0% found this document useful (0 votes)
39 views

Networking Sample 1

The document proposes upgrading the network at Boitekanelo College in Gaborone, Botswana. The current network uses a single collapsed backbone and lacks redundancy. The proposed solution involves implementing a hierarchical network with access, distribution and core layers using Cisco equipment. At the access layer, 41 Cisco 2960 switches with PoE would be installed to support the approximately 1000 users. The distribution layer would consist of two Cisco 3560 switches connected to the access layer and to two Cisco 2901 core routers. This new design would improve redundancy, support new technologies like VoIP, and better utilize the IP addresses.

Uploaded by

mompati
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Networking Sample 1

The document proposes upgrading the network at Boitekanelo College in Gaborone, Botswana. The current network uses a single collapsed backbone and lacks redundancy. The proposed solution involves implementing a hierarchical network with access, distribution and core layers using Cisco equipment. At the access layer, 41 Cisco 2960 switches with PoE would be installed to support the approximately 1000 users. The distribution layer would consist of two Cisco 3560 switches connected to the access layer and to two Cisco 2901 core routers. This new design would improve redundancy, support new technologies like VoIP, and better utilize the IP addresses.

Uploaded by

mompati
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Table of Contents

1.1. Project ........................................................................................................................................... 1


1.2. Introduction................................................................................................................................... 1
1.3. Problem statement ........................................................................................................................ 1
1.4. Proposed solution ......................................................................................................................... 2
1.5. Aim and Objectives ....................................................................................................................... 5
1.6. Project scope ................................................................................................................................. 6
1.7. Ethical consideration .................................................................................................................... 6
2. Chapter 2 ............................................................................................................................................... 7
2.1. Literature review ........................................................................................................................... 7
2.2. Research methodology .................................................................................................................. 8
2.3. Resource requirement ................................................................................................................. 11
2.4. Network requirements ................................................................................................................. 12
2.4.1. Non-functional requirements .............................................................................................. 13
2.5. Modeling diagrams / Network diagrams..................................................................................... 13
2.6. Project Plan ................................................................................................................................ 17
2.7. References .................................................................................................................................. 18
3.1. Subnetting ................................................................................................................................... 18
4.0. Final project .................................................................................................................................. 25
4.1. Implementation of the design (simulation) ........................................................................... 25
4.2 Testing techniques ............................................................................................................................ 25
4.3 Project evaluation ............................................................................................................................. 30
Chapter 1: project proposal
1.1. Project
Network upgrade for BOITEKANELO COLLEGE (campus network)

1.2. Introduction
The computer network has become a strategic asset in most enterprises, improving communication and
collaboration, reducing operational expenditure through consolidation and centralisation, and driving
innovation through leveraging technology

Internetworking the communication between two or more networks encompasses every aspect of
connecting computers together. Internetworks have grown to support vastly disparate end-system
communication requirements. An internetwork requires many protocols and features to permit
scalability and manageability without constant manual intervention. Large internetworks can consist of
the following three distinct components: Campus networks, which consist of locally connected users in a
building or group of buildings, wide-area networks (WANs), which connect campuses together, remote
connections, which link branch offices and single users

1.3. Problem statement


The customer’s current network has a number of shared access switches, collapsed network
backbone, single core router facing to the outside network. The switches currently installed cannot
support power over Ethernet hence limiting the network to implement emerging network
technologies such as voice over IP used by ip phones. The network cables used for data access has
been installed over a period of ten years, the network cabling used is cat 5. There is no redundancy
in these network hence impairing day to day business activities. Switches used are HP brand which
limit data link protocols to be used with other brands.
The college has a maximum of 1000 users, the network is using 10.0.0.0 address block without the
use of subnets hence wasting precious ip address and also making these network to become a single
broadcast domain. The router in play is a single cisco 7000 series that cannot support redundancy
protocols such as hot stand by router protocol (HSRP)

1
1.4. Proposed solution
BOITEKANELO COLLEGE will be upgrading their LAN infrastructure at their in Gaborone.
The networking infrastructure will consist, largely of Cisco equipment. This document outlines
the procedures that will be carried out for the successful deployment of the Cisco networking
infrastructure. Some of the details specified:

 Physical topology

 Logical Topology and design

 Configuration and deployment procedures

 User migration and testing.

