Sie sind auf Seite 1von 18

Capstone Project 2015

By Cronicle Nambahin

Capstone Project 2015


Table of Contents
Abstract ........................................................................................................................................... 3
Keywords......................................................................................................................................... 3
Introduction .................................................................................................................................... 3
Data Center ..................................................................................................................................... 4
DWU Campus Structure .................................................................................................................. 5
LAN Network ................................................................................................................................... 6
Small Business Network .................................................................................................................. 8
Conclusion ....................................................................................................................................... 9
Acknowledgement .......................................................................................................................... 9
References .................................................................................................................................... 10
Author ........................................................................................................................................... 11
Glossary ......................................................................................................................................... 11
Appendix 1 .................................................................................................................................... 11
Appendix 2 .................................................................................................................................... 16
Note from the Author ................................................................................................................... 18

Table of Figures
Figure 15
Figure 26
Figure 37
Figure 48
Figure 516
Figure 617
Figure 717
Figure 818

Capstone Project 2015


Abstract
Documenting, designing, configuring, verifying and securing different types of
networks from a small network to an enterprise network are a major technology
development. Documentation enhances and validates security by documenting
the configuration details and procedures that support a security policy.
Documentation also serves as an important part of backup and disaster recovery
documentation.
Good documentation must be thorough and must be kept current. Thus,
updating documentation is a part of change management and many daily
administration activities.
This paper is all about the documentation of certain aspects of DWU network. A
small network is designed, configured, verified and secured to visualize the
documentation.
Keywords:
Data Center, Local Area Network, Storage Area Network, Wide Area Network, Network
Documentation, Network Configuration, Pinging and Dial Peer Mapping.
Introduction
The objective of this project is to understand how to document existing data and communications
network and to be familiar with the various methods that may be used to design a basic network.
It helps us to identify network components and structures and to produce a formal report for
such a project in the near future. Furthermore, it helps us to choose the appropriate
configurations and security measures for a given network installation.
The first task in understanding how to design and build a computer network is to defining what
a network is and how it is designed and implemented. Understanding how it is used to help
business organizations, institutions and etc. meet their networking needs. In this paper,
network is understood as a connection of network devices and end devices via network media.
For example, computers and servers that can communicate with each other.
This paper will demonstrate the knowledge and skills of designing, configuring, verifying, securing
and documenting a SOHO network. It will also demonstrate the knowledge and skills of
documenting an existing network. There are two parts to this paper. Firstly, it will discuss the
DWU campus network documentation.

Capstone Project 2015


Part 1: Campus Network Documentation
Data Center
Data center is vital in all networks. There is no network without a data center or in other words,
every network has a data center where they use to store and retrieve data. Data center is
where all the data in a network are stored. It is physical or virtual infrastructure used by
organization to house computer, server and networking systems and components for the
organization networking needs, which typically involve storing, processing and serving large
amounts of data to clients in client server architecture.
A data center often requires extensive redundant or backup power supply systems, cooling
systems, redundant networking connections and policy-based security systems for running the
enterprise's core applications.
Data center management involves ensuring the reliability of both the connections to the data
center as well as the mission-critical information contained within the data center's storage. It
also entails efficiently placing application workloads on the most cost-effective compute
resource available.

Overall Data Center structure of DWU network is shown below (Figure 1). In the data center we
have a Storage Area Network (SAN) where data are stored, Bank of Switches (Core and
Distribution Switches, Equipment Rack, Routers and Servers. There are 40 virtual servers (some
shown within the cloud graphic) each on its own VM, with the VMs located on 4 physical
servers thereby constituting a server cloud. The cloud symbol is used as a metaphor for the
Internet as well as an abstraction of the complex infrastructure it represents. It is used to
indicate a service when details of its functioning are not relevant to the context under present
focus.

