+ All Categories
Home > Documents > Synopsis Network

Synopsis Network

Date post: 06-Apr-2018
Category:
Upload: saba-wasim
View: 225 times
Download: 0 times
Share this document with a friend
46
A SUMMER TRAINING SYNOPSIS BASED ON Networking Technologies And Its Design and Implementation AT SUBMITTED TO: - SUBMITTED BY:- DR. Afshar Alam (HOD) Name: Saba Wasim HAMDARD UNIVERSITY , Class: B.Tech (IT) NEW DELHI University Roll No.- 2007-311-030  
Transcript
Page 1: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 1/46

A

SUMMER TRAINING SYNOPSIS BASED

ON

“ Networking Technologies

And

Its Design and Implementation ”

AT

SUBMITTED TO: - SUBMITTED BY:-

DR. Afshar Alam (HOD) Name: Saba Wasim

HAMDARD UNIVERSITY, Class: B.Tech (IT)

NEW DELHI University Roll No.- 2007-311-030

Page 2: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 2/46

ACKNOWLEDGEMENT

It is my pleasure to be indebted to various people, who directly or indirectly

contributed in the development of this work and who influenced my thinking

behavior, and acts during the course of study.

I express my sincere gratitude to DR.AFSHAR ALAM, worthy HOD for

providing me an opportunity to undergo summer training at HCL CDC

I am thankful to Mr AKHLIESH SINGH for his support, cooperation, and

motivation provided to me during the training for constant inspiration,

presence and blessings.

Lastly, I would like to thank the almighty and my parents for their moral

support and my friends with whom I shared my day-to-day experience and

received lots of suggestions that improved my quality of work.

SABA WASI

(Name of the student

Page 3: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 3/46

DECLARATION

I, Saba Wasim, student of B.Tech(IT) 5th Semester, studying atHamdard University, Hamdard Nagar New Delhi, hereby declarethat the summer training report on “Networking Technologiesand Design” submitted to Hamdard University, Hamdard Nagaris the original work conducted by me.

The information and data given in the report is authentic to the

best of my knowledge.

 This summer training report is not being submitted to any otherUniversity for award of any other Degree, Diploma and

Fellowship.

 

Saba Wasim

(Name of the student)

Page 4: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 4/46

TABLE OF CONTENT 

i Acknowledgement

ii Certificate

iii Table of Content

iv.About HCL CDC

Project Review

1. NETWORK TOPOLOGY 1. TYPES OF NETWORKS

2. PHYSICAL TOPOLOGY

3. LAYER-3 DEVICES

4. LAYER-2 DEVICES

5. LAYER-1 (PHYSICAL) DEVICES

6. LAN Solution

7. END-USER DEVICES

8. LOGICAL TOPOLOGY

Page 5: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 5/46

9. IP ADDRESSING

10. INTRODUCTION TO ROUTER

11. VLANS (Virtual LANs)

Project Work

1. ADDRESSING INFORMATION OF LAYER-3 DEVICES

2. ADDRESSING INFORMATION OF LAYER-2 DEVICES

3. COMPLETE LOGICAL NETWORK TOPOLOGY

4. IP ADDRESSING STRUCTURE

5. IP ADDRESS CLASSES

6. SUBNETTING

7. SWITCHING

8. VIRTUAL LAN

Page 6: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 6/46

9. SWITCH CONFIGURATION

10. ROUTING

11. ADDRESSING SCHEME

12. INTERNET CONNECTION

13. ISP LEVELS OF SERVICE

Result and Conclusions

Bibliography

Page 7: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 7/46

About HCL CDC

As the training arm of HCL Infosystems, HCL Career DevelopmentCentre (CDC) carries forth a legacy of excellence spanning acrossmore than three decades. HCL CDC is an initiative that enablesindividuals and organisations to benefit from HCL's deep expertisein the IT space.

Among the fastest growing IT education brands in India, HCL CDCoffers a complete spectrum of quality training programs onsoftware, hardware, networking as well as global certifications inassociation with leading IT organisations worldwide.

Empowered with strategic alliances with leading IT organisations

in India and abroad, HCL CDC training solutions cater to diverseconsumer profiles including individuals, enterprises, academicinstitutions and Government enterprises

"We shall develop and Impart Industry relevant ICT Education tomeet the requirement of customers,Industry and society by

Page 8: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 8/46

continually updating technology content and improving ourprocesses"

Certification of quality standards

"In its pursuit of excellence", the company has developed aquality management system in line with ISO 9001:2000standard

Network Design And Implmentation

At

HCL CDC

Project Review

NETWORK TOPOLOGY

A network is a system that transmits any combination of voice, videoand/or data between users. A network can be defined by itsgeographical dimensions and by which the user’s PC access it.

A network consists of a:

• The network operating system (Windows NT/2000TM /Xp) on

the user’s PC (client) and server.

Page 9: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 9/46

• The cables connecting all network devices (user’s PC, server,

peripherals, etc.).

• All supporting network components (hubs, routers and

switches, etc.).Computer Network means an interconnected collection of autonomous computers.

Requirement of NetworkingResource sharing- To make all programs, equipment, and especiallydata available to anyone on the network without regard to the physicallocation of the resource and the user.

High reliability- As all files could be replicated on two or three

machines, so if one of them is unavailable (due to hardware failure),the other copies could be used.

