to ICICI 192.168.0.12 192.168.0.13 /30
Fa0/0 Link to servers 198.168.0.0 198.168.0.1 /30
BANK ROUTER (DTE)
CONTROL ROUTER (DTE)
ATM ROUTER (DTE)
SBI ROUTER (DTE)
Page 13
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/1 Link To Bank 193.168.0.32 193.168.0.33 /27
Se0/2 Link to north banking 192.168.0.0 192.168.0.2 /30
Se0/3 Link to Contorl 193.168.0.0 193.168.0.1 /27
Se0/0 Link to ATM 193.168.0.65 193.168.0.65 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 193.168.0.4 193.168.0.6 /30
Fa0/0 Link to Switch 10.0.0.32 10.0.0.1 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 193.168.0.0 193.168.0.1 /30
Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 193.168.0.8 193.168.0.9 /30
Fa0/0 Link to Switch 10.0.0.64 10.0.0.65 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
S0/2 Link to North bank 192.168.0.4 192.168.0.5 /30
Se0/3 Link to Bank 193.168.0.12 193.168.0.13 /27
Se0/1 Link to Control 193.168.0.16 193.168.0.17 /27
Se0/0 Link to Atm 192.168.0.20 193.168.0.21 /27
CONTROL ROUTER (DTE)
BANK ROUTER (DTE)
ATM ROUTER (DTE)
HDFC ROUTER (DTE)
CONTROL ROUTER (DTE)
BANK ROUTER (DTE)
Page 14
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to SBI 193.168.0.12 193.168.0.13 /30
Fa0/0 Link to Switch 20.0.0.0 20.0.0.1 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to SBI 193.168.0.16 193.168.0.17 /30
Fa0/0 Link to Switch 20.0.0.32 20.0.0.33 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to SBI 193.168.0.20 193.168.0.21 /30
Fa0/0 Link to Switch 20.0.0.64 20.0.0.65 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
S0/2 Link to North bank 192.168.0.8 192.168.0.9 /30
Se0/3 Link to Bank 194.168.0.0 194.168.0.1 /27
Se0/1 Link to Control 194.168.0.4 194.168.0.5 /27
Se0/0 Link to Atm 194.168.0.8 194.168.0.9 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to HDFC 194.168.0.0 194.168.0.1 /30
Fa0/0 Link to Switch 30.0.0.0 30.0.0.1 /27
ATM ROUTER (DTE)
ICICI ROUTER (DTE)
CONTROL ROUTER (DTE)
BANK ROUTER (DTE)
Page 15
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 193.168.0.4 194.168.0.5 /30
Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 194.168.0. 194.168.0.5 /30
Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
S0/2 Link to North bank 192.168.0.8 192.168.0.5 /30
Se0/3 Link to Bank 194.168.0.12 193.168.0.13 /27
Se0/1 Link to Control 194.168.0.16 193.168.0.17 /27
Se0/0 Link to Atm 194.168.0.20 193.168.0.21 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to HDFC 194.168.0.12 194.168.0.13 /30
Fa0/0 Link to Switch 40.0.0.0 30.0.0.1 /27
ATM ROUTER (DTE)
SOUTH BANKING ( DCE Speed 64000)
PNB ROUTER (DTE)
Page 16
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 194.168.0.4 194.168.0.5 /30
Fa0/0 Link to Switch 40.0.0.32 40.0.0.33 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 194.168.0.20 194.168.0.21 /30
Fa0/0 Link to Switch 40.0.0.64 40.0.0.65 /27
Interface/SubInterface
Type/Number
Description and Purpose Network Number Interface IP
address
Subnet
Mask
S0/1/1 Link to SBI 192.163.0.4 192.163.0.5 /30
SE0/1/0 Link to PNB 192.163.0.0 192.163.0.1 /30
SE0/0/0 Link to HDFC 192.163.0.8 192.163.0.8 /30
SE0/3/0 Link to ICICI 192.163.0.12 192.163.0.13 /30
SE0/3/1 Link to Server 198.163.0.0 198.163.0.1 /30
BANK ROUTER (DTE)
CONTROL ROUTER (DTE)
ATM ROUTER (DTE)
SBI ROUTER (DTE)
Page 17
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/1 Link To Control 122.168.0.32 122.168.0.33 /27
Se0/2 Link to South banking 192.16.0.0 192.168.0.2 /30
Se0/3 Link to Bnak 122.168.0.0 122.168.0.1 /27
Se0/0 Link to ATM 122.168.0.64 12.168.0.65 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/0 Link to PNB 122.168.0.0 122.168.0.2 /30
Fa0/0 Link to Switch 11.0.0.32 11.0.0.33 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 122.168.0.64 122.168.0.65 /30
Fa0/0 Link to Switch 11.0.0.64 11.0.0.65 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 122.168.0.0 122.168.0.1 /30
Fa0/0 Link to Switch 11.0.0.0 11.0.0.0 /27
CONTROL ROUTER (DTE)
BANK ROUTER (DTE)
ATM ROUTER (DTE)
HDFC ROUTER (DTE)
CONTROL ROUTER (DTE)
Page 18
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
S0/2 Link to South bank 192.163.0.4 192.163.0.6 /30
Se0/3 Link to Bank 122.168.0.14 122.168.0.12 /27
Se0/1 Link to Control 122.168.0.16 122.168.0.17 /27
Se0/0 Link to Atm 122.168.0.20 122.168.0.21 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to SBI 122.168.0.12 122.168.0.13 /30
Fa0/0 Link to Switch 21.0.0.32 21.0.0.33 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to SBI 122.168.0.16 122.168.0.17 /30
Fa0/0 Link to Switch 21.0.0.0 21.0.0.1 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to SBI 122.168.0.20 122.168.0.21 /30
Fa0/0 Link to Switch 21.0.0.64 21.0.0.65 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
S0/2 Link to South bank 192.163.0.8 192.163.0.9 /30
Se0/3 Link to Bank 122.122.0.0 122.122.0.1 /27
Se0/1 Link to Control 122.122.0.4 122.122.0.5 /27
Se0/0 Link to Atm 122.122.0.8 122.122.0.9 /27
BANK ROUTER (DTE)
ATM ROUTER (DTE)
ICICI ROUTER (DTE)
CONTROL ROUTER (DTE)
BANK ROUTER (DTE)
Page 19
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to HDFC 122.122.0.4 122.122.0.5 /30
Fa0/0 Link to Switch 31.0.0.4 31.0.0.5 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 122.122.0.0 122.122.0.1 /30
Fa0/0 Link to Switch 31.0.0.0 31.0.0.1 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 122.122.0.8 122.122.0.9 /30
Fa0/0 Link to Switch 31.0.0.64 31.0.0.65 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
S0/2 Link to North bank 122.122.012 122.122.0.13 /30
Se0/3 Link to Bank 122.122.0.20 122.122.0.21 /27
Se0/1 Link to Control 122.122.0.16 122.122.0.17 /27
Se0/0 Link to Atm 122.122.0.12 122.122.0.13 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to HDFC 122.122.0.16 122.122.0.17 /30
Fa0/0 Link to Switch 41.0.0.32 41.0.0.33 /27
ATM ROUTER (DTE)
Page 20
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 122.122.0.12 122.122.13 /30
Fa0/0 Link to Switch 41.0.0.0 41.0.0.1 /27
Interface/Sub
Interface
Type/Number
Description and Purpose Network
Number
Interface IP
address
Subnet Mask
SE0/2 Link to PNB 122.122.0.20 122.122.0.21 /30
Fa0/0 Link to Switch 41.0.0.64 41.0.0.65 /27
Routing is the act of moving information across an internetwork from a source to a
destination. Routing involves two basic activities: determining optimal routing paths and
transporting information groups (typically called packets) through an internetwork.
Routing protocols use metrics to evaluate what path will be the best for a packet to
travel. A metric is a standard of measurement, such as path bandwidth, that is used by
routing algorithms to determine the optimal path to a destination. To aid the process of path
determination, routing algorithms initialize and maintain routing tables, which contain route
information. Route information varies depending on the routing algorithm used.
Routing algorithms fill routing tables with a variety of information. Destination/next
hop associations tell a router that a particular destination can be reached optimally by
sending the packet to a particular router representing the "next hop" on the way to the final
destination. When a router receives an incoming packet, it checks the destination address
and attempts to associate this address with a next hop.
Routing algorithms often have one or more of the following design goals:
• Optimality
• Simplicity and low overhead
• Robustness and stability
• Rapid convergence
• Flexibility
8.1 Types of routing:
8.1.1 STATIC ROUTING ALGORITHMS are hardly algorithms at all, but are table mappings
established by the network administrator before the beginning of routing. These mappings
do not change unless the network administrator alters them. Algorithms that use static
routes are simple to design and work well in environments where network traffic is relatively
predictable and where network design is relatively simple.
8.1.2 DYNAMIC ROUTING ALGORITHMS which adjust to changing network circumstances by
analyzing incoming routing update messages. If the message indicates that a network change
has occurred, the routing software recalculates routes and sends out new routing update
messages. These messages permeate the network, stimulating routers to rerun their
algorithms and change their routing tables accordingly.
Page 21
Chapter-8 ROUTING PROTOCOL
8.2 The various routing protocol that can be used are:
1. RIP (routing information protocol) is a distance vector routing protocol. It sends
complete routing table out to all other members in an interval of 30 seconds. It uses
hop count as a metric and by default hop count is set to 15.
RIP Configuration:
The command syntax is as follows:
Router (config) #router rip
Router (config-router) #network network-number net-mask
2. IGRP is a distance vector Interior Gateway Protocol (IGP). IGRP uses a composite
metric that is calculated by factoring weighted mathematical values for internetwork
delay, bandwidth, reliability, and load. Network administrators can set the weighting
factors for each of these metrics, although great care should be taken before any
default values are manipulated.
IGRP Configuration:
To configure the IGRP routing process use the router igrp configuration command.
The command syntax is as follows:
Router A (config) #router igrp as-number
Router A (config) #network network-number net-mask
There as number identifies the IGRP process. To specify a list of networks for IGRP
routing process, se the network router configuration command. To remove an entry,
use the no form of the command.
3. EIGRP Key capabilities that distinguish EIGRP from other routing protocols include
fast convergence, support for variable-length subnet mask, support for partial
updates, and support for multiple network layer protocols.
A router running EIGRP stores all its neighbors' routing tables so that it can quickly
adapt to alternate routes. If no appropriate route exists, EIGRP queries its neighbors
to discover an alternate route.
EIGRP does not make periodic updates. Instead, it sends partial updates only when
the metric for a route changes.
EIGRP Configuration:
EIGRP is an ideal choice for large, multi-protocol networks built primary on Cisco
routers.
RouterA(Config)#router eigrp as-number
RouterA(Config)#network network-number net-mask.
4. OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LSAs) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables is included in
OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF
algorithm to calculate the shortest path to each node.
Page 22
OSPF Configuration:
To enable OSPF routing, use the global configuration command syntax:
Router (configure) #router ospf process-id
Router (configure-router) #network address wildcard-mask area area-id.
Our configuration
*****OSPF protocol in all routers with process id 10 in single area 0*****
Page 23
Routing
Protocol
Property 1
Supports
VLSM
Property 2
Scalable
Property 3
Uses
multicast
updates
Property 4
Has view
of
complete
toplology
Property 5
Easy to
configure
Property 6
Proprietary
Total
RIP V1 - - - - - - 2
RIP v2 - - - - - - 4
IGRP - - - - - - 2
EIGRP - - - - - - 3
OSPF + + + + - + 5
Now it’s making peoples life very easy as they get their money when they need. So, they do
not need to carry either big amount of money or the checked book all the time. To get rid
from this burden they need to deposit money in the bank by opening an account and then
the bank will be given a Card i.e. an ATM card with a PIN number to them. By using that they
can withdraw money from any ATM machine of that bank. When they insert the card in the
machine and the PIN number the machine will show few instructions on the screen. By that
time verification (PIN Number and Account Number) will be done with the main bank
computer as they are connected. If the verification is correct then the user will choose an
instruction and the ATM will dispense money to the card holder.
9.1 Internal Structure of ATM In the following pictures we have the internal structure of two
different type of ATM machine. And also it can be divided into two different parts: - Upper
Unit, -Lower Unit
9.2 Interactive components of ATM Card Reader:
Customer inserts their card in it when there is written “Please Insert Your card” on the
screen.
 Keypad: Use for PIN code input, choices, amount of money etc as the input to The
ATM machine.
 Display Screen: This screen shows all the instructions or options for the customers
„convenience.
 Screen Buttons: When options are given on the screen one user can choose any of
the options accordingly by the use of button on left or right side of the screen. These
buttons select the option from the screen.
 Cash Dispenser: Withdrawal money is given by this slot. Deposit Slot: To deposit
money this slot is use.
 Speaker: Speaker provides the facilities to the customer by giving auditory feedback.
ATM Card: ATM card is also like magnetic strip card. It is also a data carrier which
electronically reads and writes data. ATM cards mainly a debit card.
Ways of Transaction:
In Bank transactions are divided into three main categories
 My bank to others bank A customer of a bank uses other banks ATM.
 Others bank to my bank other banks customer uses ATM of Bank Asia.
 My bank to my bank a customer uses its own bank ATM machine.
Page 24
Chapter-9 Automated Teller Machine:
Security is most important part for online banking system. We use the different method
for provide strong online banking security system and use owasp top ten project provide
online banking security. Ensuring comprehensive network security visibility is no easy task.
Uncover expert tips on how to improve network security visibility with network flow analysis
tools, cloud security monitoring solutions, and anomaly-based monitoring technology.
10.1 AUTHENTICATION MECHANISM :
Authentication is the process of establishing whether a client is who or what it claims
to be in a particular context. A client can be an end user, a machine, or an application. The
authentication mechanism is responsible for creating a credential, which is an internal
product representation of a successfully authenticated client user. The abilities of the
credential are determined by the configured authentication mechanism.
10.2 Challenge handshake Authentication Protocol (Chap):
CHAP is an authentication scheme used by point to point servers to validate the
identity of remote clients. CHAP periodically verifies the identity of the client by using a
three-way handshake. CHAP provides protection against playback attack by the peer through
the use of an incrementally changing identifier and of a variable challenge-value. CHAP
requires that the client make the secrete available in in plaintext form.
10.3 ACCESS CONTROL LIST (ACL):
ACLs are lists of conditions used to test network traffic that tries to travel across a router
interface. These lists tell the router what types of packets to accept or deny.
 ACLs can be created for all routed network protocols such as IP and Internet
 Packet Exchange (IPX).
 ACLs can be configured at the router to control access to a network or subnet.
 To filter network traffic, ACLs determine if routed packets are forwarded or blocked
at the router interfaces.
Page 25
Chapter-10 SECURITY
10.4 ACLs can be used to perform the following task
 Limited network traffic and increase network performance
 Provide traffic follow control
 Provide a basic level of security for network access.
 Decide which types of traffic are forwarded or blocked at the router interfaces.
 Control which areas a client can access on a network.
 Script hosts to permit or deny access to a network.
Page 26
.
VLAN is a switched network that is logically segmented by functions, project teams, or
applications. Without regard to the physical location of users. For example, several end
stations might be grouped as a department, such as engineering or accounting. When the
end stations are physically located close to one another, you can group them into a LAN
segment. If any of the end stations are in different buildings (not the same physical LAN
segment), you can then group them into a VLAN.
We can assign each switch port to a VLAN. Ports in a VLAN share broadcast traffic. Ports that
do not belong to that VLAN do not share the broadcast traffic.
VLANs provide the following features:
• Simplification of end-station moves, adds, and
changes
When an end station is physically moved to a new location, its attributes can be reassigned
from a network management station through Simple Network Management Protocol (SNMP)
or through the user interface menus. When an end station is moved within the same VLAN, it
retains its previously assigned attributes in its new location. When an end station is moved to
a different VLAN, the attributes of the new VLAN are applied to the end station.
• Controlled traffic activity
VLANs allow ports on the same or different switches to be grouped so that traffic is confined
to members of only that group. This feature restricts broadcast, unicast, and multicast traffic
(flooding) only to ports included in a certain VLAN. The management domain is a group of
VLANs that are managed by a single administrative authority.
• Workgroup and network security
You can increase security by segmenting the network into distinct broadcast domains. To this
end, VLANs can restrict the number of users in a broadcast domain. You can also control the
size and composition of the broadcast domain by controlling the size and composition of a
VLAN.
Page 27
Chapter-11 VLAN
NAT allows an Internet Protocol (IP) network to maintain public IP addresses
separately from private IP addresses. NAT is a popular technology for Internet connection
sharing. It is also sometimes used in server load balancing applications on corporate
networks. In its most common configuration, NAT maps all of the private IP addresses on a
home network to the single IP address supplied by an Internet Service Provider (ISP). This
allows computers on the home LAN to share a single Internet connection. Additionally, it
enhances home network security by limiting the access of external computers into the home
IP network space.
NAT works by snooping both incoming and outgoing IP datagrams. As needed, it
modifies the source or destination address in the IP header (and the affected checksums) to
reflect the configured address mapping. NAT technically supports either fixed or dynamic
mappings of one or more internal and external IP addresses.
Network Address Translation allows a single device, such as a router, to act as agent
between the Internet (or "public network") and a local (or "private") network. This means
that only a single unique IP address is required to represent an entire group of computers to
anything outside their network.
The shortage of IP addresses is only one reason to use NAT. Two other good reasons are:
• Security
• Administration
Page 28
Chapter-12 NETWORK ADDRESS TRANSLATION (NAT)
North BANKING:-
Rou Router#sh run
Building configuration...
Current configuration : 1317 bytes
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
interface FastEthernet0/0
ip address 198.168.0.1 255.255.255.224
duplex au
to
speed auto
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
no ip address
shutdown
interface Serial0/0/1
Page 29
Chapter-13 DEVICE CONFIGURATION
no ip address
shutdown
interface Serial0/1/0
bandwidth 325435
ip address 192.168.0.9 255.255.255.252
clock rate 64000
interface Serial0/1/1
bandwidth 325435
ip address 192.168.0.13 255.255.255.252
clock rate 64000
interface Serial0/2/0
no ip address
shutdown
interface Serial0/2/1
no ip address
shutdown
interface Serial0/3/0
bandwidth 4545
ip address 192.168.0.1 255.255.255.252
clock rate 64000
!
interface Serial0/3/1
bandwidth 4545
ip address 192.168.0.5 255.255.255.252
clock rate 64000
!
Page 30
interface Vlan1
no ip address
shutdown
router ospf 100
log-adjacency-changes
network 192.168.0.0 0.0.0.3 area 0
network 192.168.0.4 0.0.0.3 area 0
network 192.168.0.8 0.0.0.3 area 0
network 192.168.0.12 0.0.0.3 area 0
network 198.168.0.0 0.0.0.3 area 0
network 198.168.0.0 0.0.0.31 area 0
ip classless
line con 0
line vty 0 4
login
end
ters
PNB SERVER:-
Router#SH run
Building configuration...
Current configuration : 894 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
Page 31
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
ip address 193.168.0.5 255.255.255.252
clock rate 64000
interface Serial0/1
