Professional Documents
Culture Documents
ON
Networking Technologies
And
Its Design and Implementation
Lastly, I would like to thank the almighty and my parents for their moral
support and my friends with whom I shared my day-to-day experience and
received lots of suggestions that improved my quality of work.
DECLARATION
i Acknowledgement
ii Certificate
Project Review
1. NETWORK TOPOLOGY
1. TYPES OF NETWORKS
2. PHYSICAL TOPOLOGY
3. LAYER-3 DEVICES
4. LAYER-2 DEVICES
6. LAN Solution
7. END-USER DEVICES
8. LOGICAL TOPOLOGY
9. IP ADDRESSING
Project Work
4. IP ADDRESSING STRUCTURE
5. IP ADDRESS CLASSES
6. SUBNETTING
7. SWITCHING
8. VIRTUAL LAN
9. SWITCH CONFIGURATION
10. ROUTING
Bibliography
NETWORK TOPOLOGY
A network consists of a:
The network operating system (Windows NT/2000TM/Xp) on
the users PC (client) and server.
The cables connecting all network devices (users PC, server,
peripherals, etc.).
All supporting network components (hubs, routers and
switches, etc.).
Computer Network means an interconnected collection of
autonomous computers.
Requirement of Networking
Resource sharing- To make all programs, equipment, and especially
data available to anyone on the network without regard to the physical
location of the resource and the user.
These are the reasons that forced the inventerors to invent the
networking devices, models and protocols etc.
And the birth of Networking took place in 1844 when for the first time
Samuel Morse send the first telegraph message.
TYPES OF NETWORKS
PHYSICAL TOPOLOGY
EQUIPMENTS
List of all equipments required for setting up the internal network
of the building for visit in MNCs.
EQUIPMENT QTY DESCRIPTION
CISCO 2960 Layer 2 9 24 Fast-Ethernet ports, 2
Switch Gigabit Ethernet ports
LAYER-2 DEVICES
CISCO 2960 Gigabit Ethernet Switch
END-USER DEVICES
HP Blade Servers
1) Network address
2) Host address
145.24 53.198
Class D- It is used for multicast. It has first bit value of 1, second bit
value of 1, third bit value of 1 and fourth bit value of 0. The other 28
bits are used to identify the group of computers the multicast
messages is intended for.
Net Host or Node
224
24.54.145
Private IP
MASKING
SUBNETTING
8 24-x x
Network Subnet Host
16 16-x
x
Network Subnet Host
24 8-x
x
Network Subnet
Host
And due to this mask changes to subnet mask and now the network
address also includes subnet address.
Example
Suppose, you have just been hired by a new company and need to add
on to the existing network. There is no problem with starting over with
a new IP address scheme. Should you use a VLSM classless network or
a classful network?
Lets just say you happen to have plenty of address space because you
are using the Class A 10.0.0.0 private network address in your
corporate environment and cant even come close to imagining that
youd ever run out of IP addresses. Why would you want to bother with
the VLSM design process?
INTRODUCTION TO ROUTER
3.2
Interface The exit interface a packet will take when destined for a
specific network.
A router in an internetwork
o Each router interface is a broadcast domain. Routers break up
broadcast domains by default and provide WAN services.
MAC (Media Access Control) . The IEEE 802.3 (Ethernet) and 802.5
(Token Ring) are the MAC sub layers of these two LAN data-link
protocols.
Unicast address: Fancy term for a MAC that represents a single LAN
interface.
VLANS (Virtual LANs)
Below figures shows the different WAN connection types that can be
used to connect distant devices.
Synchronous serial
When youve got plenty of cash, this is really the way to go because it
uses synchronous serial lines up to 45Mbps. HDLC and PPP
encapsulations are frequently used on leased lines.
Circuit switching When you hear the term circuit switching, think
phone call. The big advantage is costyou only pay for the time you
actually use. No data can transfer before an end-to-end connection is
established. Circuit switching uses dial-up modems or ISDN and is
used for low-bandwidth data transfers.
IP ADDRESS CLASSES
SUBNETTING
The customer network using the single ISR is badly
overloaded. The proposed solution is to add a second
networking device, a larger ISR, and to divide the single
network into two separate networks.
For security purposes, the wireless and wired users need to be
on separate local networks.
In the subnetting scheme for HCL CDC, we utilize the concept
of classless subnetting where we use custom subnets to
differentiate the networks.
Routers distinguish between networks by using the subnet
mask to determine which bits make up the network ID and
which bits make up the host portion of the address. When a
network is partitioned, the router needs a modified or custom
subnet mask to distinguish the subnets from each other. A
default subnet mask and a custom subnet mask differ from
each other as follows: Default subnet masks only change on
octet boundaries. For instance, the default subnet mask for a
Class A network is 255.0.0.0. Custom subnet masks take bits
from the host ID portion of the IP address and add them to the
default subnet mask.
