Koforidua Technical University (Ktu) : Waps Networks Training Academy 4 5 November 2022
Koforidua Technical University (Ktu) : Waps Networks Training Academy 4 5 November 2022
Koforidua Technical University (Ktu) : Waps Networks Training Academy 4 5 November 2022
BY
DUAH-OWUSU EPHRAIM
ACKNOWLEDGEMENT…………………………………………………………………………iv
INTRODUCTION……………………………………………………………………………….....v
PROCEDURE TO INDUSTRIAL TRIANING.............................................................................vi
OBJECTIVES OF THE INDUSTRIAL ATTACHMENT………………………………………vi
LIST OF ABBREVIATION/ ACRONYMS...................................................................................vii
CHAPTER ONE
CHAPTER TWO
i
2.8 Internet Protocol Networking Basics……………………………………………………………...20
2.8.1 Internet Protocol Addresses………………………………………………………………….20-22
2.8.1.1 Netmask……………………………………………………………………………………22-23
2.8.1.2 Subnet Addressing…………………………………………………………………………23-25
2.8.1.3 What are Valid Host……………………………………………………………………….25-26
2.8.1.4 Variable Length Subnet Mask……………………………………………………………..26-27
2.8.2 Private IP Addresses…………………………………………………………………………….27
2.8.3 Single IP Addresses using NAT……………………………………………………………..27-28
2.8.4 MAC Addresses……………………………………………………………………………..28-29
2.9 Internet Security…………………………………………………………………………………..29
2.9.1 What is a Firewall………………………………………………………………………………29
CHAPTER THREE
NETWORK DESIGN
3.1 Network Design Overview using Packet Tracer………………………………………………30-31
3.1.1 Core Layer…………………………………………………………………………………...31-32
3.1.2 Distribution Layer……………………………………………………………………………32-33
3.1.3 Access Layer…………………………………………………………………………………33-34
3.2 Project Summary…………………………………………………………………………………..34
3.3 Introduction………………………………………………………………………………………..34
3.4 Problem Statement………………………………………………………………………………...35
3.5 Objective of the Project…………………………………………………………………………....35
3.5.1 General Objective……………………………………………………………………………….35
3.5.2 Specific Objective……………………………………………………………………………….35
3.6 Literature Review………………………………………………………………………………….35
3.7 Methodology…………………………………………………………………………………...35-36
3.8 Result & Conclusions………………………………………………………………………….36-40
3.9 Practical Assignments……………………………………………………………………………..40
3.9.1 Work Assignment 1………………………………………………………………………….40-42
3.9.2 Work Assignment 2………………………………………………………………………….42-45
3.9.3 Work Assignment 3………………………………………………………………………….45-47
3.9.4 Work Assignment 4………………………………………………………………………….47-48
3.9.5 Work Assignment 5………………………………………………………………………….49-52
ii
CHAPTER FOUR
CHAPTER FIVE
iii
ACKNOWLEDGEMENT
I would be ungrateful if my appreciation is not expressed to those who helped in diverse ways
in making my attachment with KWAPS NETWORKS TRAINING ACADEMY a successful
one.
My first and foremost thanks goes to the Almighty God for His care and guidance during the
period of the attachment for without Him there would not have been the perfect peace, love
understanding and cooperation I enjoyed.
I wish to acknowledge my sincere thanks to my lectures, management and staff of Koforidua
Technical University and the whole of Computer Science Department, for arranging
Organizational attachment (Internship-program) that facilitates integration of theoretical
knowledge with real life situation.
Finally, I owe so much to my whole family for their undying support, their unwavering belief
that I can achieve so much unfortunately, I cannot thank everyone by name because it would
take a lifetime but, I just want you all to know that you count so much, had it not been for all
your prayers, love and help, I would never have completed this report. So, thank you all
iv
INTRODUCTION
As a nation, we have made very little progress in our attempt to develop over the years. For
any meaningful social and economic advancement in the environment in which we find
ourselves, it was realized that there is the need to increase and improve the country’s middle
level manpower. The implementation of Higher National Diploma (HND) courses in the
country was aimed at raising the working force of the middle level manpower both in quality
and quantity. In view of this, every student pursuing a course in the HND is to undertake six
months practical training in their field of study. This helps the students to acquire skills,
knowledge and current technological development in our various industries and leads to the
appreciation of some phases of their course outside the lecture halls.
Industrial Attachment, simply put, means attaching oneself to an industry. It involves
students spending their long vacation days with an industry or an establishment with the aim
of acquiring working experience in their field of study. It is aimed at bringing the students
into real contact with the activities of their chosen field of study. It also exposes the students
to real life problems which are anticipated in their chosen career.
This report is divided into a number of chapters. It begins with orientation and followed by
description of job offered. Problems encountered before and during the period of the
attachment then follow. In the final analysis the experiences I acquired in undertaken the
attachment are summarized. These helped me to make my recommendations and conclusion
v
PROCEDURE TO INDUSTRIAL TRIANING
The Liaison Officer issues an introductory letter to each student to be forwarded to the
organization.
I made enquiries about the organization and its facilities available to enable me to
have a successful attachment.
My application was sent to the place of training; Kwaps Networks Training Academy,
Koforidua and it was approved.
To help the student develops positive attitude and knowledge for living and self-
confidence and to develop entrepreneurial skills that can make the student take
initiative in job creation to promote expansion in the private sector.
To guide and assist the student undertake the required learning and practical activities
as outlined in the relevant external syllabus to enable the student write the
examination set the external examining board.