The LAN is the networking infrastructure that offers access to network communication services and
means for end users and devices spread within a single floor or building. a campus network is
created by communicating a set of LANs that are spread over a small geographic area. Campus
network design ideas are comprehensive to small networks that use a single LAN switch, up to very
large networks with many connections. wired LAN allows communication amongst devices in a
building or group of buildings, as well as interconnection to the WAN and Internet edge at the
network core. Precisely, this design offers a network basis and services that enable:
• Tiered LAN connectivity.
• Wired network access for employees.
• IP Multicast for efficient data distribution.
• Wired infrastructure ready for multimedia services.

HIERARCHICAL DESIGN MODEL

The campus wired LAN uses a hierarchical design model to break the design up into modular groups
or layers. Breaking the design up into layers allows each layer to implement specific functions,
which simplifies the network design and therefore the deployment and management of the network.
A hierarchical LAN design includes the following three layers:

Access layer- the design will start at the wiring and down to the core of the network. Since there are
about 1000 users for these network, there will be 41 PoE 24 port cisco 2960 series switches. Two

2
switches will be installed in a wiring closet to support 48 users and ip phones. These switches
support 100/1000 megabits and 4 gigabits and these switches have capabilities to support 1002
VLANs in total. Loop free topology based on port aggregation, utilizing full link bandwidth (active-
active links with no blocking ports). Avoidance of STP (Spanning Tree Protocol) to build loop free
network paths, which results in a sub-optimal and asymmetrical forwarding topology. With VSS
loops are avoided since the two core devices are viewed as one and pairs of up links are aggregated.

The access layer will provide a set of network services that will support advanced technologies, such
as voice and video. The access layer will provide specialized access for devices using advanced
technologies, to ensure that traffic from these devices is not impaired by traffic from other devices
and also to ensure efficient delivery of traffic that is needed by many devices in the network.

Distribution layer

Access layer switches has 4 gigabit fast Ethernet ISL uplink, to maximize redundancy, each of the
links will terminate on different distribution switches. The distribution layer will be made of two
3560-24 port gigabit port switches. These switches will connect the access layer with the core of the
network. Variable subnets (VLAN’s) will be managed at these layer. Switches will be
interconnected to provide redundancy in case one distribution switch malfunction. Network scaling-
aggregating two Ethernet links between the switches to enables network scaling from distribution to
access layer. These will be accomplished by etherchannel protocol
Core layer
Connecting to the core layer will be by the use of standalone routers. A total of 2 cisco 2901 series
routers with 8 gigabit fast Ethernet port adapters.

3
Figure 1. Access layer, distribution and core layer diagram

Structured Cable
Three different types of UTP cables are commonly encountered in the network environment:
Straight-through cables have the same pinout on both ends. They normally are used to connect
unalike devices, such as a switch and a computer or a switch and a router.
Crossover cables have transmit pins on one end joined to the receive pins on the other end. This
cable is used to connect similar devices, such as two computers, two switches, or two routers.
Crossover cables can also be used to connect a computer directly to a router interface.
When planning a structured cabling project, the major step is to acquire a perfect floor plan. The
floor plan lets the technician to find possible wiring closet locations, cable runs, and which electrical
areas to avoid. Afterward the technician has recognized and established the locations of network
devices, it is time to draw the network on the floor plan. Some of the more significant items to
document include the following:
Patch cable: A small cable from the computer to the wall jack the user work area.
Horizontal cable: A cable from the wall jack to the distribution area.
Backbone cable: part of a network that handles major traffic.
Location of wiring closet: An area to keep the hub or switch.

