Sie sind auf Seite 1von 90

School of Engineering Faculty of Design and Creative Technologies Specialisation Project Report

Table of Contents
Table of Figures......................................................................................................2 Table of Tables.......................................................................................................2 Statement of Authorship.........................................................................................3 Executive Summary................................................................................................3 Acknowledgements................................................................................................3

(Chapter 1).............................................................................................................3 (Chapter 2).............................................................................................................7 Figure 8: Network Diagram.............................................................................14 (Chapter 3)........................................................................................................34 (Chapter 4)...........................................................................................................72 HP ProLiant DL385 G6.......................................................................................75 Cisco Catalyst 3560V2-24PS 24 Ethernet 10/100 ports with Power over Ethernet (PoE) and 2 SFP ports........................................................................................76 Wireless Access point........................................................................................76 CISCO2610XM/11XM-DC....................................................................................77 Rack..................................................................................................................78 AMP RJ45 Connectors........................................................................................78 Cable5, Cable 6.................................................................................................79 APC Smart-UPS 2200VA USB & Serial RM 2U 230V ...........................................79 (Chapter 5)...........................................................................................................81 1 .Discussion..................................................................................................81 CONCLUSIONS................................................................................................83 Recommendations.........................................................................................84 Glossary.........................................................................................................84 Reference.......................................................................................................88

Table of Figures

Figure 1: DOMINION school plan.............................................................................6 Figure 2: Router Terminology...............................................................................22

Table of Tables
Table 1: IEEE WLAN Standards..............................................................................21

Statement of Authorship

Executive Summary
This specialization project is created to design a network system of a high school called Dominion school. Although, the scope of the project is for the level of Bachelor of Engineering Technology program at AUT, it is also simple, well organized and easy to follow and is based on practical applicability. This Dominion school includes seven different buildings. Each building has many study rooms or staff rooms that we had to organize. We were required to design a network in this school so it has WAN, LAN, and Wireless systems. That is to help staff, student or visitor to connect through network system at school easily. However, on the school website, a visitor can have limited information about school such as: enrollment, course, fees and so on. Students would also be able to load timetables or course material. Besides this, the project also meets the budget requirements which were initially calculated for the period we are going to work on it. Based on this estimation, the project would definitely be flexible and we can exclude, add more, or expand the network with a reasonable budget.

Acknowledgements
(Chapter 1)

Introduction:
1. Introduction.

Information technology has been playing a major part in education, and exponential growth of businesses especially on-line. Therefore, many schools have found it easy to impart education with more tools available with the technological advancements made in the field of education in the last decade. A lot of investments are being made in computer labs to equip them with the latest equipment and technology so that the best and good quality service can be delivered. The local area networks are being upgraded these days with fast Ethernet cables and cards and new switches and routers are being employed in the labs to make it easy for the students as well as the teachers to share information easily and efficiently. Hence, Dominion School has decided to implement a computer department comprising of two labs, connected with both wide area network as well as local area network and by the utilization of wireless connection as well as connecting by use of interconnecting cables for the purpose of education.

2. Place of fit up.

3. Investor

4. Project Purpose

The main purpose of his specialized project is to design a Local Area Network that will meet the requirements of the initial investigation conducted as to what is the main outcome which is desired for Dominion School. The project therefore, is expected to design and implement a network that shall meet the needs of the institution by installing the required hardware and software, which is updated and is of latest technology and is capable of expansion. It also has to allow the network administrator to determine the quality of information accessed by various end users of the organization to maintain the organizations integrity. Along with this it needs to be reliable and robust in design. The project management is to be done by the management of the Dominion school as they are the project owners as well as the project investors. They will need to do the requirements analysis in order to see how to network the computer labs with 50 computers in each lab. They would also like an interconnection between the schools administrative units and the staff room and the heads office. Another requirement is to have a connection to the Internet through an Internet Service Provider. There should be user level privileges by limiting access to the users by creating work groups and giving the maximum access only to the administrators. This is to make sure that no unauthorized person enters into the system and steal the information especially the students. The project team needs to look into all the aspects and the best way to achieve this is to do the requirements analysis so that the all the aspects can be studied and the resources of the project can be directed in the right direction. This will help the project to finish on time.
4

Areas of building which would interfere with signaling or cause problems with cabling should be examined. There is also need to have good quality product installed and not a lot of compromise is done on the price. Site visits and surveys are always helpful and have become a fundamental part of most networking standards. The school desires that the main connection for LAN is by use of interconnection cables. Plenum cables is the main construction design for the building of the school and is designed to allow them to pass without obstruction but this may soar the costs of implementation of the proposed network. Other issues of the incorporation of the wireless connection which should allow all members of staffs and students to browse comfortably. This would mean compatible devices including hand held devices and ability of the network to expand.

5. School Plan

Building E
H 1 1 1 1 1 1 1 1

Legend Notes
1.Data media termination point. Each data termination point will contain four (4) Cat 5 UTP runs terminated on a fourplex wall mounted BIA/TIA standard outlet. All horizontal data media runs will be run and terminated at the nearest IDF or MDF. 2. Existing condult for data media cable runs.
main distribution frameMDF intermediate distribution frame-IDF
1 1 1 E H

Building F

Building D
1 1 1 F 1 1 1 1 1 1 1

1 1

1 1

Building B
E 1 1 1

Building G

1 1

1 1

Outlet main cable


1 1

local cable
S pecial S tem floor P ys s lan

Building A
C 1 D 1 1 G 1 1 F 1 D 1 B D 1 1 1 D C A 1 D

DOMINION Key Map


Building C

1 B

0m A

10m

20m

30m

Copyright Cisco Systems


A 3 2 1

Figure 1: DOMINION school plan

DOMINION school measurements: The length of school is 140m and the width of school is 160m The area of school is 22400 m sq.