Scalability- It is the ability to increase system performance graduallyas the workload grows just by adding more processors.A computer network can provide a powerful communication mediumalong widely separated employees.

The use of networks to enhance human-to-human communication willprobably prove more important than technical goals such as improved

reliability.

These are the reasons that forced the inventerors to invent thenetworking devices, models and protocols etc.

And the birth of Networking took place in 1844 when for the first timeSamuel Morse send the first telegraph message.

TYPES OF NETWORKS

Page 10: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 10/46

LOCAL AEA NETWORK (LAN)

A local area network (LAN) is a computer network covering a smallphysical area, like a home, office, or small groups of buildings, such as

a school, or an airport. The defining characteristics of LANs, in contrastto wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.

Switched Ethernet is the most common Data Link 

Layer implementation on local area networks. At the Network Layer,

the Internet Protocol (i.e. TCP/IP) has become the standard. Smaller

Page 11: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 11/46

LANs generally consist of one or more switches linked to each other—

often at least one is connected to a router, cable modem, or ADSL 

modem for Internet access.

Larger LANs are characterized by their use of redundant links with

switches using the spanning tree protocol to prevent loops, their ability

to manage differing traffic types via quality of service (QoS), and to

segregate traffic with VLANs. Larger LANs also contain a wide variety

of network devices such as switches, firewalls, routers, load balancers,

and sensors.[9]

LANs may have connections with other LANs via leased lines, leased

services, or by tunneling across the Internet using virtual private 

network technologies. Depending on how the connections are

established and secured in a LAN, and the distance involved, a LAN

may also be classified as METROPOLITAN AREA NETWORK (MAN)

In a simple network consisting of a few computers, it is easy tovisualize how all of the various components connect. As networksgrow, it is more difficult to keep track of the location of eachcomponent, and how each is connected to the network. Wirednetworks require lots of cabling and network devices to provideconnectivity for all network hosts.

When networks are installed, a physical topology map is createdto record where each host is located and how it is connected tothe network. The physical topology map also shows where thewiring is installed and the locations of the networking devices thatconnect the hosts. Icons are used to represent the actual physicaldevices within the topology map. It is very important to maintainand update physical topology maps to aid future installation andtroubleshooting efforts.

In addition to the physical topology map, it is sometimesnecessary to also have a logical view of the network topology. Alogical topology map groups hosts by how they use the network,no matter where they are physically located. Host names,addresses, group information and applications can be recorded onthe logical topology map.

Page 12: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 12/46

PHYSICAL TOPOLOGY

EQUIPMENTSList of all equipments required for setting up the internal networkof the building for HCL CDC.

Page 13: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 13/46

EQUIPMENT QTY DESCRIPTION

CISCO 2960 Layer 2Switch

9 24 Fast-Ethernet ports, 2Gigabit Ethernet ports

CISCO 2960 GigabitEthernet Switch

5 10 Gigabit Ethernet ports

Linksys WirelessIntegrated Router

3 4 Ethernet ports, 1 Internetport

CISCO 2800 IntegratedService Router

3 7 Gigabit Ethernet, 2 Serialports /6 Gigabit Ethernet, 3 Serial

ports

HP Blade Servers 3 1 Fast-Ethernet port

HP Storage Servers 2 For camera monitoring

IBM Desktop Computers 142 1 Fast-Ethernet port

IBM Laptop Computers 32 1 Fast-Ethernet port,

Integrated Wi-Fi

HP IP Printers 5 1 Fast-Ethernet port/ Wireless

Shielded Twisted PairCable (CAT-5)

2500’ 

Unshielded Twisted PairCable (CAT-5)

4700’ 

Page 14: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 14/46

DESCRIPTION OF DEVICESLAYER-3 DEVICES

• Linksys Wireless Integrated Router

An ISR combines features such as routing and switchingfunctions, security, voice, LAN and WAN connectivity intoa single device. It is designed for small offices and home-based users. It consists of one WAN connection (RouterPort) and four 10/100 Mbps switch ports. It providesservices at broadband speeds.

• CISCO 2800 Integrated Service Router

An ISR combines features such as routing and switchingfunctions, security, voice, LAN and WAN connectivity into

a single device. It is designed for enterprise branchoffices. It supports seven to eight 10/100/1000 MbpsGigabit Ethernet ports and two to three Serial ports. Itprovides services at broadband speeds using T1/E1connectioins.

LAYER-2 DEVICES

• CISCO 2960 Gigabit Ethernet Switch

A switch is a device that is able to direct a stream of messages coming in one port, out of another port basedon the destination MAC address within the frame. Itsupports ten Gigabit Ethernet ports. It is generally usedfor trunk lines which carry a huge amount of traffic.

• CISCO 2960 Layer 2 Switch

This type of switches does not use modules or flash cardslots. Due to this reason, their physical configuration

cannot be changed. It supports twentyfour 10/100 MbpsFast-Ethernet ports and two 10/100/1000 Mbps GigabitEthernet ports.

Page 15: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 15/46

LAYER-1 (PHYSICAL) DEVICES

• Shielded Twisted Pair Cable

They are used for high-speed data transmission. Theindividual pair of wires are wrapped in a shield and theentire four pairs are wrapped in another shield. Itsupports data transmission at rates as high as 1000 Mbps.It is generally used for trunk lines.