4
IP addressing
An IP address uniquely identifies a device on an IP network. Allocating, recycling, and documenting
IP addresses and subnets in a network can get confusing very quickly if you have not laid out an IP
addressing plan. By following recommended IP address management standards, we will avoid;
overlapping or duplicate subnets, un-summarized routes in the network, duplicate IP address device
assignments, wasted IP address space And Unnecessary complexity
IP address class B block size will be used for these project and Variable Length Subnet Masks
(VLSMs) to allow the use of different masks for each subnet, and thereby use address space
efficiently. We will use VLSM to create a larger subnet of more than 255 host addresses, create very
small subnets for WAN links and configure loopback addresses

1.5. Aim and Objectives


1.5.1 Aims
Network upgrade for Boitekanelo College

1.5.2 Objectives
The main goals of following the proposed design are articulated below:
1. Scalability and flexibility and redundancy: The modular nature of the design as
well as the proposed devices makes it flexible and scalable.
2. Security and Resiliency: The proposed design promotes separation of data from
different sections of the organisation, enabling enforcement of network policies
for data access. Multiple links are also included for all devices, building in
resiliency in terms of link and device failure (in some cases).
3. Future Readiness: The proposed design incorporates best of breed technology
based on a Unified access paradigm, promoting consolidation and virtualization
and the associated benefits

5
1.6. Project scope

While the requirements are being gathered, the designer will identify the issues that affect the entire
network and those that affect only specific portions, this will help in isolating areas of concern and
identify the scope of the project. Failure to understand the impact of a particular requirement often
causes a project scope to expand beyond the original estimate. This oversight can greatly increase the
cost and time required to implement the new design. The main scope of these project include the
following;
 Improving the efficiency of network addressing-creation of VLANs
 Integrating new security measures-introducing IP access control lists in the network
 Adding new network services, such as voice traffic
 Relocating servers to a data center server farm
 Improving Internet connectivity and adding bandwidth
 Updating access layer LAN cabling
 Providing redundancy for key services
 Upgrading WAN bandwidth

1.7. Ethical consideration

Ethical issues plays a major role to these project by attaining benefits and maintaining agreed
standards. Those will be privacy, accuracy, property and accessibility.
Privacy: the college information will be kept safe and secure as agreed and the information will
belong only to the college. The information will not be revealed to any other company
Accuracy: Boitekanelo college management must check out information accuracy, fidelity and
authentication responsibilities, if there are any errors they have check out, the information will be
recollected again so as to attain relevant information

The users of these network will continue working as normal, the only time they will face down
time periods is during the replacement of the equipment.

6
2. Chapter 2
2.1. Literature review
The LAN is the networking infrastructure which offers an access to network communication services
and resources for end users and devices spread over a sole floor or building. One is able to create a
campus network by connecting a group of LANs that are spread over a small geographic area. Campus
network design thoughts are inclusive small networks that use a single LAN switch to very large
networks with thousands of connections (cisco systems, 2017).

Campus wired LAN allows communications among devices in a building or group of buildings, as well
as interconnection to the WAN and Internet edge at the network core. Precisely, this design offers a
network foundation and services that enable:

 Tiered LAN connectivity.


 Wired network access for employees.
 IP Multicast for efficient data distribution.
 Wired infrastructure ready for multimedia services (cisco systems, 2017).

HIERARCHICAL DESIGN MODEL

The campus wired LAN uses an ordered design model to break the designs into modular groups or
layers. Breaking the design into layers enable each layer to put into effect specific functions, which
simplifies the network design and consequently the distribution and management of the network.
Modularity in network designs allows one to form design elements that can be simulated the entire
network. Simulation offers an easy way to measure the network as well as the network as well as a
reliable distribution method. In flat or meshed network architectures, changes seem to affect a large
number of systems. Ordered designs helps constrain functional changes to a subset of the network,
which enables easy management as well as improving resiliency. Modular structuring of the network
into small, simple elements also enables resiliency through improved fault isolation (campus network
design fundamentals, 2017).

Fundamental Design Goals- when carefully examined, these requirements interprets into four
fundamental network design goals:

7
Scalability: Scalable network designs can grow to encompass new user groups and remote sites and can
support new applications without having an impact on the level of service delivered to existing users.
Availability: A network designed for availability is the one that brings consistent, consistent
performance, 24 hours a day, 7 days a week. Furthermore, the failure of a single link or piece of
equipment should not pointedly impact network performance (campus network design fundamentals,
2017).
Security: Security is a piece that must be designed into the network, not added on after the network is
complete. In preparing the location of security devices, filters, and firewall features is important to
safeguarding network resources.
Manageability: Despite how good the initial network design is, the available network staff should be
able to manage and support the network. A network that is too challenging cannot function well and
efficiently.
The measures listed here offer an additional security to networking devices at the access layer are setting
strong passwords, using Secure Shell (SSH) to administer devices and disabling unused ports. Switch
port security and network access control can ensure that only known and trusted devices have access to
the network (campus network design fundamentals, 2017)