(Chapter 2)

Literature Review:

Figure2: Multiple services-multiple networks

1. Overview -Network

Networks are a collection of nodes which are interconnected and serve purposes like sharing resources via communication paths. They can further be connected to other networks over short and long distances and can contain sub-networks. There are some common topologies which are used like bus, star, Token Ring, and mesh topologies. Networks can also be characterized in terms of distance like Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs). There are many standards which are described in the OSI model. They are for cables and the connectors as well as how the data will be transmitted and presented and transferred, these protocols act on different layers of the OSI model. They can be classified under the TCP/IP or Systems Network Architecture network. There are also connections techniques like dial-up or switched, dedicated or non-switched, or virtual connections. Different cabling standards and techniques ate defined as per the EIA/TIA standards for cables which will be discussed later. Some examples include, optical fiber, coaxial cable, and Unshielded Twisted Pair, CAT5, CAT 6 and T-568-A and T-568-B.

1.1.LAN 1.1.1. A local area network A LAN (Local Area Network): is a computer or data network that is contained within a limited area. Typically a LAN consists of computers and printers within a single office location or home. (ICND, 2003). A LAN is a high-speed network which is based on the topologies mentioned above that covers a relatively small geographic area. It typically connects end terminals, workstations, printers, servers, and other devices like PDA and hand held devices. They offer computer users with shared access to devices and applications. There can be a file exchange between connected users, and a communication session between users via electronic mail and other applications. (CCNA1, 2003).

Figure 3: LAN

1.1.2. Network topologies 1.1.2.1. Ethernet

Basically defined as a baseband LAN specification created by the Xerox Corporation and then improved through joint efforts of Xerox, Digital Equipment Corporation, and Intel. Ethernet is similar to the IEEE 802.3 series standard and, using CSMA/CD, operates over various types of cables at 10Mbps. Also called DIX Digital/Intel/Xerox) Ethernet. The topologies are logical architectures, but the actual devices need not be physically organized in these configurations. According to ICND, 2007, Ethernet/IEEE 802.3 networksincluding 100BaseTimplement a bus topology, which is illustrated in Figure 2-3. (University of South Florida, chapter 5).

Figure 4: Ethernet Topo

Based on the IEEE 802.3u standard, 100BaseT is the Fast Ethernet specification of 100Mbps baseband that uses UTP wiring. 100BaseT sends link pulses (containing more information than those used in 10BaseT) over the network when no traffic is present. Ethernet is one of the most commonly used network configuration. Network repeaters are used to extend trunk segments. Multiple accesses to the network is solved by CSMA/CD protocol, which senses when the network is free and detects collisions (University of South Florida, chapter 5). 1.1.2.2. Token Ring

A network logical topology comprising a series of repeaters that form one closed loop by connecting unidirectional transmission links. Individual stations on the network are connected to the network at a repeater. Physically, ring topologies are generally organized in a closed-loop star. Both Token Ring/IEEE 802.5 and FDDI networks implement a ring topology. A LAN physical topology with endpoints on the network converging at a common central device (known as a hub) using point-to-point links. A logical ring topology can be configured as a physical star topology using a unidirectional closed-loop star rather than point-to-point links. That is, connections within the hub are arranged in an internal ring. which is illustrated in Figure
9

A tree topology is a LAN architecture that is identical to the bus topology, except that branches with multiple nodes are possible in this case. Figure 2-5 illustrates a logical tree topology. (ICND, 2007).

Figure5: Ring

1.2. Wide area network - WAN 2. (Wide Area Network) A long-distance communications network that covers a wide

geographic area, such as a state or country. The telephone companies and cellular carriers deploy WANs to service large regional areas or the entire nation. Large enterprises have their own private WANs to link remote offices, or they use the Internet for connectivity. Of course, the Internet is the world's largest WAN. The world's most popular WAN is the Internet. Some segments of the Internet, like VPN-based extranets, are also WANs in themselves. Finally, many WANs are corporate or research networks that utilize leased lines. WANs generally utilize different and much more expensive networking equipment than do LANs. Key technologies often found in WANs include SONET, Frame Relay, and ATM (McQuerry, 2007).

10

Figure6: WAN

1.2.1. For Example If a LAN ties computers together at a single site, than a WAN connects computers across large distances at multiple sites. Here are some important characteristics of wide area networks (LWC Training Corp, 2008). They use data lines which belong to a third party service provider such as the telephone company. Organizations do not create and use their own WANs. They require special interfaces to the data lines such as synchronous modems, routers and/or DSU/CSUs. WANs do not use LAN cable systems. WANs have less throughput than LANs, therefore they require gearing down at the interface of the two systems. Routers decide which packets from the LAN will be transmitted over the WAN.

Routing technology is a crucial component of a WAN. Routers decide how a packet should be sent in order that it arrives at its intended destination. 2.1.VLAN Virtual LAN: A group of devices on one or more logically segmented LANs (configured by use of management software), enabling devices to communicate as if attached to the same physical medium, when they are actually located on numerous different LAN segments. VLANs are based on logical instead of physical connections and thus are tremendously flexible.