• Unshielded Twisted Pair Cable

UTP cable is inexpensive, offers a high bandwidth, and iseasy to install. This type of cable is used to connectworkstations, hosts and network devices. It can come

with many different numbers of pairs inside the jacket,but the most common number of pairs is four. Each pair isidentified by a specific color code. It supports datatransmission speeds of 100 Mbps.

END-USER DEVICES

• HP Blade Servers

These servers are high performance computers used in

businesses and other organizations. They provide themaximum concentration of computing power and stability.It also contains hot-swappable hard-drives.

• HP Storage Servers

These servers are used to store redundant parts of files inorder to prevent them from failing. Servers are usuallykept in secure areas where access is controlled.

• IBM Desktop Computers

These are general purpose computers which provide thebasic desktop services to users. It contains of a Fast-Ethernet port.

• IBM Laptop Computers

Page 16: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 16/46

These are mobile computers which supports both LAN andWAN connectivity.

• HP IP Printers

These are IP based printers which acts as a host on thenetwork. It contains either a Fast-Ethernet port or aWireless card.

LOGICAL TOPOLOGY

PROTOTYPE OF NETWORK TOPOLOGYThe network topology of the HCL CDC building can be

broadly categorized into three network layers: Access,

Distribution and Core Layer.

Page 17: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 17/46

IP ADDRESSING

Every machine on the internet has a unique identifying number, calledan IPAddress. A typical; IP address looks like this:216.27.61.45

Page 18: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 18/46

IP ADDRESS is a 32-bit number, usually written in dotted decimalform, that uniquely identifies an interface of some computer. This 32-bit number is divided into 4 octets each separated by a decimal. Outso many values certain values are restricted for use as typical IP

address. For example, the IP address 0.0.0.0 is reserved for thedefault network and the address 255.255.255.255is used forbroadcast.

Each IP address is split into 2 sections:

1) Network address

2) Host address

Individual IP address in same network all have a different value in thehost part of address, but they have identical value in network part,

 just as in town there are different street address but same ZIP code.

There are five IP classes:

Class A – This class is for very large networks, such as a majorinternational company. IP addresses with a first octet from 1 to 126are part of this class. The other three octets are each used to identifyeach host.

Net Host or Node

54. 24.54.43

Loopback- The IP address 127.0.0.1 is used as the loopback address.This means that it is used by the host computer to send a messageback to itself. It is commonly used for troubleshooting and networktesting.

Class B- Class B is used for medium-sized networks. A good example

is a large college campus. IP addresses with a first octet from 128to191 are part of this class. Class B addresses also include the secondoctet as part of the Net identifier. The other two octets are used toidentify each host.

Net Host or Node

Page 19: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 19/46

145.24 53.198

Class C- Class C addresses are commonly used for small to mid-sizebusiness. IP addresses with a first octet from192 to 223 are part of 

this class. Class C addresses also include the second and third octetsas part of Net identifier. The last octet is used to identify each host.

Net Host or Node

196.54.34 86

Class D- It is used for multicast. It has first bit value of 1, second bitvalue of 1, third bit value of 1 and fourth bit value of 0. The other 28bits are used to identify the group of computers the multicast

messages is intended for.Net Host or Node

22424.54.145

Class E- It is used for experimental purpose only.

Net Host or Node

240.

23.45.105

Private IP 

It is not necessary that every time we make a network we areconnected to some ISP (Internet Service Provider). So in that case werequire some private IP also which can be used in indigenous networks.In each class a range of IP addresses have been defined for thispurpose

CLASS A 10.0.0.1 to 10.255.255.244

CLASS B 172.16.0.1 to 172.34.255.254

CLASS C 192.168.0.0/16

Page 20: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 20/46

MASKING 

Computers use a mask to define size of network and host part of anaddress. Mask is a 32-bit number written in dotted decimal form. Itprovides us the network address when we perform a Boolean AND of 

mask with the IP address. It also define number of host bits in anaddress.

Classof address

Size of networkPart of address,in bits

Size of HostPart of address,in bits

Default Maskfor Each Classof Network

 A

8 24 255.0.0.0

B16 16 255.255.0.0

C 24 8 255.255.255.0

SUBNETTING 

Basically it is a process of subdividing networks into smaller subnets.In case we have 2-3 small networks but we cant buy IP address for

each and every network. So here we use the basic concept of SUBNETTING i.e using one public IP address we will give them IPaddress and make them independent networks. For this we take somebits of host address and use them for network address so we havedifferent independent networks

Address Format when Subnetting Is Used (class A,B,C resp.):

8 24-x x

Network Subnet Host

16 16-xx

Network Subnet Host

24 8-xx

Network SubnetHost

Page 21: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 21/46

And due to this mask changes to subnet mask and now the networkaddress also includes subnet address.

Example

If subnet mask is 255.255.240.0And an IP address for a computer is given as 142.16.52.4142.16.0.0 is network address0.0.48.0 is the subnet address0.0.4.4 is the host address of the computer

10001110.00010000.00110100.00000100 is ANDed with11111111.11111111.11110000.00000000and output is 10001110.00010000.00110000.00000000

here first two octets represents Network address and third octetrepresents subnet address.It can be compared with a postal address as there is only one ZIP code(Network address), different streets (Subnet address), and differenthouse number (Host address).

Why Bother with VLSM Design?

Suppose, you have just been hired by a new company and need to add

on to the existing network. There is no problem with starting over witha new IP address scheme. Should you use a VLSM classless network ora classful network?