To enable the student, acquire relevant and adequate technical professional skills that
will give the student the opportunity to perform as a middle – level management and
supervisory personnel in an appropriate establishment and hence be able to contribute
to the technological and commercial development of the nation.
vi
LIST OF ABBREVIATION/ ACRONYMS
• MS Microsoft
• AD Active Directory
• DS Domain Service
vii
CHAPTER ONE
BREIF HISTORICAL BACKGROUND
As the training arm of CISCO, KWAPS Network Training Academy carries forth a legacy of
excellence spanning across more than ten decades. KWAPS is an initiative that enables individuals
and organizations to benefit from KWAPS's deep expertise in the IT space. Among the fastest
growing IT education brands in Ghana, KWAPS offers a complete spectrum of quality training
programs on software, hardware, networking as well as global certifications in association with
leading IT organizations worldwide. Empowered with strategic alliances with leading IT
organizations in Ghana and abroad, KWAPS training solutions cater to diverse consumer profiles
including individuals, enterprises, academic institutions and Government enterprises. As the
fountainhead of the most significant pursuit of human mind (IT), KWAPS strongly believes, "Only
a Leader can transform you into a Leader". KWAPS Network Academy is a formalization of this
experience and credo which has been perfected over many decades.
VISION
“Join force with other organizations in IT research, develop cutting edge content, and provide
community trainings needed to solve developmental needs of the less privileged African.”
MISSION
“To endow our students with the skillset to become more competitive, effective employable, and
OBJECTIVES
"To fuel initiative and foster activity by allowing individuals freedom of action and innovation in
Page | 1
PEOPLE OBJECTIVE
"To help people and share in the company's successes, which they make possible; to provide job
security based on their performance; to recognize their individual achievements; and help them
gain a sense of satisfaction and accomplishment from their work."
CORE VALUES
Cisco is a leading provider of IT products and services that ensures business benefits and helps in
overcoming various IT challenges. Cisco also offers a variety of certification programs for
professionals, employees and students. Cisco offers five levels of IT certification with eight different
career paths including routing and switching, design, network security, service provider, service
provider operations, storage networking, voice and wireless. The five levels of Cisco certification are
Entry, Associate, Professional, Expert and Architect. Cisco certification is one of the most demanded
technology certifications in the global job market. KWAPS offers Cisco training courses for CCNA,
CCNP and CCIE
A network is a system that transmits any combination of voice, video and/or data between
users. The main field on which I was working was networking and the course was CCNA
which includes all the parts of networking.
In a typical LAN, there are various types of network devices available as outlined below.
1. Hub Repeat signals received on each port by broadcasting to all the other connected
ports.
2. Repeaters Used to connect two or more Ethernet segments of any media type, and to
Page | 2
provide signal amplification for a segment to be extended. In a network that uses repeater, all
members are contending for transmission of data onto a single network. We like to call this single
network a collision domain. Effectively, every user can only enjoy a percentage of the available
bandwidth. Ethernet is subject to the "5-4-3" rule regarding repeater placement, meaning we can
only have five segments connected using four repeaters with only three segments capable of
accommodating hosts.
3. Bridge A layer 2 device used to connect different networks types or networks of same
type. It maps the Ethernet addresses of the nodes residing on each segment and allows only the
necessary traffic to pass through the bridge. Packet destined to the same segment is dropped. This
"store-and-forward" mechanism inspects the whole Ethernet packet before making a decision.
Unfortunately, it cannot filter out broadcast traffic. Also, it introduces a 20 to 30 percent latency
when processing the frame. Only 2 networks can be linked with a bridge.
4. Switch Can link up four, six, eight or even more networks. Cut-through switches run
faster because when a packet comes in, it forwards it right after looking at the destination address
only. A store-and-forward switch inspects the entire packet before forwarding. Most switches
cannot stop broadcast traffic. Switches are layer 2 devices.
5. Routers Can filter out network traffic also. However, they filter based on the protocol
addresses defined in OSI layer 3(the network layer), not based on the Ethernet packet addresses.
Note that protocols must be routable in order to pass through the routers. A router can determine
the most efficient path for a packet to take and send packets around failed segments.
6. Brouter Has the best features of both routers and bridges in that it can be configured to
pass the unroutable protocols by imitating a bridge, while not passing broadcast storms by acting
as a router for other protocols.
7. Gateway Often used as a connection to a mainframe or the internet. Gateways enable
communications between different protocols, data types and environments. This is achieved via
protocol conversion, whereby the gateway strips the protocol stack off of the packet and adds the
appropriate stack for the other side. Gateways operate at all layers of the OSI model without
making any forwarding decisions.
Page | 3
Work assigned was:
• To design a coaxial cable and twisted cable.
• To design a LAN.
• To design a WAN.
• To design a MAN.
• To program router.
• To design network.
• To break password of router and switches.
I wonder what the world of computer will be without computer networks. In computing,
networking is a way of connecting two or more computers together. When you network computers
together, the computers can share information and resources with one another. Networking is a
very vital and delicate area in computing.
We cannot really quantify the importance of networking two or more PC. Computer network is
very important for every business, no matter how small a business may be. Computer network
helps in sharing resources. With computer network, so many computers can share one printer,
scanner and some other hardware, which might be expensive for a company to acquire for every
computer user.
It is quite obvious that computer network helps to save cost for an organization. Instead of buying
all hardware for each computer, one can just share one via the computer network in addition to
this, let us just think of additional space that will be occupied by providing printers or scanners for
each of the computers in an organization. Networking two or more computer not only saves money
but also saves space. This in addition makes the user's environment friendly.
Page | 4
Do we ignore the communication aspect? No! Networking enhances effective communication
among members of an organization or a company. With appropriate software, each computer user
can communicate with other members or staff of an organization or company. In addition to this,
Computer network gives users the opportunity to use remote programs and remote databases either
of the same organization or from other enterprises or public sources. The importance of having
computer networks are really numerous.
Page | 5
CHAPTER TWO
DESCRIPTION OF INTERNSHIP TRAINING
2.0 Orientation
By definition, Orientation refers to the planned introduction of new people to their jobs, their peers
and to the company. The Orientation and briefing Exercise was conducted by the workplace
supervisor who welcomed the interns to the training center and briefed the interns about the goals,
aims, Mission of his organization, guidelines through the internship and Areas of coverage during
the period.
Page | 6
• The layer which is important for networking are
Page | 7
Area network (LAN). Here the router used has the capability of implementing the adaptive security
appliances (ASA) capabilities and other security policies.