ip address 193.168.0.9 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.168.0.2 255.255.255.252
interface Serial0/3
ip address 193.168.0.1 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 192.168.0.0 0.0.0.3 area 0
network 193.168.0.0 0.0.0.3 area 0
network 193.168.0.4 0.0.0.3 area 0
Page 32
network 193.168.0.8 0.0.0.3 area 0
ip classless
line con 0
line vty 0 4
login
end
SBI SERVER:-
Router#Sh run
Building configuration...
Current configuration : 1116 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
ip dhcp excluded-address 20.0.0.1
ip dhcp pool abc2
network 20.0.0.0 255.255.255.224
default-router 20.0.0.1
dns-server 198.168.0.6
interface FastEthernet0/0
ip address 20.0.0.1 255.255.255.224
ip nat inside
duplex auto
speed auto
interface FastEthernet0/1
Page 33
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
no ip address
shutdown
interface Serial0/1
no ip address
shutdown
interface Serial0/2
ip address 193.168.0.14 255.255.255.252
ip nat outside
interface Serial0/3
no ip address
shutdown
router ospf 100
log-adjacency-changes
network 20.0.0.0 0.0.0.31 area 0
network 193.168.0.12 0.0.0.3 area 0
ip nat pool contorl 193.168.0.13 193.168.0.14 netmask 255.255.255.252
ip nat inside source list 1 pool contorl
ip classless
access-list 1 permit 20.0.0.0 0.0.0.31
access-list 10 deny any
Page 34
access-list 10 permit 20.0.0.32 0.0.0.31
line con 0
line vty 0 4
login
end
HDFC ROUTER:-
Router#sh run
Building configuration...
Current configuration : 929 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 67767
Page 35
ip address 194.168.0.5 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 78989
ip address 194.168.0.9 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.168.0.10 255.255.255.252
interface Serial0/3
ip address 194.168.0.1 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 192.168.0.8 0.0.0.3 area 0
network 194.168.0.0 0.0.0.3 area 0
network 194.168.0.4 0.0.0.3 area 0
network 194.168.0.8 0.0.0.3 area 0
ip classless
line con 0
line vty 0 4
login
end
ICICI ROUTER:-
Router#SH RUN
Building configuration...
Current configuration : 920 bytes
Page 36
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
ip address 194.168.0.21 255.255.255.252
clock rate 64000
interface Serial0/1
ip address 192.168.0.14 255.255.255.252
interface Serial0/2
ip address 194.168.0.13 255.255.255.252
clock rate 64000
interface Serial0/3
bandwidth 234445
ip address 194.168.0.17 255.255.255.252
Page 37
clock rate 64000
router ospf 100
log-adjacency-changes
network 192.168.0.12 0.0.0.3 area 0
network 194.168.0.12 0.0.0.3 area 0
network 194.168.0.16 0.0.0.3 area 0
network 194.168.0.20 0.0.0.3 area 0
ip classles
line con 0
line vty 0 4
login
end
SOUTH SERVER:-
SOUTHBANK#SH RUN
Building configuration...
Current configuration : 1266 bytes
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname SOUTHBANK
interface FastEthernet0/0
ip address 198.163.0.1 255.255.255.224
duplex auto
speed auto
interface FastEthernet0/1
Page 38
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 192.163.0.13 255.255.255.252
clock rate 64000
interface Serial0/0/1
bandwidth 6743876
ip address 192.163.0.9 255.255.255.252
clock rate 64000
interface Serial0/1/0
bandwidth 345356
ip address 192.163.0.1 255.255.255.252
clock rate 64000
interface Serial0/1/1
ip address 192.163.0.5 255.255.255.252
clock rate 64000
interface Serial0/2/0
no ip address
shutdown
!
interface Serial0/2/1
no ip address
shutdown
interface Serial0/3/0
Page 39
no ip address
shutdown
interface Serial0/3/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
router ospf 100
log-adjacency-changes
network 192.163.0.0 0.0.0.3 area 0
network 192.163.0.4 0.0.0.3 area 0
network 192.163.0.8 0.0.0.3 area 0
network 192.163.0.12 0.0.0.3 area 0
network 198.163.0.0 0.0.0.31 area 0
ip classless
no cdp run
line con 0
line vty 0 4
login
end
PNB SERVER :-
Router#sh run
Building configuration...
Current configuration : 993 bytes
version 12.2
Page 40
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 4534
ip address 122.168.0.5 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 7674
ip address 122.168.0.9 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.163.0.2 255.255.255.252
interface Serial0/3
bandwidth 766734
Page 41
ip address 122.168.0.1 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 122.168.0.0 0.0.0.3 area 0
network 122.168.0.4 0.0.0.3 area 0
network 122.168.0.8 0.0.0.3 area 0
network 192.163.0.0 0.0.0.3 area 0
network 12.168.0.12 0.0.0.3 area 0
ip classless
no cdp run
line con 0
line vty 0 4
login
end
SBI SERVER:-
SBIBANK#sh run
Building configuration...
Current configuration : 950 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname SBIBANK
Page 42
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0
bandwidth 43545
ip address 122.168.0.17 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 3454546
ip address 122.168.0.21 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.163.0.6 255.255.255.252
interface Serial0/3
ip address 122.168.0.13 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 122.168.0.12 0.0.0.3 area 0
Page 43
network 122.168.0.16 0.0.0.3 area 0
network 122.168.0.20 0.0.0.3 area 0
network 192.163.0.4 0.0.0.3 area 0
ip classless
no cdp run
line con 0
line vty 0 4
login
end
HDFC SERVER:-
HDFCBANK#sh run
Building configuration...
Current configuration : 966 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname HDFCBANK
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
interface FastEthernet0/1
no ip address
duplex auto
Page 44
speed auto
shutdown
interface Serial0/0
bandwidth 354435
ip address 122.122.0.1 255.255.255.252
clock rate 64000
interface Serial0/1
bandwidth 78433
ip address 122.122.0.5 255.255.255.252
clock rate 64000
interface Serial0/2
bandwidth 34566
ip address 192.163.0.10 255.255.255.252
interface Serial0/3
bandwidth 35455
ip address 122.122.0.9 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 122.122.0.0 0.0.0.3 area 0
network 122.122.0.4 0.0.0.3 area 0
network 122.122.0.8 0.0.0.3 area 0
network 192.163.0.8 0.0.0.3 area 0
ip classless
line con 0
line vty 0 4
Page 45
login
end
ICICI SERVER:-
ICICIBANK#SH RUN
Building configuration...
Current configuration : 954 bytes
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname ICICIBANK
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0
ip address 122.122.0.13 255.255.255.252
clock rate 64000
Page 46
interface Serial0/1
bandwidth 22345
ip address 122.122.0.17 255.255.255.252
clock rate 64000
interface Serial0/2
ip address 192.163.0.14 255.255.255.252
interface Serial0/3
bandwidth 6568778
ip address 122.122.0.21 255.255.255.252
clock rate 64000
router ospf 100
log-adjacency-changes
network 122.122.0.12 0.0.0.3 area 0
network 122.122.0.16 0.0.0.3 area 0
network 122.122.0.20 0.0.0.3 area 0
network 192.163.0.12 0.0.0.3 area 0
ip classlesS
no cdp
line con 0
line vty 0 4
login
end
Page 47
HTTP SERVER:-
-
Page 48
Chapter-14 RESULT
DNS SERVER:-
Page 49
FTP:-
TFTP:-
Page 50
WEB BROWSING:-
WEB BROWSING:-
Page 51
Page 52
COMMUNICATION BETWEEN TWO PC’S AND NAT TRANSLATION
PING TO PC WITHOUT NAT
Page 53
DHCP IP ADDRESS:-
Page 54
DESCRIPTION:
The aim of this system is to overcome the lacking of the manual system. All branches
of the Bank situated at District level provide the Banking services to customers and had to
send report to the central branch manually, which sometimes create problem to get up-to-
date information rapidly. But now through this system whenever any transaction will be
taking place it will store in the central database and authorized person can get necessary
information or report when they get into the system from any branches through Wide Area
Network (WAN). Routers are generally known as intermediate systems, which operates at
the network layer of the OSI reference model, routers are devices used to connect two or
more networks (IP networks) or a LAN to the Internet. A router acts as a packet filter when it
forwards or denies packets according to filtering rules. As a Layer 3 device, a packet-filtering
router uses rules to determine whether to permit or deny traffic based on source and
destination IP addresses, source port and destination port, and the protocol of the packet.
These rules are defined using access control lists or ACLs. Banking system in India all
banks has an IT department. IT department solution all
type of IT problem and serve the core network. IT creates
a core network diagram. This diagram involves all type of
useable network mechanism (Switch, Router, Firewall,
Server) etc. Simulation is the most important of any
system. An accurate system design, accurate performance
and accurate Simulation give best performance of a
system. Now we discuss and simulate the OSPF protocol.
Open Shortest Path First (OSPF) is a routing protocol
developed for Internet Protocol (IP) networks by the
interior gateway protocol (IGP) working group of the
Internet Engineering Task Force (IETF).
Page 55
Chapter -15 SUMMARY STEP WORK DESCRIPTION
Now a days, technological development, and automated system development is more
essential and crying need for the expansion of banking services because They will need less
employers by using automated system. On top of that Security is a major issue regarding
banking issues. With this system network will be more easy to handle and it will route the
data in a shortest path in a vast distributed system. In future we will try to implement it in
real life so that banks can use it and get benefited from this project.
Future Work:
 Add time based transmission.
 Security system will be upgraded .
 Make the project more user friendly.
 Real life implementation.
Limitations :
 The main Limitation is to implement the project in real world . Because we only
simulate it via packet tracer.
 Due to less time and work pressure we could not add more features which could make
the project more useful.
Page 56
Chapter-16 CONCLUSION
Computer Networks by Tanenbaum
All about Computer Network By Manohar Lodia
Data communication By Ferozon
www.cisco.com
www.education.umd.edu/EDMS/mislevy/CiscoPapers/DPs_for_Learning.pdf
www.packettracernetwork.com
www.weikipedia.com
www.routeralley.com
www.networkessential.com
www.google.com
Page 57
Chapter-17 REFRENCES
THANKS
@@@@@@@@@@@@@@@@@@
Page 58