11

Here are some common reasons why a company might have VLANs:

Security Departmentalization of the system will make sure that the information for one VLAN does not enter the information of another and no unauthorized access is gained into other departments. Projects/Special applications helps in better managing a project or working with a specialized application and people skilled in that area can be asked to administer that VLAN.

Performance/Bandwidth can be useful in monitoring of network and see where the bits are going and which VLAN is using the most. It also allows the network administrator to create VLANs that reduce the number of router hops and increase the apparent bandwidth for network users. Broadcasts/Traffic flow As stated above, the principle element of a VLAN is the fact that it does not pass broadcast traffic to nodes that are not part of the VLAN, it reduces broadcasts. Access Control lists can eapplied on the interface of the routers which connect to the VLAN and the traffic coming and going out can be mon itored and controlled.

Telnet can be used to make emulated sessions of authentications so that the resources on some of the switches can be shared. This can be done by entering the parameters for the VLAN (name, domain and port assignments). After you have created the VLAN, any network segments connected to the assigned ports will become part of that VLAN. While you can have more than one VLAN on a switch, they cannot communicate directly with one another on that switch. As shown in the figure below, there are many devices which are connected to the VLAN switch and they normally operate on the layer 2 of the OSI model. These VLANS are also configured in the specific layer 3 added functionality switches where they can perform the function of the router and also create load balancing. (CCNA3, 2008).

12

Figure7: VLAN

Advantages of VLANs: Segmentation of broadcast domains to create more bandwidth Additional security by isolating users with bridge technologies Deployment flexibility based upon job function rather than physical placement

1.3.1 Redundant Topology

Segmentation is a part of LANs. There can be many segments in a LAN. It sometimes becomes difficult to handle the segments as the LANs may not function properly and and may lead to slowing down the networks. The LAN topologies discussed are redundant and mostly the switches are used to replace repeaters as well as hubs. There are also availability of the multilayer switches from Cisco systems and 3COM. These are extensively used as they remove the collision domains as well as the broadcast domains and help in better and mo efficient networks (Answer.com, 2008).

13

Figure 8: Network Diagram

1.3.2 Spanning tree protocol

The bridge protocol (IEEE 802.1D) that enables a learning bridge to dynamically avoid loops in the network topology by creating a spanning tree using the spanning-tree algorithm. Spanning-tree frames called Bridge Protocol Data Units (BPDUs) are sent and received by all switches in the network at regular intervals. The switches participating in the spanning tree dont forward the frames; instead, theyre processed to determine the spanning-tree topology itself. Cisco Catalyst series switches use STP 802.1D to perform this function. (ICND, 2003) STPs main task is to stop network loops from occurring on your layer 2 network (bridges or switches). It vigilantly monitors the network to find all links, making sure that no loops occur by shutting down any redundant links. STP uses the spanning-tree algorithm (STA) to first create a topology database and then search out and destroy redundant links. With STP running, frames will be forwarded only on the premium, STP-picked links.

14

Figure9: STP

1.3.3 STP Operation Summary

STP accomplishes this by first electing a root bridge that will forward through all ports and act as a point of reference for all other devices in the STP domain. Once all switches agree on who the root bridge is, every bridge must find its one and only allotted root port. Each and every link between two switches must have one, and only one, designated portthe port on that link that provides the highest bandwidth to the root. Its really important to remember that a bridge can go through many other bridges to get to the root, meaning that its not always the shortest path but the fastest (highest bandwidth) path that will be the one used.
1.3.4 VLAN Trunking Protocol

VLAN Trunking Protocol: Used to update switches in a switch fabric about VLANs configured on a VTP server. VTP devices can be a VTP server, client, or transparent device. Servers update clients. Transparent devices are only local devices and do not share information with VTP clients. VTP devices send VLAN information down trunked links only. It has another state which is known as VTP transparent mode, which is a state where Switch mode that receives VLAN Trunking Protocol VLAN information and passes it on, but doesnt read the information. The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network VTP allows you to add, delete, and rename VLANsinformation that is then propagated to all other switches in the VTP domain. Heres a list of some of the cool features VTP has to offer: _ Consistent VLAN configuration across all switches in the network _ VLAN trunking over mixed networks, such as Ethernet to ATM LANE or even FDDI _ Accurate tracking and monitoring of VLANs _ Dynamic reporting of added VLANs to all switches in the VTP domain _ Plug and Play VLAN adding Very nice, but before you can get VTP to manage your VLANs across the network, you have to create a VTP server. All servers that need to share VLAN information must use the same domain name, and a switch can be in only one domain at a time. So basically, this means that a
15

switch can only share VTP domain information with other switches if theyre configured into the same VTP domain. You can use a VTP domain if you have more than one switch connected in a network, but if youve got all your switches in only one VLAN, you just dont need to use VTP. Do keep in mind that VTP information is sent between switches only via a trunk port. Switches advertise VTP management domain information as well as a configuration revision number and all known VLANs with any specific parameters. But theres also something called VTP transparent mode. In it, you can configure switches to forward VTP information through trunk ports but not to accept information updates or update their VTP databases. If youve got sneaky users adding switches to your VTP domain behind your back, you can include passwords, but dont forgetevery switch must be set up with the same password. And as you can imagine, this little snag can be a real hassle administratively! Switches detect any added VLANs within a VTP advertisement, then prepare to send information on their trunk ports with the newly defined VLAN in tow. Updates are sent out as revision numbers that consist of the notification plus 1. Any time a switch sees a higher revision number, it knows the information its getting is more current, so it will overwrite the existing database with the latest information. You should know these three requirements for VTP to communicate VLAN information between switches: _ The VTP management domain name of both switches must be set the same. _ One of the switches has to be configured as a VTP server. _ No router is necessary.