Switch: A switch does almost the same job the router. It distributes packets to peripherals. But
most importantly it serves as a central connection point for cables from workstations, other
switches etc.
Wireless Access Point (WAP): The wireless access point serves as an extension of the LAN to
devices that cannot connect to the network by the use of cables. The WAP becomes the part of the
network that visitors are allowed to connect to with limited security but with some security too.
Cables: The cables to be used here would be majorly, the unshielded twisted pair CAT5 (CAT5
UTP) because of its speed, and relatively low cost as well as reliability. If there would be a need
for running cables externally (exposed) then the shielded CAT5 twisted pair cables would be
employed. The RJ45 would be used in terminating the cables
So that network installation has been implemented to be extremely careful of the expected
outcome before we had gone ahead and laying down the foundation for a computer network
To do so this network installation in optimal way, I have been done step by step as follow.
Select the suitable room for switch arrangement
Label the shortest path for trucking which 65cm above and trunk it.
Label each UTP cables in both sides i.e.; to the node and to the UTP punch panel.
Page | 8
Punch the terminals of the UTP in to the female and male RJ-45 connector by using puncher
and clamper.
While I was punching UTPs to RJ-45 connector; separate the accessories and trunks i.e.;
accessories to users or nodes and trunks for giving connection from one floor to another
one by the case of FSP (Small Factor Protocol) module.
The way in which UTP cables are twisted (which pin on one end is connected to which pin on
the other end) have two modes (standards); these standard A&B.
2 Orange 2 Green
4 Blue 4 Blue
6 Green 6 Orange
8 Brown 8 Brown
Page | 9
color arrangements for standard A and B
Standard-B cabling: means straight through cabling. The cable wire goes through straight
transmission wires over to the reception end. It uses for inter connecting of dissimilar devices.
Standard-A cabling: means crossover cabling. It uses for inter connecting similar devices i.e.,
switch with switch, PCs with PCs.
The steps that I have been made for nominal network cabling are:
1. Striping(remove) the outside insulation
3. Sorting the wire based on standards and insert in to the RJ-45 connector
Stripper, clamper, node connector, UTP punch panel, puncher, scotch, bits(screws), drill, cutter,
trunk, node holder, saw, UTP CAT-6 cable, etc.
Page | 10
Clamper used for crimping network cables
UTP CAT-6 cables used for expand the network connection. It has
two wounded conductors for the purpose of canceling out or reduces the noise from external
source.
Drill: used for making holes for the UTP cable expansion and bit holder on
the wall.
Node holder & node cover: used for hold and cover to the jack of RJ-45
Page | 11
2.4.2. Intra-Building and Inter-Building Network Installation
Hence, we didn’t implement the inter-building & intra-building network installation but as I
understand:
Inter-building network installation: while SMF cable is arrived from the mini-DCs the SMF
is spliced into the fiber patch panel which is in 1st floor the 2nd and 3rd floor are arrived
network connections by the case of SFP module to the fiber patch panel of other one.
Topologies in computer networks refer to the physical arrangement of computers and the
network devices. There are various topology types, such as bus topology (linear), star topology,
Star topology is implemented throughout the network infrastructure for the following reasons;
Security
Ease of expansion
Page | 12
Cheaper to maintain even though it costs more to set up due to purchase of so many
hardware devices
Page | 13
Multi-Mode Fiber (MMF): Multimode fiber supports multiple paths of light and has a much
larger core and has a core size of 50 or 62.5 microns. The light travels down a much larger path in
multimode fiber, allowing the light to go down several paths or modes.
Page | 14
The following steps are necessary to splice optical fiber:
Strip the coating off the two fibers that will be spliced together
Clean the stripped fiber
Each fiber must be cleaved so that its end-face is perfectly flat and perpendicular to the
axis of the fiber
Aligning of two end-faces of the fibers. This is normally done by the splicing machine by
means of: fixed V-groove, optical core alignment, cladding alignment or local injection
and detection of light (LID)
The two fibers are fused together
Visual inspection of the splice and splice loss estimation (available on most splicing
machine). Redo the splice (step 1 to 6) in case an error is found
Check mechanical strength of the splice (normally done by the splicing machine)
The bare fiber area around the splice is protected with a splice protector.
Alternatives to fusion splicing include using optical fiber connectors or mechanical splices both
of which have in general higher insertion losses, lower reliability and higher return losses than
fusion splicing. During installation, the splice loss is estimated by the optical image processing
system of the splicer unit. Based on this estimation, the splice can be approved or rejected. Since
while we have been splicing the fiber cable the splice loss is 0.00db-0.02db.
Active directory structure comprises of Single Forest, with multiple domains and child domains.
Administrator can configure active directory domain based on the physical subnets; it is advisable
to install directory server on the physical site. Active directory provides different security
boundaries in the form of a) Forest b) Domain c) Organizational Units. It plays two basic functions
Page | 15
within a network: that of a directory service containing a hierarchical listing of all the objects
within the network, and that of an authentication and security service that controls and provides
access to network resources. These two roles are different in nature and focus, but they combine
together to provide increased user capabilities while decreasing administrative overhead. The
Active Directory itself is defined by a schema that indicates how each object is represented within
the data store. For example, a user object has, among other things, a first name, last name, logon
name, e-mail address, and password. If you’re familiar with databases, you should already be
familiar with the term schema since a database schema refers to the structure of the database in the
same way the Active Directory schema defines the Active Directory’s structure. Domain Name
System (DNS) is a system for naming computers and network services that maps those names to
network addresses and organizes them into a hierarchy of domains. DNS naming is used on TCP/IP
networks, such as the Internet and most corporate networks, to locate computers and services by
using user-friendly names. When a user enters the DNS name of a computer in an application,
DNS can look up the name and provide other information that is associated with the computer,
such as its IP address or services that it provides for the network. This process is called name
resolution. Name systems, such as DNS, make it easier to use network resources by providing
users with a way to refer to a computer or service by a name that is easy to remember. DNS looks
up that name and provides the numeric address that operating systems and applications require to
identify the computer on a network.