Let’s just say you happen to have plenty of address space because youare using the Class A 10.0.0.0 private network address in yourcorporate environment and can’t even come close to imagining thatyou’d ever run out of IP addresses. Why would you want to botherwith the VLSM design process?

INTRODUCTION TO ROUTER 

It is an intelligent device. It works on networks layer. It is used forinternet work communication, packet switching, packet filtering andpath selection. It has no of broadcast and collision domain. By default

Page 22: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 22/46

router does not broadcast. Router understands different topology andprotocols. It works on full duplex mode.

ROUTER represents a separate network.

The Network layer (also called layer 3) manages device addressing,tracks the location of devices on the network, and determines the bestway to move data, which means that the Network layer must transporttraffic between devices that aren’t locally attached. Routers (layer 3devices) are specified at the Network layer and provide the routingservices within an internetwork. It happens like this: First, when apacket is received on a router interface, the destination IP address ischecked. If the packet isn’t destined for that particular router, it will

look up the destination network address in the routing table. Once therouter chooses an exit interface, the packet will be sent to thatinterface to be framed and sent out on the local network. If the routercan’t find an entry for the packet’s destination network in the routingtable, the router drops the packet. Two types of packets are used atthe Network layer: data and route updates.

Data packets Used to transport user data through the internetwork.Protocols used to support data traffic are called routed protocols;examples of routed protocols are IP and IPv6.

Route update packets Used to update neighboring routers about thenetworks connected to all routers within the internetwork. Protocolsthat send route update packets are called routing protocols; examplesof some common ones are RIP, RIPv2, EIGRP, and OSPF. Route updatepackets are used to help build and maintain routing tables on eachrouter.

Network addresses Protocol-specific network addresses. A routermust maintain a routing table for individual routing protocols becauseeach routing protocol keeps track of a network with a differentaddressing scheme (IP, IPv6, and IPX, for example).

Page 23: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 23/46

3.2

Interface The exit interface a packet will take when destined for aspecific network.

Metric It is the distance to the remote network. Different routingprotocols use different ways of computing this distance

Routers break up broadcast domains, which mean that by default,broadcasts aren’t forwarded. Routers also break up collision domains,but you can also do that using layer 2 (Data Link layer) switches.Because each interface in a router represents a separate network, itmust be assigned unique network identification numbers, and eachhost on the network connected to that router must use the same

network number.

A router in an internetwork

o Each router interface is a broadcast domain. Routers break up

broadcast domains by default and provide WAN services.

o Routers, by default, will not forward any broadcast or multicast

packets.

Page 24: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 24/46

1o Routers use the logical address in a Network layer header to

determine the next hop router to forward the packet to.1

o Routers can use access lists, created by an administrator, to control

security on the types of packets that are allowed to enter or exit aninterface.2

o Routers can provide layer 2 bridging functions if needed and can

simultaneously route through the same interface.

o Routers provide connections between virtual LANs (VLANs).

Because by creating contiguous blocks of addresses to specific areas of your network, you can then easily summarize your network and keeproute updates with a routing protocol to a minimum. Why wouldanyone want to advertise hundreds of networks between buildingswhen you can just send one summary route between buildings andachieve the same result? Summarization, also called Supernetting,provides route updates in the most efficient way possible by

advertising many routes in one advertisement instead of individually.

Some terminologies those are used with Networking models:

Collision Domain- It is the group of PC’s in which collision will occurwhen two PC will transmit data simultaneously.

Page 25: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 25/46

Broadcast Domain- It is the group of PC’s those will receive samebroadcast message.

CSMA/CD (Carrier Sense Multiple Access/ Collision Detection)-In this protocol when a PC wants to transmit any packet it sense thecarrier i.e the path ,if no other PC is using the carrier then only itsends. If two PCs starts sending data simultaneously collision willoccur. Both PCs will wait for some random time and then initiate thesame process.

MAC (Media Access Control) . The IEEE 802.3 (Ethernet) and 802.5(Token Ring) are the MAC sub layers of these two LAN data-linkprotocols.

Burned-in address: The 6-byte address assigned by the vendormakingthe card. It is usually burned in to a ROM or EEPROM on the LAN cardand begins with a 3-byte organizationally unique identifier (OUI)assigned bythe IEEE.

Locally administered address: Through configuration, an addressthat is used instead of the burned-in address.

Unicast address: Fancy term for a MAC that represents a single LANinterface.

Page 26: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 26/46

VLANS (Virtual LANs)

A VLAN permits a group of users to share a common broadcast domainregardless of their physical location in the internetwork. VLAN improveperformance and security in switched networks.

A Catalyst switch operates in a network like a traditional bridge. EachVLAN configured on the switch implements address learning,forwarding/filtering decisions, and loop avoidance mechanisms.

Ports belonging to a VLAN are configured with a membership modethat determines to which VLAN they belong. Catalyst switches supporttwo VLAN membership modes: static and dynamic.

The IEEE 802.1Q protocol is used to transport frames for multipleVLANs between switches and routers, and for defining VLANtopologies.

Page 27: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 27/46

WAN (Wide Area Network) and Protocols involved

Below figures shows the different WAN connection types that can beused to connect distant devices.