More Related Content

What's hot

Routing ppt
Routing pptRouting ppt
Routing ppt
ArpiSaxena1
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
AYESHA JAVED
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
Hasibul Islam Nirob
 
transport layer
transport layer transport layer
transport layer
usman19
 
acl configuration
acl configurationacl configuration
acl configuration
RandyDookheran1
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
rajshreemuthiah
 
Vlsm
VlsmVlsm
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
Abdelkhalik Mosa
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
Kanishk Raj
 
Configuration of mail server on cisco packet tracer
Configuration of mail server on cisco packet tracer Configuration of mail server on cisco packet tracer
Configuration of mail server on cisco packet tracer
TanjilurRahman6
 
TCP/ IP
TCP/ IP TCP/ IP
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
Hitesh Mohapatra
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
Bisrat Girma
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Ip addressing
Ip addressingIp addressing
Ip addressing
sid1322
 

What's hot (20)

Subnetting
SubnettingSubnetting
Subnetting
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
 
transport layer
transport layer transport layer
transport layer
 
acl configuration
acl configurationacl configuration
acl configuration
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Vlsm
VlsmVlsm
Vlsm
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
 
Configuration of mail server on cisco packet tracer
Configuration of mail server on cisco packet tracer Configuration of mail server on cisco packet tracer
Configuration of mail server on cisco packet tracer
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Data link layer
Data link layer Data link layer
Data link layer
 
Cis82 e2-1-packet forwarding
Cis82 e2-1-packet forwardingCis82 e2-1-packet forwarding
Cis82 e2-1-packet forwarding
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

Viewers also liked

Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
The New Age Of Atm Concept
The New Age Of Atm ConceptThe New Age Of Atm Concept
The New Age Of Atm Conceptdorami
 
Datawarehouse Overview
Datawarehouse OverviewDatawarehouse Overview
Datawarehouse Overviewashok kumar
 
How Restaurants Obtain Feedback
How Restaurants Obtain FeedbackHow Restaurants Obtain Feedback
How Restaurants Obtain Feedback
SamanthaBendernagel
 
Natalie Pate Profile
Natalie Pate ProfileNatalie Pate Profile
Natalie Pate ProfileSarah Haghi
 
S4 tarea4 hemoa
S4 tarea4 hemoaS4 tarea4 hemoa
S4 tarea4 hemoa
Adry Hernández
 
S4 tarea4 hemoa
S4 tarea4 hemoaS4 tarea4 hemoa
S4 tarea4 hemoa
Adry Hernández
 
Mep Magazine Sept 2016 featuring DC PRO Engineering
Mep Magazine Sept 2016 featuring DC PRO EngineeringMep Magazine Sept 2016 featuring DC PRO Engineering
Mep Magazine Sept 2016 featuring DC PRO Engineering
George Berbari
 
La cultura y la identidad del mexicano en
La cultura y la identidad del mexicano enLa cultura y la identidad del mexicano en
La cultura y la identidad del mexicano en
carlos alberto martinez piedra
 
Web 2
Web 2Web 2
Delitos informaticos
Delitos informaticosDelitos informaticos
Delitos informaticos
Juank Cadena
 
Planificador maria eugenia
Planificador maria eugeniaPlanificador maria eugenia
Planificador maria eugenia
Maria Eugenia Colonia
 
Trabajo del blog
Trabajo del blogTrabajo del blog
Trabajo del blog
Teresita Carranza Perez
 
cis_sti2009_lessons_globalization-model-un-simulation
cis_sti2009_lessons_globalization-model-un-simulationcis_sti2009_lessons_globalization-model-un-simulation
cis_sti2009_lessons_globalization-model-un-simulationLauren Vander Pluym
 
Presentazione Concorso Mutimediale 3D
Presentazione Concorso Mutimediale 3DPresentazione Concorso Mutimediale 3D
Presentazione Concorso Mutimediale 3D
Giulia Rubeis
 

Viewers also liked (16)

Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
The New Age Of Atm Concept
The New Age Of Atm ConceptThe New Age Of Atm Concept
The New Age Of Atm Concept
 
Datawarehouse Overview
Datawarehouse OverviewDatawarehouse Overview
Datawarehouse Overview
 
Core Banking
Core BankingCore Banking
Core Banking
 
How Restaurants Obtain Feedback
How Restaurants Obtain FeedbackHow Restaurants Obtain Feedback
How Restaurants Obtain Feedback
 
Natalie Pate Profile
Natalie Pate ProfileNatalie Pate Profile
Natalie Pate Profile
 
S4 tarea4 hemoa
S4 tarea4 hemoaS4 tarea4 hemoa
S4 tarea4 hemoa
 
S4 tarea4 hemoa
S4 tarea4 hemoaS4 tarea4 hemoa
S4 tarea4 hemoa
 
Mep Magazine Sept 2016 featuring DC PRO Engineering
Mep Magazine Sept 2016 featuring DC PRO EngineeringMep Magazine Sept 2016 featuring DC PRO Engineering
Mep Magazine Sept 2016 featuring DC PRO Engineering
 
La cultura y la identidad del mexicano en
La cultura y la identidad del mexicano enLa cultura y la identidad del mexicano en
La cultura y la identidad del mexicano en
 
Web 2
Web 2Web 2
Web 2
 
Delitos informaticos
Delitos informaticosDelitos informaticos
Delitos informaticos
 
Planificador maria eugenia
Planificador maria eugeniaPlanificador maria eugenia
Planificador maria eugenia
 
Trabajo del blog
Trabajo del blogTrabajo del blog
Trabajo del blog
 
cis_sti2009_lessons_globalization-model-un-simulation
cis_sti2009_lessons_globalization-model-un-simulationcis_sti2009_lessons_globalization-model-un-simulation
cis_sti2009_lessons_globalization-model-un-simulation
 
Presentazione Concorso Mutimediale 3D
Presentazione Concorso Mutimediale 3DPresentazione Concorso Mutimediale 3D
Presentazione Concorso Mutimediale 3D
 

Similar to Banking and ATM networking reports

En35793797
En35793797En35793797
En35793797
IJERA Editor
 
THESIS.pptx
THESIS.pptxTHESIS.pptx
THESIS.pptx
abderrazzakch
 
Final project report
Final project reportFinal project report
Final project report
RaziaSultanaHimu
 
Bcc network connection
Bcc network connectionBcc network connection
Bcc network connection
MDMusab
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
ITExamAnswers.net
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
MDMusab
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
PhiliphaHaldline
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
ssuserf7cd2b
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
aciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
aciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
aciijournal
 
Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
Juan Carlos Banegas
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
Motty Ben Atia
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
NowrinJahanSiam
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
Sumit K Das
 

Similar to Banking and ATM networking reports (20)

En35793797
En35793797En35793797
En35793797
 
THESIS.pptx
THESIS.pptxTHESIS.pptx
THESIS.pptx
 
Final project report
Final project reportFinal project report
Final project report
 
Bcc network connection
Bcc network connectionBcc network connection
Bcc network connection
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
Comprehensive AAP
Comprehensive AAPComprehensive AAP
Comprehensive AAP
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
 

Recently uploaded

ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Banking and ATM networking reports