Figure 10: VTP

16

2.2.Wireless technologies Wireless technologies have revolutionized the way work is being done these days. With no use of cables and operating applications on the move, administrators as well as students and normal office workers can now access to their network resources and can make full use of it. Even in cities there are many public hot-spots, Wi-Fi Internet providing depots, stations and airports, and the local coffee joint are all as suitable to work performance as the standard office cubicle. As the hardware device that supports connection to and utilization of the available wireless network technologies.

Figure 11: wireless

1.4.1 Function

The main function is to establish a link between host and networked server with the help of an access point where the Wireless network adapters can provide connectivity to a local area network (LAN). Many ways of establishing this connection are available. Every wireless adapter works via radio waves, Infrared or Bluetooth. In some cases, some antennas in the wireless adapters work on microwave technology as well. (Gast, 2005).
1.4.2 Types

Wireless network adapters are distinguished by the manner in which network connectivity is provided. These are like: Wi-Fi adapters, Broadband Cellular adapters, and Bluetooth adapters. Not all computing devices can use all three types of wireless network adapters: some adapters have conditions that must be met for a device to utilize, not just connect, to a network.

17

1.4.2.1 802.11 Legacy

IEEE 802.11 was the first, original standardized WLAN at 1 and 2Mbps. It runs in the 2.4GHz radio frequency and was ratified in 1997 even though we didnt see many products pop up until around 1999 when 802.11b was introduced. All the committees listed in Table 12.2 are amendments to the original 802.11 standard except for 802.11F and 802.11T, which are both standalone documents. (Gast, 2005).
1.4.2.2 The 802.11a

The 802.11a was the 5 GHz Standard which operated at 54Mbps. 802.11a is one of several specifications in the 802.11 family applicable to wireless local area networks (wireless LANs or WLANs). 802.11a provides specifications for wireless ATM systems and is used in access hub. Networks using 802.11a operate at radio frequencies between 5.725 GHz and 5.850 GHz. The specification uses a modulation scheme known as orthogonal frequency-division multiplexing (OFDM) that is especially well suited to use in office settings. In 802.11a, data speeds as high as 54 Mbps are possible. There is less interference with 802.11a than with 802.11b, because 802.11a provides more available channels, and because the frequency spectrum employed by 802.11b (2.400 GHz to 2.4835 GHz) is shared with various household appliances and medical devices. Operating in the 5GHz radio band, 802.11a is also immune to interference from devices that operate in the 2.4GHz band, like microwave ovens, cordless phones, and Bluetooth devices. 802.11a isnt backward compatible with 802.11b because they are different frequencies, so you dont get to just upgrade part of your network and expect everything to work together in perfect harmony. But no worriesthere are plenty of dual-radio devices that will work in both types of networks. A definite plus for 802.11a is that it can work in the same physical environment without interference from 802.11b users. (Gast, 2005).
1.2.4.3 The 802.11b Amendment

It was the most widely deployed wireless standard, and it operates in the 2.4GHz unlicensed radio band that delivers a maximum data rate of 11Mbps. The 802.11b standard has been widely adopted by both vendors and customers who found that its 11Mbps data rate worked pretty well for most applications. But now that 802.11b has a big brother (802.11g), no one goes out and just buys an 802.11b card or access point anymore. The problem with 802.11b lies in how the Data Link layer is dealt with. In order to solve problems in the RF spectrum, a type of Ethernet collision detection was created called CSMA/CA, or Carrier Sense Multiple Access with Collision Avoidance. Check this out in Figure 12.2. CSMA/CA is also called a Request To Send, Clear To Send (RTS/CTS) because of the way that hosts must communicate to the access point (AP). For every packet sent, an RTS/CTS and acknowledgment must be received, and because of this rather cumbersome process, its kind of hard to believe it all actually works.
1.2.4.4 The 802.11g Amendment

18

The 802.11g standard was ratified in June 2003 and is backward compatible with 802.11b. The 802.11g standard delivers the same 54Mbps maximum data rate as 802.11a but runs in the 2.4GHz rangethe same as 802.11b. Because 802.11b/g operates in the same 2.4GHz unlicensed band, migrating to 802.11g is an affordable choice for organizations with existing 802.11b wireless infrastructures. Just keep in mind that 802.11b products cant be software upgraded to 802.11g. This limitation is because 802.11g radios use a different chipset in order to deliver the higher data rate. But still, much like Ethernet and Fast Ethernet, 802.11g products can be commingled with 802.11b products in the same network. Yet, for example, completely unlike Ethernet, if you have four users running 802.11g cards and one user starts using an 802.11b card, everyone connected to the same access point is then forced to run the 802.11b CSMA/CA methodan ugly fact that really makes throughput suffer. So to optimize performance, its recommended that you disable the 802.11bonly modes on all your access points. (Gast, 2005).
1.2.4.5 The 802.11n Amendment (MIMO)