WAN connection types

Synchronous serial

Here’s a list explaining the different WAN connection types:

Leased lines These are usually referred to as a point-to-point ordedicated connection. A leased line is a pre-established WAN

communications path that goes from the CPE through the DCE switch,then over to the CPE of the remote site. The CPE enables DTEnetworks to communicate at any time with no cumbersome setupprocedures to muddle through before transmitting data.

When you’ve got plenty of cash, this is really the way to go because ituses synchronous serial lines up to 45Mbps. HDLC and PPP

Page 28: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 28/46

encapsulations are frequently used on leased lines.

Circuit switching When you hear the term circuit switching, thinkphone call. The big advantage is cost—you only pay for the time youactually use. No data can transfer before an end-to-end connection isestablished. Circuit switching uses dial-up modems or ISDN and isused for low-bandwidth data transfers.

Packet switching This is a WAN switching method that allows you toshare bandwidth with other companies to save money. Packetswitching can be thought of as a network that’s designed to look like aleased line yet charges you more like circuit switching. But less costisn’t always better—there’s definitely a downside: If you need totransfer data constantly, just forget about this option. Instead, get

yourself a leased line. Packet switching will only work for you if yourdata transfers are the bursty type—not continuous. Frame Relay andX.25 are packet-switching technologies with speeds that can rangefrom 56Kbps up to T3 (45Mbps).

Frame Relay A packet-switched technology that made its debut in theearly 1990s, Frame Relay is a high-performance Data Link andPhysical layer specification. It’s pretty much a successor to X.25,except that much of the technology in X.25 used to compensate forphysical errors (noisy lines) has been eliminated. An upside to Frame

Relay is that it can be more cost effective than point-to-point links,plus it typically runs at speeds of 64Kbps up to 45Mbps (T3). AnotherFrame Relay benefit is that it provides features for dynamic bandwidthallocation and congestion control.

Page 29: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 29/46

HDLC High-Level Data-Link Control (HDLC) was derived fromSynchronous Data Link Control (SDLC), which was created by IBM as aData Link connection protocol. HDLC works at the Data Link layer andcreates very little overhead compared to LAPB. It wasn’t intended toencapsulate multiple Network layer protocols across the same link—the HDLC header doesn’t contain any identification about the type of protocol being carried inside the HDLC encapsulation. Because of this,each vendor that uses HDLC has its own way of identifying theNetwork layer protocol, meaning each vendor’s HDLC is proprietarywith regard to its specific equipment.

PPP Point-to-Point Protocol (PPP) is a pretty famous, industry-standard protocol. Because all multiprotocol versions of HDLC areproprietary, PPP can be used to create point-to-point links betweendifferent vendors’ equipment. It uses a Network Control Protocol fieldin the Data Link header to identify the Network layer protocol andallows authentication and multi-link connections to be run overasynchronous and synchronous links.

Page 30: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 30/46

Project Work

ADDRESSING INFORMATION OF LAYER-3 DEVICESROUTERS

DEVICE INTERFACE

IP ADDRESS SUBNET MASK

Core Router Serial 7/0 212.212.212.2

255.255.255.0

Serial 8/0 192.168.10.6

255.255.255.252

Serial 9/0 192.168.10.2

255.255.255.252

Gb E0/0.27

192.168.8.2 255.255.255.240

Gb E0/0.28

200.200.200.1

255.255.255.248

Lab A Router Serial 8/0 192.168.10.1

255.255.255.252

Gb E0/0.15

192.168.2.225

255.255.255.224

Gb E0/0.16

192.168.2.177

255.255.255.240

Gb E0/0.17

192.168.2.161

255.255.255.240

Gb E0/0.18

192.168.2.193

255.255.255.240

Gb E

0/0.19

192.168.2.2

09

255.255.255.2

40Gb E

0/0.24192.168.2.2 255.255.255.2

24

Gb E0/0.25

192.168.2.33

255.255.255.224

Gb E 192.168.2.6 255.255.255.2

Page 31: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 31/46

0/0.26 5 40

Lab B Router Serial 8/0 192.168.10.5

255.255.255.252

Gb E 0/0.9 192.168.2.65

255.255.255.224

Gb E0/0.10

192.168.2.2 255.255.255.224

Gb E0/0.11

192.168.2.33

255.255.255.224

Gb E0/0.12

192.168.2.97

255.255.255.224

Gb E

0/0.13

192.168.2.1

29

255.255.255.2

24

Finance Deptt.Wireless Router

Internet 192.168.1.4 255.255.255.224

LAN 192.168.3.2 255.255.255.0

Seminar Hall-1Wireless Router

Internet 192.168.1.3 255.255.255.224

LAN 192.168.3.1 255.255.255.0

Seminar Hall-2Wireless Router

Internet 192.168.2.4 255.255.255.224

LAN 192.168.4.1 255.255.255.0

ADDRESSING INFORMATION OF LAYER-2 DEVICESSWITCHES

DEVICE INTERFACE

MODE VLAN ID

Server Switch 0/1 Access 28

1/1 Access 28

2/1 Trunk 1-1005

3/1 Access 27

Page 32: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 32/46

Lab-A Core Switch 0/1 Trunk 1-14,16,20-1005

1/1 Trunk 1-15,17,20-1005

2/1 Trunk 1-14,18-10053/1 Trunk 1-1005

Lab-B Core Switch 0/1 Trunk 1-1005

2/1 Trunk 1-14,20-1005

Floor 1 Switch 0/1 Access 24

1/1 Trunk 1-23,26-1005

2/1 Trunk 1-23,25,27-

10053/1 Access 24

4/1 Trunk 1-1005

COMPLETE LOGICAL NETWORK TOPOLOGY

• IP ADDRESSING

A host needs an IP address to participate on the Internet. The

IP address is a logical network address that identifies aparticular host. It must be properly configured and unique inorder to communicate with other devices on the Internet.An IP address is assigned to the Network interface connectionfor a host. This connection is usually a network interface card(NIC) installed in the device. Examples of end-user deviceswith network interfaces include workstations, servers, networkprinters and IP phones. Some servers can have more than oneNIC and each of these has its own IP address. Router