  • 1. Cisco Network Academy validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2), VLANs, Ethernet, access control lists (ACLs). 1.1 SOFTWARE USED: PACKET TRACER VER 6.2.0.005 Cisco Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask “what if” questions. As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts. Packet Tracer supplements physical equipment in the classroom by allowing students to create a network with an almost unlimited number of devices, encouraging practice, discovery, and troubleshooting. The simulation based learning environment helps students develop 21st century skills such as decision making, creative and critical thinking, and problem solving. Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run on Mac OS, Linux and Microsoft Windows. A similar Android app is also available. Packet Tracer allows users to create simulated network topologies by dragging and dropping routers, switches and various other types of network devices. A physical connection between devices is represented by a "cable" item. Packet Tracer supports an array of simulated Application Layer protocols, as well as basic routing with RIP, OSPF, EIGRP, BDP, to the extents required by the current CCNA curriculum. As of version 6.2, Packet Tracer also supports the Border Gateway Protocol, even though; this protocol is not taught in the CCNA curriculum. As of version 6.2, Packet Tracer supports an embedded web server with JavaScript and CSS support. The command line can be used for creating a router-to-pc connection. Version 6.1.1 Page 1 Chapter-1 ABOUT THE TECHNOLOGY
  • 2. added support for various DHCP, EIGRP and OSPF commands, improved support for Zone- Based Firewall policies. Version 6.0 added support for IOS version 15 and Hot Standby Routing Protocol. 1.2 Packet Tracer Features: • Logical and Physical Workspaces • Real-Time and Simulation Modes • User friendly CLI • Global event list (packet sniffer) • LAN, switching, TCP/IP, routing, and WAN protocols • Activity Wizard, Lab grading • Multiple platform support Page 2
  • 3. An ideal Bank Networking system will be fully network base and easy with friendly user interface staff task management system where any banking system manage their networking system somehow Head office , Branch Office, and other office are maintain LAN, MAN, WAN, VLAN, VLSM,VPN and some branch are maintain by manageable switch. LAN is used by Local Area Networking system for example one office and a one building. And MAN are using by the Metro Politian area Network for Example small town, and WAN are use by the WIDE AREA NETWORK. In this networking system are used by all banking users can use by shared their data very easily. So that every user use to take about Network Structure & Security of Banking System instantly this way anywhere. 2.1 Objectives 1. To design and simulate a banking network system which is secure. 2. To simulate a banking network system that will easily manage any banking task. 3. To manage the banking network by a central system 2.3 Justification of study: The trend of growth of Online Banking brings many security issues and increasing cost of implementing higher security system for both Online Banking users and the banks. Classers said security is all about risks and associated cost in his paper .The most critical issue of Online Banking security is to protect valuable information that is susceptible to unauthorized access by attackers. Hence, the banks must constantly increase security. At the same time, the banks must manage costs to make a profit. In contrast, increasing security is increasing the cost for attackers to break into the system, and increasing the punishment that the attackers may suffer. Hence the Internet criminals/attackers/crackers may lose motivation for hacking a high security online banking system. 2.4 Scopes of study The scope of the Network Structure & Security of Banking System includes. 1. Online based day to day transmission. 2. Save time and cost because of day to day transmission. 3. Established relation between one branch to another 4. Connect all branches to head branch in same network. 5. Online based update and maintain everyday work. The following case study is used to illustrate the process and documentation required for a network design. This case study presents a scenario in which the Banks & ATM has hired a Network Consultant Group to design their network. In order to help organization this project, the scenario has been broken into eight phases listing requirements for each phase. Page 3 Chapter-2 INTRODUCTION
  • 4. A worksheet is to be completed for each part. A formal report, similar to what would be given to the banks, will need to be created after all tasks have been completed. This case study requires that you accomplish the following: 1. Use the resources provided, diagram and narrative, to set up the physical network. 2. Set up an IP sub-netting scheme 3. Configure the routers as required. 4. Set up and configure the switches and VLANS as required. 5. Verify and troubleshoot all connections. 6. Provide detailed documentation in the appropriate format. 7. Provide a written final report Page 4
  • 5. The Banks & ATM has provided a partially completed logical diagram of the required network. The company has also provided networking equipment for development and demonstration. • The company consists of 3 remote locations. One being the main building and other two locations on a remote site. • The main building consists of 6 departments with the following requirement: Department Number Remarks BANKS 120 Size can vary up to 255 ATM 120 Size can vary up to 255 CONTYROL 120 Size can vary up to 255 • 8 servers that distributed in all locations • The following ip address to be used for connection with SERVER • 198.168.0.1 • 198.168.0.2 • 198.168.0.3 • 198.168.0.4 • 198.168.0.5 • 198.168.0.6 • 198.168.0.7 • 198.163.0.1 • 198.163.0.2 • 198.163.0.3 • 198.163.0.4 • 198.163.0.5 • 198.163.0.6 • 198.163.0.7 Page 5 Chapter-3 REQUIREMENTS
  • 6. 3.1 Following address are used for internal addressing. • 10.0.0.0 • 20.0.0.0 • 30.0.0.0 • 40.0.0.0 • 11.0.0.0 • 21.0.0.0 • 31.0.0.0 • 41.0.0.0 • Use VLSM for IP addressing. • Device details DEVICE MODEL NUMBER Router 2811 4 Switches 2960 10 Server - 11 Page 6
  • 10. An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. Address Classes There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address. · Class A addresses begin with 0xxx, or 1 to 126 decimal. · Class B addresses begin with 10xx, or 128 to 191 decimal. · Class C addresses begin with 110x, or 192 to 223 decimal. · Class D addresses begin with 1110, or 224 to 239 decimal. · Class E addresses begin with 1111, or 240 to 254 decimal. Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. Subnetting Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive. Subnet Masking Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number. DHCP The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating the configuration of computers that use TCP/IP. DHCP can be used to automatically assign IP addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and default router, and to provide other configuration information such as the addresses for printer, time and news servers. Page 10 Chapter-5 IP ADDRESSING
  • 11. NOTE: • Overlapping subnets in sales, marketing department etc is note done as more hosts can be accommodated in the given domain whenever required • All devices are assigned ip address using DHCP Page 11 Number of host addresses required Network Address Subnet Mask Max Number of Hosts Possible In Use (Yes/No) Network Name 30 10.0.0.0 /27 30 Yes PNB Control 60 10.0.0.32 /26 30 Yes PNB Bank 6 10.0.0.66 /29 30 Yes PNB ATM 30 20.0.0.0 /27 30 Yes SBI Control 25 20.0.0.32 /24 30 Yes SBI Bank 24 20.0.0.64 /24 30 Yes SBI ATM 20 30.0.0.0 /24 30 Yes HDFC control 30 30.0.0.32 /27 30 Yes HDFC BANK 30 30.0.0.64 /27 30 Yes HDFC ATM 255 40.0.0.0 /27 30 Yes ICICI Bank Chapter-6 INTERNAL IP ADDRESSING Chapter-7 SERVER ADDRESSING
  • 12. SERVER IP ADDRESS LOCATION DNS 198.168.0.6 CENTER HTTP 198.168.0.2 HTTP 198.168.0.3 CENTER HTTP 198.168.0.4 CENTER HTTP 198.168.0.5 CENTER FTP 198.168.0.7 CENTER TFTP 198.168.0.8 CENTER HTTP 198.163.0.2 CENTER HTTP 198.163.0.3 HTTP 198.163.0.4 CENTER HTTP 198.163.0.5 CENTER DNS 198.163.0.6 CENTER TFTP 198.163.0.7 CENTER 7.1 Router Configuration: NORTH BANKING ROUTER (DCE Speed 64000) PNB ROUTER (DTE) Page 12 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask S0/3/0 Link to PNB 192.168.0.0 192.168.0.1 /30 S0/3/1 Link to SBI 192.168.0.4 192.168.0.5 /30 Se0/0/0 Link to HDFC 192.168.0.8 192.168.0.9 /30 Se0/1/0 Link to ICICI 192.168.0.12 192.168.0.13 /30 Fa0/0 Link to servers 198.168.0.0 198.168.0.1 /30
  • 13. BANK ROUTER (DTE) CONTROL ROUTER (DTE) ATM ROUTER (DTE) SBI ROUTER (DTE) Page 13 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/1 Link To Bank 193.168.0.32 193.168.0.33 /27 Se0/2 Link to north banking 192.168.0.0 192.168.0.2 /30 Se0/3 Link to Contorl 193.168.0.0 193.168.0.1 /27 Se0/0 Link to ATM 193.168.0.65 193.168.0.65 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 193.168.0.4 193.168.0.6 /30 Fa0/0 Link to Switch 10.0.0.32 10.0.0.1 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 193.168.0.0 193.168.0.1 /30 Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 193.168.0.8 193.168.0.9 /30 Fa0/0 Link to Switch 10.0.0.64 10.0.0.65 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask S0/2 Link to North bank 192.168.0.4 192.168.0.5 /30 Se0/3 Link to Bank 193.168.0.12 193.168.0.13 /27 Se0/1 Link to Control 193.168.0.16 193.168.0.17 /27 Se0/0 Link to Atm 192.168.0.20 193.168.0.21 /27