Page | 16
frames broadcast onto the network are only switched between the ports logically grouped within
the same VLAN.
2.7.2. Trunk
Trunking is a process of connecting switches together so that they can send VLAN information
between each other. A trunk port is a point-to-point connection between switches, a switch and a
router, or even a switch and a server, and it carries the traffic of multiple VLANS. Configuration
of trunk involves identifying trunk ports and selecting the encapsulation type. Identifying the trunk
ports is a useful task in such a way that it eases VLAN configuration and administration.
Simple example
An employer has a single ordinary switch with 20 ports and single IP address with no subnetting.
He needs to create 4 VLANs, i.e., VLAN1, VLAN2, VLAN3, VLAN4 named as ICT, HRM,
Account, and Teachers respectively; with 5 users per VLAN and VLAN3 is need to communicate
with other VLAN of its organization through port fa0/24. Write the appropriate step by step
vlavvlan-id command to confirm this task.
Solution:
Firstly, create the 4 VLANs:
Enable
Conf t
Hostname employer
Vlan1
Name ICT
Page | 17
Exit
Vlan2
Name HRM
Exit
Vlan3
Name Account
Exit
Vlan4
Name Teachers
Exit
Secondly assigning the proper port to that VLAN
Conf t
Int range fa0/1-5
Switch port mode access
Swichport access vlan1
Ctrl+z
Conf t
Int range fa0/6-10
Switch port mode access
Swichport access vlan2
Ctrl+z
Conf t
Int range fa0/10-15
Switch port mode access
Swichport access vlan3
Ctrl+z
Conf t
Int range fa0/15-20
Switch port mode access
Swichport access vlan4
Ctrl+z
Hence the employer needs to interface or communicate VLAN3 through port fa0/24, from the
concept of trunk I can implement as:
Conf t
Int fa0/24
Switch port mode trunk
Switch port mode trunk allow Vlan3
Page | 18
2.7.3. Advantage of using VLANs
VLANs have the following benefits
Performance: Routers that forward data in software becomes a bottleneck as LAN data
rates increase. Doing away with the routers removes this bottleneck.
Formation of virtual workgroups: Because workstations can be moved from one VLAN
to another just by changing the configuration on switches, it is relatively easy to put all the
people working together on a particular project all into a single VLAN. They can then more
easily share files and resource with each other. To be honest though virtual workgroups
sound like a good idea in theory, but often do not work well in practice. It turns out that
users are usually more interested in accessing company-wide resource than files on each
other’s PCs.
Greater flexibility: If users move their desks, or just move around the place with their
laptops, then if the VLANs are set up the right way they can plug their PC in at new
location, and still be within the same VLAN. This is much harder when a network is
physically divided up by routers.
Ease of partitioning off resources: If there are servers or other equipments to which the
network administrator wishes to limit access, then they can be put off into their own VLAN.
Then users in other VLANs can be given access selectively.
Page | 19
From the network diagram above we see that the local area network is linked with the internet
(The external) through the Internet Service Provider (ISP) the connection comes into the local
network through the Cisco router that has ASA (Adaptive security Appliance) enabled. The
connection flows through to the core switch which serves as a central connection point for other
workstation switches. Obviously, there are three departments in this simulated network and one
public wireless access point.
Page | 20
unique address (called an IP address) to make sure that transmitted data reaches the correct
destination. Blocks of addresses are assigned to organizations by the Internet Assigned Numbers
Authority (IANA). Individual users and small organizations may obtain their addresses either from
the IANA or from an Internet service provider (ISP). The Internet Protocol (IP) uses a 32bit address
structure. The address is usually written in dot notation (also called dotted-decimal notation), in
which each group of eight bits is written in decimal form, separated by decimal points. For
example, the following binary address: 11000011 00100010 00001100 00000111 is normally
written as: 195.34.12.7 The latter notation is easier to remember and easier to enter into your
computer. In addition, the 32 bits of the address are subdivided into two parts. The first part of the
address identifies the network, and the second part identifies the host node or station on the
network. The dividing point may vary depending on the address range and the application.
There are five standard classes of IP addresses. These address classes have different ways of
determining the network and host sections of the address, allowing for different numbers of hosts
on a network. Each address type begins with a unique bit pattern, which is used by the TCP/IP
software to identify the address class. After the address class has been determined, the software
can correctly identify the host section of the address. The figure below shows the three main
address classes, including network and host sections of the address for each address type.
Page | 21
The five address classes are:
Class A Class A addresses can have up to 16,777,214 hosts on a single network. They use
an 8-bit network number and a 24-bit node number. Class A addresses are in this range:
1.x.x.x to 126.x.x.x.
Class B Class B addresses can have up to 65,354 hosts on a network. A Class B address
uses a 16-bit network number and a 16-bit node number. Class B addresses are in this
range: 128.1.x.x to 191.254.x.x.
Class C Class C addresses can have up to 254 hosts on a network. A Class C address uses
a 24-bit network number and an 8-bit node number. Class C addresses are in this range:
192.0.1.x to 223.255.254.x.
Class D Class D addresses are used for multicasts (messages sent to many hosts). Class D
addresses are in this range: 224.0.0.0 to 239.255.255.255.
Class E Class E addresses are for experimental use. This addressing structure allows IP
addresses to uniquely identify each physical network and each node on each physical
network.
For each unique value of the network portion of the address, the base address of the range (host
address of all zeros) is known as the network address and is not usually assigned to a host. Also,
the top address of the range (host address of all ones) is not assigned, but is used as the broadcast
address for simultaneously sending a packet to all hosts with the same network address.