2.2. Research methodology


Extensive preparation should go into a network upgrade, as with any project, a need is first identified,
and then a plan outlines the upgrade process from beginning to end. A site survey have been conducted
and the network designer has a substantial amount of information and create a proper starting point for
the project. The survey shows what is already on site and indicates what is needed. This information is
gathered from different people (account personnel, IT, students, Administration personnel) in an attempt
to accurately forecast the current and future network requirements. Table 1 lists the information sought
in a site survey.

Table 1

Category Information Sought


Number of users and type of equipment Number network users, printers, and servers
will the network upkeep? To define the
number of network users that the network

8
obliged to support, be sure to consider how
many users will be added over the next 12
months, and how many network printers and
network servers the network has to
accommodate.

Projected growth What is likely to be the growth in the college?


Will the college be hiring new employees
who must be provided with right of entry to
network resources? Will a new campus office
be opened that will require connectivity?

Current Internet connectivity How does your college connect to the


Internet? Does the ISP offer the equipment? If
the connectivity is upgraded, the equipment
that offers connection may also have
necessity to be upgraded or replaced.

Application desires What are the applications that the network


need to support? Do you need services for
applications such as IP telephony or
videoconferencing in future?

Present network infrastructure and physical In what way many networking devices are
arrangement connected in your network? What purposes
do they perform? Accepting the existing
number and types of networking equipment
that are currently connected is critical to being
able to plan for the upgrade. It is also
essential to file any configurations that are
loaded on the existing devices

9
services required Are there any new services be required either
now or in the future? Will the college be
using VoIP or videoconferencing technology?
Numerous services have a need of special
equipment or configurations to enhance their
performance.

Reliability and uptime What is the cost of network downtime in the


college? In what way an outage can the
college stand before suffering serious
financial or customer losses? Upholding
nearly 100% uptime needs complete
redundancy in all equipment and services and
is very expensive to implement. Networks
must be planned to return the real need for
uptime and system reliability.

The design of a network upgrade initiates after the first site survey and report are thorough. It involves
five distinct phases:

1. Phase 1: Requirements gathering


After all the facts has been collected from the customer and the site visit, the planning team at
the ISP considers the information to decide network requirements and then makes an analysis
report. If there is not enough information available to properly determine the best network
upgrade path to follow, this team may request additional information.
2. Phase 2: Selection and design
When the analysis report is complete, devices and cabling are selected. The design team
produces numerous designs which are then shared with other members of the project. This then
allow team members to view the LAN from a documentation perspective and assess trade-offs in
performance and cost.
3. Phase 3: Implementation

10
If the first two steps are properly done, therefore the implementation phase may be performed
without incident. If there were any tasks which were ignored during the earlier phases, they must
be modified during implementation

4. Phase 4: Operation
In this phase, the network is said to be live and performs all the tasks it has been designed to
Complete. If all steps up to this point have been properly completed

5. Phase 5: Review and evaluation


This evaluation comprises of costs, performance, and appropriateness for the environment.
For this process, the following items are recommended:
 Associate the user experience with the goals in the documentation, and assess whether the
design is perfect for the job.
 Relate the projected designs and costs with the actual placement. This will ensure that future
projects will benefit from the lessons learned on this project.
 Monitor the operation, and record changes. This certifies that the system is always fully
recognized and accountable.

2.3. Resource requirement


in order to design this network there are resources used to help meet what the project is actually planned
for, with the support of cisco packet tracer version 6.2, will be able to simulate the network before
implementation stage. Concept draw PRO will be used for drawing network diagram for these project in
addition to smart sheet software for documenting and tracing the project plan and timeline

PacketTracer version 6.2: Packet Tracer is a cross-platform visual simulation program which is
designed by Cisco Systems that allows users to produce network topologies and imitate modern
computer networks. The software also allows users to simulate the configuration of Cisco routers and as
such, it switches using a simulated command line interface. Version 6.2 added support for IOS version
15 and Hot Standby Routing Protocol. Version 6.2 added support for various DHCP, EIGRP and OSPF
commands, improved support for Zone-Based Firewall policies.

