Networking Sample 1
Networking Sample 1
1.2. Introduction
The computer network has become a strategic asset in most enterprises, improving communication and
collaboration, reducing operational expenditure through consolidation and centralisation, and driving
innovation through leveraging technology
Internetworking the communication between two or more networks encompasses every aspect of
connecting computers together. Internetworks have grown to support vastly disparate end-system
communication requirements. An internetwork requires many protocols and features to permit
scalability and manageability without constant manual intervention. Large internetworks can consist of
the following three distinct components: Campus networks, which consist of locally connected users in a
building or group of buildings, wide-area networks (WANs), which connect campuses together, remote
connections, which link branch offices and single users
1
1.4. Proposed solution
BOITEKANELO COLLEGE will be upgrading their LAN infrastructure at their in Gaborone.
The networking infrastructure will consist, largely of Cisco equipment. This document outlines
the procedures that will be carried out for the successful deployment of the Cisco networking
infrastructure. Some of the details specified:
Physical topology
The LAN is the networking infrastructure that offers access to network communication services and
means for end users and devices spread within a single floor or building. a campus network is
created by communicating a set of LANs that are spread over a small geographic area. Campus
network design ideas are comprehensive to small networks that use a single LAN switch, up to very
large networks with many connections. wired LAN allows communication amongst devices in a
building or group of buildings, as well as interconnection to the WAN and Internet edge at the
network core. Precisely, this design offers a network basis and services that enable:
• Tiered LAN connectivity.
• Wired network access for employees.
• IP Multicast for efficient data distribution.
• Wired infrastructure ready for multimedia services.
The campus wired LAN uses a hierarchical design model to break the design up into modular groups
or layers. Breaking the design up into layers allows each layer to implement specific functions,
which simplifies the network design and therefore the deployment and management of the network.
A hierarchical LAN design includes the following three layers:
Access layer- the design will start at the wiring and down to the core of the network. Since there are
about 1000 users for these network, there will be 41 PoE 24 port cisco 2960 series switches. Two
2
switches will be installed in a wiring closet to support 48 users and ip phones. These switches
support 100/1000 megabits and 4 gigabits and these switches have capabilities to support 1002
VLANs in total. Loop free topology based on port aggregation, utilizing full link bandwidth (active-
active links with no blocking ports). Avoidance of STP (Spanning Tree Protocol) to build loop free
network paths, which results in a sub-optimal and asymmetrical forwarding topology. With VSS
loops are avoided since the two core devices are viewed as one and pairs of up links are aggregated.
The access layer will provide a set of network services that will support advanced technologies, such
as voice and video. The access layer will provide specialized access for devices using advanced
technologies, to ensure that traffic from these devices is not impaired by traffic from other devices
and also to ensure efficient delivery of traffic that is needed by many devices in the network.
Distribution layer
Access layer switches has 4 gigabit fast Ethernet ISL uplink, to maximize redundancy, each of the
links will terminate on different distribution switches. The distribution layer will be made of two
3560-24 port gigabit port switches. These switches will connect the access layer with the core of the
network. Variable subnets (VLAN’s) will be managed at these layer. Switches will be
interconnected to provide redundancy in case one distribution switch malfunction. Network scaling-
aggregating two Ethernet links between the switches to enables network scaling from distribution to
access layer. These will be accomplished by etherchannel protocol
Core layer
Connecting to the core layer will be by the use of standalone routers. A total of 2 cisco 2901 series
routers with 8 gigabit fast Ethernet port adapters.
3
Figure 1. Access layer, distribution and core layer diagram
Structured Cable
Three different types of UTP cables are commonly encountered in the network environment:
Straight-through cables have the same pinout on both ends. They normally are used to connect
unalike devices, such as a switch and a computer or a switch and a router.
Crossover cables have transmit pins on one end joined to the receive pins on the other end. This
cable is used to connect similar devices, such as two computers, two switches, or two routers.
Crossover cables can also be used to connect a computer directly to a router interface.
When planning a structured cabling project, the major step is to acquire a perfect floor plan. The
floor plan lets the technician to find possible wiring closet locations, cable runs, and which electrical
areas to avoid. Afterward the technician has recognized and established the locations of network
devices, it is time to draw the network on the floor plan. Some of the more significant items to
document include the following:
Patch cable: A small cable from the computer to the wall jack the user work area.
