Академический Документы
Профессиональный Документы
Культура Документы
Introduction to
The Company
1
81103107098
CISCO
2
81103107098
Background
In 1993, Cisco embarked on an initiative to design practical, cost-effective
networks for schools. It quickly became apparent that designing and
installing the networks was not enough, schools also needed some way to
maintain the networks after they were up and running. Cisco Senior
Consulting Engineer George Ward developed training for teachers and staff
for maintenance of school networks. The students in particular were eager
to learn and the demand was such that it led to the creation of the Cisco
Networking Academy Program.[1]
3
81103107098
CHAPTER 2
Project Review
4
81103107098
NETWORK TOPOLOGY
In a simple network consisting of a few computers, it is easy to visualize
how all of the various components connect. As networks grow, it is more
difficult to keep track of the location of each component, and how each is
connected to the network. Wired networks require lots of cabling and
network devices to provide connectivity for all network hosts.
5
81103107098
PHYSICAL TOPOLOGY
EQUIPMENTS
List of all equipments required for setting up the internal network of the
building for PurpleLeap.
6
81103107098
DESCRIPTION OF DEVICES
LAYER-3 DEVICES
LAYER-2 DEVICES
This type of switches does not use modules or flash card slots.
Due to this reason, their physical configuration cannot be
changed. It supports twentyfour 10/100 Mbps Fast-Ethernet ports
and two 10/100/1000 Mbps Gigabit Ethernet ports.
7
81103107098
LAYER-1 (PHYSICAL) DEVICES
END-USER DEVICES
• HP Blade Servers
• HP Storage Servers
These are mobile computers which supports both LAN and WAN
connectivity.
• HP IP Printers
8
81103107098
These are IP based printers which acts as a host on the network.
It contains either a Fast-Ethernet port or a Wireless card.
LOGICAL TOPOLOGY
9
81103107098
10
81103107098
Chapter 3
Project Work
11
81103107098
ADDRESSING INFORMATION OF LAYER-3 DEVICES
ROUTERS
12
81103107098
ADDRESSING INFORMATION OF LAYER-2 DEVICES
SWITCHES
13
81103107098
COMPLETE LOGICAL NETWORK TOPOLOGY
• IP ADDRESSING
A host needs an IP address to participate on the Internet. The IP address
is a logical network address that identifies a particular host. It must be
properly configured and unique in order to communicate with other
devices on the Internet.
Every packet sent across the Internet has a source and destination IP
address. This information is required by networking devices to insure
the information gets to the destination and any replies are returned to
the source.
• IP ADDRESSING STRUCTURE
An IP address is simply a series of 32 binary bits (ones and zeros). It is
very difficult for humans to read a binary IP address. For this reason,
the 32 bits are grouped into four 8-bit bytes called octets. An IP address
in this format is hard for humans to read, write and remember. To make
the IP address easier to understand, each octet is presented as its
decimal value, separated by a decimal point or period. This is referred
to as dotted-decimal notation.
14
81103107098
the values of the remaining bits, from right to left, are 2, 4, 8, 16, 32, 64
and 128.
• IP ADDRESS CLASSES
The IP address and subnet mask work together to determine which
portion of the IP address represents the network address and which
portion represents the host address. The class of an address can be
determined by the value of the first octet.
• Class C addresses have three octets for the network portion and one
for the hosts. The default subnet mask is 24 bits (255.255.255.0).
Class C addresses are usually assigned to small networks.
15
81103107098
SUBNETTING
The customer network using the single ISR is badly overloaded. The
proposed solution is to add a second networking device, a larger ISR,
and to divide the single network into two separate networks.
SWITCHING
A switch is a device that is able to direct a stream of messages coming
in one port, out of another port based on the destination MAC address
16
81103107098
within the frame. A switch cannot route traffic between two different
local networks. In the context of the OSI model, a switch performs the
Layer 2, known as the data-link layer function.
VIRTUAL LAN
A VLAN is a logical broadcast domain that can span multiple physical
LAN segments. It allows an administrator to group together stations by
logical function, by project teams, or by applications, without regard to
physical location of the users.
