Вы находитесь на странице: 1из 27

Chapter 1

Introduction to
The Company

1
81103107098
CISCO

CISCO NETWORKING ACADMENY

The AUL'Cisco Networking Academies', part of Cisco Systems,


offer networking courses, like the CCNA and CCNP courses,
which prepare students for the certification exams of the same
name, and other computer-related courses. Also see History of
virtual learning environments for how the Cisco Networking
Academy Program has developed since 1997 relative to others
within the VLE community.

Courses are available in approximately 10,000 local academies,


in over 150 different countries.

As of 2004, there were approximately 500,000 active students


(defined as students currently enrolled, students enrolled in a
future course, and students who were enrolled in a course
during the last five months).

2
81103107098
Background
In 1993, Cisco embarked on an initiative to design practical, cost-effective
networks for schools. It quickly became apparent that designing and
installing the networks was not enough, schools also needed some way to
maintain the networks after they were up and running. Cisco Senior
Consulting Engineer George Ward developed training for teachers and staff
for maintenance of school networks. The students in particular were eager
to learn and the demand was such that it led to the creation of the Cisco
Networking Academy Program.[1]

The Cisco Networking Academy Program, established in 1997, teaches


students networking and other information technology-related skills,
preparing them for jobs as well as for higher education in engineering,
computer science and related fields. Since its launch, the program has
grown to more than 10,000 Academies in 50 U.S. states and more than
150 countries with a curriculum taught in nine different languages. More
than 400,000 students participate in Academies operating in high schools,
colleges and universities, technical schools, community-based
organizations, and other educational programs around the world. The
Networking Academy program blends face-to-face teaching with web-
based curriculum, hands-on lab exercises, and Internet-based assessment.
Networking courses
The Cisco Academies offer a variety of courses in networking, such
as CCNA (Cisco Certified Network Associate), CCNP (Cisco Certified
Network Professional), Wireless Networking and Network security, among
others. The CCNA is offered in two models, discovery for new and younger
learners and exploration for more advanced and experienced learners,
each is divided into four courses. CCNP courses follow from the CCNA and
is offered as four separate certificated courses

3
81103107098
CHAPTER 2

Project Review

4
81103107098
NETWORK TOPOLOGY
In a simple network consisting of a few computers, it is easy to visualize
how all of the various components connect. As networks grow, it is more
difficult to keep track of the location of each component, and how each is
connected to the network. Wired networks require lots of cabling and
network devices to provide connectivity for all network hosts.

When networks are installed, a physical topology map is created to record


where each host is located and how it is connected to the network. The
physical topology map also shows where the wiring is installed and the
locations of the networking devices that connect the hosts. Icons are used
to represent the actual physical devices within the topology map. It is very
important to maintain and update physical topology maps to aid future
installation and troubleshooting efforts.

In addition to the physical topology map, it is sometimes necessary to also


have a logical view of the network topology. A logical topology map groups
hosts by how they use the network, no matter where they are physically
located. Host names, addresses, group information and applications can be
recorded on the logical topology map.

5
81103107098
PHYSICAL TOPOLOGY
EQUIPMENTS
List of all equipments required for setting up the internal network of the
building for PurpleLeap.

EQUIPMENT QTY DESCRIPTION


CISCO 2960 Layer 2 Switch 9 24 Fast-Ethernet ports, 2 Gigabit
Ethernet ports

CISCO 2960 Gigabit Ethernet 5 10 Gigabit Ethernet ports


Switch
Linksys Wireless Integrated 3 4 Ethernet ports, 1 Internet port
Router
CISCO 2800 Integrated 3 7 Gigabit Ethernet, 2 Serial ports /
Service Router 6 Gigabit Ethernet, 3 Serial ports

HP Blade Servers 3 1 Fast-Ethernet port

HP Storage Servers 2 For camera monitoring

IBM Desktop Computers 142 1 Fast-Ethernet port

IBM Laptop Computers 32 1 Fast-Ethernet port, Integrated Wi-


Fi

HP IP Printers 5 1 Fast-Ethernet port/ Wireless

Shielded Twisted Pair Cable 2500’


(CAT-5)
Unshielded Twisted Pair 4700’
Cable (CAT-5)

6
81103107098
DESCRIPTION OF DEVICES

LAYER-3 DEVICES

• Linksys Wireless Integrated Router

An ISR combines features such as routing and switching functions,


security, voice, LAN and WAN connectivity into a single device. It
is designed for small offices and home-based users. It consists of
one WAN connection (Router Port) and four 10/100 Mbps switch
ports. It provides services at broadband speeds.