Horizontal cable: A cable from the wall jack to the distribution area.
Backbone cable: part of a network that handles major traffic.
Location of wiring closet: An area to keep the hub or switch.
4
IP addressing
An IP address uniquely identifies a device on an IP network. Allocating, recycling, and documenting
IP addresses and subnets in a network can get confusing very quickly if you have not laid out an IP
addressing plan. By following recommended IP address management standards, we will avoid;
overlapping or duplicate subnets, un-summarized routes in the network, duplicate IP address device
assignments, wasted IP address space And Unnecessary complexity
IP address class B block size will be used for these project and Variable Length Subnet Masks
(VLSMs) to allow the use of different masks for each subnet, and thereby use address space
efficiently. We will use VLSM to create a larger subnet of more than 255 host addresses, create very
small subnets for WAN links and configure loopback addresses
1.5.2 Objectives
The main goals of following the proposed design are articulated below:
1. Scalability and flexibility and redundancy: The modular nature of the design as
well as the proposed devices makes it flexible and scalable.
2. Security and Resiliency: The proposed design promotes separation of data from
different sections of the organisation, enabling enforcement of network policies
for data access. Multiple links are also included for all devices, building in
resiliency in terms of link and device failure (in some cases).
3. Future Readiness: The proposed design incorporates best of breed technology
based on a Unified access paradigm, promoting consolidation and virtualization
and the associated benefits
5
1.6. Project scope
While the requirements are being gathered, the designer will identify the issues that affect the entire
network and those that affect only specific portions, this will help in isolating areas of concern and
identify the scope of the project. Failure to understand the impact of a particular requirement often
causes a project scope to expand beyond the original estimate. This oversight can greatly increase the
cost and time required to implement the new design. The main scope of these project include the
following;
Improving the efficiency of network addressing-creation of VLANs
Integrating new security measures-introducing IP access control lists in the network
Adding new network services, such as voice traffic
Relocating servers to a data center server farm
Improving Internet connectivity and adding bandwidth
Updating access layer LAN cabling
Providing redundancy for key services
Upgrading WAN bandwidth
Ethical issues plays a major role to these project by attaining benefits and maintaining agreed
standards. Those will be privacy, accuracy, property and accessibility.
Privacy: the college information will be kept safe and secure as agreed and the information will
belong only to the college. The information will not be revealed to any other company
Accuracy: Boitekanelo college management must check out information accuracy, fidelity and
authentication responsibilities, if there are any errors they have check out, the information will be
recollected again so as to attain relevant information
The users of these network will continue working as normal, the only time they will face down
time periods is during the replacement of the equipment.
6
2. Chapter 2
2.1. Literature review
The LAN is the networking infrastructure which offers an access to network communication services
and resources for end users and devices spread over a sole floor or building. One is able to create a
campus network by connecting a group of LANs that are spread over a small geographic area. Campus
network design thoughts are inclusive small networks that use a single LAN switch to very large
networks with thousands of connections (cisco systems, 2017).
Campus wired LAN allows communications among devices in a building or group of buildings, as well
as interconnection to the WAN and Internet edge at the network core. Precisely, this design offers a
network foundation and services that enable:
The campus wired LAN uses an ordered design model to break the designs into modular groups or
layers. Breaking the design into layers enable each layer to put into effect specific functions, which
simplifies the network design and consequently the distribution and management of the network.
Modularity in network designs allows one to form design elements that can be simulated the entire
network. Simulation offers an easy way to measure the network as well as the network as well as a
reliable distribution method. In flat or meshed network architectures, changes seem to affect a large
number of systems. Ordered designs helps constrain functional changes to a subset of the network,
which enables easy management as well as improving resiliency. Modular structuring of the network
into small, simple elements also enables resiliency through improved fault isolation (campus network
design fundamentals, 2017).
Fundamental Design Goals- when carefully examined, these requirements interprets into four
fundamental network design goals:
7
Scalability: Scalable network designs can grow to encompass new user groups and remote sites and can
support new applications without having an impact on the level of service delivered to existing users.
