You are on page 1of 38

qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjk

lzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm
LAKSHMI NARAYAN COLLEGE OF TECHNOLOGY

qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjk
lzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjk
lzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuio
PROJECT REPORT ON
NETWORKING(INFRASTRUCTURE)

pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjk
lzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopas
dfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwe
rtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxc
Submitted to: Submitted by:

Mohd. Anis
vbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopas Shibi Choudhary

IT Manager-TCS
dfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwe
TTSL BHOPAL

rtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopas
dfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwe
rtyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyu
INDEX

1. Acknowledgement.

2. Certificate of Approval.

3. TATA Teleservices Limited.

4. Introduction.

5. Basics of networking.

6. RJ-45.

7. Switch configuration

8. V-Lan
KNOWLEDGEMENT

No creation in this world is a solo effort and neither is this project. I would be very
remiss if I did not thank many people who have helped me directly or indirectly to
survive the project.

In particular I would like to thank:

Information Technology Head


Mr. Deepanjan Nath for being truly generous and allowing me to work in his
department.

Information Technology Manager


Mohd. Anis for allowing me to do the project in the respective department.

My sincere thanks to Mohd. Anis (IT Manager-TCS) for the constant enormous
support through the thick and thin and polishing it until it shines.

While talking about football for any tedious work we say ‘bend it like Beckham’
so was the case here working with TTSL, whenever I had any problem Mr. Rajesh
pandey (Network Manager) was always here to give a helping hand and pixilate
the problem. So for me it became “bend it like Rajesh Sir”.

I always believe in transforming things in their easiest possible state and I thank
Mr. Mohd Anis for allowing me work my way.

‘God help those who help themselves’ but in technical field we say god help those
who are helped by “Help Desk”. These very important people fulfilled there duties
in all aspect. So my special votes of thanks to Mr. Ganesh More, Mrs. Babita
Diwakaran and Mr. Wasim Khan.

“A healthy environment plays a vital role in the functionality of any company”


Team TTSL Bhopal proves it right! I would take the opportunity to thank and
appreciate all those who have given me a friendly working environment where I
enjoyed learning. I have a list to thank people for this favor Mrs. Priyanka
Parmar, Mr. Vivek Upadhayay.
I thank the faculty of my college for keeping me updated with the scope of my
subject which helped me a lot during the training and my dear friends for keep me
going.

Family comes first but here I am mentioning them in the end because their support
has always been and will always be the laying stone of any work I do. So I thank
my family with all my heart for encouraging and supporting me always.
CERTIFICATE OF APPROVAL

This is to certify that Ms.Shibi Choudhary of Lakshmi

Narayan College Of Technology, Bhopal (M.P.) have completed

their training and project on “NETWORKING

(INFRASTRUCTURE)” during the session 24/06/10 to 24/07/10

and have submitted satisfactory report in this volume for the

partial fulfillment of Bachelor Of Engineering granted by RGPV,

Bhopal (M.P.).

[COMPUTER SCIENCE & ENGINEERING]

Mohd. Anis Mr. Deepanjan Nath


(IT Manager-TCS) (IT Head- TCS)

Mr. Rajesh Pandey Mr. Ganesh Moore


(Network Manager) (Helpdesk Engg.)
TATA TELESERVICES LIMITED

Tata Teleservices Limited spearheads the Tata Group’s presence in the telecom
sector. The Tata Group had revenues of around US $75 billion in financial year
2008-09, and includes over 90 companies, over 350,000 employees worldwide and
more than 3.5 million shareholders.

Incorporated in 1996, Tata Teleservices Limited is the pioneer of the CDMA 1x


technology platform in India. It has embarked on a growth path since the
acquisition of Hughes Tele.com (India) Ltd [renamed Tata Teleservices
(Maharashtra) Limited] by the Tata Group in 2002. It launched mobile operations
in January 2005 under the brand Tata Indicom and today enjoys a pan-India
presence through existing operations in all of India’s 22 telecom Circles. The
company is also the market leader in the fixed wireless telephony market with its
brand Walky. The company has recently introduced the brand Photon to provide a
variety of options for wireless mobile broadband access. The company’s network
has been rated as the ‘Least Congested’ in India for last five consecutive quarters
by the Telecom

Regulatory Authority of India through independent surveys.