802.11n builds upon previous 802.11 standards by adding Multiple-Input Multiple-Output (MIMO), which employs multiple transmitters and receiver antennas to increase data throughput. 802.11n can have up to eight antennas, but most of todays access points use four. These are sometimes referred to as smart antennas, and if you do have four of them, two would be used for transmitting simultaneously with the other two receiving simultaneously. This setup would allow for much higher data rates than 802.11a/b/g. In fact, the marketing people claim it will provide about 250Mbps. (Computer plus, 2008).
1.3 Table speed of wireless

802.11

802.11a

802.11b

802.11g

Standard Approved

July 1997

September 1999

September 1999

Draft stage. Completion expected in 2002. 83.5 MHz

Available Bandwidth Unlicensed Frequencies of Operation Number of NonOverlapping Channels

83.5 MHz

300 MHz

83.5 MHz

2.4-2.4835 GHz DSSS, FHSS 3 (Indoor/Outdoor)

5.15-5.35 GHz OFDM 5.725-5.825Ghz OFDM 4 Indoor (UNII1) 4 Indoor/Outdoor (UNII2) 4 Outdoor (UNII3 )

2.4-2.4835GHz DSSS 3 (Indoor/Outdoor)

2.4-2.4835GHz DSSS, OFDM 3 (Indoor/Outdoor)

19

Data Rate per Channel Modulation Type

2, 1 Mbps

54, 48, 36, 24, 18, 12, 9, 6 Mbps BPSK (6, 9 Mbps) QPSK (12, 18 Mbps) 16-QAM (24, 36 Mbps) 64-QAM 54 Mbps) Wi-Fi5 (48,

11, 5.5, Mbps

2,

54, 36, 33, 24, 22, 12, 11, 9, 6, 5.5, 2, 1 Mbps OFDM/CCK (6,9, 12,18,24,36,48,54) OFDM (6,9,12,18, 24,36,48,54) DQPSK/CCK (22, 33, 11, 5.5 Mbps) DQPSK (2 Mbps) DBPSK (1 Mbps) Wi-Fi at 11Mpbs and below

DQPSK (2 Mbps DSSS) DBPSK (1 Mbps DSSS) 4GFSK (2Mbps FHSS) 2GFSK (1Mbps FHSS)

DQPSK/CCK (11, 5.5 Mbps) DQPSK (2 Mbps) DBPSK (1 Mbps)

Compatibility

802.11

Wi-Fi

Table 1: IEEE WLAN Standards

2.3. Connectivity Connectivity is provided by the communication ability of the one device with the other. A LAN connection (i.e. Ethernet connection). Broadband cellular adapters, or air cards, enable wireless mobility much like a cell phone, connecting laptops and other devices to a cellular network. Bluetooth adapters provide wireless connectivity between devices within short range of each other. This is achieved through infra-red radiations or the use of small frequency radio waved which propagate from the connectivity cards (Gast, 2005).

2.4.Dial-up Traditional use of the Public Switched Telephone Network (PSTN) where their copper cables are used to carry data on behalf of the end user. It involves customer premises equipment (CPE) device sending the telephone switch a phone number to direct a connection to ISDN has been the stay of the substitution for the normal copper cable dial-up and the digital availability has enabled transfer of the data, voice and video over the same cable. A PRI or a BRI can transmit data at more than 53 K using the V.90 communication standard attests to the success of the idea. A Short Dialup Technology Background With the breakthrough in Internet technologies it was important to connect the machines. This is where the Dialup technology traces its origins back to. There was a need and a requirement to have a network which could be laid to transmit data. The Internet, then known as ARPANET, was brought online in 1969 under a contract let by the renamed Advanced Research Projects Agency (ARPA) which initially connected four major computers at universities in the southwestern US (UCLA, Stanford Research Institute, UCSB, and the University of Utah). The contract was carried out by BBN of Cambridge, MA under Bob Kahn and went online in December 1969. By June 1970, MIT, Harvard, BBN, and Systems Development Corp (SDC) in Santa Monica, Cal. were added. By January 1971, Stanford, MIT's Lincoln Labs, Carnegie-Mellon, and Case-Western Reserve U were added. In months to

20

come, NASA/Ames, Mitre, Burroughs, RAND, and the U of Illinois plugged in. After that, there were far too many to keep listing here.

The PSTN already had a network where the copper coaxial cables could be used to transmit the data. The already laid network had the voice data which was transmitted for the PSTN purposes. This was only 4khz of the audible frequency for the human ear. The rest of the frequency was untapped and unused. This was use for the analog signals which could be used by modems to modulate and demodulate the analog signals propagating from the copper cables. The dial-up is no t used anymore and is replaced by DSL, ADSL, ADSL 2+ and V.35 modems using voice grade cables. (ICND, 2003)

2.5.Bridging and Switching Bridges and switches are data communications devices that operate principally at Layer 2 of the OSI reference model. As such, they are widely referred to as data link layer devices. A device for connecting two segments of a network and transmitting packets between them. Both segments must use identical protocols to communicate. Bridges function at the Data Link layer, layer 2 of the OSI reference model. The purpose of a bridge is to filter, send, or flood any incoming frame, based on the MAC address of that particular frame.Transparent bridging is found primarily in Ethernet environments, while source-route bridging occurs primarily in Token Ring environments. Translational bridging provides translation between the formats and transit principles of different media types (usually Ethernet and Token Ring. Switches on the other hand can be defined as an internetworking device responsible for multiple functions such as filtering, flooding, and sending frames. It works using the destination address of individual frames. Switches operate at the Data Link layer of the OSI model. (2) Broadly, any electronic/mechanical device allowing connections to be established as needed and terminated if no longer necessary. (Cisco press, 2008). 2.6.Routing The process of forwarding logically addressed packets from their local sub-network toward their ultimate destination. In large networks, the numerous intermediary destinations a packet might travel before reaching its destination can make routing very complex. 1.6.1. Routing domain is an important concept which can be defined as any collection of end systems and intermediate systems that operate under an identical set of administrative rules. Every routing domain contains one or several areas, all individually given a certain area address. (Cisco press, 2008). 1.6.2Router Terminology
21