11
ConceptDraw PRO: is a registered diagramming software which is used to create business graphics,
including diagrams, flowcharts, Infographics, data visualization for business process models, data
presentation and as well as project management documentation. It can also be used for producing
professional and technical diagrams, such as UML diagrams, computer networks topology, engineering
schemes and other technical graphic formats

SmartSheet: Is a software as a service (SaaS) application for combining and work management
developed and marketed by Smartsheet.com, Inc. Its use include assigning tasks, track project progress,
manage calendars, share documents and also to manage other work. It has a spreadsheet-like user
interface.

2.4. Network requirements


Currently, the Internet-based economy often demands around-the-clock customer service. This implies
that business networks must always available nearly 100 percent of the time. They must be smart
enough to automatically protect against unpredictable security incidents. Moreover, these business
networks must also be able to keep up with changing traffic loads to maintain consistent application
response times

The network shall have the following aspects

Device connectivity: The proposed network upgrade intend to provide high-bandwidth device
connectivity, to enable the network a transparent part of an end-user’s day-to-day job, the access layer
will support high-bandwidth traffic when users perform routine tasks, which includes sending large
emails or opening a file from an internal web page. Many types of end-user devices consequently join at
the access layer personal computers, IP phones, wireless APs, and IP video surveillance cameras, the
access layer will support many logical networks, delivering benefits for performance, management, and
security

Advanced technology capabilities: it is a set of network services that support advanced technologies,
such as voice and video. The proposed network equipment will provide a specified access for devices
using advanced technologies. In order to ensure that traffic from these devices is not impaired by traffic
from other devices, and also to ensure efficient delivery of traffic that is needed by many devices in the
network.

12
Scalability: At any building with more than two or three access-layer devices, it is impossible to
interconnect all access switches, the distribution layer will then serve as aggregation point for multiple
access-layer switches.

Self-healing: The network shall be continuously on and available, in respect to the high availability
concepts for both a resilient wired switching infrastructure. Resiliency not only based on the component
of redundancy and how interconnections are made in the modular campus design but also for
capabilities that can enhance that physical resiliency.

Self-defending: Creation of VLANs (Virtual LAN) for security. Since VLANs divide a network,
creating multiple broadcast domains, they efficiently let traffic from the broadcast domains to stay
isolated whereas increasing the network's bandwidth, availability and security

Self-optimizing: new equipment installed shall be able to adapt to varying needs, beyond the edges of
just the simple published standards, is a key need for more innovative networks. Basic standards don’t
address a particular organization’s determination on how devices must behave on their network.

Self-aware: effort to change through insight into network activity, the best networks can report insight
into traffic that they transport and how it relates to an organization’s mission

2.4.1. Non-functional requirements

 The system shall be able to handle up to 10000 concurrent users and satisfying all their desires
 The network devices will be usable only in authorized means by authorized users.
 Network speed and throughput shall be as per the decided limit with the service provider
 Network latency shall be minimal.

2.5. Modeling diagrams / Network diagrams

It is a diagram that visualize depiction of network architecture and It also maps out the structure of a
network with a range of different symbols and line connections. It is the perfect way to share the design

13
of a network because the visual presentation makes it easier for users to understand how items are
connected.

14
15
Network Upgrade Plan
Site Survey Report

Number of Current
Application Network
user and types Project growth internet
requirements Infrastructure
of Equipment connectivity

Security and Reliability and


New services Wireless Budget
piracy Uptime
required Requirements constraints
consideration Expections
Boitekanelo-
college
network
upgrade

Plan nework Phase 1 : Phase 2: Phase 3: Phase 5


Phase 4:
upgrade Requirements Select and Implementatio Review and
Operation
gathering Design n Evaluation

Created of Overlooked
Is the design
Analysis report multiple tasks should Network is live
appropriate?
designs be corrected

Record
Prototypes
changes and
Upgrade path created and
monitor
tested
operation

16
2.6. Project Plan

17
2.7. References

1. Campus network design


http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.ht
ml
2. Campus network design fundamentals
http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Oct2016/CVD-Campus-LAN-WLAN-
Design-2016OCT.pdf