Tata Teleservices Limited now also has a presence in the GSM space, through its
joint venture with NTT DOCOMO of Japan, and offers differentiated products and
services under the TATA DOCOMO brand name. TATA DOCOMO arises out of
the Tata Group’s strategic alliance with Japanese telecom major NTT DOCOMO
in November 2008. TATA DOCOMO has received a pan-India license to operate
GSM telecom services—and has also been allotted spectrum in 18 telecom Circles.
The company has rolled out GSM services in 14 of India’s 22 telecom Circles in a
quick span of under six months. The company plans to launch pan-India operations
by the end of FY 2009-10.
TATA DOCOMO marks a significant milestone in the Indian telecom landscape,
and has already redefined the very face of telecoms in India, being the first to
pioneer the per-second tariff option—part of its ‘Pay for What You Use’ pricing
paradigm. Tokyo-based NTT
is one of the world’s leading mobile operators—in the Japanese market, the
company is the clear market leader, used by over 50 per cent of the country’s
mobile phone users.

Today, Tata Teleservices Limited, along with Tata Teleservices (Maharashtra)


Limited, serves over 58 million customers in more than 410,000 towns and villages
across the country, with a bouquet of telephony services encompassing mobile
services, wireless desktop phones, public booth telephony, wireline services and
enterprise solutions.

In December 2008, Tata Teleservices Limited announced a unique reverse equity


swap strategic agreement between its telecom tower subsidiary, Wireless TT Info-
Services Limited, and Quippo Telecom Infrastructure Limited—with the combined
entity kicking off operations in early 2009 with 18,000 towers, thereby becoming
the largest independent entity in this space—and with the highest tenancy ratios in
the industry. The WTTIL-Quippo combine is targeting over 50,000 towers by the
end of FY 2010-11.
INTRODUCTION

"We think we started with sound and straightforward business principles,


considering the interests of the shareholders, our own and the health and welfare of
the employees the sure foundation of our success."

— Jamsetji Nusserwanji Tata, Founder, Tata Group

R.M. Lala, author of various critically acclaimed books on the Tata Group has, in
an article in The Hindu, clearly defined business ethics from the Tata Group
perspective. He says that in the public mind, ethics in business is mainly identified
with financial integrity, but the real meaning of ethics goes beyond that. The
dictionary defines ethics as the science of morals in human conduct, a moral
principle or code. Business ethics lays down how a person in business deals with
his or her colleagues, staff and workers, shareholders, customers, the community,
the government, the environment and even the nation at large.

As Tata Teleservices Limited we are part of the larger whole that is Tata Group;
and as TTSLites we have to ensure that we uphold the highest standards of
business practices and human ethics that have been set by the Tata’s over the years.

In any fast moving industry, especially one as dynamic as telecom, there are times
when you might be tempted to take shortcuts for the sake of growth. However,
many a times these shortcuts maybe unethical and against the norms of business
ethics which exist within the Group and the world outside. The Tata Code of
Conduct clearly defines the ideal behavior and ethics that every Tata employee
should follow in his/her day to day work.

If, in your daily course of life here at TTSL, you see someone taking those
shortcuts and violating what we as a part of the Tata Group and as decent human
beings stand for — take a stand and blow the whistle; it is the right thing to do!
Speak out for what is right and report any violation of our ethical standards.
Click the Ethics Violation link below to report a violation you have observed.
Ethics Violation
Trust us to do the right thing for we expect you to do the same.
Ethics: (defn.)
1. The discipline dealing with what is good and bad and with moral duty and
obligation

2. A set of moral principles: a theory or system of moral values

3. The principles of conduct governing an individual or a group

4. A guiding philosophy
(Source: Merriam-Webster’s Online Dictionary
Philosophy
“Sharpening the saw” is the essence of life. It is imperative to create time to renew
knowledge, skills and allow one self the opportunity to form new mental frames."

The role of Learning and Development team will be to formally create this
opportunity of renewal and continuous learning for team members, leading to
improved organizational and individual effectiveness.

Key Highlights
• Training strategy finalized and ready for roll out.
• Gyan Tarang released and rolled our for all TTSL employees. This application
aims at consolidating the Talent in TTSL.
• Six skill development training programs organized for GM and above employees.
Some of the key programs were – “Finance for Strategic Decision making”,
“Breakthrough Leadership”, “Strategic Planning and Leadership skills”.
• Induction Dates Standardized and Pre read material uploaded on intranet.
• Training calendar published on intranet so that it is easily accessible to all TTSL
employees.
SOFTWARE REQUIREMENTS IN TATA:-