2.8.1.1. Netmask
In each of the address classes previously described, the size of the two parts (network address and
host address) is implied by the class. This partitioning scheme can also be expressed by a netmask
associated with the IP address. A netmask is a 32-bit quantity that, when logically combined (using
an AND operator) with an IP address, yields the network address. For instance, the netmasks for
Class A, B, and C addresses are 255.0.0.0, 255.255.0.0, and 255.255.255.0, respectively. For
example, the address 192.168.170.237 is a Class C IP address whose network portion is the upper
24 bits. When combined (using an AND operator) with the Class C netmask, as shown here, only
the network p o r t i o n o f t h e a d d r e s s r e m a i n s : 11000000 1 0 1 0 1 0 0 0 1 0 1 0 1 0 1 0
11101101 (192.168.170.237) combined with: 11111111 11111111 11111111 00000000
(255.255.255.0) equals: 11000000 10101000 10101010 00000000 (192.168.170.0) As a shorter
alternative to dotted-decimal notation, the netmask may also be expressed in terms of the number
of ones from
Page | 22
the left. This number is appended to the IP address, following a backward slash (/), as “/n.” In the
example, the address could be written as 192.168.170.237/24, indicating that the netmask is 24
ones followed by 8 zeros.
A Class B address can be effectively translated into multiple Class C addresses. For example, the
IP address of 172.16.0.0 is assigned, but node addresses are limited to 255 maximum, allowing
eight extra bits to use as a subnet address. The IP address of 172.16.97.235 would be interpreted
as IP network address 172.16, subnet number 97, and node number 235. In addition to extending
the number of addresses available, subnet addressing provides other benefits. Subnet addressing
allows a network manager to construct an address scheme for the network by using different
subnets for other geographical locations in the network or for other departments in the
organization. Although the preceding example uses the entire third octet for a subnet address, note
that you are not restricted to octet boundaries in subnetting. To create more network numbers, you
need only shift some bits from the host address to the network address. For instance, to partition a
Class C network number (192.68.135.0) into two, you shift one bit from the host address to the
Page | 23
network address. The new netmask (or subnet mask) is 255.255.255.128. The first subnet has
network number 192.68.135.0 with hosts 192.68.135.1 to 129.68.135.126, and the second subnet
has network number 192.68.135.128 with hosts 192.68.135.129 to 192.68.135.254.
Note: The number 192.68.135.127 is not assigned because it is the broadcast address of the first
subnet. The number 192.68.135.128 is not assigned because it is the network address of the second
subnet.
The following table lists the additional subnet mask bits in dotted-decimal notation. To use the
table, write down the original class netmask and replace the 0-value octets with the dotted decimal
value of the additional subnet bits. For example, to partition your Class C network with subnet
mask 255.255.255.0 into 16 subnets (four bits), the new subnet mask becomes 255.255.255.240.
The following table displays several common netmask values in both the dotted-decimal and the
mask length formats for class C. Configure all hosts on a LAN segment to use the same netmask
for the following reasons:
Netmask Notation Translation Table for One Octet
Number of Bits Dotted-Decimal Value
1 128
2 192
3 224
4 240
5 248
6 252
7 254
8 255
The following table displays several common netmask values in both the dotted-decimal and the
mask length formats.
Page | 24
255.255.255.0 /24
255.255.255.128 /25
255.255.255.192 /26
255.255.255.224 /27
255.255.255.240 /28
255.255.255.248 /29
255.255.255.252 /30
255.255.255.254 /31
255.255.255.255 /32
Configure all hosts on a LAN segment to use the same netmask for the following reasons:
So that hosts recognize local IP broadcast packets When a device broadcasts to its
segment neighbors, it uses a destination address of the local network address with all ones for the
host address. In order for this scheme to work, all devices on the segment must agree on which
bits comprise the host address.
So that a local router or bridge recognizes which addresses are local and which are
remote
Example
Step 1: Router R1 needs 20 network addresses. So, 25= 32-2 (2 is subtract form 32 because in
FLSM all 0’s and all 1’s are not considered) = 30
Step 2: Now borrow 5 bit from the host part of the IP address.
172.16.00000 000.00000000
Step 3: So the subnet mask is change, now new subnet mask is 255.255. (128+64+32+26+8)
000.00000000 255.255.248.0
Page | 25
Step 4: After calculating subnet mask, the first network address is, Put 1 at the rightmost bit of the
network part, like 172.16.00001 000.00000000
IP is 172.168.8.0/21 (CIDR is 21 because 8 bit + 8 bit + 5 bit)
Step 6: Second network calculation goes like this, put 1 in the second bit if the network part like
172.16.00010 000.00000000
Step2: So, we have to leave 6 bit form the host part of the IP
172.168.00000000.00 000000
So, the subnet mask is 8+8+8+2 = 26
Now network address for R2 is 172.168.0.0 / 26
Step4: Now we calculate the network address of R1 for 2nd network address.
172.168.00000000.01000000 / 26
Page | 26
Requirement of R1 is 28 hosts.
25 = 32
172.168.00000000.010 00000
So, network address for r1 is 172.168.0.64 / 27
Step5: Repeat step 3 for calculate 3rd network address and step 4 for calculate network
address between two routers.
Page | 27
single-address account typically used by a single user with a modem, rather than a router.
NETGEAR products use an address-sharing method called Network Address Translation (NAT).
This method allows several networked computers to share an Internet account using only a single
IP address, which may be statically or dynamically assigned by your ISP. The router does this by
translating the internal LAN IP addresses to a single address that is unique on the Internet. The
internal LAN IP addresses can be either private addresses or registered addresses. The following
figure illustrates a single IP address operation
This scheme offers the additional benefit of firewall-like protection because the internal LAN
addresses are not shown to the Internet connection. This filtering can prevent intruders from
probing your system. However, using port forwarding, you can allow one computer (for example,
a Web server) on your local network to be accessible to outside users.