• CISCO 2800 Integrated Service Router

An ISR combines features such as routing and switching functions,


security, voice, LAN and WAN connectivity into a single device. It
is designed for enterprise branch offices. It supports seven to
eight 10/100/1000 Mbps Gigabit Ethernet ports and two to three
Serial ports. It provides services at broadband speeds using T1/E1
connectioins.

LAYER-2 DEVICES

• CISCO 2960 Gigabit Ethernet Switch

A switch is a device that is able to direct a stream of messages


coming in one port, out of another port based on the destination
MAC address within the frame. It supports ten Gigabit Ethernet
ports. It is generally used for trunk lines which carry a huge
amount of traffic.

• CISCO 2960 Layer 2 Switch

This type of switches does not use modules or flash card slots.
Due to this reason, their physical configuration cannot be
changed. It supports twentyfour 10/100 Mbps Fast-Ethernet ports
and two 10/100/1000 Mbps Gigabit Ethernet ports.

7
81103107098
LAYER-1 (PHYSICAL) DEVICES

• Shielded Twisted Pair Cable

They are used for high-speed data transmission. The individual


pair of wires are wrapped in a shield and the entire four pairs are
wrapped in another shield. It supports data transmission at rates
as high as 1000 Mbps. It is generally used for trunk lines.

• Unshielded Twisted Pair Cable

UTP cable is inexpensive, offers a high bandwidth, and is easy to


install. This type of cable is used to connect workstations, hosts
and network devices. It can come with many different numbers of
pairs inside the jacket, but the most common number of pairs is
four. Each pair is identified by a specific color code. It supports
data transmission speeds of 100 Mbps.

END-USER DEVICES

• HP Blade Servers

These servers are high performance computers used in


businesses and other organizations. They provide the maximum
concentration of computing power and stability. It also contains
hot-swappable hard-drives.

• HP Storage Servers

These servers are used to store redundant parts of files in order


to prevent them from failing. Servers are usually kept in secure
areas where access is controlled.

• IBM Desktop Computers

These are general purpose computers which provide the basic


desktop services to users. It contains of a Fast-Ethernet port.

• IBM Laptop Computers

These are mobile computers which supports both LAN and WAN
connectivity.

• HP IP Printers

8
81103107098
These are IP based printers which acts as a host on the network.
It contains either a Fast-Ethernet port or a Wireless card.

LOGICAL TOPOLOGY

PROTOTYPE OF NETWORK TOPOLOGY


The network topology of the PurpleLeap building can be broadly
categorized into three network layers: Access, Distribution and Core
Layer.

9
81103107098
10
81103107098
Chapter 3

Project Work

11
81103107098
ADDRESSING INFORMATION OF LAYER-3 DEVICES

ROUTERS

DEVICE INTERFACE IP ADDRESS SUBNET MASK


Core Router Serial 7/0 212.212.212.2 255.255.255.0
Serial 8/0 192.168.10.6 255.255.255.252
Serial 9/0 192.168.10.2 255.255.255.252
Gb E 0/0.27 192.168.8.2 255.255.255.240
Gb E 0/0.28 200.200.200.1 255.255.255.248

Lab A Router Serial 8/0 192.168.10.1 255.255.255.252


Gb E 0/0.15 192.168.2.225 255.255.255.224
Gb E 0/0.16 192.168.2.177 255.255.255.240
Gb E 0/0.17 192.168.2.161 255.255.255.240
Gb E 0/0.18 192.168.2.193 255.255.255.240
Gb E 0/0.19 192.168.2.209 255.255.255.240
Gb E 0/0.24 192.168.2.2 255.255.255.224
Gb E 0/0.25 192.168.2.33 255.255.255.224
Gb E 0/0.26 192.168.2.65 255.255.255.240