interfaces that provide connections to an IP network will alsohave an IP address.Every packet sent across the Internet has a source anddestination IP address. This information is required bynetworking devices to insure the information gets to thedestination and any replies are returned to the source.

Page 33: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 33/46

• IP ADDRESSING STRUCTURE

An IP address is simply a series of 32 binary bits (ones andzeros). It is very difficult for humans to read a binary IPaddress. For this reason, the 32 bits are grouped into four 8-bitbytes called octets. An IP address in this format is hard forhumans to read, write and remember. To make the IP addresseasier to understand, each octet is presented as its decimalvalue, separated by a decimal point or period. This is referredto as dotted-decimal notation.The 32-bit IP address is defined with IP version 4 (IPv4) and is

currently the most common form of IP address on the Internet.There are over 4 billion possible IP addresses using a 32-bitaddressing scheme.When a host receives an IP address, it looks at all 32 bits asthey are received by the NIC. Humans, on the other hand,need to convert those 32 bits into their four octet decimalequivalent. Each octet is made up of 8 bits and each bit has avalue. The four groups of 8 bits have the same set of values.The rightmost bit in an octet has a value of 1 and the values of 

the remaining bits, from right to left, are 2, 4, 8, 16, 32, 64and 128.

• IP ADDRESS CLASSES

The IP address and subnet mask work together to determinewhich portion of the IP address represents the network addressand which portion represents the host address. The class of anaddress can be determined by the value of the first octet.IP addresses are grouped into 5 classes. Classes A, B and C arecommercial addresses and are assigned to hosts. Class D isreserved for multicast use and Class E is for experimental use.

Page 34: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 34/46

• Class C addresses have three octets for the network portion

and one for the hosts. The default subnet mask is 24 bits

(255.255.255.0). Class C addresses are usually assigned to

small networks.

• Class B addresses have two octets to represent the network

portion and two for the hosts. The default subnet mask is 16

bits (255.255.0.0). These addresses are typically used for

medium-sized networks.

• Class A addresses have only one octet to represent the

network portion and three to represent the hosts. The

default subnet mask is 8 bits (255.0.0.0). These addresses

are typically assigned to large organizations.

In the addressing scheme of HCL CDC, we have used Class-Caddressing scheme. In the Class-C addressing scheme, thereare a total of 256 addresses available. Out of these, 254addresses are usable. The remaining to addresses are reservedfor network and broadcast address.IP addresses are of two types: Private addresses and Publicaddresses. All hosts that connect directly to the Internetrequire a unique public IP address. Because of the finitenumber of 32-bit addresses available, there is a risk of runningout of IP addresses. This problem can be resolved by the useof Private addresses. They allow hosts within an organizationto communicate with one another without the need of a uniquepublic IP address. Table below shows a list of Privateaddresses:

Page 35: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 35/46

SUBNETTINGThe customer network using the single ISR is badlyoverloaded. The proposed solution is to add a secondnetworking device, a larger ISR, and to divide the singlenetwork into two separate networks.For security purposes, the wireless and wired users need to beon separate local networks.In the subnetting scheme for HCL CDC, we utilize the conceptof classless subnetting where we use custom subnets todifferentiate the networks.Routers distinguish between networks by using the subnetmask to determine which bits make up the network ID andwhich bits make up the host portion of the address. When anetwork is partitioned, the router needs a modified or customsubnet mask to distinguish the subnets from each other. Adefault subnet mask and a custom subnet mask differ fromeach other as follows: Default subnet masks only change onoctet boundaries. For instance, the default subnet mask for aClass A network is 255.0.0.0. Custom subnet masks take bitsfrom the host ID portion of the IP address and add them to thedefault subnet mask.

SWITCHING

Page 36: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 36/46

A switch is a device that is able to direct a stream of messagescoming in one port, out of another port based on thedestination MAC address within the frame. A switch cannotroute traffic between two different local networks. In the

context of the OSI model, a switch performs the Layer 2,known as the data-link layer function.Only one message can be sent through an Ethernet hub at atime. It is possible for two or more hosts connected to a hub toattempt to send a message at the same time. If this happens,the electronic signals that make up the messages collide witheach other at the hub.A collision causes the messages to become garbled andunreadable by the hosts. A hub does not decode the

messages; therefore it does not detect that the message isgarbled and repeats it out all the ports. The area of thenetwork where a host can receive a garbled message resultingfrom a collision is known as a collision domain.A switch is preferred over hubs in the networking model of HCLCDC because of the large collision domain associated withhubs. Since a switch uses micro-segmentation, it narrowsdown the collision domain. The network of HCL CDC uses 9CISCO switches, which can result in a huge broadcast domain.

So, to minimize the domain, we have used the concept of Virtual LAN (VLAN).

