Upload
satnam-singh-mann
View
761
Download
6
Embed Size (px)
Citation preview
Chapter 1
Introduction to
The Company
1
81103107098
CISCO
CISCO NETWORKING ACADMENY
The AUL'Cisco Networking Academies', part of Cisco Systems, offer networking courses, like the CCNA and CCNP courses, which prepare students for the certification exams of the same name, and other computer-related courses. Also see History of virtual learning environments for how the Cisco Networking Academy Program has developed since 1997 relative to others within the VLE community.
Courses are available in approximately 10,000 local academies, in over 150 different countries.
As of 2004, there were approximately 500,000 active students (defined as students currently enrolled, students enrolled in a future course, and students who were enrolled in a course during the last five months).
2
81103107098
Background
In 1993, Cisco embarked on an initiative to design practical, cost-effective networks for schools. It quickly became apparent that designing and installing the networks was not enough, schools also needed some way to maintain the networks after they were up and running. Cisco Senior Consulting Engineer George Ward developed training for teachers and staff for maintenance of school networks. The students in particular were eager to learn and the demand was such that it led to the creation of the Cisco Networking Academy Program.[1]
The Cisco Networking Academy Program, established in 1997, teaches students networking and other information technology-related skills, preparing them for jobs as well as for higher education in engineering, computer science and related fields. Since its launch, the program has grown to more than 10,000 Academies in 50 U.S. states and more than 150 countries with a curriculum taught in nine different languages. More than 400,000 students participate in Academies operating in high schools, colleges and universities, technical schools, community-based organizations, and other educational programs around the world. The Networking Academy program blends face-to-face teaching with web-based curriculum, hands-on lab exercises, and Internet-based assessment.
Networking courses
The Cisco Academies offer a variety of courses in networking, such as CCNA (Cisco Certified Network Associate), CCNP (Cisco Certified Network Professional), Wireless Networking and Network security, among others. The CCNA is offered in two models, discovery for new and younger learners and exploration for more advanced and experienced learners, each is divided into four courses. CCNP courses follow from the CCNA and is offered as four separate certificated courses
3
81103107098
CHAPTER 2
Project Review
4
81103107098
NETWORK TOPOLOGY
In a simple network consisting of a few computers, it is easy to visualize how all of the various components connect. As networks grow, it is more difficult to keep track of the location of each component, and how each is connected to the network. Wired networks require lots of cabling and network devices to provide connectivity for all network hosts.
When networks are installed, a physical topology map is created to record where each host is located and how it is connected to the network. The physical topology map also shows where the wiring is installed and the locations of the networking devices that connect the hosts. Icons are used to represent the actual physical devices within the topology map. It is very important to maintain and update physical topology maps to aid future installation and troubleshooting efforts.
In addition to the physical topology map, it is sometimes necessary to also have a logical view of the network topology. A logical topology map groups hosts by how they use the network, no matter where they are physically located. Host names, addresses, group information and applications can be recorded on the logical topology map.
5
81103107098
PHYSICAL TOPOLOGY
EQUIPMENTS
EQUIPMENT QTY DESCRIPTIONCISCO 2960 Layer 2 Switch 9 24 Fast-Ethernet ports, 2 Gigabit Ethernet
ports
CISCO 2960 Gigabit Ethernet Switch 5 10 Gigabit Ethernet ports
Linksys Wireless Integrated Router 3 4 Ethernet ports, 1 Internet port
CISCO 2800 Integrated Service Router
3 7 Gigabit Ethernet, 2 Serial ports / 6 Gigabit Ethernet, 3 Serial ports
HP Blade Servers 3 1 Fast-Ethernet port
HP Storage Servers 2 For camera monitoring
IBM Desktop Computers 142 1 Fast-Ethernet port
IBM Laptop Computers 32 1 Fast-Ethernet port, Integrated Wi-Fi
HP IP Printers 5 1 Fast-Ethernet port/ Wireless
Shielded Twisted Pair Cable (CAT-5) 2500’
Unshielded Twisted Pair Cable (CAT-5)
4700’
List of all equipments required for setting up the internal network of the building for PurpleLeap.