  • 14. CONTROL ROUTER (DTE) BANK ROUTER (DTE) ATM ROUTER (DTE) HDFC ROUTER (DTE) CONTROL ROUTER (DTE) BANK ROUTER (DTE) Page 14 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to SBI 193.168.0.12 193.168.0.13 /30 Fa0/0 Link to Switch 20.0.0.0 20.0.0.1 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to SBI 193.168.0.16 193.168.0.17 /30 Fa0/0 Link to Switch 20.0.0.32 20.0.0.33 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to SBI 193.168.0.20 193.168.0.21 /30 Fa0/0 Link to Switch 20.0.0.64 20.0.0.65 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask S0/2 Link to North bank 192.168.0.8 192.168.0.9 /30 Se0/3 Link to Bank 194.168.0.0 194.168.0.1 /27 Se0/1 Link to Control 194.168.0.4 194.168.0.5 /27 Se0/0 Link to Atm 194.168.0.8 194.168.0.9 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to HDFC 194.168.0.0 194.168.0.1 /30 Fa0/0 Link to Switch 30.0.0.0 30.0.0.1 /27
  • 15. ATM ROUTER (DTE) ICICI ROUTER (DTE) CONTROL ROUTER (DTE) BANK ROUTER (DTE) Page 15 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 193.168.0.4 194.168.0.5 /30 Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 194.168.0. 194.168.0.5 /30 Fa0/0 Link to Switch 10.0.0.0 10.0.0.1 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask S0/2 Link to North bank 192.168.0.8 192.168.0.5 /30 Se0/3 Link to Bank 194.168.0.12 193.168.0.13 /27 Se0/1 Link to Control 194.168.0.16 193.168.0.17 /27 Se0/0 Link to Atm 194.168.0.20 193.168.0.21 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to HDFC 194.168.0.12 194.168.0.13 /30 Fa0/0 Link to Switch 40.0.0.0 30.0.0.1 /27
  • 16. ATM ROUTER (DTE) SOUTH BANKING ( DCE Speed 64000) PNB ROUTER (DTE) Page 16 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 194.168.0.4 194.168.0.5 /30 Fa0/0 Link to Switch 40.0.0.32 40.0.0.33 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 194.168.0.20 194.168.0.21 /30 Fa0/0 Link to Switch 40.0.0.64 40.0.0.65 /27 Interface/SubInterface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask S0/1/1 Link to SBI 192.163.0.4 192.163.0.5 /30 SE0/1/0 Link to PNB 192.163.0.0 192.163.0.1 /30 SE0/0/0 Link to HDFC 192.163.0.8 192.163.0.8 /30 SE0/3/0 Link to ICICI 192.163.0.12 192.163.0.13 /30 SE0/3/1 Link to Server 198.163.0.0 198.163.0.1 /30
  • 17. BANK ROUTER (DTE) CONTROL ROUTER (DTE) ATM ROUTER (DTE) SBI ROUTER (DTE) Page 17 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/1 Link To Control 122.168.0.32 122.168.0.33 /27 Se0/2 Link to South banking 192.16.0.0 192.168.0.2 /30 Se0/3 Link to Bnak 122.168.0.0 122.168.0.1 /27 Se0/0 Link to ATM 122.168.0.64 12.168.0.65 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/0 Link to PNB 122.168.0.0 122.168.0.2 /30 Fa0/0 Link to Switch 11.0.0.32 11.0.0.33 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 122.168.0.64 122.168.0.65 /30 Fa0/0 Link to Switch 11.0.0.64 11.0.0.65 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 122.168.0.0 122.168.0.1 /30 Fa0/0 Link to Switch 11.0.0.0 11.0.0.0 /27
  • 18. CONTROL ROUTER (DTE) BANK ROUTER (DTE) ATM ROUTER (DTE) HDFC ROUTER (DTE) CONTROL ROUTER (DTE) Page 18 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask S0/2 Link to South bank 192.163.0.4 192.163.0.6 /30 Se0/3 Link to Bank 122.168.0.14 122.168.0.12 /27 Se0/1 Link to Control 122.168.0.16 122.168.0.17 /27 Se0/0 Link to Atm 122.168.0.20 122.168.0.21 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to SBI 122.168.0.12 122.168.0.13 /30 Fa0/0 Link to Switch 21.0.0.32 21.0.0.33 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to SBI 122.168.0.16 122.168.0.17 /30 Fa0/0 Link to Switch 21.0.0.0 21.0.0.1 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to SBI 122.168.0.20 122.168.0.21 /30 Fa0/0 Link to Switch 21.0.0.64 21.0.0.65 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask S0/2 Link to South bank 192.163.0.8 192.163.0.9 /30 Se0/3 Link to Bank 122.122.0.0 122.122.0.1 /27 Se0/1 Link to Control 122.122.0.4 122.122.0.5 /27 Se0/0 Link to Atm 122.122.0.8 122.122.0.9 /27
  • 19. BANK ROUTER (DTE) ATM ROUTER (DTE) ICICI ROUTER (DTE) CONTROL ROUTER (DTE) BANK ROUTER (DTE) Page 19 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to HDFC 122.122.0.4 122.122.0.5 /30 Fa0/0 Link to Switch 31.0.0.4 31.0.0.5 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 122.122.0.0 122.122.0.1 /30 Fa0/0 Link to Switch 31.0.0.0 31.0.0.1 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 122.122.0.8 122.122.0.9 /30 Fa0/0 Link to Switch 31.0.0.64 31.0.0.65 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask S0/2 Link to North bank 122.122.012 122.122.0.13 /30 Se0/3 Link to Bank 122.122.0.20 122.122.0.21 /27 Se0/1 Link to Control 122.122.0.16 122.122.0.17 /27 Se0/0 Link to Atm 122.122.0.12 122.122.0.13 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to HDFC 122.122.0.16 122.122.0.17 /30 Fa0/0 Link to Switch 41.0.0.32 41.0.0.33 /27
  • 20. ATM ROUTER (DTE) Page 20 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 122.122.0.12 122.122.13 /30 Fa0/0 Link to Switch 41.0.0.0 41.0.0.1 /27 Interface/Sub Interface Type/Number Description and Purpose Network Number Interface IP address Subnet Mask SE0/2 Link to PNB 122.122.0.20 122.122.0.21 /30 Fa0/0 Link to Switch 41.0.0.64 41.0.0.65 /27
  • 21. Routing is the act of moving information across an internetwork from a source to a destination. Routing involves two basic activities: determining optimal routing paths and transporting information groups (typically called packets) through an internetwork. Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard of measurement, such as path bandwidth, that is used by routing algorithms to determine the optimal path to a destination. To aid the process of path determination, routing algorithms initialize and maintain routing tables, which contain route information. Route information varies depending on the routing algorithm used. Routing algorithms fill routing tables with a variety of information. Destination/next hop associations tell a router that a particular destination can be reached optimally by sending the packet to a particular router representing the "next hop" on the way to the final destination. When a router receives an incoming packet, it checks the destination address and attempts to associate this address with a next hop. Routing algorithms often have one or more of the following design goals: • Optimality • Simplicity and low overhead • Robustness and stability • Rapid convergence • Flexibility 8.1 Types of routing: 8.1.1 STATIC ROUTING ALGORITHMS are hardly algorithms at all, but are table mappings established by the network administrator before the beginning of routing. These mappings do not change unless the network administrator alters them. Algorithms that use static routes are simple to design and work well in environments where network traffic is relatively predictable and where network design is relatively simple. 8.1.2 DYNAMIC ROUTING ALGORITHMS which adjust to changing network circumstances by analyzing incoming routing update messages. If the message indicates that a network change has occurred, the routing software recalculates routes and sends out new routing update messages. These messages permeate the network, stimulating routers to rerun their algorithms and change their routing tables accordingly. Page 21 Chapter-8 ROUTING PROTOCOL
  • 22. 8.2 The various routing protocol that can be used are: 1. RIP (routing information protocol) is a distance vector routing protocol. It sends complete routing table out to all other members in an interval of 30 seconds. It uses hop count as a metric and by default hop count is set to 15. RIP Configuration: The command syntax is as follows: Router (config) #router rip Router (config-router) #network network-number net-mask 2. IGRP is a distance vector Interior Gateway Protocol (IGP). IGRP uses a composite metric that is calculated by factoring weighted mathematical values for internetwork delay, bandwidth, reliability, and load. Network administrators can set the weighting factors for each of these metrics, although great care should be taken before any default values are manipulated. IGRP Configuration: To configure the IGRP routing process use the router igrp configuration command. The command syntax is as follows: Router A (config) #router igrp as-number Router A (config) #network network-number net-mask There as number identifies the IGRP process. To specify a list of networks for IGRP routing process, se the network router configuration command. To remove an entry, use the no form of the command. 3. EIGRP Key capabilities that distinguish EIGRP from other routing protocols include fast convergence, support for variable-length subnet mask, support for partial updates, and support for multiple network layer protocols. A router running EIGRP stores all its neighbors' routing tables so that it can quickly adapt to alternate routes. If no appropriate route exists, EIGRP queries its neighbors to discover an alternate route. EIGRP does not make periodic updates. Instead, it sends partial updates only when the metric for a route changes. EIGRP Configuration: EIGRP is an ideal choice for large, multi-protocol networks built primary on Cisco routers. RouterA(Config)#router eigrp as-number RouterA(Config)#network network-number net-mask. 4. OSPF is a link-state routing protocol that calls for the sending of link-state advertisements (LSAs) to all other routers within the same hierarchical area. Information on attached interfaces, metrics used, and other variables is included in OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF algorithm to calculate the shortest path to each node. Page 22
  • 23. OSPF Configuration: To enable OSPF routing, use the global configuration command syntax: Router (configure) #router ospf process-id Router (configure-router) #network address wildcard-mask area area-id. Our configuration *****OSPF protocol in all routers with process id 10 in single area 0***** Page 23 Routing Protocol Property 1 Supports VLSM Property 2 Scalable Property 3 Uses multicast updates Property 4 Has view of complete toplology Property 5 Easy to configure Property 6 Proprietary Total RIP V1 - - - - - - 2 RIP v2 - - - - - - 4 IGRP - - - - - - 2 EIGRP - - - - - - 3 OSPF + + + + - + 5