Capstone Project 2015

Figure 1. DWU Data Center structure showing the fiber optic connection from the equipment
rack, SAN network, servers and network from Telikom to the bank of switches and out to the
campus.
Overall DWU Campus Structure
DWU receives internet service through Satellite and from Telikom via a fiber optic cable. The
network from the Internet Service Provider (ISP) through Satellite and satellite dish is a backup
internet service. The Satellite gets the signal from the ISP and transmits it to the satellite dish at
the back of the FR Sirios house. The satellite dish then receives the signal and sends it through
fiber optics cable to the Fiber Optics Switch Port where it distributes to the whole campus.
DWU receives internet service via a Fiber Optic cable from Telikom. Telikom provides the main
internet service to DWU. The fiber optic cable travels undersea from Sydney through Guam and
comes up out from the sea near the Kalibobo Light House and Coast Watches and to Telikom.
The fiber optic cable that comes from Telikom also connects to the Fiber Optics Switch Port
where it distributes to the whole campus.
From the main fiber optic switch port, it branches out to different distribution switches within
the campus as shown below in Figure 3.

Capstone Project 2015

Figure 2. Overall DWU Network Structure showing the logical connection of network devices
and end devices via different network media.
LAN Network
A Local Area Network (LAN) is a computer network that interconnects computers within a
limited area such as a home, school, computer laboratory, or office building, using network
media. Network media are twisted-pair cable, coaxial cable, fiber-optic cable, and wireless and
etc.
Figure 3 shows detailed LAN network topology of Lab 101. It is connected to DWU network via
fiber optic cable as shown in the figure below. The cloud symbol is used as a metaphor for the
Internet as well as an abstraction of the complex infrastructure it represents. It is used to
indicate a service when details of its functioning are not relevant to the context under present
focus.
The fiber optic cable is connected to the distribution switch in the Printing Room. It branches
out from the junction box beside the THM Building and comes up out of the ground to the
6

Capstone Project 2015


building and follows the building down to the IS Lab. From IS Lab it runs over a cable tray across
to the CIC building and again runs over another cable tray across to the Radio Diwai Building
and to the Printing Room.
The purpose of a Distribution Layer Switch is to provide a point of connection for the building's
Access Layer switches. UTP Cat-6 cable connects the distribution switch in the printing room to
the access layer switch in the Lab 101 and also to other access layer switches within the
building.
The Lab 101 network consists of an Access Layer Switch (Catalyst 2950 Series), a Wireless
Access Point, Desktop PCs and Laptops. The PCs are connected to the switch via Cat-5 cables
(Category 5). Laptops can either be connected wirelessly via Wireless Access Point or by Cat-5
cable.

Figure 3. Detailed LAN Network for Lab101. It shows how the network is designed and what
network media are used for the connections.
Part 2: Basic Router & Switch Configuration
Small Business Network
Generally, the first task in understanding how to build a computer network is to define what a
network is and understanding how it is used and what it is used for. A network is consisting of
devices and end systems, such as computers and servers that communicate with each other.

Capstone Project 2015


Here is a small network topology designed using Packet Tracer. It is fully configured and verified
and secured. IPv4 and Class C address are used in this network. Subnetting is included as part of
the addressing scheme for future expansion.
Networks are separated by routers. In this small business network topology, there are three
networks altogether. Two LAN network (Local Area Network) are connected via a serial
connection over a WAN (Wide Area Network). WAN connection is established between the two
routers by defining static route. The two LAN networks are Madang Network which is the Head
Office and the Lae Network which is the branch (Lae Branch).
Each LAN network consists of one 2811 series router, one 1960 series switch, two IP phones
and two desktop PC. These two networks have only one main server located in Madang where
their data are stored. The devices in each network are connected via a straight through cables.
Addresses are assigned to each network devices as shown in the logical topology below.

Figure 4. Logical diagram of a small business network. It shows connection of the Head Quarter
in Madang and the Lae branch via a serial connection over WAN.
The two routers in each network are configured with DHCP to provide addressing for each IP
phone to be connected and to handle voice packets. The connectivity between all phone
devices within the two Local Area Networks is established by configuring Dial Peer Mapping.
Dial Peer Mapping is specifically configured to make a call from one LAN across to the other
LAN. Here the four IP phones are able to call one another within and across the WAN to the
other network. The routers and switches configuration and the screenshots of pinging are
shown in the Appendixes. Appendix 1 shows the routers and switches configuration and
Appendix 2 shows the screenshots of pinging and IP phone calling each other.
8