6
81103107098
DESCRIPTION OF DEVICES
LAYER-3 DEVICES
Linksys Wireless Integrated Router
An ISR combines features such as routing and switching functions, security, voice, LAN and WAN connectivity into a single device. It is designed for small offices and home-based users. It consists of one WAN connection (Router Port) and four 10/100 Mbps switch ports. It provides services at broadband speeds.
CISCO 2800 Integrated Service Router
An ISR combines features such as routing and switching functions, security, voice, LAN and WAN connectivity into a single device. It is designed for enterprise branch offices. It supports seven to eight 10/100/1000 Mbps Gigabit Ethernet ports and two to three Serial ports. It provides services at broadband speeds using T1/E1 connectioins.
LAYER-2 DEVICES
CISCO 2960 Gigabit Ethernet Switch
A switch is a device that is able to direct a stream of messages coming in one port, out of another port based on the destination MAC address within the frame. It supports ten Gigabit Ethernet ports. It is generally used for trunk lines which carry a huge amount of traffic.
CISCO 2960 Layer 2 Switch
This type of switches does not use modules or flash card slots. Due to this reason, their physical configuration cannot be changed. It supports twentyfour 10/100 Mbps Fast-Ethernet ports and two 10/100/1000 Mbps Gigabit Ethernet ports.
7
81103107098
LAYER-1 (PHYSICAL) DEVICES
Shielded Twisted Pair Cable
They are used for high-speed data transmission. The individual pair of wires are wrapped in a shield and the entire four pairs are wrapped in another shield. It supports data transmission at rates as high as 1000 Mbps. It is generally used for trunk lines.
Unshielded Twisted Pair Cable
UTP cable is inexpensive, offers a high bandwidth, and is easy to install. This type of cable is used to connect workstations, hosts and network devices. It can come with many different numbers of pairs inside the jacket, but the most common number of pairs is four. Each pair is identified by a specific color code. It supports data transmission speeds of 100 Mbps.
END-USER DEVICES
HP Blade Servers
These servers are high performance computers used in businesses and other organizations. They provide the maximum concentration of computing power and stability. It also contains hot-swappable hard-drives.
HP Storage Servers
These servers are used to store redundant parts of files in order to prevent them from failing. Servers are usually kept in secure areas where access is controlled.
IBM Desktop Computers
These are general purpose computers which provide the basic desktop services to users. It contains of a Fast-Ethernet port.
IBM Laptop Computers
These are mobile computers which supports both LAN and WAN connectivity.
HP IP Printers
These are IP based printers which acts as a host on the network. It contains either a Fast-Ethernet port or a Wireless card.
8
81103107098
LOGICAL TOPOLOGY
PROTOTYPE OF NETWORK TOPOLOGY
The network topology of the PurpleLeap building can be broadly categorized into three network layers: Access, Distribution and Core Layer.