Availability: A network designed for availability is the one that brings consistent, consistent
performance, 24 hours a day, 7 days a week. Furthermore, the failure of a single link or piece of
equipment should not pointedly impact network performance (campus network design fundamentals,
2017).
Security: Security is a piece that must be designed into the network, not added on after the network is
complete. In preparing the location of security devices, filters, and firewall features is important to
safeguarding network resources.
Manageability: Despite how good the initial network design is, the available network staff should be
able to manage and support the network. A network that is too challenging cannot function well and
efficiently.
The measures listed here offer an additional security to networking devices at the access layer are setting
strong passwords, using Secure Shell (SSH) to administer devices and disabling unused ports. Switch
port security and network access control can ensure that only known and trusted devices have access to
the network (campus network design fundamentals, 2017)
Table 1
8
obliged to support, be sure to consider how
many users will be added over the next 12
months, and how many network printers and
network servers the network has to
accommodate.
Present network infrastructure and physical In what way many networking devices are
arrangement connected in your network? What purposes
do they perform? Accepting the existing
number and types of networking equipment
that are currently connected is critical to being
able to plan for the upgrade. It is also
essential to file any configurations that are
loaded on the existing devices
9
services required Are there any new services be required either
now or in the future? Will the college be
using VoIP or videoconferencing technology?
Numerous services have a need of special
equipment or configurations to enhance their
performance.
The design of a network upgrade initiates after the first site survey and report are thorough. It involves
five distinct phases:
10
If the first two steps are properly done, therefore the implementation phase may be performed
without incident. If there were any tasks which were ignored during the earlier phases, they must
be modified during implementation
4. Phase 4: Operation
In this phase, the network is said to be live and performs all the tasks it has been designed to
Complete. If all steps up to this point have been properly completed
PacketTracer version 6.2: Packet Tracer is a cross-platform visual simulation program which is
designed by Cisco Systems that allows users to produce network topologies and imitate modern
computer networks. The software also allows users to simulate the configuration of Cisco routers and as
such, it switches using a simulated command line interface. Version 6.2 added support for IOS version
15 and Hot Standby Routing Protocol. Version 6.2 added support for various DHCP, EIGRP and OSPF
commands, improved support for Zone-Based Firewall policies.
11
ConceptDraw PRO: is a registered diagramming software which is used to create business graphics,
including diagrams, flowcharts, Infographics, data visualization for business process models, data
presentation and as well as project management documentation. It can also be used for producing
professional and technical diagrams, such as UML diagrams, computer networks topology, engineering
schemes and other technical graphic formats
SmartSheet: Is a software as a service (SaaS) application for combining and work management
developed and marketed by Smartsheet.com, Inc. Its use include assigning tasks, track project progress,
manage calendars, share documents and also to manage other work. It has a spreadsheet-like user
interface.
Device connectivity: The proposed network upgrade intend to provide high-bandwidth device
connectivity, to enable the network a transparent part of an end-user’s day-to-day job, the access layer
will support high-bandwidth traffic when users perform routine tasks, which includes sending large
emails or opening a file from an internal web page. Many types of end-user devices consequently join at
the access layer personal computers, IP phones, wireless APs, and IP video surveillance cameras, the
access layer will support many logical networks, delivering benefits for performance, management, and
security
Advanced technology capabilities: it is a set of network services that support advanced technologies,
such as voice and video. The proposed network equipment will provide a specified access for devices
using advanced technologies. In order to ensure that traffic from these devices is not impaired by traffic
from other devices, and also to ensure efficient delivery of traffic that is needed by many devices in the
network.
12
Scalability: At any building with more than two or three access-layer devices, it is impossible to
interconnect all access switches, the distribution layer will then serve as aggregation point for multiple
access-layer switches.
Self-healing: The network shall be continuously on and available, in respect to the high availability
concepts for both a resilient wired switching infrastructure. Resiliency not only based on the component
of redundancy and how interconnections are made in the modular campus design but also for
capabilities that can enhance that physical resiliency.