Lab B Router Serial 8/0 192.168.10.5 255.255.255.252


Gb E 0/0.9 192.168.2.65 255.255.255.224
Gb E 0/0.10 192.168.2.2 255.255.255.224
Gb E 0/0.11 192.168.2.33 255.255.255.224
Gb E 0/0.12 192.168.2.97 255.255.255.224
Gb E 0/0.13 192.168.2.129 255.255.255.224

Law Deptt. Internet 192.168.1.4 255.255.255.224


Wireless Router
LAN 192.168.3.2 255.255.255.0

Seminar Hall-1 Internet 192.168.1.3 255.255.255.224


Wireless Router
LAN 192.168.3.1 255.255.255.0

Seminar Hall-2 Internet 192.168.2.4 255.255.255.224


Wireless Router
LAN 192.168.4.1 255.255.255.0

12
81103107098
ADDRESSING INFORMATION OF LAYER-2 DEVICES

SWITCHES

DEVICE INTERFAC MODE VLAN ID


E
Server Switch 0/1 Access 28
1/1 Access 28
2/1 Trunk 1-1005
3/1 Access 27

Lab-A Core Switch 0/1 Trunk 1-14,16,20-1005


1/1 Trunk 1-15,17,20-1005
2/1 Trunk 1-14,18-1005
3/1 Trunk 1-1005

Lab-B Core Switch 0/1 Trunk 1-1005


2/1 Trunk 1-14,20-1005

Floor 1 Switch 0/1 Access 24


1/1 Trunk 1-23,26-1005
2/1 Trunk 1-23,25,27-1005
3/1 Access 24
4/1 Trunk 1-1005

13
81103107098
COMPLETE LOGICAL NETWORK TOPOLOGY

• IP ADDRESSING
A host needs an IP address to participate on the Internet. The IP address
is a logical network address that identifies a particular host. It must be
properly configured and unique in order to communicate with other
devices on the Internet.

An IP address is assigned to the Network interface connection for a


host. This connection is usually a network interface card (NIC) installed
in the device. Examples of end-user devices with network interfaces
include workstations, servers, network printers and IP phones. Some
servers can have more than one NIC and each of these has its own IP
address. Router interfaces that provide connections to an IP network
will also have an IP address.

Every packet sent across the Internet has a source and destination IP
address. This information is required by networking devices to insure
the information gets to the destination and any replies are returned to
the source.

• IP ADDRESSING STRUCTURE
An IP address is simply a series of 32 binary bits (ones and zeros). It is
very difficult for humans to read a binary IP address. For this reason,
the 32 bits are grouped into four 8-bit bytes called octets. An IP address
in this format is hard for humans to read, write and remember. To make
the IP address easier to understand, each octet is presented as its
decimal value, separated by a decimal point or period. This is referred
to as dotted-decimal notation.

The 32-bit IP address is defined with IP version 4 (IPv4) and is currently


the most common form of IP address on the Internet. There are over 4
billion possible IP addresses using a 32-bit addressing scheme.

When a host receives an IP address, it looks at all 32 bits as they are


received by the NIC. Humans, on the other hand, need to convert those
32 bits into their four octet decimal equivalent. Each octet is made up
of 8 bits and each bit has a value. The four groups of 8 bits have the
same set of values. The rightmost bit in an octet has a value of 1 and

14
81103107098
the values of the remaining bits, from right to left, are 2, 4, 8, 16, 32, 64
and 128.

• IP ADDRESS CLASSES
The IP address and subnet mask work together to determine which
portion of the IP address represents the network address and which
portion represents the host address. The class of an address can be
determined by the value of the first octet.

IP addresses are grouped into 5 classes. Classes A, B and C are


commercial addresses and are assigned to hosts. Class D is reserved for
multicast use and Class E is for experimental use.

• Class C addresses have three octets for the network portion and one
for the hosts. The default subnet mask is 24 bits (255.255.255.0).
Class C addresses are usually assigned to small networks.

• Class B addresses have two octets to represent the network portion


and two for the hosts. The default subnet mask is 16 bits
(255.255.0.0). These addresses are typically used for medium-sized
networks.

• Class A addresses have only one octet to represent the network


portion and three to represent the hosts. The default subnet mask is
8 bits (255.0.0.0). These addresses are typically assigned to large
organizations.