9
81103107098
Chapter 3
Project Work
10
81103107098
ADDRESSING INFORMATION OF LAYER-3 DEVICES
ROUTERS
DEVICE INTERFACE IP ADDRESS SUBNET MASKCore Router Serial 7/0 212.212.212.2 255.255.255.0
Serial 8/0 192.168.10.6 255.255.255.252Serial 9/0 192.168.10.2 255.255.255.252Gb E 0/0.27 192.168.8.2 255.255.255.240Gb E 0/0.28 200.200.200.1 255.255.255.248
Lab A Router Serial 8/0 192.168.10.1 255.255.255.252Gb E 0/0.15 192.168.2.225 255.255.255.224Gb E 0/0.16 192.168.2.177 255.255.255.240Gb E 0/0.17 192.168.2.161 255.255.255.240Gb E 0/0.18 192.168.2.193 255.255.255.240Gb E 0/0.19 192.168.2.209 255.255.255.240Gb E 0/0.24 192.168.2.2 255.255.255.224Gb E 0/0.25 192.168.2.33 255.255.255.224Gb E 0/0.26 192.168.2.65 255.255.255.240
Lab B Router Serial 8/0 192.168.10.5 255.255.255.252Gb E 0/0.9 192.168.2.65 255.255.255.224Gb E 0/0.10 192.168.2.2 255.255.255.224Gb E 0/0.11 192.168.2.33 255.255.255.224Gb E 0/0.12 192.168.2.97 255.255.255.224Gb E 0/0.13 192.168.2.129 255.255.255.224
Law Deptt. Wireless Router
Internet 192.168.1.4 255.255.255.224
LAN 192.168.3.2 255.255.255.0
Seminar Hall-1 Wireless Router
Internet 192.168.1.3 255.255.255.224
LAN 192.168.3.1 255.255.255.0
Seminar Hall-2 Wireless Router
Internet 192.168.2.4 255.255.255.224
LAN 192.168.4.1 255.255.255.0
11
81103107098
ADDRESSING INFORMATION OF LAYER-2 DEVICES
SWITCHES
DEVICE INTERFACE
MODE VLAN ID
Server Switch 0/1 Access 281/1 Access 282/1 Trunk 1-10053/1 Access 27
Lab-A Core Switch 0/1 Trunk 1-14,16,20-10051/1 Trunk 1-15,17,20-10052/1 Trunk 1-14,18-10053/1 Trunk 1-1005
Lab-B Core Switch 0/1 Trunk 1-10052/1 Trunk 1-14,20-1005
Floor 1 Switch 0/1 Access 241/1 Trunk 1-23,26-10052/1 Trunk 1-23,25,27-10053/1 Access 244/1 Trunk 1-1005
12
81103107098
COMPLETE LOGICAL NETWORK TOPOLOGY
IP ADDRESSING
A host needs an IP address to participate on the Internet. The IP address is a logical network address that identifies a particular host. It must be properly configured and unique in order to communicate with other devices on the Internet.
An IP address is assigned to the Network interface connection for a host. This connection is usually a network interface card (NIC) installed in the device. Examples of end-user devices with network interfaces include workstations, servers, network printers and IP phones. Some servers can have more than one NIC and each of these has its own IP address. Router interfaces that provide connections to an IP network will also have an IP address.
Every packet sent across the Internet has a source and destination IP address. This information is required by networking devices to insure the information gets to the destination and any replies are returned to the source.
IP ADDRESSING STRUCTURE
An IP address is simply a series of 32 binary bits (ones and zeros). It is very difficult for humans to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called octets. An IP address in this format is hard for humans to read, write and remember. To make the IP address easier to understand, each octet is presented as its decimal value, separated by a decimal point or period. This is referred to as dotted-decimal notation.
The 32-bit IP address is defined with IP version 4 (IPv4) and is currently the most common form of IP address on the Internet. There are over 4 billion possible IP addresses using a 32-bit addressing scheme.
When a host receives an IP address, it looks at all 32 bits as they are received by the NIC. Humans, on the other hand, need to convert those 32 bits into their four octet decimal equivalent. Each octet is made up of 8 bits and each bit has a value. The four groups of 8 bits have the same set of values. The rightmost bit in an octet has a value of 1 and the values of the remaining bits, from right to left, are 2, 4, 8, 16, 32, 64 and 128.
13
81103107098
IP ADDRESS CLASSES
The IP address and subnet mask work together to determine which portion of the IP address represents the network address and which portion represents the host address. The class of an address can be determined by the value of the first octet.
IP addresses are grouped into 5 classes. Classes A, B and C are commercial addresses and are assigned to hosts. Class D is reserved for multicast use and Class E is for experimental use.
Class C addresses have three octets for the network portion and one for the hosts. The default subnet mask is 24 bits (255.255.255.0). Class C addresses are usually assigned to small networks.
Class B addresses have two octets to represent the network portion and two for the hosts. The default subnet mask is 16 bits (255.255.0.0). These addresses are typically used for medium-sized networks.
Class A addresses have only one octet to represent the network portion and three to represent the hosts. The default subnet mask is 8 bits (255.0.0.0). These addresses are typically assigned to large organizations.