SWITCHING
A switch is a device that is able to direct a stream of messages
coming in one port, out of another port based on the
destination MAC address within the frame. A switch cannot
route traffic between two different local networks. In the
context of the OSI model, a switch performs the Layer 2,
known as the data-link layer function.
Only one message can be sent through an Ethernet hub at a
time. It is possible for two or more hosts connected to a hub to
attempt to send a message at the same time. If this happens,
the electronic signals that make up the messages collide with
each other at the hub.
A collision causes the messages to become garbled and
unreadable by the hosts. A hub does not decode the
messages; therefore it does not detect that the message is
garbled and repeats it out all the ports. The area of the
network where a host can receive a garbled message resulting
from a collision is known as a collision domain.
A switch is preferred over hubs in the networking model of HCL
CDC because of the large collision domain associated with
hubs. Since a switch uses micro-segmentation, it narrows
down the collision domain. The network of HCL CDC uses 9
CISCO switches, which can result in a huge broadcast domain.
So, to minimize the domain, we have used the concept of
Virtual LAN (VLAN).
VIRTUAL LAN
A VLAN is a logical broadcast domain that can span multiple
physical LAN segments. It allows an administrator to group
together stations by logical function, by project teams, or by
applications, without regard to physical location of the users.
A VLAN has two major functions:
A VLAN contains broadcasts.
A VLAN groups devices. Devices located on one VLAN are
not visible to devices located on another VLAN.
Configuring a VLAN:
In order to configure VLAN on a switch, connect it with a
terminal device using a console cable.
Enter the privileged mode using the enable command
Switch>enable
Switch#
Enter the configuration mode using the configure terminal
command
Switch# configure terminal
Switch (config) #
Enter the name and VLAN number using the commands
Switch(config)#vlan vlan_number
Switch(config-vlan)#name vlan_name
Switch(config-vlan)#exit
Use the following commands to assign individual ports to
VLANs:
Switch(config)#interface fa#/#
Switch(config-if)#switchport access vlan vlan_number
Switch(config-if)# exit
Use the following commands to assign a range ports to
VLANs:
Other Switches
SWITCH INTERFACE MODE VLAN ID
Main Deptt. Fa E 0/1-0/6 Access 18
Switch
Fa E 0/7-0/11 Access 19
Gb E 1/1 Trunk 1-1005
The host from the sending VLAN forwards traffic to the router
using the default gateway. The sub-interface for the VLAN
specifies the default gateway for all hosts in that VLAN. The
router locates the destination IP address and does a routing
table lookup.
If the destination VLAN is on the same switch as the source
VLAN, the router forwards the traffic back down to the source
switch using the subinterface parameters of the destination
VLAN ID. This type of configuration is often referred to as a
router-on-a-stick.
If the exit interface of the router is 802.1Q-compatible, the
frame retains its 4-byte VLAN tag. If the outbound interface is
not 802.1Q-compatible, the router strips the tag from the
frame and returns the frame to its original Ethernet format.
To configure inter-VLAN routing, use the following steps:
1. Configure a trunk port on the switch.
Switch(config)#interface fa0/2
Switch(config-if)#switchport mode trunk
ADDRESSING SCHEME
ROOM IP ADDRESS SUBNET MASK DEFAULT
RANGE GATEWAY
Managers 192.168.2.210 255.255.255.24 192.168.2.20
Office -222 0 9
INTERNET CONNECTION
The Internet is a network of networks that connects users in
every country in the world. There are currently over one billion
Internet users worldwide.
Any home, business or organization that wants to connect to the
Internet must use an Internet Service Provider (ISP). An ISP is a
company that provides the connections and support to access the
Internet. It can also provide additional services such as Email and
web hosting.
ISPs are essential to gaining access to the Internet. No one gets
on the Internet without a host computer, and no one gets on the
Internet without going through an ISP. ISPs range in size from
small to very large and differ in terms of the area they service.
ISPs also differ in the types of connection technologies and
speeds they offer.
ISP LEVELS OF SERVICE
When data is transferred, it is either uploaded or downloaded.
Downloading refers to information coming from the Internet to
your computer, while uploading indicates the reverse path, from
your computer to the Internet. When the download transfer rate
is different from the upload transfer rate, it is called asymmetric.
When the transfer rate is the same in both directions, it is called
symmetric. ISPs can offer both asymmetric and symmetric
services.
Books:-
Sites:-
www.about.com
http://Subscript.org/wiki/