Capstone Project 2015


Conclusion
This paper has described a documentation of a certain aspects of DWU network.
Documentation is vital in all aspects of networking. It enhances and validates security by
documenting the configuration details and procedures that support a security policy.
Furthermore, documentation serves as an important part of backup and disaster
recovery documentation. Good documentation must be thorough and must be kept
current. Thus, updating documentation is a part of change management and many daily
administration activities.
The paper has also discussed how to designing, configuring, verifying and securing a
network. A small network has been designed in packet tracer to show how to
configured, verified and secured a network.
Acknowledgements
I am very grateful to my instructors Prof. Peter K. Anderson and Mr. Cyril Sarsoruo for their
technical guidance and instruction for writing this paper. I would also like to thank my fellow
classmate Mr. Ryan David for his support in contributing ideas to successfully configured and
verified the small business network designed in packet tracer. However, any errors of fact or
omission rest entirely with the author.
Furthermore, I wish to take this opportunity to thank the Head of Department Prof. Peter K.
Anderson and the Department Coordinator Mr. Cyril Sarsoruo for their concern in helping me to
be competitive and a team player in the near future.
I would like to thank my wife Maryanne Idawa for her inspiration, in spite of being far away
from me.
Finally, I want to thank God for giving me the wisdom, knowledge and understanding and His
many blessings upon my life.

Capstone Project 2015


References
Cisco Networking Academy. (2014). Cisco Networking Academys Introduction to Routing
Concepts. Retrieved May 13th, 2015 from
http://www.ciscopress.com/articles/article.asp?p=2180208&seqNum=6
Peter, K., Anderson. (2013). Visualization for local cloud computing: DWU Data Center.
Contemporary PNG Studies: DWU Research, 18.
Orbit-Computer Solution.Com. (2013). How to Configure Static Routes. Retrieved May 13th,
2015 from http://orbit-computer-solutions.com/How-to-Configure-Static-Routes.php
Peter, K., Anderson. (2009). Satellite Communication for PNG Universities and Research
Institutes: A New Design. Contemporary PNG Studies: DWU Research, 11.
Teresa, C., Piliouras. (2005).Network Design: Management and Technical Perspectives, (2 nd.Ed).
United State of America: CRC Press LLC. ISBN: 0-8493-1608-1.

10

Capstone Project 2015


Author
Cronicle Nambahin is a Third Year Mathematics and Computing Science student at Divine Word
University. He will be graduating with a Bachelor Degree on March, 2017. His interests include
programming computer program solution of a given problem and network configuration.
Mobile Phone: (+675) 73 435 313 or Email: cnambahin@student.dwu.ac.pg /
cnambahin@gmail.com.
Glossary
WAN
LAN
SAN
F/O
Cat -5
IP
DHCP
IPv4
UTP
VM

Wide Area Network


Land Area Network
Storage Area Network
Fiber Optic
Category 5
Internet Protocol
Dynamic Host Configuration Protocol
Internet Protocol Version 4
Unshielded Twisted Pair
Virtual Machine

Appendix 1
Madang Router Configuration
Router>enable
Router#configure terminal
Router(config)#hostname Madang_Router
Madang_Router(config)#no ip domain-lookup
Madang_Router(config)#enable password capstone
Madang_Router(config)#line console 0
Madang_Router(config-line)#password project
Madang_Router(config-line)#login
Madang_Router(config-line)#exit
Madang_Router(config)#
Madang_Router(config)#
Madang_Router(config)#line vty 0 4
Madang_Router(config-line)#password project
Madang_Router(config-line)#login
Madang_Router(config-line)#exit
Madang_Router(config)#
Madang_Router(config)#
11