Routers used to be called "gateways," which is why the term "default gateway" means the router in your network (see default gateway). In older Novell terminology, routers were also called "network-layer bridges." For more details on the routable protocol layer (network layer 3), see OSI model and TCP/IP. See layer 3 switches, route server, router cluster and routing protocol (McQuerry, 2007).

Figure 2: Router Terminology

2.7.Virtual Private Networks


22

Virtual private networks (VPNs) are a fairly quixotic subject; there is no single defining product, nor does even much of a consensus among VPN vendors as to what comprise a VPN. Many VPN are logical creations or the segmentation of the network into departments so that the data and information can be handled in a much better fashion. Virtual private network: A method of encrypting point-to-point logical connections across a public network, such as the Internet. This allows secure communications across a public network.
1.9.1 Layer 2 Tunneling Protocols

Tunneling: A method of avoiding protocol restrictions by wrapping packets from one protocol in another protocols frame and transmitting this encapsulated packet over a network that supports the wrapper protocol. It normally takes place at layer 2 of the OSI model. Hence, ththere are protocols created which help in the operation of tunneling. Some examples are Point-to-Point Tunneling Protocol (PPTP), which it had championed. Cisco, too, had a protocol designed to perform a similar function. The IETF combined the best elements of each proposal and specified the open standard L2TP.
1.9.2 Operational Mechanics

6to4 Tunneling 6to4 tunneling is really useful for carrying IPv6 data over a network thats still IPv4. Its quite possible that youll have IPv6 subnets or other portions of your network that are all IPv6, and those networks will have to communicate with each other. Not so complicated, but when you consider that you might find this happening over a WAN or some other network that you dont control, well, that could be a bit ugly. So what do we do about this if we dont control the whole tamale? Create a tunnel that will carry the IPv6 traffic for us across the IPv4 network, thats what. The whole idea of tunneling isnt a difficult concept, and creating tunnels really isnt as hard as you might think. All it really comes down to is snatching the IPv6 packet thats happily traveling across the network and sticking an IPv4 header onto the front of it. Kind of like catch and release fishing, except for the fish doesnt get something plastered on its face before being thrown back into the stream.
1.9.3 Implementation Topologies

There are two specific ways of implementing L2TP topologies: Client-aware tunneling Client-transparent tunneling

23

The basic difference lies in which machine is being tunneled. There are also protocols which assist the tunneling process and hence make the topology implementation easy.

1.9.4 Client-Aware Tunneling

As the name suggests, the technology is derived from the remote client start hence, the title. In this topology, the client establishes a connection which is logical in nature to a connection which is physical and is connected to the LAS. The client remains aware of the tunneled connection all the way through to the LNS. It can filter and determine which traffic is to be diverted to the tunnel.
1.9.5 Client-Transparent Tunneling

The main idea of the Client-transparent tunneling features L2TP, is to have access through concentrators (LACs) distributed and close the gap geographically to the remote users. Such The long distance modem dialing will also be costly and hence this implementation will help reduce that. L2TP does not directly establish a connection but rather uses point-to-point communication session with using PPP. In this way the user will encapsulate IP datagram in PPP frames. LNS is normally used as the remote user's gateway to the network it wants to connect to which is mostly its own home network. When the packets reach the destination or near, the tunneling headers are stripped off.
1.9.6 Adding More Security

Although very useful, but this is still in the basic developmental stages just like PPP which in all fairness, uses security features over WANs and MAN but is till developing how to securely transmit packets. Hence the security can be enhances later in the coming few years. For now there are many parts of the networking systems which help in safe implementation. In Linux, you can find so many different applications to build a L2TP server but there is no proper documentation for this. Also, I think no one is using L2TP VPN nowadays. But my requirement could solve by L2TP only. I wanted to configure the VPN for some old devices that does support only L2TP VPN.