In the addressing scheme of PurpleLeap, we have used Class-C


addressing scheme. In the Class-C addressing scheme, there are a total
of 256 addresses available. Out of these, 254 addresses are usable. The
remaining to addresses are reserved for network and broadcast
address.

IP addresses are of two types: Private addresses and Public addresses.


All hosts that connect directly to the Internet require a unique public IP
address. Because of the finite number of 32-bit addresses available,
there is a risk of running out of IP addresses. This problem can be
resolved by the use of Private addresses. They allow hosts within an
organization to communicate with one another without the need of a
unique public IP address. Table below shows a list of Private addresses:

15
81103107098
SUBNETTING
The customer network using the single ISR is badly overloaded. The
proposed solution is to add a second networking device, a larger ISR,
and to divide the single network into two separate networks.

For security purposes, the wireless and wired users need to be on


separate local networks.

In the subnetting scheme for PurpleLeap, we utilize the concept of


classless subnetting where we use custom subnets to differentiate the
networks.

Routers distinguish between networks by using the subnet mask to


determine which bits make up the network ID and which bits make up
the host portion of the address. When a network is partitioned, the
router needs a modified or custom subnet mask to distinguish the
subnets from each other. A default subnet mask and a custom subnet
mask differ from each other as follows: Default subnet masks only
change on octet boundaries. For instance, the default subnet mask for a
Class A network is 255.0.0.0. Custom subnet masks take bits from the
host ID portion of the IP address and add them to the default subnet
mask.

SWITCHING
A switch is a device that is able to direct a stream of messages coming
in one port, out of another port based on the destination MAC address

16
81103107098
within the frame. A switch cannot route traffic between two different
local networks. In the context of the OSI model, a switch performs the
Layer 2, known as the data-link layer function.

Only one message can be sent through an Ethernet hub at a time. It is


possible for two or more hosts connected to a hub to attempt to send a
message at the same time. If this happens, the electronic signals that
make up the messages collide with each other at the hub.

A collision causes the messages to become garbled and unreadable by


the hosts. A hub does not decode the messages; therefore it does not
detect that the message is garbled and repeats it out all the ports. The
area of the network where a host can receive a garbled message
resulting from a collision is known as a collision domain.

A switch is preferred over hubs in the networking model of PurpleLeap


because of the large collision domain associated with hubs. Since a
switch uses micro-segmentation, it narrows down the collision domain.
The network of PurpleLeap uses 9 CISCO switches, which can result in a
huge broadcast domain. So, to minimize the domain, we have used the
concept of Virtual LAN (VLAN).

VIRTUAL LAN
A VLAN is a logical broadcast domain that can span multiple physical
LAN segments. It allows an administrator to group together stations by
logical function, by project teams, or by applications, without regard to
physical location of the users.

A VLAN has two major functions:

• A VLAN contains broadcasts.

• A VLAN groups devices. Devices located on one VLAN are not


visible to devices located on another VLAN.

Configuring a VLAN:

In order to configure VLAN on a switch, connect it with a terminal


device using a console cable.

17
81103107098
Enter the privileged mode using the enable command
Switch>enable

Switch#

Enter the configuration mode using the configure terminal command

Switch# configure terminal


Switch (config) #

Enter the name and VLAN number using the commands


Switch(config)#vlan vlan_number

Switch(config-vlan)#name vlan_name

Switch(config-vlan)#exit

Use the following commands to assign individual ports to VLANs:

Switch(config)#interface fa#/#

Switch(config-if)#switchport access vlan vlan_number

Switch(config-if)# exit

Use the following commands to assign a range ports to VLANs:

Switch(config)#interface range fa#/start_of_range - end_of_range

Switch(config-if)#switchport access vlan vlan_number

Switch(config-if)#exit

To disassociate a port from a specific VLAN:


Switch(config)#interface fa#/#

Switch(config-if)#no switchport access vlan vlan_number

A switch port can function in two modes: Access and Trunk mode.

To switch between the two modes, use the following command

18
81103107098
Switch(config)#interface fa#/#

Switch(config-if)#switchport mode <trunk/access>

A switchport in the trunk mode is used for a switch-switch or switch-router


connection, whereas an access mode is used for connection to terminal
devices.