Capstone Project 2015


Madang_Router(config)#service password-encryption
Madang_Router(config)#banner motd # AUTHORIZED ACCESS ONLY...! #
Madang_Router(config)#
Madang_Router(config)#
Madang_Router(config)#interface f0/0
Madang_Router(config-if)#description Link to Madang_Router
Madang_Router(config-if)#ip address 192.168.2.1 255.255.255.0
Madang_Router(config-if)#no shutdown
Madang_Router(config-if)#exit
Madang_Router(config)#
Madang_Router(config)#
Madang_Router(config)#interface s0/0/1
Madang_Router(config-if)#description Link to Lae_Router
Madang_Router(config-if)#ip address 10.2.1.1 255.255.255.252
Madang_Router(config-if)#no shutdown
Madang_Router(config-if)#exit
Madang_Router(config)#
Madang_Router(config)#
Madang_Router(config)#ip route 192.168.3.0 255.255.255.0 10.2.1.2
Madang_Router(config)#interface s0/0/1
Madang_Router(config-if)#clock rate 64000
Madang_Router(config-if)#exit
Madang_Router(config)#
Madang_Router(config)#
Madang_Router(config)#ip dhcp pool PHONE
Madang_Router(dhcp-config)#network 192.168.2.0 255.255.255.0
Madang_Router(dhcp-config)#default-router 192.168.2.1
Madang_Router(dhcp-config)#option 150 ip 192.168.2.1
Madang_Router(dhcp-config)#exit
Madang_Router(config)#
Madang_Router(config)#
Madang_Router(config)#telephony-service
Madang_Router(config-telephony)#max-ephones 5
Madang_Router(config-telephony)#max-dn 5
Madang_Router(config-telephony)#ip source-address 192.168.2.1 port 2000
Madang_Router(config-telephony)#auto assign 4 to 6
Madang_Router(config-telephony)#auto assign 1 to 5
Madang_Router(config-telephony)#exit
Madang_Router(config)#
Madang_Router(config)#
Madang_Router(config)#ephone-dn 1
Madang_Router(config-ephone-dn)#number 6401
Madang_Router(config-ephone-dn)#ephone-dn 2
Madang_Router(config-ephone-dn)#number 6402
12

Capstone Project 2015


Madang_Router(config-ephone-dn)#exit
Madang_Router(config)#
Madang_Router(config)#
Madang_Router(config)#dial-peer voice 1 voip
Madang_Router(config-dial-peer)#destination-pattern 64..
Madang_Router(config-dial-peer)#session target ipv4:192.168.3.1
Madang_Router(config-dial-peer)#end
Madang_Router#copy running-config startup-config
Madang_Router#exit
Madang Switch Configuration
Switch>enable
Switch#configure terminal
Switch(config)#hostname Madang_Switch
Madang_Switch(config)#no ip domain-lookup
Madang_Switch(config)#enable password capstone
Madang_Switch(config)#line console 0
Madang_Switch(config-line)#password project
Madang_Switch(config-line)#login
Madang_Switch(config-line)#exit
Madang_Switch(config)#
Madang_Switch(config)#
Madang_Switch(config)#line vty 0 4
Madang_Switch(config-line)#password project
Madang_Switch(config-line)#login
Madang_Switch(config-line)#exit
Madang_Switch(config)#
Madang_Switch(config)#
Madang_Switch(config)#service password-encryption
Madang_Switch(config)#banner motd # AUTHORIZED ACCESS ONLY...! #
Madang_Switch(config)#
Madang_Switch(config)#
Madang_Switch(config)#interface range f0/1 - 24
Madang_Switch(config-if-range)#switch mode access
Madang_Switch(config-if-range)#switch voice vlan 1
Madang_Switch(config-if-range)#end
Madang_Switch#
Madang_Switch#copy running-config startup-config
Madang_Switch#exit
Lae Router Configuration
Router>enable
Router#configure terminal
13