Self-defending: Creation of VLANs (Virtual LAN) for security. Since VLANs divide a network,
creating multiple broadcast domains, they efficiently let traffic from the broadcast domains to stay
isolated whereas increasing the network's bandwidth, availability and security
Self-optimizing: new equipment installed shall be able to adapt to varying needs, beyond the edges of
just the simple published standards, is a key need for more innovative networks. Basic standards don’t
address a particular organization’s determination on how devices must behave on their network.
Self-aware: effort to change through insight into network activity, the best networks can report insight
into traffic that they transport and how it relates to an organization’s mission
The system shall be able to handle up to 10000 concurrent users and satisfying all their desires
The network devices will be usable only in authorized means by authorized users.
Network speed and throughput shall be as per the decided limit with the service provider
Network latency shall be minimal.
It is a diagram that visualize depiction of network architecture and It also maps out the structure of a
network with a range of different symbols and line connections. It is the perfect way to share the design
13
of a network because the visual presentation makes it easier for users to understand how items are
connected.
14
15
Network Upgrade Plan
Site Survey Report
Number of Current
Application Network
user and types Project growth internet
requirements Infrastructure
of Equipment connectivity
Created of Overlooked
Is the design
Analysis report multiple tasks should Network is live
appropriate?
designs be corrected
Record
Prototypes
changes and
Upgrade path created and
monitor
tested
operation
16
2.6. Project Plan
17
2.7. References
3.1. Subnetting
IP Addressing and Subnetting (VLAN structure)
The core objective is to make IP addressing as simpler to minimize the cost of addresses, moves, and changes.
Previously, each computer had to be manually configured with an IP address, address mask, and default
gateway. The college has a maximum of 1000 users, the network is using 10.0.0.0 address block without the use
of subnets hence wasting precious IP address and also making these network to become a single broadcast
domain. Variable length subnetting will be introduced to cancel wastage of IPs
Variable-Length Subnet Masking (VLSM) amounts to "subnetting subnets," which means that VLSM permits
network engineers to divide IP address space into a hierarchy of subnets of dissimilar sizes and making it
possible to create subnets with very different host counts without wasting large numbers of addresses. In kanelo
campus design, the college will have 7 un-equal subnets (VLANs). The following tables shows details about the
different subnets
Computer_Lab
Specification Values
Hosts needed 500
Hosts availbale 510
Unused hosts 10
Network address 172.16.0.0
Ip mask(Descimal) 255.255.254.0
Ip mask(slash notation /23
Usable range of Ip Address 172.16.0.1 - 172.16.1.254
Broadcast Address 172.16.1.255
Wildcard Mask 0.0.1.255
18
IP PHONES
Specification Values
Hosts needed 200
Hosts availbale 254
Unused hosts 54
Network address 172.16.2.0
Ip mask(Descimal) 255.255.255.0
Ip mask(slash notation /24
Usable range of Ip Address 172.16.2.1 - 172.16.2.254
Broadcast Address 172.16.2.2550.0.0.255
Wildcard Mask 0.0.0.255
ADMINISTRATION
Specification Values
Hosts needed 100
Hosts availbale 126
Unused hosts 26
Network address 172.16.3.0
Ip mask(Descimal) 255.255.255.128
Ip mask(slash notation /25
Usable range of Ip Address 172.16.3.1 - 172.16.3.126
Broadcast Address 172.16.3.127
Wildcard Mask 0.0.0.127
FACULTY
Specification Values
Hosts needed 100
Hosts availbale 126
Unused hosts 26
Network address 172.16.3.128
Ip mask(Descimal) 255.255.255.128
Ip mask(slash notation /25
Usable range of Ip Address 172.16.3.129 - 172.16.3.254
Broadcast Address 172.16.3.255
Wildcard Mask 0.0.0.127
ACCOUNTING
Specification Values
Hosts needed 50
Hosts availbale 62
Unused hosts 12
19
Network address 172.16.4.0
Ip mask(Descimal) 255.255.255.192
Ip mask(slash notation /26
Usable range of Ip Address 172.16.4.1 - 172.16.4.62
Broadcast Address 172.16.4.63
Wildcard Mask 0.0.0.63
DATACENTER
Specification Values
Hosts needed 50
Hosts available 62
Unused hosts 12
Network address 172.16.4.64
Ip mask(Decimal) 255.255.255.192
Ip mask(slash notation /26
Usable range of Ip Address 172.16.4.65 - 172.16.4.126
Broadcast Address 172.16.4.127
Wildcard Mask 0.0.0.63
SWITCH MANAGEMENT
Specification Values
Hosts needed 50
Hosts availbale 62
Unused hosts 12
Network address 172.16.4.128
Ip mask(Descimal) 255.255.255.192
Ip mask(slash notation /26
Usable range of Ip Address 172.16.4.129 - 172.16.4.190
Broadcast Address 172.16.4.191
Wildcard Mask 0.0.0.63
SWITCH MANAGEMENT
Specification Values
Hosts needed 20
Hosts availbale 30
Unused hosts 10
Network address 172.16.4.192
Ip mask(Descimal) 255.255.255.224
Ip mask(slash notation /27
20
Usable range of Ip Address 172.16.4.193 - 172.16.4.210
Broadcast Address 172.16.4.211
Wildcard Mask 0.0.0.31
A virtual LAN (VLAN) is any broadcast domain that is divided and isolated in a computer network at the data link
layer (OSI layer 2). LAN is shortening for local area network. To subdivide a network into virtual LANs, one
configures network equipment. I have planned to give each subnet (VLAN) a VLAN number for easy
identification starting with a VLAN with the highest number of hosts.