2.8.4. Media Access Control (MAC) Addresses and Address Resolution Protocol
An IP address alone cannot be used to deliver data from one LAN device to another. To send data
between LAN devices, you must convert the IP address of the destination device to its MAC
address. Each device on an Ethernet network has a unique MAC address, which is a 48-bit number
assigned to each device by the manufacturer. The technique that associates the IP address with a
Page | 28
MAC address is known as address resolution. Internet Protocol uses the Address Resolution
Protocol (ARP) to resolve MAC addresses. If a device sends data to another station on the network
and the destination MAC address is not yet recorded, ARP is used. An ARP request is broadcast
onto the network. All stations (computers, for example) on the network receive and read the
request. The destination IP address for the chosen station is included as part of the message so that
only the station with this IP address responds to the ARP request. All other stations discard the
request.
The station with the correct IP address responds with its own MAC address directly to the sending
device. The receiving station provides the transmitting station with the required destination MAC
address. The IP address data and MAC address data for each station are held in an ARP table. The
next time data is sent, the address can be obtained from the address information in the table.
Page | 29
CHAPTER THREE
NETWORK DESIGN
Functions are distributed at each layer. A hierarchical design avoids the need for a fully-meshed
network in which all network nodes are interconnected. The building blocks of modular networks
are easy to replicate, redesign, and expand. There should be no need to redesign the whole network
Page | 30
each time a module is added or removed. Distinct building blocks can be put in-service and taken
out-of-service without impacting the rest of the network. This capability facilitates
troubleshooting, problem isolation, and network management.
Page | 31
Design the core layer as a high-speed, Layer3 (L3) switching environment utilizing only
hardware-accelerated services. Layer3 core designs are superior to Layer2 and other
alternatives because they provide:
Faster convergence around a link or node failure.
Increased scalability because neighbor relationships and meshing are reduced.
More efficient bandwidth utilization
Use redundant point-to-point L3 interconnections in the core (triangles, not squares) where ever
possible, because this design yields the fastest and most deterministic convergence results. Avoid
L2 loops and the complexity of L2 redundancy, such as Spanning Tree Protocol (STP) and indirect
failure detection for L3 building block peers
Page | 32
failover depends primarily on hardware link failure detection instead of timer-based software
failure detection. Convergence based on these functions, which are implemented in hardware, is
the most deterministic.
Page | 33
Prioritization of mission-critical network traffic using QoS. This provides traffic
classification and queuing as close to the ingress of the network as possible.
Security services for additional security against unauthorized access to the network through the
use of tools such as 802.1x, port security, DHCP snooping, Dynamic ARP Inspection, and IP
Source Guard.
Efficient network and bandwidth management using software features such as Internet
Group Membership Protocol (IGMP) snooping. IGMP snooping helps control multicast
packet flooding for multicast applications.
3.3 Introduction
The design that I was simulating for campus uses a three-layer hierarchical logical model known
as cisco three tier model containing Access, Distribution and Core Layer and the diagram I used
was containing all the three layers each performing different task. The Diagram Consists of IP
Services like Dynamic Host Configuration Protocol, Network Address Translation and Routing
(OSPF). To share the traffic flow load on different layers each service should be implemented on
different layers. The Dynamic Host Configuration Protocol & DNS Services are delivered by
distribution switches of each campus and Network Address Translation is better to be handled by
the ASA firewall (2911 serious router used in our particular case).
To note here what I wanted to emulate is the knowledge I gained in the internship by taking my
university as task sampler performing the tasks, I already knew in my 2 months internship period
Page | 34
3.4 Problem Statement
When network devices communicate with many other devices, the workload required of the CPUs
on the devices are burdensome. The modular nature of the hierarchical design model is to enable
accurate capacity planning within each layer of the hierarchy, thus reducing wasted bandwidth,
reducing costs, increasing network speed, scalability, security, reliability and easy management
system.
Page | 35
UTP (network media)
Access point
PC (personal computer)
Software requirement
Cisco packet tracer 8.2.0.0162
Systems of methods used in this project are;
drag and drop network devices in cisco packet tracer
connecting network devices using automatically choose connection type cable
Then configure the IOS command line interfaces in each device
Instructions
You have been given the network address 172.19.67.0/24 by your customer. The host address
requirements are:
Note: Some of the information is provided in the Packet Tracer instructions for your topology.
Requirements
Host Requirements:
Page | 36
Note: You will configure addressing on all devices and hosts in the network.
• Assign the first usable IP addresses in the appropriate subnets to Police for the two
LAN links and the WAN link.
• Assign the first usable IP addresses in the appropriate subnets to Schools for the two
LANs links. Assign the last usable IP address for the WAN link.
• Assign the second usable IP addresses in the appropriate subnets to the switches.
• The switch management interface should be reachable from hosts on all of the LANs.
• Assign the last usable IP addresses in the appropriate subnets to the hosts.
If the addressing design and implementation are correct, all hosts and devices should be reachable
over the network.
3.8 Results & Conclusions
Page | 37
ip add 172.19.67.1 255.255.255.224
no shut
int g0/1
ip add 172.19.67.33 255.255.255.224
no shut
int s0/0/0
ip add 172.19.67.97 255.255.255.252
no shut
…………………….
schools
en
conf t
int g0/0
ip add 172.19.67.65 255.255.255.240
no shut
int g0/1
ip add 172.19.67.81 255.255.255.240
no shut
int s0/0/0
ip add 172.19.67.98 255.255.255.252
no shut
………………….
PD-1
en
conf t
int vlan 1
ip add 172.19.67.2 255.255.255.224
no shut
ip def 172.19.67.1
.............................
Page | 38
PD-1-11
IP Address: 172.19.67.30
Subnet Mask: 255.255.255.224
Default Gateway: 172.19.67.1
............................
PD-2
en
conf t
int vlan 1
ip add 172.19.67.34 255.255.255.224
no shut
ip def 172.19.67.33
..............................
PD-2-23
IP Address: 172.19.67.62
Subnet Mask: 255.255.255.224
Default Gateway: 172.19.67.33
..............................
PS-101-87
IP Address: 172.19.67.78
Subnet Mask: 255.255.255.240
Default Gateway: 172.19.67.65
.............................
PS-101
en
conf t
int vlan 1
ip add 172.19.67.66 255.255.255.240
no shut
ip def 172.19.67.65
...............................