1. OS/ windows 7(Enterprise).

2. MS-Office 2007.

3. OCS (Office Communicator).

4. Print Manager.

5. E-attendance.

6. Acrobat Reader

7. WinZip 14.1.
BASICS OF NETWORKING

# NETWORK TOPOLOGY:-
1. Bus topology.

2. Star topology

3. Mesh topology.

4. Hybrid topology.

5. Ring topology.

# OSI-MODEL:-
OSI stands for open system interconnection reference model. The Open System
Interconnection (OSI) reference model describes how information from a software
application in one computer moves through a network medium to a software
application in another computer. The OSI reference model is a conceptual model
composed of seven layers, each specifying particular network functions. The
model was developed by the International Organization for Standardization (ISO)
in 1984, and it is now considered the primary architectural model for inter-
computer communications. The OSI model divides the tasks involved with moving
information between networked computers into seven smaller, more manageable
task groups. A task or group of tasks is then assigned to each of the seven OSI
layers. Each layer is reasonably self-contained so that the tasks assigned to each
layer can be implemented independently. This enables the solutions offered by
one layer to be updated without adversely affecting the other layers.

The seven layers of the Open System Interconnection (OSI) reference model:

 Application layer.
 Presentation layer.
 Session layer.
 Transport layer.
 Network layer.
 Data link layer.
 Physical layer.

 CHARACTERISTICS OF OSI LAYER:-

The seven layers of the OSI reference model can be divided into two
categories: upper layers and lower layers.

The upper layers of the OSI model deal with application issues and
generally are implemented only in software. The highest layer, the
application layer, is closest to the end user. Both users and application layer
processes interact with software applications that contain a communications
component. The term upper layer is sometimes used to refer to any layer
above another layer in the OSI model.

The lower layers of the OSI model handle data transport issues. The
physical layer and the data link layer are implemented in hardware and
software. The lowest layer, the physical layer, is closest to the physical
network medium (the network cabling, for example) and is responsible for
actually placing information on the medium.

Information being transferred from a software application in one computer


system to a software application in another must pass through the OSI layers. For
example, if a software application in System A has information to transmit to a
software application in System B, the application program in System A will pass its
information to the application layer (Layer 7) of System A. The application layer
then passes the information to the presentation layer (Layer 6), which relays the
data to the session layer (Layer 5), and so on down to the physical layer (Layer 1).
At the physical layer, the information is placed on the physical network medium
and is sent across the medium to System B. The physical layer of System B
removes the information from the physical medium, and then its physical layer
passes the information up to the data link layer (Layer 2), which passes it to the
network layer (Layer 3), and so on, until it reaches the application layer (Layer 7)
of System B. Finally, the application layer of System B passes the information to
the recipient application program to complete the communication process.

# NETWORKING DEVICES:-
1. Switches:-
In electronics, a switch is an electrical component that can break an
electrical circuit, interrupting the current or diverting it from one conductor
to another.[1][2] The most familiar form of switch is a manually operated
electromechanical device with one or more sets of electrical contacts. Each
set of contacts can be in one of two states: either 'closed' meaning the
contacts are touching and electricity can flow between them, or 'open',
meaning the contacts are separated and nonconducting.
2. Routers:-
A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN). Technically, network
switches operate at layer two (Data Link Layer) of the OSI model.

Network switches appear nearly identical to network hubs, but a switch


generally contains more intelligence (and a slightly higher price tag) than a hub.
Unlike hubs, network switches are capable of inspecting data packets as they
are received, determining the source and destination device of each packet, and
forwarding them appropriately. By delivering messages only to the connected
device intended, a network switch conserves network bandwidth and offers
generally better performance than a hub.
RJ-45
The RJ-45 connector is commonly used for network cabling and for
telephony applications.  It's also used for serial connections in special
cases.

RJ-45 Cables

There are 3 main types of RJ-45 cables that you will run across in networking, both
LAN and WAN.

 Straight-through

 Crossover

 Rolled

To identify the RJ-45 cable type, hold the two ends of the cable next to each other
so you can see the colored wires inside the ends.

Examine the sequence of colored wires to determine the type of RJ-45 cable, as
follows:

 Straight-through — the colored wires are in the same sequence at both ends
of the cable.
 Crossover — the first (far left) colored wire at one end of the cable is the
third colored wire at the other end of the cable.

 Rolled — the colored wires at one end of the cable are in the reverse
sequence of the colored wires at the other end of the cable.

The sequence of wires for establishing the connection is as follows:-

1. White of orange.
2. Orange.
3. White of green.
4. Blue.
5. White of blue
6. Green.
7. White of brown.
8. Brown.

# STATIC CABLE MAKING:-

 Steps for making Static cable:-

1. Cut the cable using the clipping tool and align them in order, cut them in
same level, now with tool put all the wires in RJ-45 connector.
2. Color should be in order otherwise the cable made will be of no use.