SWITCH CONFIGURATION
Core Switches

SWITCH INTERFACE MODE VLAN ID


Server Switch Gb E 0/1,1/1 Access 28
Gb E 2/1 Trunk 1-1005
Gb E 3/1 Access 27

Floor-1 Switch Gb E 0/1,3/1 Trunk 24


1/1 Trunk 1-23,26-1005
2/1 Trunk 1-23,25,27-1005
4/1 Trunk 1-1005

Lab A Core 0/1 Trunk 1-14,16,20-1005


Switch
1/1 Trunk 1-15,17,20-1005
2/1 Trunk 1-14,18-1005
3/1 Trunk 1-1005

Lab B Core 0/1 1-1005


Switch

19
81103107098
2/1 1-14,20-1005

Other Switches

SWITCH INTERFACE MODE VLAN ID


Mechanical Fa E 0/1-0/6 Access 18
Deptt. Switch
Fa E 0/7-0/11 Access 19
Gb E 1/1 Trunk 1-1005

Electrical Deptt. Fa E 0/1-0/8 Access 15


Switch
Fa E 0/10-0/13 Access 17
Gb E 1/1 Trunk 1-1005

Boys Hostel Fa E 0/1-2/1,4/1 Access 16


Switch
3/1 Trunk 1-1005

Girls Hostel Fa E <all> Access 13


Switch
Gb E 1/1 Trunk 1-1005

DB Switch Fa E <all> Access 12


Gb E 1/1 Trunk 1-1005

OP Switch Fa E <all> Access 9


Gb E 1/1 Trunk 1-1005

PC Switch Fa E <all> Access 11


Gb E 1/1 Trunk 1-1005

Lab B Main Gb E 0/1 Trunk 1-8,11,14-1005

20
81103107098
Switch
Gb E 1/1 Trunk 1-9,14-1005
Gb E 2/1 Trunk 1-8,12,14-1005
Gb E 3/1 Trunk 1-8,13-1005
Gb E 4/1 Access 10
Gb E 5/1 Trunk 1-1005

D Switch Fa E <all> Access 26


Gb E 1/1 Trunk 1-1005

HD Switch Fa E <all> Access 25


Gb E 1/1 Trunk 1-1005

ROUTING
Routing is the process of finding a path to the destination host. A router
is a networking device that connects a local network to other local
networks. At the Distribution Layer of the network, routers direct traffic
and perform other functions critical to efficient network operation.
Routers, like switches, are able to decode and read the messages that
are sent to them. Unlike switches, which only decode (unencapsulate)
the frame containing the MAC address information, routers decode the
packet that is encapsulated within the frame.

Each port, or interface, on a router connects to a different local


network. Every router contains a table of all locally-connected networks
and the interfaces that connect to them. These routing tables can also
contain information about the routes, or paths, that the router uses to
reach other remote networks that are not locally attached.

When a router receives a frame, it decodes the frame to get to the


packet containing the destination IP address. It matches the address of
the destination to all of the networks that are contained in the routing
table. If the destination network address is in the table, the router
encapsulates the packet in a new frame in order to send it out. It
forwards the new frame out of the interface associated with the path, to
the destination network. The process of forwarding the packets toward
their destination network is called routing.

Router interfaces do not forward messages that are addressed to the


broadcast MAC address. As a result, local network broadcasts are not
sent across routers to other local networks.

Configuring a ROUTER:

21
81103107098
In order to configure a router, the following commands can be
executed.

Enter the privileged mode using the enable command


Router>enable

Router#

Enter the configuration mode using the configure terminal command


Router# configure terminal

Router (config) #

The host from the sending VLAN forwards traffic to the router using the
default gateway. The sub-interface for the VLAN specifies the default
gateway for all hosts in that VLAN. The router locates the destination IP
address and does a routing table lookup.

If the destination VLAN is on the same switch as the source VLAN, the
router forwards the traffic back down to the source switch using the
subinterface parameters of the destination VLAN ID. This type of
configuration is often referred to as a router-on-a-stick.

If the exit interface of the router is 802.1Q-compatible, the frame


retains its 4-byte VLAN tag. If the outbound interface is not 802.1Q-
compatible, the router strips the tag from the frame and returns the
frame to its original Ethernet format.