Page | 39
PS-115
en
conf t
int vlan 1
ip add 172.19.67.82 255.255.255.240
no shut
ip def 172.19.67.81
...............................
PS-115-12
IP Address: 172.19.67.94
Subnet Mask: 255.255.255.240
Default Gateway: 172.19.67.81
Page | 40
Instructions and Solutions
Page | 41
Step 3: Compare and contrast LANs and WANs.tions:
a. Explain the difference between a LAN and a WAN. Give examples of each.
LANs provide access to end users in a small geographical area. A home office or school
campus are examples of LANs. WANs provide access to users in a wide geographical area
over long distances spanning a few miles to thousands of miles. A Metropolitan Area
Network and the Internet are examples of WANs. A company’s intranet may also connect
multiple remote sites using a WAN.
b. In the Packet Tracer network, how many WANs do you see?
There are two: the Internet and the Intranet WANs.
c. How many LANs do you see?
There are three, easily identifiable because each has a border and label.
d. The internet in this Packet Tracer network is overly simplified and does not represent the structure
and form of the real internet. Briefly describe the internet.
The Internet is mostly used when we need to communicate with a resource on another
network. The Internet is a global mesh of interconnected networks (internetworks).
e. What are some of the common ways a home user connects to the internet?
Cable, DSL, dial-up, cellular, and satellite.
f. What are some common methods that businesses use to connect to the internet in your area?
Dedicated leased line, Metro-E, DSL, Cable, Satellite
Objectives
Part 1: Verify the Default Switch Configuration
Part 2: Configure a Basic Switch Configuration
Part 3: Configure a MOTD Banner
Part 4: Save Configuration Files to NVRAM
Part 5: Configure S2
Solution
Page | 42
Step2: (a). Enter the show running-config command.
Switch# show running-config
Page | 43
Note: The 0 in c1$c0 is a zero, not a capital O. This password will not grade as correct until after you
encrypt it in Step 8.
S1> enable
S1# configure terminal
S1(config)# enable password c1$c0
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Step 5: Verify that privileged mode access is secure.
a. Enter the exit command again to log out of the switch.
b. Press <Enter> and you will now be asked for a password:
User Access Verification
Password:
c. The first password is the console password you configured for line con 0. Enter this password to
return to user EXEC mode.
d. Enter the command to access privileged mode.
e. Enter the second password you configured to protect privileged EXEC mode.
f. Verify your configuration by examining the contents of the running-configuration file:
S1# show running-config
Notice that the console and enable passwords are both in plain text. This could pose a security risk if
someone is looking over your shoulder or obtains access to config files stored in a backup location.
Step 6: Configure an encrypted password to secure access to privileged mode.
The enable password should be replaced with the newer encrypted secret password using the enable
secret command. Set the enable secret password to itsasecret.
S1# config t
S1(config)# enable secret itsasecret
S1(config)# exit
S1#
Note: The enable secret password overrides the enable password. If both are configured on the switch,
you must enter the enable secret password to enter privileged EXEC mode.
Step 7: Verify that the enable secret password is added to the configuration file.
Enter the show running-config command again to verify the new enable secret password is configured.
Note: You can abbreviate show running-config as
S1# show run
Questions:
Step 8: Encrypt the enable and console passwords.
As noticed in step7 the enable secret password was encrypted, but the enable and console passwords
were still in plain text. We will now encrypt these plain text passwords using the service password-
encryption command.
Page | 44
S1# config t
S1(config)# service password-encryption
S1(config)# exit
Question:
Part 5: Configure S2
Objectives
Part 1: Examine the Network Requirements
Part 2: Design the VLSM Addressing Scheme
Part 3: Assign IP Addresses to Devices and Verify Connectivity
Background
In this activity, I was given a /24 network address to use to design a VLSM addressing scheme. Based on
a set of requirements, you will assign subnets and addressing, configure devices and verify connectivity
Page | 45
The steps I followed in configuring the above task
Building 1 -configuration
en
conf t
int g0/0
no shut
int g0/1
no shut
.....................
ASW3 -configuration
en
conf t
int vlan 1
no shut
ip def 10.11.48.113
Page | 46
.......................
Host-D configuration
IP Address: 10.11.48.62
Objectives
Part 1: Design an IP Addressing Scheme
Part 2: Assign IP Addresses to Network Devices and Verify Connectivity
Scenario
In this activity, I was given the network address of 192.168.100.0/24 to subnet and provide the IP
addressing for the Packet Tracer network. Each LAN in the network requires at least 25 addresses for
end devices, the switch and the router. The connection between R1 to R2 will require an IP address for
each end of the link.
Page | 47
The steps I followed in configuring the above task is as follows
R1 -configuration
enable
configure terminal
R1(config)#interface gigabitEthernet 0/0
R1(config-if)#ip address 192.168.100.1 255.255.255.224
R1(config-if)#no shutdown
R1(config-if)#exit
........................................
S3 -configuration
S3>enable
S3#configure terminal
S3(config)#interface vlan 1
S3(config-if)#no shutdown
S3(config-if)#exit
............................................
PC4 -configuration
IP address: 192.168.100.126
Page | 48
3.9.5 Work Assignment -5 Skills Integration Challenge
Background / Scenario
The router Central, ISP cluster, and the Web server from the above diagram are completely configured. I
was to create a new IPv4 addressing scheme that will accommodate 4 subnets using the 192.168.0.0/24
network. The IT department requires 25 hosts. The Sales department needs 50 hosts. The subnet for the
rest of the staff requires 100 hosts. A Guest subnet will be added in the future to accommodate 25 hosts.
I was to also finish the basic security settings and interface configurations on R1 as well. Then, will
configure the SVI interface and basic security settings on switches S1, S2, and S3 respectively.
.............................................
Page | 50
S2 Configuration
enable
conf t
service password-encryption
hostname S2
enable secret 5 $1$mERr$Amm/da5NtiazLuZDbgqZ60
no ip domain-lookup
interface Vlan1
ip address 192.168.0.130 255.255.255.192
no shutdown
ip default-gateway 192.168.0.129
line con 0
password 7 0802455D0A1606181C1B0D517F
login
exec-timeout 5 0
line vty 0 4
exec-timeout 5 0
login
line vty 5 15
exec-timeout 5 0
login
end
.............................................