VIRTUAL LAN

A VLAN is a logical broadcast domain that can span multiplephysical LAN segments. It allows an administrator to grouptogether stations by logical function, by project teams, or by

applications, without regard to physical location of the users.A VLAN has two major functions:

• A VLAN contains broadcasts.

• A VLAN groups devices. Devices located on one VLAN are

not visible to devices located on another VLAN.

Page 37: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 37/46

Configuring a VLAN:

In order to configure VLAN on a switch, connect it with aterminal device using a console cable.Enter the privileged mode using the enable commandSwitch>enableSwitch#Enter the configuration mode using the configure terminalcommandSwitch# configure terminalSwitch (config) #

Enter the name and VLAN number using the commandsSwitch(config)#vlan vlan_numberSwitch(config-vlan)#name vlan_nameSwitch(config-vlan)#exitUse the following commands to assign individual ports toVLANs:

Switch(config)#interface fa#/#Switch(config-if)#switchport access vlan vlan_number

Switch(config-if)# exit

Use the following commands to assign a range ports toVLANs:

Switch(config)#interface range fa#/start_of_range -end_of_range

Switch(config-if)#switchport access vlan vlan_numberSwitch(config-if)#exitTo disassociate a port from a specific VLAN:Switch(config)#interface fa#/#Switch(config-if)#no switchport access vlan vlan_numberA switch port can function in two modes: Access and Trunkmode.

Page 38: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 38/46

To switch between the two modes, use the followingcommandSwitch(config)#interface fa#/#

Switch(config-if)#switchport mode <trunk/access>

A switchport in the trunk mode is used for a switch-switch orswitch-router connection, whereas an access mode is used forconnection to terminal devices.

SWITCH CONFIGURATIONCore Switches

SWITCH INTERFACE MODE VLAN ID

Server Switch Gb E 0/1,1/1 Access 28

Gb E 2/1 Trunk 1-1005

Gb E 3/1 Access 27

Floor-1 Switch Gb E 0/1,3/1 Trunk 24

1/1 Trunk 1-23,26-1005

2/1 Trunk 1-23,25,27-1005

4/1 Trunk 1-1005

Lab A CoreSwitch

0/1 Trunk 1-14,16,20-1005

1/1 Trunk 1-15,17,20-1005

2/1 Trunk 1-14,18-1005

3/1 Trunk 1-1005

Lab B CoreSwitch

0/1 1-1005

2/1 1-14,20-1005

Page 39: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 39/46

Other Switches

SWITCH INTERFACE MODE VLAN ID

Main Deptt.

Switch

Fa E 0/1-0/6 Access 18

Fa E 0/7-0/11 Access 19

Gb E 1/1 Trunk 1-1005

IT Deptt.Switch

Fa E 0/1-0/8 Access 15

Fa E 0/10-0/13

Access 17

Gb E 1/1 Trunk 1-1005

Java classroomSwitch

Fa E 0/1-2/1,4/1

Access 16

3/1 Trunk 1-1005

CCNA classroomSwitch

Fa E <all> Access 13

Gb E 1/1 Trunk 1-1005

DB Switch Fa E <all> Access 12

Gb E 1/1 Trunk 1-1005

OP Switch Fa E <all> Access 9

Gb E 1/1 Trunk 1-1005

PC Switch Fa E <all> Access 11

Gb E 1/1 Trunk 1-1005

Lab B MainSwitch

Gb E 0/1 Trunk 1-8,11,14-1005

Gb E 1/1 Trunk 1-9,14-1005

Gb E 2/1 Trunk 1-8,12,14-

Page 40: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 40/46

1005

Gb E 3/1 Trunk 1-8,13-1005

Gb E 4/1 Access 10

Gb E 5/1 Trunk 1-1005

D Switch Fa E <all> Access 26

Gb E 1/1 Trunk 1-1005

HD Switch Fa E <all> Access 25

Gb E 1/1 Trunk 1-1005

ROUTING

Routing is the process of finding a path to the destination host.A router is a networking device that connects a local networkto other local networks. At the Distribution Layer of thenetwork, routers direct traffic and perform other functionscritical to efficient network operation. Routers, like switches,are able to decode and read the messages that are sent tothem. Unlike switches, which only decode (unencapsulate) theframe containing the MAC address information, routers decodethe packet that is encapsulated within the frame.

Each port, or interface, on a router connects to a different localnetwork. Every router contains a table of all locally-connectednetworks and the interfaces that connect to them. Theserouting tables can also contain information about the routes, orpaths, that the router uses to reach other remote networksthat are not locally attached.When a router receives a frame, it decodes the frame to get tothe packet containing the destination IP address. It matchesthe address of the destination to all of the networks that are

contained in the routing table. If the destination networkaddress is in the table, the router encapsulates the packet in anew frame in order to send it out. It forwards the new frameout of the interface associated with the path, to the destinationnetwork. The process of forwarding the packets toward theirdestination network is called routing.

Page 41: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 41/46

Router interfaces do not forward messages that are addressedto the broadcast MAC address. As a result, local networkbroadcasts are not sent across routers to other local networks.