Addressing table
Port Assignment
BUILDING A SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-15 VLAN 50-accounting
Fa0/16-20 VLAN 40-faculty
Fa0/21-24 VLAN 10-computer_lab
21
BUILDING A SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-15 VLAN 50-accounting
Fa0/16-20 VLAN 40-faculty
Fa0/21-24 VLAN 10-computer_lab
BUILDING A SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-15 VLAN 50-accounting
Fa0/16-20 VLAN 40-faculty
Fa0/21-24 VLAN 10-computer_lab
BUILDING B SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-0/15 VLAN 50-accounting
Fa0/16-0/20 VLAN 40-faculty
Fa0/21-0/24 VLAN 10-computer_lab
BUILDING C SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-0/15 VLAN 50-accounting
Fa0/16-0/20 VLAN 40-faculty
Fa0/21-0/24 VLAN 10-computer_lab
BUILDING B SWITCH
PORTS ASSINMENT NETWORK
Fa0/1-05 802.1q trunks(native VLAN 99)
Fa0/6-0/10 VLAN 30-administration
Fa0/11-0/15 VLAN 50-accounting
Fa0/16-0/20 VLAN 40-faculty
Fa0/21-0/24 VLAN 10-computer_lab
22
3.4. Virtual Tree Protocol Design
VTP shapes a logical loop-free topology for Ethernet networks. The basic purpose of STP is to avoid bridge
loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include
spare (redundant) links to provide automatic backup paths if an active link fails.
CORE SWITCH 1
ROLE Server
DOMAIN Pro11
PASSWORD Cisco
CORE SWITCH 2
ROLE Transparent
DOMAIN Pro11
PASSWORD Cisco
BUILDING A SWITCH
ROLE Client
DOMAIN Pro11
PASSWORD Cisco
BUILDING B SWITCH
ROLE Client
DOMAIN Pro11
PASSWORD Cisco
BUILDING C SWITCH
ROLE Client
DOMAIN Pro11
PASSWORD Cisco
BUILDING D SWITCH
23
ROLE Client
DOMAIN Pro11
PASSWORD Cisco
24
4.0. Final project
The following screen shots shows the configurations implemented on core routers, distribution switches
as well as the access switches respectively. After the switch was configured, a show run command was
issued to show what has been configure on the switch, some of the show run information has been
omitted. The screen shot below shows that the switch has been named to distribution and the vlans have
been created accordingly. Testing was done using packet tracer. Screen shots have being shot to show
the results as per the test.
25
26
It shows that the distribution switch is operating as a vtp server, these means that the switch will be abke to
replicate the configured vlan to client switches if they are on the same domain and uses the same domain
password
27
28
29
4.3 Project evaluation
The project has gone well during all the phases of the project, the only problem uncounted was during the
design as the simulated had to take time to run the commands. The other problem faced during implementation
was that the vlans could one communicate within themselves but there could not reach re service provider
equipment. All in all I can say the project is well executed.
30