In the addressing scheme of PurpleLeap, we have used Class-C addressing scheme. In the Class-C addressing scheme, there are a total of 256 addresses available. Out of these, 254 addresses are usable. The remaining to addresses are reserved for network and broadcast address.
IP addresses are of two types: Private addresses and Public addresses. All hosts that connect directly to the Internet require a unique public IP address. Because of the finite number of 32-bit addresses available, there is a risk of running out of IP addresses. This problem can be resolved by the use of Private addresses. They allow hosts within an organization to communicate with one another without the need of a unique public IP address. Table below shows a list of Private addresses:
14
81103107098
SUBNETTING
The customer network using the single ISR is badly overloaded. The proposed solution is to add a second networking device, a larger ISR, and to divide the single network into two separate networks.
For security purposes, the wireless and wired users need to be on separate local networks.
In the subnetting scheme for PurpleLeap, we utilize the concept of classless subnetting where we use custom subnets to differentiate the networks.
Routers distinguish between networks by using the subnet mask to determine which bits make up the network ID and which bits make up the host portion of the address. When a network is partitioned, the router needs a modified or custom subnet mask to distinguish the subnets from each other. A default subnet mask and a custom subnet mask differ from each other as follows: Default subnet masks only change on octet boundaries. For instance, the default subnet mask for a Class A network is 255.0.0.0. Custom subnet masks take bits from the host ID portion of the IP address and add them to the default subnet mask.
SWITCHING
A switch is a device that is able to direct a stream of messages coming in one port, out of another port based on the destination MAC address within the frame. A switch cannot route traffic between two different local networks. In the context of the OSI model, a switch performs the Layer 2, known as the data-link layer function.
Only one message can be sent through an Ethernet hub at a time. It is possible for two or more hosts connected to a hub to attempt to send a message at the same time. If this happens, the electronic signals that make up the messages collide with each other at the hub.
A collision causes the messages to become garbled and unreadable by the hosts. A hub does not decode the messages; therefore it does not detect that the message is garbled and repeats it out all the ports. The area of the network where a host can receive a garbled message resulting from a collision is known as a collision domain.
15
81103107098
A switch is preferred over hubs in the networking model of PurpleLeap because of the large collision domain associated with hubs. Since a switch uses micro-segmentation, it narrows down the collision domain. The network of PurpleLeap uses 9 CISCO switches, which can result in a huge broadcast domain. So, to minimize the domain, we have used the concept of Virtual LAN (VLAN).
VIRTUAL LAN
A VLAN is a logical broadcast domain that can span multiple physical LAN segments. It allows an administrator to group together stations by logical function, by project teams, or by applications, without regard to physical location of the users.
A VLAN has two major functions:
A VLAN contains broadcasts. A VLAN groups devices. Devices located on one VLAN are not visible to devices
located on another VLAN.
Configuring a VLAN:
In order to configure VLAN on a switch, connect it with a terminal device using a console cable.
Enter the privileged mode using the enable command
Switch>enable
Switch#
Enter the configuration mode using the configure terminal command
Switch# configure terminal
Switch (config) #
Enter the name and VLAN number using the commands
Switch(config)#vlan vlan_number
Switch(config-vlan)#name vlan_name
Switch(config-vlan)#exit
16
81103107098
Use the following commands to assign individual ports to VLANs:
Switch(config)#interface fa#/#
Switch(config-if)#switchport access vlan vlan_number
Switch(config-if)# exit
Use the following commands to assign a range ports to VLANs:
Switch(config)#interface range fa#/start_of_range - end_of_range
Switch(config-if)#switchport access vlan vlan_number
Switch(config-if)#exit
To disassociate a port from a specific VLAN:
Switch(config)#interface fa#/#
Switch(config-if)#no switchport access vlan vlan_number
A switch port can function in two modes: Access and Trunk mode.
To switch between the two modes, use the following command
Switch(config)#interface fa#/#
Switch(config-if)#switchport mode <trunk/access>
A switchport in the trunk mode is used for a switch-switch or switch-router connection, whereas an access mode is used for connection to terminal devices.