Configuring a ROUTER:

In order to configure a router, the following commands canbe executed.Enter the privileged mode using the enable commandRouter>enableRouter#

Enter the configuration mode using the configure terminalcommandRouter# configure terminal

Router (config) #

The host from the sending VLAN forwards traffic to the routerusing the default gateway. The sub-interface for the VLANspecifies the default gateway for all hosts in that VLAN. Therouter locates the destination IP address and does a routingtable lookup.If the destination VLAN is on the same switch as the sourceVLAN, the router forwards the traffic back down to the source

switch using the subinterface parameters of the destinationVLAN ID. This type of configuration is often referred to as arouter-on-a-stick.If the exit interface of the router is 802.1Q-compatible, theframe retains its 4-byte VLAN tag. If the outbound interface isnot 802.1Q-compatible, the router strips the tag from theframe and returns the frame to its original Ethernet format.To configure inter-VLAN routing, use the following steps:1. Configure a trunk port on the switch.

Switch(config)#interface fa0/2Switch(config-if)#switchport mode trunk

2. On the router, configure a FastEthernet interface with no IPaddress or subnet mask.

Router(config)#interface fa0/1Router(config-if)#no ip address

Page 42: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 42/46

Router(config-if)#no shutdown

3. On the router, configure one subinterface with an IP addressand subnet mask for each VLAN. Each subinterface has an

802.1Q encapsulation.Router(config)#interface fa0/0.10Router(config-subif)#encapsulation dot1q 10Router(config-subif)#ip address 192.168.10.1

255.255.255.0

4. Use the following commands to verify the inter-VLAN routingconfiguration and functionality.

Switch#show trunk

Router#show ip interfacesRouter#show ip interfaces brief Router#show ip route

ADDRESSING SCHEME

ROOM IP ADDRESSRANGE

SUBNET MASK DEFAULTGATEWAY

Manager’s

Office

192.168.2.210

-222

255.255.255.24

0

192.168.2.20

9

HumanResourcesDept

192.168.2.210-222

255.255.255.240

192.168.2.209

Accounts Dept 192.168.2.194-206

255.255.255.240

192.168.2.193

Application

Development

192.168.2.226

-254

255.255.255.22

4

192.168.2.22

5

MarketingRoom

192.168.2.162-174

255.255.255.240

192.168.2.161

Special 192.168.2.178 255.255.255.24 192.168.2.17

Page 43: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 43/46

Projects Room -190 0 7

Testing &  Simulation

Room

192.168.2.130-158

255.255.255.224

192.168.2.129

DebuggingRoom

192.168.2.98-126

255.255.255.224

192.168.2.97

OptimizationRoom

192.168.2.66-94

255.255.255.224

192.168.2.65

Prototype

Construction

192.168.2.34-

62

255.255.255.22

4

192.168.2.33

ConferenceHall

192.168.4.2-62

255.255.255.192

192.168.4.1

Waiting Room 192.168.3.2-62

255.255.255.192

192.168.3.1

HelpDesk/Custome

r Care

192.168.1.34-62

255.255.255.240

192.168.1.33

Documentation Room

192.168.1.66-79

255.255.255.240

192.168.1.65

Cafeteria 192.168.3.0-254

255.255.255.0 192.168.3.1

INTERNET CONNECTIONThe Internet is a network of networks that connects users inevery country in the world. There are currently over one billionInternet users worldwide.

Page 44: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 44/46

Any home, business or organization that wants to connect to theInternet must use an Internet Service Provider (ISP). An ISP is acompany that provides the connections and support to access theInternet. It can also provide additional services such as Email and

web hosting.ISPs are essential to gaining access to the Internet. No one getson the Internet without a host computer, and no one gets on theInternet without going through an ISP. ISPs range in size fromsmall to very large and differ in terms of the area they service.ISPs also differ in the types of connection technologies andspeeds they offer.

ISP LEVELS OF SERVICEWhen data is transferred, it is either uploaded or downloaded.Downloading refers to information coming from the Internet toyour computer, while uploading indicates the reverse path, fromyour computer to the Internet. When the download transfer rateis different from the upload transfer rate, it is called asymmetric.When the transfer rate is the same in both directions, it is calledsymmetric. ISPs can offer both asymmetric and symmetricservices.

The HCL CDC is to use T1 symmetric connection from any ISP.The advantage of using a symmetric T1 connection is that it cancarry large amounts of data in both directions at equal rates.Moreover, it helps when we need to upload large amounts of traffic such as intensive graphics, multimedia, or video.The network for HCL CDC was established with an eye towardsthe prospects for future upgrades.

Page 45: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 45/46

Result and Conclusion

The HCL CDC network built up is installed in theComputer Lab, and is based on the same networkingmodel created and discussed here in the project report.

The N/W model is suited for a small business andwork. It is formed by following best practices ascommenced by the CISCO N/W academy.

The model is laid down by the prospect of futureupgrades as required by the enterprise. It adjusts andaccommodates major upgrades without changing theactual model.

Any additional constraints can be added and the N/W

be redesigned with those constraints functional.

The N/W created gives functioning environment tothe next shown Physical Layout

Page 46: Synopsis Network

8/3/2019 Synopsis Network

http://slidepdf.com/reader/full/synopsis-network 46/46

BIBLIOGRAPHY

Books:-

Stevens W Richard., “TCP/IP Illustrated Volume - I”Pearson Education, Second Edition.Strebe Mathew, Tata McGraw Hill, Seventh EditionCCNA: Cisco Certified Networking Associate, Study Guide, Todd

Lemmle

Sites:-

www.about.com

http://en.wikipedia.org/wiki/


Recommended