24

Figure13: Using nslookup

25

2.8.OSI Networking Protocols Open Systems Interconnection reference model: A conceptual model defined by the International Organization for Standardization (ISO), describing how any combination of devices can be connected for the purpose of communication. The OSI model divides the task into seven functional layers, forming a hierarchy with the applications at the top and the physical medium at the bottom, and it defines the functions each layer must provide. These layers are defined below later in the next section. The OSI model was meant to help vendors create interoperable network devices and software in the form of protocols so that different vendor networks could work with each other. Like world peace, itll probably never happen completely, but its still a great goal. The OSI model is the primary architectural model for networks. It describes how data and network information are communicated from an application on one computer through the network media to an application on another computer. The OSI reference model breaks this approach into layers. (ICND, 2003). Layer 7: The application layer. The Application layer of the OSI model marks the spot where users actually communicate to the computer. This layer only comes into play when its apparent that access to the network is going to be needed soon. Take the case of Internet Explorer (IE). Layer 6: The presentation layer. The Presentation layer gets its name from its purpose: It presents data to the Application layer and is responsible for data translation and code formatting. This layer is essentially a translator and provides coding and conversion functions. A successful data-transfer technique is to adapt the data into a standard format before transmission. Layer 5: The session layer. The Session layer is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. This layer also provides dialog control between devices, or nodes. It coordinates communication between systems and serves to organize their communication by offering three different modes: simplex, half duplex, and fullduplex. Layer 4: The transport layer. The Transport layer segments and reassembles data into a data stream. Services located in the Transport layer segment and reassemble data from upper-layer applications and unite it into the same data stream. Layer 3: The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network layer must transport traffic between devices that arent locally attached. Routers (layer 3 devices) are specified at the Network layer and provide the routing services within an internetwork. Layer 2: The Data Link layer provides the physical transmission of the data and handles error notification, network topology, and flow control. This means that the Data Link layer will ensure that messages are delivered to the proper device on a LAN using hardware addresses and will translate messages from the Network layer into bits for the Physical layer to transmit.

26

Layer 1: Finally arriving at the bottom, we find that the Physical layer does two things: It sends bits and receives bits. Bits come only in values of 1 or 0a Morse code with numerical values. The Physical layer communicates directly with the various types of actual communication media. Different kinds of media represent these bit values in different ways. Some use audio tones, while others employ state transitionschanges in voltage from high to low and low to high. Specific protocols are needed for each type of media to describe the proper bit patterns to be used, how data is encoded into media signals, and the various qualities of the physical medias attachment interface.

Figure 14: OSI

3. Network Device Network devices are components which are hardware tangible elements of the network and have the capability to exchange information and data in forms of signals or packets to communicate with each other. For example, a LAN requires a hub, router, cabling or radio technology, network cards, and if online access is desired, a high-speed modem. Happily this is much less complicated than it might sound to someone new to networking.

3.1.Router

27

A Network layer mechanism, either software or hardware, using one or more metrics to decide on the best path to use for transmission of network traffic. Sending packets between networks by routers is based on the information provided on Network layers. Historically, this device has sometimes been called a gateway. It has a few functions that it performs. They are listed as below: -

Packet forwarding Finding the best destination for the packet Path selection for the destination for the originating packet (Cisco press, 2008).

Figure 15: Router 7200

3.2.Switch In networking, a device responsible for multiple functions such as filtering, flooding, and sending frames. It works using the destination address of individual frames. Switches operate at the Data Link layer of the OSI model. Broadly, any electronic/mechanical device allowing connections to be established as needed and terminated if no longer necessary. The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a gateway to access small office/home broadband services such as DSL or cable internet. In most of these cases, the end-user device contains a router and components that interface to the particular physical broadband technology. User devices may also include a telephone interface for VoIP.

Switches developed from repeaters and bridges which were layer 1 devices and contained ports for signal attenuation. Hence these unintelligent electronic devices solved their purpose but could not add more functionalities and security. Hence switches were created which are mostly multi-port bridges which eliminate collision domains and broadcast domains. The added functionalities could help also add security. There is different ways in which the singles are handled in switches. Some of the switches arealso known as multi-layer switches. They can also be used to handle packets as opposed to them handling frames nd MAC addresses as in the LAN and Ethernet setups. (Cisco press, 2008).

28

Figure 16: Switch

3.3.Cable Network 2.3.1 Cat5 CAT5 (also, CAT 5) is a twisted pair Ethernet network cable standard defined by the Electronic Industries Association and Telecommunications Industry Association (commonly known as EIA/TIA). CAT5 is the fifth generation of twisted pair Ethernet technology and the most popular of all twisted pair cables in use today. CAT5 cable contains cables of different cables. These are used in different sequences to generate the desired communication through analog signals. The advantage is the ease of the direction of the analog signal through an amplification system. CAT5 cable runs are limited to a maximum recommended run length of 100m (328 feet). It is normally governed by the standards of the RS under the RS-232 category. The cable is available in both stranded and solid conductor forms. The stranded form is more flexible and withstands more bending without breaking and is suited for reliable connections with insulation piercing connectors, but makes unreliable connections in insulation-displacement connectors. There are also Null-Modem cables used in this category which can have different combination of the colored wires inside the shield to male up different cables like: Roll over cable Crossover Straight through These have their own purposes and can be used to connect consoles to routers or hosts with switches. The Cat 5 cables are normally shielded and also put under the category of the shielded twisted pair cabling. This is to avoid the spilt pair occurrence which happens due to electrical interference. Slight variations in the cabling techniques and their can lead to different ID names to differentiate and make it easy for the engineers to choose which cable to use under which situation. (Anwers.com, 2008).

29

Figure 17: Cat5

2.3.2 Cat 6 There is always need to for better communication with networks and with the increase in the network traffic, the physical layer will feel the pressure as it will have to accommodate the amount of data flowing through cables. In the cable world, the technology improves with the use of different cables and their combinations. The cables have to carry voice and data and for the reliability of the network, they cannot afford to lose communication data or the flow of information. Some applications are mission critical in schools and other institutions and require that there is high level of speed. This prompts for a better cable and a little advancement in its anatomy to make changes for the analog signal amplification and frequency changes experienced by systems.This is similar to the advancements in the electronics of the Ethernet cards which lead them to have better transmission speeds. Most Ethernet cards now operate at 100MBPS. The main difference between CAT 5/5e and CAT 6 is the extension of the bandwidth from 100MHz to 250MHz. Like other cables, Category 6 cable contains four twisted wire pairs. Although it is sometimes made with 23 AWG wire, the increase in performance with Cat 6 comes mainly from better insulation. It is suitable for the network architecture which is to be designed for the school and for the transmission and the data floe, cat 6 cables are used mainly in houselhold and office buildings. As with all other types of twisted pair EIA/TIA cabling, individual CAT6 cable runs are limited to a maximum recommended length of 100m (328 feet). Printing along the length of the cable sheath identifies it as CAT6. (Anwers.com, 2008).