Capstone Project 2015


Router(config)#hostname Lae_Router
Lae_Router(config)#no ip domain-lookup
Lae_Router(config)#enable password capstone
Lae_Router(config)#line console 0
Lae_Router(config-line)#password project
Lae_Router(config-line)#login
Lae_Router(config-line)#exit
Lae_Router(config)#
Lae_Router(config)#
Lae_Router(config)#line vty 0 4
Lae_Router(config-line)#password project
Lae_Router(config-line)#login
Lae_Router(config-line)#exit
Lae_Router(config)#
Lae_Router(config)#
Lae_Router(config)#service password-encryption
Lae_Router(config)#banner motd # AUTHORIZED ACCESS ONLY...! #
Lae_Router(config)#
Lae_Router(config)#
Lae_Router(config)#interface f0/0
Lae_Router(config-if)#description Link to Lae_Switch
Lae_Router(config-if)#ip address 192.168.3.1 255.255.255.0
Lae_Router(config-if)#no shutdown
Lae_Router(config-if)#exit
Lae_Router(config)#
Lae_Router(config)#
Lae_Router(config)#interface s0/0/0
Lae_Router(config-if)#description Link to Madang_Router
Lae_Router(config-if)#ip address 10.2.1.2 255.255.255.252
Lae_Router(config-if)#no shutdown
Lae_Router(config)#exit
Lae_Router(config)#
Lae_Router(config)#ip route 192.168.2.0 255.255.255.0 10.2.1.1
Lae_Router(config)#interface s0/0/0
Lae_Router(config-if)#exit
Lae_Router(config)#
Lae_Router(config)#
Lae_Router(config)#ip dhcp pool PHONE
14

Capstone Project 2015


Lae_Router(dhcp-config)#network 192.168.3.0 255.255.255.0
Lae_Router(dhcp-config)#default-router 192.168.3.1
Lae_Router(dhcp-config)#option 150 ip 192.168.3.1
Lae_Router(dhcp-config)#exit
Lae_Router(config)#
Lae_Router(config)#
Lae_Router(config)#telephony-service
Lae_Router(config-telephony)#max-ephones 5
Lae_Router(config-telephony)#max-dn 5
Lae_Router(config-telephony)#ip source-address 192.168.3.1 port 2000
Lae_Router(config-telephony)#auto assign 4 to 6
Lae_Router(config-telephony)#auto assign 1 to 5
Lae_Router(config-telephony)#exit
Lae_Router(config)#
Lae_Router(config)#
Lae_Router(config)#ephone-dn 3
Lae_Router(config-ephone-dn)#number 6403
Lae_Router(config-ephone-dn)#ephone-dn 4
Lae_Router(config-ephone-dn)#number 6404
Lae_Router(config-ephone-dn)#exit
Lae_Router(config)#
Lae_Router(config)#
Lae_Router(config)#dial-peer voice 1 voip
Lae_Router(config-dial-peer)#destination-pattern 64..
Lae_Router(config-dial-peer)#session target ipv4:192.168.2.1
Lae_Router(config-dial-peer)#end
Lae_Router#
Lae_Router#copy running-config startup-config
Lae_Router#exit
Lae Switch Configuration
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Lae_Switch
Lae_Switch(config)#no ip domain-lookup
Lae_Switch(config)#enable password capstone
Lae_Switch(config)#line console 0
Lae_Switch(config-line)#password project
15

Capstone Project 2015


Lae_Switch(config-line)#login
Lae_Switch(config-line)#exit
Lae_Switch(config)#
Lae_Switch(config)#
Lae_Switch(config)#line vty 0 4
Lae_Switch(config-line)#password project
Lae_Switch(config-line)#login
Lae_Switch(config-line)#exit
Lae_Switch(config)#
Lae_Switch(config)#
Lae_Switch(config)#service password-encryption
Lae_Switch(config)#banner motd # AUTHORIZED ACCESS ONLY...! #
Lae_Switch(config)#
Lae_Switch(config)#
Lae_Switch(config)#interface range f0/1 - 24
Lae_Switch(config-if-range)#switch mode access
Lae_Switch(config-if-range)#switch voice vlan 1
Lae_Switch(config-if-range)#end
Lae_Switch#
Lae_Switch#copy running-config startup-config
Lae_Switch#exit
Appendix 2

Figure 5. Pinging from Madang PC 1 to Lae router. It shows that the ping is successful because
there is 0% loss.

16

Capstone Project 2015

Figure 6. Pinging from Lae PC 1 to Madang router. It shows that the ping is successful because
there is 0% loss.

Figure 7. Pinging Madang PC2 from Lae PC 2. It shows that the ping is successful because there
is 0% loss.

17

Capstone Project 2015

Figure 8. Madang Phone1 calling the Lae Phone2. The two phones are connected as shown
above.

Note from the Author


This paper can be used as instructions for students to write a research paper.

18

Das könnte Ihnen auch gefallen