To configure inter-VLAN routing, use the following steps:

1. Configure a trunk port on the switch.


Switch(config)#interface fa0/2

Switch(config-if)#switchport mode trunk

2. On the router, configure a FastEthernet interface with no IP address


or subnet mask.
Router(config)#interface fa0/1

Router(config-if)#no ip address

Router(config-if)#no shutdown

22
81103107098
3. On the router, configure one subinterface with an IP address and
subnet mask for each VLAN. Each subinterface has an 802.1Q
encapsulation.
Router(config)#interface fa0/0.10

Router(config-subif)#encapsulation dot1q 10

Router(config-subif)#ip address 192.168.10.1 255.255.255.0

4. Use the following commands to verify the inter-VLAN routing


configuration and functionality.
Switch#show trunk

Router#show ip interfaces

Router#show ip interfaces brief

Router#show ip route

ADDRESSING SCHEME
ROOM IP ADDRESS SUBNET DEFAULT
RANGE MASK GATEWAY
Manager’s Office 192.168.2.210- 255.255.255. 192.168.2.2
222 240 09

Human Resources Dept 192.168.2.210- 255.255.255. 192.168.2.2


222 240 09

Accounts Dept 192.168.2.194- 255.255.255. 192.168.2.1


206 240 93

Application 192.168.2.226- 255.255.255. 192.168.2.2


Development 254 224 25

Marketing Room 192.168.2.162- 255.255.255. 192.168.2.1


174 240 61

Special Projects Room 192.168.2.178- 255.255.255. 192.168.2.1


190 240 77
Testing & Simulation 192.168.2.130- 255.255.255. 192.168.2.1
Room 158 224 29

23
81103107098
Debugging Room 192.168.2.98-126 255.255.255. 192.168.2.9
224 7
Optimization Room 192.168.2.66-94 255.255.255. 192.168.2.6
224 5
Prototype Construction 192.168.2.34-62 255.255.255. 192.168.2.3
224 3
Conference Hall 192.168.4.2-62 255.255.255. 192.168.4.1
192
Waiting Room 192.168.3.2-62 255.255.255. 192.168.3.1
192
Help Desk/Customer 192.168.1.34-62 255.255.255. 192.168.1.3
Care 240 3

Documentation Room 192.168.1.66-79 255.255.255. 192.168.1.6


240 5
Cafeteria 192.168.3.0-254 255.255.255. 192.168.3.1
0

INTERNET CONNECTION
The Internet is a network of networks that connects users in every country
in the world. There are currently over one billion Internet users worldwide.

Any home, business or organization that wants to connect to the Internet


must use an Internet Service Provider (ISP). An ISP is a company that
provides the connections and support to access the Internet. It can also
provide additional services such as Email and web hosting.

ISPs are essential to gaining access to the Internet. No one gets on the
Internet without a host computer, and no one gets on the Internet without
going through an ISP. ISPs range in size from small to very large and differ
in terms of the area they service. ISPs also differ in the types of connection
technologies and speeds they offer.

ISP LEVELS OF SERVICE


24
81103107098
When data is transferred, it is either uploaded or downloaded.
Downloading refers to information coming from the Internet to your
computer, while uploading indicates the reverse path, from your computer
to the Internet. When the download transfer rate is different from the
upload transfer rate, it is called asymmetric. When the transfer rate is the
same in both directions, it is called symmetric. ISPs can offer both
asymmetric and symmetric services.

The PurpleLeap is to use T1 symmetric connection from any ISP. The


advantage of using a symmetric T1 connection is that it can carry large
amounts of data in both directions at equal rates. Moreover, it helps when
we need to upload large amounts of traffic such as intensive graphics,
multimedia, or video.

The network for PurpleLeap was established with an eye towards the
prospects for future upgrades.

25
81103107098
Chapter 4

Result and
Conclusion

26
81103107098
The PurpleLeap network built up is installed in the
Computer Lab, and is based on the same networking
model created and discussed here in the project report.
The N/W model is suited for a small business and
work. It is formed by following best practices as
commenced by the CISCO N/W academy.
The model is laid down by the prospect of future
upgrades as required by the enterprise. It adjusts and
accommodates major upgrades without changing the
actual model.
Any additional constraints can be added and the
N/W be redesigned with those constraints functional.

The N/W created gives functioning environment to


the next shown Physical Layout

27
81103107098

Вам также может понравиться