  • 24. Now it’s making peoples life very easy as they get their money when they need. So, they do not need to carry either big amount of money or the checked book all the time. To get rid from this burden they need to deposit money in the bank by opening an account and then the bank will be given a Card i.e. an ATM card with a PIN number to them. By using that they can withdraw money from any ATM machine of that bank. When they insert the card in the machine and the PIN number the machine will show few instructions on the screen. By that time verification (PIN Number and Account Number) will be done with the main bank computer as they are connected. If the verification is correct then the user will choose an instruction and the ATM will dispense money to the card holder. 9.1 Internal Structure of ATM In the following pictures we have the internal structure of two different type of ATM machine. And also it can be divided into two different parts: - Upper Unit, -Lower Unit 9.2 Interactive components of ATM Card Reader: Customer inserts their card in it when there is written “Please Insert Your card” on the screen.  Keypad: Use for PIN code input, choices, amount of money etc as the input to The ATM machine.  Display Screen: This screen shows all the instructions or options for the customers „convenience.  Screen Buttons: When options are given on the screen one user can choose any of the options accordingly by the use of button on left or right side of the screen. These buttons select the option from the screen.  Cash Dispenser: Withdrawal money is given by this slot. Deposit Slot: To deposit money this slot is use.  Speaker: Speaker provides the facilities to the customer by giving auditory feedback. ATM Card: ATM card is also like magnetic strip card. It is also a data carrier which electronically reads and writes data. ATM cards mainly a debit card. Ways of Transaction: In Bank transactions are divided into three main categories  My bank to others bank A customer of a bank uses other banks ATM.  Others bank to my bank other banks customer uses ATM of Bank Asia.  My bank to my bank a customer uses its own bank ATM machine. Page 24 Chapter-9 Automated Teller Machine:
  • 25. Security is most important part for online banking system. We use the different method for provide strong online banking security system and use owasp top ten project provide online banking security. Ensuring comprehensive network security visibility is no easy task. Uncover expert tips on how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions, and anomaly-based monitoring technology. 10.1 AUTHENTICATION MECHANISM : Authentication is the process of establishing whether a client is who or what it claims to be in a particular context. A client can be an end user, a machine, or an application. The authentication mechanism is responsible for creating a credential, which is an internal product representation of a successfully authenticated client user. The abilities of the credential are determined by the configured authentication mechanism. 10.2 Challenge handshake Authentication Protocol (Chap): CHAP is an authentication scheme used by point to point servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable challenge-value. CHAP requires that the client make the secrete available in in plaintext form. 10.3 ACCESS CONTROL LIST (ACL): ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.  ACLs can be created for all routed network protocols such as IP and Internet  Packet Exchange (IPX).  ACLs can be configured at the router to control access to a network or subnet.  To filter network traffic, ACLs determine if routed packets are forwarded or blocked at the router interfaces. Page 25 Chapter-10 SECURITY
  • 26. 10.4 ACLs can be used to perform the following task  Limited network traffic and increase network performance  Provide traffic follow control  Provide a basic level of security for network access.  Decide which types of traffic are forwarded or blocked at the router interfaces.  Control which areas a client can access on a network.  Script hosts to permit or deny access to a network. Page 26
  • 27. . VLAN is a switched network that is logically segmented by functions, project teams, or applications. Without regard to the physical location of users. For example, several end stations might be grouped as a department, such as engineering or accounting. When the end stations are physically located close to one another, you can group them into a LAN segment. If any of the end stations are in different buildings (not the same physical LAN segment), you can then group them into a VLAN. We can assign each switch port to a VLAN. Ports in a VLAN share broadcast traffic. Ports that do not belong to that VLAN do not share the broadcast traffic. VLANs provide the following features: • Simplification of end-station moves, adds, and changes When an end station is physically moved to a new location, its attributes can be reassigned from a network management station through Simple Network Management Protocol (SNMP) or through the user interface menus. When an end station is moved within the same VLAN, it retains its previously assigned attributes in its new location. When an end station is moved to a different VLAN, the attributes of the new VLAN are applied to the end station. • Controlled traffic activity VLANs allow ports on the same or different switches to be grouped so that traffic is confined to members of only that group. This feature restricts broadcast, unicast, and multicast traffic (flooding) only to ports included in a certain VLAN. The management domain is a group of VLANs that are managed by a single administrative authority. • Workgroup and network security You can increase security by segmenting the network into distinct broadcast domains. To this end, VLANs can restrict the number of users in a broadcast domain. You can also control the size and composition of the broadcast domain by controlling the size and composition of a VLAN. Page 27 Chapter-11 VLAN
  • 28. NAT allows an Internet Protocol (IP) network to maintain public IP addresses separately from private IP addresses. NAT is a popular technology for Internet connection sharing. It is also sometimes used in server load balancing applications on corporate networks. In its most common configuration, NAT maps all of the private IP addresses on a home network to the single IP address supplied by an Internet Service Provider (ISP). This allows computers on the home LAN to share a single Internet connection. Additionally, it enhances home network security by limiting the access of external computers into the home IP network space. NAT works by snooping both incoming and outgoing IP datagrams. As needed, it modifies the source or destination address in the IP header (and the affected checksums) to reflect the configured address mapping. NAT technically supports either fixed or dynamic mappings of one or more internal and external IP addresses. Network Address Translation allows a single device, such as a router, to act as agent between the Internet (or "public network") and a local (or "private") network. This means that only a single unique IP address is required to represent an entire group of computers to anything outside their network. The shortage of IP addresses is only one reason to use NAT. Two other good reasons are: • Security • Administration Page 28 Chapter-12 NETWORK ADDRESS TRANSLATION (NAT)
  • 29. North BANKING:- Rou Router#sh run Building configuration... Current configuration : 1317 bytes version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption interface FastEthernet0/0 ip address 198.168.0.1 255.255.255.224 duplex au to speed auto interface FastEthernet0/1 no ip address duplex auto speed auto shutdown interface Serial0/0/0 no ip address shutdown interface Serial0/0/1 Page 29 Chapter-13 DEVICE CONFIGURATION
  • 30. no ip address shutdown interface Serial0/1/0 bandwidth 325435 ip address 192.168.0.9 255.255.255.252 clock rate 64000 interface Serial0/1/1 bandwidth 325435 ip address 192.168.0.13 255.255.255.252 clock rate 64000 interface Serial0/2/0 no ip address shutdown interface Serial0/2/1 no ip address shutdown interface Serial0/3/0 bandwidth 4545 ip address 192.168.0.1 255.255.255.252 clock rate 64000 ! interface Serial0/3/1 bandwidth 4545 ip address 192.168.0.5 255.255.255.252 clock rate 64000 ! Page 30
  • 31. interface Vlan1 no ip address shutdown router ospf 100 log-adjacency-changes network 192.168.0.0 0.0.0.3 area 0 network 192.168.0.4 0.0.0.3 area 0 network 192.168.0.8 0.0.0.3 area 0 network 192.168.0.12 0.0.0.3 area 0 network 198.168.0.0 0.0.0.3 area 0 network 198.168.0.0 0.0.0.31 area 0 ip classless line con 0 line vty 0 4 login end ters PNB SERVER:- Router#SH run Building configuration... Current configuration : 894 bytes version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname Router Page 31
  • 32. interface FastEthernet0/0 no ip address duplex auto speed auto shutdown interface FastEthernet0/1 no ip address duplex auto speed auto shutdown interface Serial0/0 ip address 193.168.0.5 255.255.255.252 clock rate 64000 interface Serial0/1 ip address 193.168.0.9 255.255.255.252 clock rate 64000 interface Serial0/2 ip address 192.168.0.2 255.255.255.252 interface Serial0/3 ip address 193.168.0.1 255.255.255.252 clock rate 64000 router ospf 100 log-adjacency-changes network 192.168.0.0 0.0.0.3 area 0 network 193.168.0.0 0.0.0.3 area 0 network 193.168.0.4 0.0.0.3 area 0 Page 32
  • 33. network 193.168.0.8 0.0.0.3 area 0 ip classless line con 0 line vty 0 4 login end SBI SERVER:- Router#Sh run Building configuration... Current configuration : 1116 bytes version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname Router ip dhcp excluded-address 20.0.0.1 ip dhcp pool abc2 network 20.0.0.0 255.255.255.224 default-router 20.0.0.1 dns-server 198.168.0.6 interface FastEthernet0/0 ip address 20.0.0.1 255.255.255.224 ip nat inside duplex auto speed auto interface FastEthernet0/1 Page 33
  • 34. no ip address duplex auto speed auto shutdown interface Serial0/0 no ip address shutdown interface Serial0/1 no ip address shutdown interface Serial0/2 ip address 193.168.0.14 255.255.255.252 ip nat outside interface Serial0/3 no ip address shutdown router ospf 100 log-adjacency-changes network 20.0.0.0 0.0.0.31 area 0 network 193.168.0.12 0.0.0.3 area 0 ip nat pool contorl 193.168.0.13 193.168.0.14 netmask 255.255.255.252 ip nat inside source list 1 pool contorl ip classless access-list 1 permit 20.0.0.0 0.0.0.31 access-list 10 deny any Page 34