17
81103107098
SWITCH CONFIGURATION
Core Switches
SWITCH INTERFACE MODE VLAN ID
Server Switch Gb E 0/1,1/1 Access 28Gb E 2/1 Trunk 1-1005Gb E 3/1 Access 27
Floor-1 Switch Gb E 0/1,3/1 Trunk 241/1 Trunk 1-23,26-10052/1 Trunk 1-23,25,27-10054/1 Trunk 1-1005
Lab A Core Switch 0/1 Trunk 1-14,16,20-10051/1 Trunk 1-15,17,20-10052/1 Trunk 1-14,18-10053/1 Trunk 1-1005
Lab B Core Switch 0/1 1-10052/1 1-14,20-1005
18
81103107098
Other Switches
SWITCH INTERFACE MODE VLAN IDMechanical Deptt.
SwitchFa E 0/1-0/6 Access 18
Fa E 0/7-0/11 Access 19Gb E 1/1 Trunk 1-1005
Electrical Deptt. Switch
Fa E 0/1-0/8 Access 15
Fa E 0/10-0/13 Access 17Gb E 1/1 Trunk 1-1005
Boys Hostel Switch
Fa E 0/1-2/1,4/1 Access 16
3/1 Trunk 1-1005
Girls Hostel Switch
Fa E <all> Access 13
Gb E 1/1 Trunk 1-1005
DB Switch Fa E <all> Access 12Gb E 1/1 Trunk 1-1005
OP Switch Fa E <all> Access 9Gb E 1/1 Trunk 1-1005
PC Switch Fa E <all> Access 11Gb E 1/1 Trunk 1-1005
Lab B Main Switch Gb E 0/1 Trunk 1-8,11,14-1005Gb E 1/1 Trunk 1-9,14-1005Gb E 2/1 Trunk 1-8,12,14-1005Gb E 3/1 Trunk 1-8,13-1005Gb E 4/1 Access 10Gb E 5/1 Trunk 1-1005
D Switch Fa E <all> Access 26Gb E 1/1 Trunk 1-1005
HD Switch Fa E <all> Access 25Gb E 1/1 Trunk 1-1005
19
81103107098
ROUTING
Routing is the process of finding a path to the destination host. A router is a networking device that connects a local network to other local networks. At the Distribution Layer of the network, routers direct traffic and perform other functions critical to efficient network operation. Routers, like switches, are able to decode and read the messages that are sent to them. Unlike switches, which only decode (unencapsulate) the frame containing the MAC address information, routers decode the packet that is encapsulated within the frame.
Each port, or interface, on a router connects to a different local network. Every router contains a table of all locally-connected networks and the interfaces that connect to them. These routing tables can also contain information about the routes, or paths, that the router uses to reach other remote networks that are not locally attached.
When a router receives a frame, it decodes the frame to get to the packet containing the destination IP address. It matches the address of the destination to all of the networks that are contained in the routing table. If the destination network address is in the table, the router encapsulates the packet in a new frame in order to send it out. It forwards the new frame out of the interface associated with the path, to the destination network. The process of forwarding the packets toward their destination network is called routing.
Router interfaces do not forward messages that are addressed to the broadcast MAC address. As a result, local network broadcasts are not sent across routers to other local networks.
Configuring a ROUTER:
In order to configure a router, the following commands can be executed.
Enter the privileged mode using the enable command
Router>enable
Router#
Enter the configuration mode using the configure terminal command
Router# configure terminal
Router (config) #
20
81103107098
The host from the sending VLAN forwards traffic to the router using the default gateway. The sub-interface for the VLAN specifies the default gateway for all hosts in that VLAN. The router locates the destination IP address and does a routing table lookup.
If the destination VLAN is on the same switch as the source VLAN, the router forwards the traffic back down to the source switch using the subinterface parameters of the destination VLAN ID. This type of configuration is often referred to as a router-on-a-stick.
If the exit interface of the router is 802.1Q-compatible, the frame retains its 4-byte VLAN tag. If the outbound interface is not 802.1Q-compatible, the router strips the tag from the frame and returns the frame to its original Ethernet format.