S3 Configuration
enable
conf t
service password-encryption
hostname S3
enable secret 5 $1$mERr$Amm/da5NtiazLuZDbgqZ60
no ip domain-lookup
interface Vlan1
ip address 192.168.0.194 255.255.255.224
no shut
ip default-gateway 192.168.0.193
line con 0
password 7 0802455D0A1606181C1B0D517F
login
exec-timeout 5 0
line vty 0 4
exec-timeout 5 0
login
line vty 5 15
exec-timeout 5 0
login
end
.....................................
PC Configurations
IT PC
IP Address: 192.168.0.195
Subnet Mask: 255.255.255.224
Default Gateway: 192.168.0.193
Page | 51
IPv6 Address: 2001:db8:acad:2::2/64
IPv6 Gateway: fe80::1
Link Local Address: fe80::2
Sales PC
IP Address: 192.168.0.131
Subnet Mask: 255.255.255.192
Default Gateway: 192.168.0.129
Staff PC
IP Address: 192.168.0.3
Subnet Mask: 255.255.255.128
Default Gateway: 192.168.0.1
Page | 52
CHAPTER FOUR
THE OVERALL INTERNSHIP EXPERIENCE
Page | 53
Introduction
Internship is the beginning of the road that will take me to the point I want to be at after my
graduation. Internship is a practice I need to perform, because it prepares me for the business life
that I aim at.
Page | 54
4.3.3 Interpersonal Communication Skills
During my internship period the Interpersonal skills, which are the life skills I use every day to
communicate and interact with other people, individually and in groups are good for me. Not only
how I communicate with others, but also, I got confidence and my ability to listen and understand.
Problem solving, decision making and personal stress management are also considered
interpersonal skills. Through this internship, I found that I matured and I gained many new
perspectives, such as problem-solving skill, diversity, effective communication, teamwork and
service recovery, attention to detail, time management, personal empowerment, self-confidence,
responsibility and cultural sensitivity. My supervisor was so kind to answer with patience and
teach me much that made this internship so enjoyable. I had gotten a wonderful internship that
spent such a happy moment with all of them. Though, still have so much to learn, I think this
challenge was what should include in my career. This helped much on my future planning
Page | 55
4.3.6 Entrepreneurship Skills
Entrepreneurship is the ability to create and build something from practically nothing. It is
initiating, doing, achieving and building an enterprise or organization, rather than just watching,
analyzing or describing one. It is the knack of sensing an opportunity where others see chaos,
contradiction and confusion. It is the ability to build a founding team to complement your own
skills and talents. It is the know-how to find, marshal and control resources and to make sure you
don’t run out of money when you need it most.
Finally, it is the willingness to take calculated risks, both personal and financial, and then to do
everything possible to get the odds in your favor.
An entrepreneurship education program consists of wide-ranging subjects, and in every
entrepreneurship education program, learning something at outside classroom like internship in a
company plays an important role, as well as normal lectures in classroom. Of course, in this
respect, the good relationship between educational institutions and business society is very
important for the purpose of implementing an internship program as a part of curriculum. Interns
gain firsthand understanding of entrepreneurship along with enhanced technical, professional, and
communication skills. In this internship I have gained self-confidence, information seeking,
problem seeking and sees and acts on opportunities of business in networking. Though helping me
to clarify my vision and decided whether or not to forge ahead with the idea.
Page | 56
CHAPTER FIVE
CONCLUSION AND RECOMMENDATION
5.1. Conclusion
In this world of today where so the internet has gotten so many users and we are just like pebbles
in an ocean of information. Majority of the users of the internet do not understand how exactly it
works some others don’t care, the few who understands the background working system of internet
either exploits the vulnerability of other users or help to protect others or just don’t care about
others. Therefore, it is necessary to ensure that security is air tight before deploying the network.
Otherwise, the organization’s information is vulnerable and attacks would easy. It is necessary for
the network administrator to understand the best security practice. More so, I learnt new concepts
and new ways of working. During this internship period I acquired practical experience to
complement the theoretical content of my study of local area network (LAN) and network security
of Kwaps Networks. To conclude, I think that this internship was very beneficial to me as I learnt
a lot, and it made me discover works in a real world.
5.2. Recommendations
The following are the intern’s recommendation for improvement of field attachment, Academy
(KWAPS), and the University
Page | 57
The company should also buy other networking equipment’s especially a tester, Rooters,
and more switches so that the future internees can gain much in the networking field.
The university should carefully evaluate each proposed internship Centers prior to
approving it as an internship station for its students. This because the workplace
supervisors obviously play a major role in the internship course and experience to students.
The University should be holding pre-internship sessions with students at which the course
is discussed and packets containing the various internship documents are distributed in
order for the students to understand what internship is, before them going for internship.
The University should make at least one on-site visit prior to internship. A site visits to the
internship location by the instructor or a designated representative has important benefits
to all involved and should be a requirement of the internship program
Page | 58
Appendix
From this trainee, I learn how to configure and deploy Cisco switch step by step using the cisco
packet tracer:
1. Connect your switch to computer using roll over cable or using console (serial to utp connector)
2. Right click my computer, go to Device manager and check the Port (COM & LPT)
3. Remember the com port number and use it for the putty later
Do the following:
1. Security (priv mode, con, vty)
2. Banner
3. Hostname
4. Vlan IP
5. Default Gateway
6. Interface Setup
Configure Trunk
sw1# conf t
sw1(config)#interface fastEthernet 0/24
sw1(config- if)#switchport mode trunk
sw1(config- if)#switchport trunk allowed vlan 1-500
sw1(config- if)# end
sw1# show run
sw1# show interface trunk
Native VLAN,
Page | 62
Data VLAN,
Management VLAN
Voice VLAN