# CROSS CABLE: -

 Steps for making cross cable:


1. One side will in order of static cable order.
2. Second side order will be changed as follows-
- White of green.
- Green
- White of orange.
- Blue.
- White of blue.
- Orange.
- White of brown.
- Brown.

SWITCH CONFIGURATION
#. HOW TO CONFIGURE IP ADDRESS OF A SWITCH:-
To start the HYPER TERMINAL –

1. Go to Start ProgramsAccessoriesCommunicationHyper
Terminal.
2. Give any username say “XYZ”.
3. Click on Default settings and click OK.
4. Hit “enter” to start the processing.

USER ACCESS VERIFICATION

Username:

Password:

-Type “en” to enable the configuration.

Password:

-Type “sh run” to show the running configuration.


-Type “congif t” to configure the terminal.

 Now Give Commands As Follows:-

Config()#hostname ttsl

ttsl(config)#interface fastethernet 0/1

ttsl(config-if)#description ***SHIBI***

ttsl(config-if)#exit

ttsl(config)#vlan 1(IP address with subnet address)

 We assign IP to only one V-lan and to give access to other ports


we need to make them the member of that one port.
 Command to make the member of V-LAN:-

Switchport access vlan 6

 Switch can be accessed in two ways after it is configured:-

1. Through TELNET:- In TELNET, we access through LAN. To make some or


any number of users gain access to the switch, the command is as follows-
Line vty 0 4

[This will allow five users to gain access.]

To access TELNET, first we are required to give a password as-

Password XYZ
Then go to startruntype cmdtype telnet.

Then it will ask for the password, enter the password you have assigned
earlier. Only after entering the password we can gain access to the switch.

2. Through CONSOLE:- Insert the console cable in the console port of the
switch and one end connected to the system. Now we can gain access to the
switch.

V-LAN
A Local Area Network (LAN) was originally defined as a network of computers
located within the same area. Today, Local Area Networks are defined as a single
broadcast domain. This means that if a user broadcasts information on his/her
LAN, the broadcast will be received by every other user on the LAN. Broadcasts
are prevented from leaving a LAN by using a router. The disadvantage of this
method is routers usually take more time to process incoming data compared to a
bridge or a switch. More importantly, the formation of broadcast domains
depends on the physical connection of the devices in the network. Virtual Local
Area Networks (VLAN's) were developed as an alternative solution to using
routers to contain broadcast traffic.

In a traditional LAN, workstations are connected to each other by means of a hub


or a repeater. These devices propagate any incoming data throughout the network.
However, if two people attempt to send information at the same time, a collision
will occur and all the transmitted data will be lost. Once the collision has occurred,
it will continue to be propagated throughout the network by hubs and repeaters.
The original information will therefore need to be resent after waiting for the
collision to be resolved, thereby incurring a significant wastage of time and
resources. To prevent collisions from traveling through all the workstations in the
network, a bridge or a switch can be used. These devices will not forward
collisions, but will allow broadcasts (to every user in the network) and multicasts
(to a pre-specified group of users) to pass through. A router may be used to prevent
broadcasts and multicasts from traveling through the network.

The workstations, hubs, and repeaters together form a LAN segment. A LAN
segment is also known as a collision domain since collisions remain within the
segment. The area within which broadcasts and multicasts are confined is called a
broadcast domain or LAN. Thus a LAN can consist of one or more LAN segments.
Defining broadcast and collision domains in a LAN depends on how the
workstations, hubs, switches, and routers are physically connected together. This
means that everyone on a LAN must be located in the same area .
VLAN's allow a network manager to logically segment a LAN into different
broadcast domains (see Figure2). Since this is a logical segmentation and not a
physical one, workstations do not have to be physically located together. Users on
different floors of the same building, or even in different buildings can now
belong to the same LAN.

Logical View
Physical View

VLAN's offer a number of advantages over traditional LAN's. They are:

1) Performance.

2) Formation of Virtual Workgroups.

3) Simplified Administration.

4) Reduced Cost.

5) Security.
#. V-LAN CONFIGURATION:-
Username:

Password:
switch>en

Password:

switch#config t

Enter configuration commands, one per line. End with CNTL/Z.