To configure inter-VLAN routing, use the following steps:
1. Configure a trunk port on the switch.
Switch(config)#interface fa0/2
Switch(config-if)#switchport mode trunk
2. On the router, configure a FastEthernet interface with no IP address or subnet mask.
Router(config)#interface fa0/1
Router(config-if)#no ip address
Router(config-if)#no shutdown
3. On the router, configure one subinterface with an IP address and subnet mask for each VLAN. Each subinterface has an 802.1Q encapsulation.
Router(config)#interface fa0/0.10
Router(config-subif)#encapsulation dot1q 10
Router(config-subif)#ip address 192.168.10.1 255.255.255.0
4. Use the following commands to verify the inter-VLAN routing configuration and functionality.
Switch#show trunk
Router#show ip interfaces
Router#show ip interfaces brief
Router#show ip route
21
81103107098
ADDRESSING SCHEME
ROOM IP ADDRESS RANGE
SUBNET MASK
DEFAULT GATEWAY
Manager’s Office 192.168.2.210-222 255.255.255.240 192.168.2.209
Human Resources Dept 192.168.2.210-222 255.255.255.240 192.168.2.209
Accounts Dept 192.168.2.194-206 255.255.255.240 192.168.2.193
Application Development 192.168.2.226-254 255.255.255.224 192.168.2.225
Marketing Room 192.168.2.162-174 255.255.255.240 192.168.2.161
Special Projects Room 192.168.2.178-190 255.255.255.240 192.168.2.177
Testing & Simulation Room 192.168.2.130-158 255.255.255.224 192.168.2.129
Debugging Room 192.168.2.98-126 255.255.255.224 192.168.2.97
Optimization Room 192.168.2.66-94 255.255.255.224 192.168.2.65
Prototype Construction 192.168.2.34-62 255.255.255.224 192.168.2.33
Conference Hall 192.168.4.2-62 255.255.255.192 192.168.4.1
Waiting Room 192.168.3.2-62 255.255.255.192 192.168.3.1
Help Desk/Customer Care 192.168.1.34-62 255.255.255.240 192.168.1.33
Documentation Room 192.168.1.66-79 255.255.255.240 192.168.1.65
Cafeteria 192.168.3.0-254 255.255.255.0 192.168.3.1
22
81103107098
INTERNET CONNECTION
The Internet is a network of networks that connects users in every country in the world. There are currently over one billion Internet users worldwide.
Any home, business or organization that wants to connect to the Internet must use an Internet Service Provider (ISP). An ISP is a company that provides the connections and support to access the Internet. It can also provide additional services such as Email and web hosting.
ISPs are essential to gaining access to the Internet. No one gets on the Internet without a host computer, and no one gets on the Internet without going through an ISP. ISPs range in size from small to very large and differ in terms of the area they service. ISPs also differ in the types of connection technologies and speeds they offer.
ISP LEVELS OF SERVICE
When data is transferred, it is either uploaded or downloaded. Downloading refers to information coming from the Internet to your computer, while uploading indicates the reverse path, from your computer to the Internet. When the download transfer rate is different from the upload transfer rate, it is called asymmetric. When the transfer rate is the same in both directions, it is called symmetric. ISPs can offer both asymmetric and symmetric services.
The PurpleLeap is to use T1 symmetric connection from any ISP. The advantage of using a symmetric T1 connection is that it can carry large amounts of data in both directions at equal rates. Moreover, it helps when we need to upload large amounts of traffic such as intensive graphics, multimedia, or video.
The network for PurpleLeap was established with an eye towards the prospects for future upgrades.
23
81103107098
Chapter 4
Result and Conclusion
24
81103107098
The PurpleLeap network built up is installed in the Computer Lab, and is based on the same networking model created and discussed here in the project report.
The N/W model is suited for a small business and work. It is formed by following best practices as commenced by the CISCO N/W academy.
The model is laid down by the prospect of future upgrades as required by the enterprise. It adjusts and accommodates major upgrades without changing the actual model.
Any additional constraints can be added and the N/W be redesigned with those constraints functional.
The N/W created gives functioning environment to the next shown Physical Layout
25
81103107098