Configuring a VLAN:
17
81103107098
Enter the privileged mode using the enable command
Switch>enable
Switch#
Switch(config-vlan)#name vlan_name
Switch(config-vlan)#exit
Switch(config)#interface fa#/#
Switch(config-if)# exit
Switch(config-if)#exit
A switch port can function in two modes: Access and Trunk mode.
18
81103107098
Switch(config)#interface fa#/#
SWITCH CONFIGURATION
Core Switches
19
81103107098
2/1 1-14,20-1005
Other Switches
20
81103107098
Switch
Gb E 1/1 Trunk 1-9,14-1005
Gb E 2/1 Trunk 1-8,12,14-1005
Gb E 3/1 Trunk 1-8,13-1005
Gb E 4/1 Access 10
Gb E 5/1 Trunk 1-1005
ROUTING
Routing is the process of finding a path to the destination host. A router
is a networking device that connects a local network to other local
networks. At the Distribution Layer of the network, routers direct traffic
and perform other functions critical to efficient network operation.
Routers, like switches, are able to decode and read the messages that
are sent to them. Unlike switches, which only decode (unencapsulate)
the frame containing the MAC address information, routers decode the
packet that is encapsulated within the frame.
Configuring a ROUTER:
21
81103107098
In order to configure a router, the following commands can be
executed.
Router#
Router (config) #
The host from the sending VLAN forwards traffic to the router using the
default gateway. The sub-interface for the VLAN specifies the default
gateway for all hosts in that VLAN. The router locates the destination IP
address and does a routing table lookup.
If the destination VLAN is on the same switch as the source VLAN, the
router forwards the traffic back down to the source switch using the
subinterface parameters of the destination VLAN ID. This type of
configuration is often referred to as a router-on-a-stick.
Router(config-if)#no ip address
Router(config-if)#no shutdown
22
81103107098
3. On the router, configure one subinterface with an IP address and
subnet mask for each VLAN. Each subinterface has an 802.1Q
encapsulation.
Router(config)#interface fa0/0.10
Router(config-subif)#encapsulation dot1q 10
Router#show ip interfaces
Router#show ip route
ADDRESSING SCHEME
ROOM IP ADDRESS SUBNET DEFAULT
RANGE MASK GATEWAY
Manager’s Office 192.168.2.210- 255.255.255. 192.168.2.2
222 240 09
23
81103107098
Debugging Room 192.168.2.98-126 255.255.255. 192.168.2.9
224 7
Optimization Room 192.168.2.66-94 255.255.255. 192.168.2.6
224 5
Prototype Construction 192.168.2.34-62 255.255.255. 192.168.2.3
224 3
Conference Hall 192.168.4.2-62 255.255.255. 192.168.4.1
192
Waiting Room 192.168.3.2-62 255.255.255. 192.168.3.1
192
Help Desk/Customer 192.168.1.34-62 255.255.255. 192.168.1.3
Care 240 3
INTERNET CONNECTION
The Internet is a network of networks that connects users in every country
in the world. There are currently over one billion Internet users worldwide.
ISPs are essential to gaining access to the Internet. No one gets on the
Internet without a host computer, and no one gets on the Internet without
going through an ISP. ISPs range in size from small to very large and differ
in terms of the area they service. ISPs also differ in the types of connection
technologies and speeds they offer.
The network for PurpleLeap was established with an eye towards the
prospects for future upgrades.
25
81103107098
Chapter 4
Result and
Conclusion
26
81103107098
The PurpleLeap network built up is installed in the
Computer Lab, and is based on the same networking
model created and discussed here in the project report.
The N/W model is suited for a small business and
work. It is formed by following best practices as
commenced by the CISCO N/W academy.
The model is laid down by the prospect of future
upgrades as required by the enterprise. It adjusts and
accommodates major upgrades without changing the
actual model.
Any additional constraints can be added and the
N/W be redesigned with those constraints functional.
27
81103107098