User Access Verification

Username:

Password:

switch>en

Password:

switch#config t

Enter configuration commands, one per line. End with CNTL/Z.

switch(config)#hostname switch

switch(config)#hostname switch

switch(config)#vlan 10

switch(config-vlan)#name cs

switch(config-vlan)#exit

switch(config)#vlan 20

switch(config-vlan)#name it
switch(config-vlan)#exit

switch(config)#vlan 30

switch(config-vlan)#name ec

switch(config-vlan)#exit

switch#

switch#config t

Enter configuration commands, one per line. End with CNTL/Z.

switch(config)#interface fastethernet 0/1

switch(config-if)#description ***cs***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 10

switch(config-if)#exit

switch(config)#interface fastethernet 0/2

switch(config-if)#description ***cs1***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 10

switch(config-if)#exit

switch(config)#interface fastethernet 0/3

switch(config-if)#description ***cs2***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 10


switch(config-if)#exit

switch(config)#interface fastethernet 0/4

switch(config-if)#description ***cs3***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 10

switch(config-if)#exit

switch(config)#interface fastethernet 0/5

switch(config-if)#description ***cs4***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 10

switch(config-if)#exit

switch(config)#interface fastethernet 0/6

switch(config-if)#description ***cs5***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 10

switch(config-if)#exit

switch(config)#interface fastethernet 0/7

switch(config-if)#description ***cs6***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 10

switch(config-if)#exit
switch(config)#interface fastethernet 0/8

switch(config-if)#description ***it***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/9

switch(config-if)#description ***it1***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/9

switch(config-if)#description ***it2***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/9

switch(config-if)#description ***it1***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/10


switch(config-if)#description ***it2***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/11

switch(config-if)#description ***it3***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/12

switch(config-if)#description ***it4***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/13

switch(config-if)#description ***it5***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/14

switch(config-if)#description ***it6***
switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/15

switch(config-if)#description ***it7***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 20

switch(config-if)#exit

switch(config)#interface fastethernet 0/16

switch(config-if)#description ***ec***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 30

switch(config-if)#exit

switch(config)#interface fastethernet 0/17

switch(config-if)#description ***ec1***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 30

switch(config-if)#exit

switch(config)#interface fastethernet 0/18

switch(config-if)#description ***ec2***

switch(config-if)#switchport mode access


switch(config-if)#switchport access vlan 30

switch(config-if)#exit

switch(config)#interface fastethernet 0/19

switch(config-if)#description ***ec3***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 30

switch(config-if)#exit

switch(config)#interface fastethernet 0/20

switch(config-if)#description ***ec4***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 30

switch(config-if)#exit

switch(config)#interface fastethernet 0/21

switch(config-if)#description ***ec5***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 30

switch(config-if)#exit

switch(config)#interface fastethernet 0/22

switch(config-if)#description ***ec6***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 30


switch(config-if)#exit

switch(config)#interface fastethernet 0/23

switch(config-if)#description ***ec7***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 30

switch(config-if)#exit

switch(config)#interface fastethernet 0/24

switch(config-if)#description ***ec8***

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan 30

switch(config-if)#exit

switch(config)#exit

switch#config t

switch(config)# interface vlan 10

switch(config-if)#172.18.100.263 255.255.255.2

switch(config-if)#exit

switch(config)#exit

switch#

*Mar 1 01:31:08: %SYS-5-CONFIG_I: Configured from console by helpdesk on


consol

eshow vlan
VLAN Name Status Ports
---- -------------------------------- --------- ------------------------------
1 default active

3 HSRP_Zone active

6 VLAN0006 active

7 Franchisee active

8 OMC_Zone active

9 Internet_Zone active

10 cs active Fa0/1, Fa0/2, Fa0/3, Fa0/4

Fa0/5, Fa0/6, Fa0/7

20 it active Fa0/8, Fa0/9, Fa0/10, Fa0/11

Fa0/12, Fa0/13, Fa0/14, Fa0/15

30 ec active Fa0/16, Fa0/17, Fa0/18, Fa0/19

Fa0/20, Fa0/21, Fa0/22, Fa0/23

Fa0/24

1002 fddi-default act/unsup

1003 token-ring-default act/unsup

1004 fddinet-default act/unsup

1005 trnet-default act/unsup

VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1
Trans2

switch#[Bswitch(config)#interface gigabitethernet 0/
THANK YOU…….
BIBLIOGRAPHY

http://social.msdn.microsoft.com

http://www.tek-tips.com/

http://slacksite.com/
http://www.devasp.net/net/articles/

http://www.tatainteractive.com

http://telespace:8080/default.aspx

c# by o’reilly

http://www.webwizguide.com/kb/asp_tutorials/add_to_database.asp

http://www.microsoft.com/

http://www.dealing-with-data.net/index.html

http://www.asptutorial.info/learn/OpenReadCreate-files.html

http://172.17.14.119/crtool/cr_process.asp

http://www.wikipiedia.com

You might also like