3.0. Chapter 3: Second project review

3.1. Subnetting
IP Addressing and Subnetting (VLAN structure)

The core objective is to make IP addressing as simpler to minimize the cost of addresses, moves, and changes.
Previously, each computer had to be manually configured with an IP address, address mask, and default
gateway. The college has a maximum of 1000 users, the network is using 10.0.0.0 address block without the use
of subnets hence wasting precious IP address and also making these network to become a single broadcast
domain. Variable length subnetting will be introduced to cancel wastage of IPs

Variable-Length Subnet Masking (VLSM) amounts to "subnetting subnets," which means that VLSM permits
network engineers to divide IP address space into a hierarchy of subnets of dissimilar sizes and making it
possible to create subnets with very different host counts without wasting large numbers of addresses. In kanelo
campus design, the college will have 7 un-equal subnets (VLANs). The following tables shows details about the
different subnets

Computer_Lab
Specification Values
Hosts needed 500
Hosts availbale 510
Unused hosts 10
Network address 172.16.0.0
Ip mask(Descimal) 255.255.254.0
Ip mask(slash notation /23
Usable range of Ip Address 172.16.0.1 - 172.16.1.254
Broadcast Address 172.16.1.255
Wildcard Mask 0.0.1.255

18
IP PHONES
Specification Values
Hosts needed 200
Hosts availbale 254
Unused hosts 54
Network address 172.16.2.0
Ip mask(Descimal) 255.255.255.0
Ip mask(slash notation /24
Usable range of Ip Address 172.16.2.1 - 172.16.2.254
Broadcast Address 172.16.2.2550.0.0.255
Wildcard Mask 0.0.0.255

ADMINISTRATION
Specification Values
Hosts needed 100
Hosts availbale 126
Unused hosts 26
Network address 172.16.3.0
Ip mask(Descimal) 255.255.255.128
Ip mask(slash notation /25
Usable range of Ip Address 172.16.3.1 - 172.16.3.126
Broadcast Address 172.16.3.127
Wildcard Mask 0.0.0.127

FACULTY
Specification Values
Hosts needed 100
Hosts availbale 126
Unused hosts 26
Network address 172.16.3.128
Ip mask(Descimal) 255.255.255.128
Ip mask(slash notation /25
Usable range of Ip Address 172.16.3.129 - 172.16.3.254
Broadcast Address 172.16.3.255
Wildcard Mask 0.0.0.127

ACCOUNTING
Specification Values
Hosts needed 50
Hosts availbale 62
Unused hosts 12

19
Network address 172.16.4.0
Ip mask(Descimal) 255.255.255.192
Ip mask(slash notation /26
Usable range of Ip Address 172.16.4.1 - 172.16.4.62
Broadcast Address 172.16.4.63
Wildcard Mask 0.0.0.63

DATACENTER
Specification Values
Hosts needed 50
Hosts available 62
Unused hosts 12
Network address 172.16.4.64
Ip mask(Decimal) 255.255.255.192
Ip mask(slash notation /26
Usable range of Ip Address 172.16.4.65 - 172.16.4.126
Broadcast Address 172.16.4.127
Wildcard Mask 0.0.0.63

SWITCH MANAGEMENT
Specification Values
Hosts needed 50
Hosts availbale 62
Unused hosts 12
Network address 172.16.4.128
Ip mask(Descimal) 255.255.255.192
Ip mask(slash notation /26
Usable range of Ip Address 172.16.4.129 - 172.16.4.190
Broadcast Address 172.16.4.191
Wildcard Mask 0.0.0.63

SWITCH MANAGEMENT
Specification Values
Hosts needed 20
Hosts availbale 30
Unused hosts 10
Network address 172.16.4.192
Ip mask(Descimal) 255.255.255.224
Ip mask(slash notation /27

20
Usable range of Ip Address 172.16.4.193 - 172.16.4.210
Broadcast Address 172.16.4.211
Wildcard Mask 0.0.0.31

3.2. VLAN Design

VLAN table addressing

A virtual LAN (VLAN) is any broadcast domain that is divided and isolated in a computer network at the data link
layer (OSI layer 2). LAN is shortening for local area network. To subdivide a network into virtual LANs, one
configures network equipment. I have planned to give each subnet (VLAN) a VLAN number for easy
identification starting with a VLAN with the highest number of hosts.