  • 35. access-list 10 permit 20.0.0.32 0.0.0.31 line con 0 line vty 0 4 login end HDFC ROUTER:- Router#sh run Building configuration... Current configuration : 929 bytes version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname Router interface FastEthernet0/0 no ip address duplex auto speed auto shutdown interface FastEthernet0/1 no ip address duplex auto speed auto shutdown interface Serial0/0 bandwidth 67767 Page 35
  • 36. ip address 194.168.0.5 255.255.255.252 clock rate 64000 interface Serial0/1 bandwidth 78989 ip address 194.168.0.9 255.255.255.252 clock rate 64000 interface Serial0/2 ip address 192.168.0.10 255.255.255.252 interface Serial0/3 ip address 194.168.0.1 255.255.255.252 clock rate 64000 router ospf 100 log-adjacency-changes network 192.168.0.8 0.0.0.3 area 0 network 194.168.0.0 0.0.0.3 area 0 network 194.168.0.4 0.0.0.3 area 0 network 194.168.0.8 0.0.0.3 area 0 ip classless line con 0 line vty 0 4 login end ICICI ROUTER:- Router#SH RUN Building configuration... Current configuration : 920 bytes Page 36
  • 37. version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname Router interface FastEthernet0/0 no ip address duplex auto speed auto shutdown interface FastEthernet0/1 no ip address duplex auto speed auto shutdown interface Serial0/0 ip address 194.168.0.21 255.255.255.252 clock rate 64000 interface Serial0/1 ip address 192.168.0.14 255.255.255.252 interface Serial0/2 ip address 194.168.0.13 255.255.255.252 clock rate 64000 interface Serial0/3 bandwidth 234445 ip address 194.168.0.17 255.255.255.252 Page 37
  • 38. clock rate 64000 router ospf 100 log-adjacency-changes network 192.168.0.12 0.0.0.3 area 0 network 194.168.0.12 0.0.0.3 area 0 network 194.168.0.16 0.0.0.3 area 0 network 194.168.0.20 0.0.0.3 area 0 ip classles line con 0 line vty 0 4 login end SOUTH SERVER:- SOUTHBANK#SH RUN Building configuration... Current configuration : 1266 bytes version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname SOUTHBANK interface FastEthernet0/0 ip address 198.163.0.1 255.255.255.224 duplex auto speed auto interface FastEthernet0/1 Page 38
  • 39. no ip address duplex auto speed auto shutdown interface Serial0/0/0 ip address 192.163.0.13 255.255.255.252 clock rate 64000 interface Serial0/0/1 bandwidth 6743876 ip address 192.163.0.9 255.255.255.252 clock rate 64000 interface Serial0/1/0 bandwidth 345356 ip address 192.163.0.1 255.255.255.252 clock rate 64000 interface Serial0/1/1 ip address 192.163.0.5 255.255.255.252 clock rate 64000 interface Serial0/2/0 no ip address shutdown ! interface Serial0/2/1 no ip address shutdown interface Serial0/3/0 Page 39
  • 40. no ip address shutdown interface Serial0/3/1 no ip address shutdown interface Vlan1 no ip address shutdown router ospf 100 log-adjacency-changes network 192.163.0.0 0.0.0.3 area 0 network 192.163.0.4 0.0.0.3 area 0 network 192.163.0.8 0.0.0.3 area 0 network 192.163.0.12 0.0.0.3 area 0 network 198.163.0.0 0.0.0.31 area 0 ip classless no cdp run line con 0 line vty 0 4 login end PNB SERVER :- Router#sh run Building configuration... Current configuration : 993 bytes version 12.2 Page 40
  • 41. no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname Router interface FastEthernet0/0 no ip address duplex auto speed auto shutdown interface FastEthernet0/1 no ip address duplex auto speed auto shutdown interface Serial0/0 bandwidth 4534 ip address 122.168.0.5 255.255.255.252 clock rate 64000 interface Serial0/1 bandwidth 7674 ip address 122.168.0.9 255.255.255.252 clock rate 64000 interface Serial0/2 ip address 192.163.0.2 255.255.255.252 interface Serial0/3 bandwidth 766734 Page 41
  • 42. ip address 122.168.0.1 255.255.255.252 clock rate 64000 router ospf 100 log-adjacency-changes network 122.168.0.0 0.0.0.3 area 0 network 122.168.0.4 0.0.0.3 area 0 network 122.168.0.8 0.0.0.3 area 0 network 192.163.0.0 0.0.0.3 area 0 network 12.168.0.12 0.0.0.3 area 0 ip classless no cdp run line con 0 line vty 0 4 login end SBI SERVER:- SBIBANK#sh run Building configuration... Current configuration : 950 bytes version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname SBIBANK Page 42
  • 43. interface FastEthernet0/0 no ip address duplex auto speed auto shutdown interface FastEthernet0/1 no ip address duplex auto speed auto shutdown interface Serial0/0 bandwidth 43545 ip address 122.168.0.17 255.255.255.252 clock rate 64000 interface Serial0/1 bandwidth 3454546 ip address 122.168.0.21 255.255.255.252 clock rate 64000 interface Serial0/2 ip address 192.163.0.6 255.255.255.252 interface Serial0/3 ip address 122.168.0.13 255.255.255.252 clock rate 64000 router ospf 100 log-adjacency-changes network 122.168.0.12 0.0.0.3 area 0 Page 43
  • 44. network 122.168.0.16 0.0.0.3 area 0 network 122.168.0.20 0.0.0.3 area 0 network 192.163.0.4 0.0.0.3 area 0 ip classless no cdp run line con 0 line vty 0 4 login end HDFC SERVER:- HDFCBANK#sh run Building configuration... Current configuration : 966 bytes version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname HDFCBANK interface FastEthernet0/0 no ip address duplex auto speed auto shutdown interface FastEthernet0/1 no ip address duplex auto Page 44
  • 45. speed auto shutdown interface Serial0/0 bandwidth 354435 ip address 122.122.0.1 255.255.255.252 clock rate 64000 interface Serial0/1 bandwidth 78433 ip address 122.122.0.5 255.255.255.252 clock rate 64000 interface Serial0/2 bandwidth 34566 ip address 192.163.0.10 255.255.255.252 interface Serial0/3 bandwidth 35455 ip address 122.122.0.9 255.255.255.252 clock rate 64000 router ospf 100 log-adjacency-changes network 122.122.0.0 0.0.0.3 area 0 network 122.122.0.4 0.0.0.3 area 0 network 122.122.0.8 0.0.0.3 area 0 network 192.163.0.8 0.0.0.3 area 0 ip classless line con 0 line vty 0 4 Page 45
  • 46. login end ICICI SERVER:- ICICIBANK#SH RUN Building configuration... Current configuration : 954 bytes version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname ICICIBANK interface FastEthernet0/0 no ip address duplex auto speed auto shutdown ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0 ip address 122.122.0.13 255.255.255.252 clock rate 64000 Page 46
  • 47. interface Serial0/1 bandwidth 22345 ip address 122.122.0.17 255.255.255.252 clock rate 64000 interface Serial0/2 ip address 192.163.0.14 255.255.255.252 interface Serial0/3 bandwidth 6568778 ip address 122.122.0.21 255.255.255.252 clock rate 64000 router ospf 100 log-adjacency-changes network 122.122.0.12 0.0.0.3 area 0 network 122.122.0.16 0.0.0.3 area 0 network 122.122.0.20 0.0.0.3 area 0 network 192.163.0.12 0.0.0.3 area 0 ip classlesS no cdp line con 0 line vty 0 4 login end Page 47
  • 53. COMMUNICATION BETWEEN TWO PC’S AND NAT TRANSLATION PING TO PC WITHOUT NAT Page 53
  • 55. DESCRIPTION: The aim of this system is to overcome the lacking of the manual system. All branches of the Bank situated at District level provide the Banking services to customers and had to send report to the central branch manually, which sometimes create problem to get up-to- date information rapidly. But now through this system whenever any transaction will be taking place it will store in the central database and authorized person can get necessary information or report when they get into the system from any branches through Wide Area Network (WAN). Routers are generally known as intermediate systems, which operates at the network layer of the OSI reference model, routers are devices used to connect two or more networks (IP networks) or a LAN to the Internet. A router acts as a packet filter when it forwards or denies packets according to filtering rules. As a Layer 3 device, a packet-filtering router uses rules to determine whether to permit or deny traffic based on source and destination IP addresses, source port and destination port, and the protocol of the packet. These rules are defined using access control lists or ACLs. Banking system in India all banks has an IT department. IT department solution all type of IT problem and serve the core network. IT creates a core network diagram. This diagram involves all type of useable network mechanism (Switch, Router, Firewall, Server) etc. Simulation is the most important of any system. An accurate system design, accurate performance and accurate Simulation give best performance of a system. Now we discuss and simulate the OSPF protocol. Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the interior gateway protocol (IGP) working group of the Internet Engineering Task Force (IETF). Page 55 Chapter -15 SUMMARY STEP WORK DESCRIPTION
  • 56. Now a days, technological development, and automated system development is more essential and crying need for the expansion of banking services because They will need less employers by using automated system. On top of that Security is a major issue regarding banking issues. With this system network will be more easy to handle and it will route the data in a shortest path in a vast distributed system. In future we will try to implement it in real life so that banks can use it and get benefited from this project. Future Work:  Add time based transmission.  Security system will be upgraded .  Make the project more user friendly.  Real life implementation. Limitations :  The main Limitation is to implement the project in real world . Because we only simulate it via packet tracer.  Due to less time and work pressure we could not add more features which could make the project more useful. Page 56 Chapter-16 CONCLUSION
  • 57. Computer Networks by Tanenbaum All about Computer Network By Manohar Lodia Data communication By Ferozon www.cisco.com www.education.umd.edu/EDMS/mislevy/CiscoPapers/DPs_for_Learning.pdf www.packettracernetwork.com www.weikipedia.com www.routeralley.com www.networkessential.com www.google.com Page 57 Chapter-17 REFRENCES