VLAN NAME NAME NUMBER


COMPUTER_LAB 10
IP_PHONES 20
ADMINISTRATION 30
FACULTY 40
ACCOUNTING 50
DATA_CENTER 60
SWITCH_MANAGEMENT 99

3.3. Addressing Table

Addressing table

DEVICE(HOSTNAME) INTERFACE IP ADDRESS SUBNET MASK DEFAULT GATWAY


BUILDING A SWITCH VLAN 99 NIL
BUILDING A SWITCH VLAN 99 NIL
BUILDING A SWITCH VLAN 99 NIL
BUILDING A SWITCH VLAN 99 NIL
BUILDING A SWITCH VLAN 99 NIL
BUILDING A SWITCH VLAN 99 Nil

Port Assignment

BUILDING A SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-15 VLAN 50-accounting
Fa0/16-20 VLAN 40-faculty
Fa0/21-24 VLAN 10-computer_lab

21
BUILDING A SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-15 VLAN 50-accounting
Fa0/16-20 VLAN 40-faculty
Fa0/21-24 VLAN 10-computer_lab
BUILDING A SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-15 VLAN 50-accounting
Fa0/16-20 VLAN 40-faculty
Fa0/21-24 VLAN 10-computer_lab

BUILDING B SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-0/15 VLAN 50-accounting
Fa0/16-0/20 VLAN 40-faculty
Fa0/21-0/24 VLAN 10-computer_lab

BUILDING C SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-0/15 VLAN 50-accounting
Fa0/16-0/20 VLAN 40-faculty
Fa0/21-0/24 VLAN 10-computer_lab

BUILDING B SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-0/15 VLAN 50-accounting
Fa0/16-0/20 VLAN 40-faculty
Fa0/21-0/24 VLAN 10-computer_lab

DATA CENETR SWITCH


PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)

22
3.4. Virtual Tree Protocol Design

Virtual tree protocol

VTP shapes a logical loop-free topology for Ethernet networks. The basic purpose of STP is to avoid bridge
loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include
spare (redundant) links to provide automatic backup paths if an active link fails.

CORE SWITCH 1
ROLE Server
DOMAIN Pro11
PASSWORD Cisco

CORE SWITCH 2
ROLE Transparent
DOMAIN Pro11
PASSWORD Cisco

BUILDING A SWITCH
ROLE Client
DOMAIN Pro11
PASSWORD Cisco

BUILDING B SWITCH
ROLE Client
DOMAIN Pro11
PASSWORD Cisco

BUILDING C SWITCH
ROLE Client
DOMAIN Pro11
PASSWORD Cisco

BUILDING D SWITCH

23
ROLE Client
DOMAIN Pro11
PASSWORD Cisco

DATA CENTRE SWITCH


ROLE Client
DOMAIN Pro11
PASSWORD Cisco

3.5. Logical network design

A logical network defined by its IP addressing scheme.

24
4.0. Final project

4.1. Implementation of the design (simulation)


The project have gone various stages of design hence the need for implementation is ideal as all the
information gathering gone well as planned. Networking simulation was implemented using packet
tracer version 6.3 as to implement and test networking between various planned vlan as well as to see if
the devices are able to reach each other.

4.2 Testing techniques

The following screen shots shows the configurations implemented on core routers, distribution switches
as well as the access switches respectively. After the switch was configured, a show run command was
issued to show what has been configure on the switch, some of the show run information has been
omitted. The screen shot below shows that the switch has been named to distribution and the vlans have
been created accordingly. Testing was done using packet tracer. Screen shots have being shot to show
the results as per the test.

25
26
It shows that the distribution switch is operating as a vtp server, these means that the switch will be abke to
replicate the configured vlan to client switches if they are on the same domain and uses the same domain
password

27
28
29
4.3 Project evaluation
The project has gone well during all the phases of the project, the only problem uncounted was during the
design as the simulated had to take time to run the commands. The other problem faced during implementation
was that the vlans could one communicate within themselves but there could not reach re service provider
equipment. All in all I can say the project is well executed.

30

You might also like