30

Figure 18: Cat6

2.3.3 Fiber Defined by the numerical aperture (NA), the fiber cables are used these days for very fast and effective networking systems. There are various protocols and network designs which revolvea round the use of the optic fibers. They are completely different from the cooper coaxial cables as they are made up of super-thin filaments of glass or other transparent materials that can carry beams of light. Optical Carrier: A series of physical protocols, designated as OC-1, OC-2, OC-3, and so on, for SONET optical signal transmissions. OC signal levels place STS frames on a multimode fiberoptic line at various speeds, of which 1.84Mbps is the lowest (OC-1). Each subsequent protocol runs at a speed divisible by 51.84. Synchronous Optical Networks are designed using these cables under the ANSI standard for synchronous transmission on fiber-optic media, developed at Bell Labs. It specifies a base signal rate of 51.84Mbps and a set of multiples of that rate, known as Optical Carrier levels, up to 2.5Gbps. It has many advantages over the coaxial cables which are given here below: -

Size: these are slimmer and smaller in size. Weight: they are at least 1/10th the weight of a coaxial cable. Crosstalk: There is no electrical interference and hence there is no chance for a spilt pair happening. Security: With their use, the cladding can be removed nd it is very difficult to remove signals and interpret them from optic cables. Bandwidth Fewer repeaters Installation is easy Cost effective and better performance than coaxial cables. No ground loops No shielding is required No electrical hazards There is absolutely no damage through EMP

31

Figure 19: fiber cable

2.3.4 Single mode In optical fiber technology, single mode fiber is optical fiber that is designed for the transmission of a single ray or mode of light as a carrier and is used for long-distance signal transmission. For short distances, multimode fiber is used. Single mode has their own advantages as they help in propagation of fast signals over long distances. Single mode offer no model dispersions which indicate only a single (an axial ray) can propagate and offer very good bandwidth. The only issue with the single mode cable is the difficulty in projecting light into a small core. There is also difficulty of aligning connectors and fiber-fiber splices. This cable can provide the ultimate bandwidth if these difficulties are removed. The decision to use the single mode or the multi-mode is based on transmission distance to be covered as well as the overall budget allowed. If the distance is less than a couple of miles, multimode fiber will work well and transmission system costs (transmitter and receiver) will be in the $500 to $800 range. If the distance to be covered is more than 3-5 miles, single mode fiber is the choice. Transmission systems designed for use with this fiber will typically cost more than $1000 (due to the increased cost of the laser diode (Cable Communication, 1994).

32

Figure 20: Single mode

2.3.5 Multi Mode In optical fiber technology, multimode fiber is optical fiber that is designed to carry multiple light rays or modes concurrently, each at a slightly different reflection angle within the optical fiber core. Multimode fiber transmission is used for relatively short distances because the modes tend to disperse over longer lengths (this is called modal dispersion). For longer distances, single mode fiber (sometimes called monomode) fiber is used. Multimode fiber has a larger core than single mode. Multimode fiber has a relatively large light carrying core, usually 62.5 microns or larger in diameter. It is usually used for short distance transmissions with LED based fiber optic equipment. Single-mode fiber has a small light carrying core of 8 to 10 microns in diameter. It is normally used for long distance transmissions with laser diode based fiber optic transmission equipment. There are also many graded cables which are used in multi mode optic fiber cables. These are given here below: Step index fiber: The core diameter for this cable is 50-75 nanometers and has advantage that coupling light into the fiber and splicing fibers together which is easier. However transmission capacity is lower. Graded Index: In fiber optics, a graded-index or gradient-index fiber is an optical fiber whose core has a refractive index that decreases with increasing radial distance from the fiber axis (the imaginary central axis running down the length of the fiber).

Because parts of the core closer to the fiber axis have a higher refractive index than the parts near the cladding, light rays follow sinusoidal paths down the fiber. The advantage of the graded-index fiber compared to multimode step-index fiber is the considerable decrease

33

in modal dispersion. The most common refractive index profile for a graded-index fiber is very nearly parabolic. The parabolic profile results in continual refocusing of the rays in the core, and minimizes modal dispersion. This type of fiber is normalized by the International Telecommunications Union ITU-T at recommendation G.651.1 (Cable Communication, 1994).

Figure 21: Multi Mode

(Chapter 3)

Design :

34

3.1.Network Design

Figure 22: Logical Network design

When building a LAN that satisfies the needs of a small- or medium-sized business, your plan is more likely to be successful if a hierarchical design model is used. Compared to other network designs, a hierarchical network is easier to manage and expand, and problems are solved more quickly. Hierarchical network design involves dividing the network into discrete layers. Each layer provides specific functions that define its role within the overall network. By separating the various functions that exist on a network, the network design becomes modular, which facilitates scalability and performance. The typical hierarchical design model is broken up in to three layers: access, distribution, and core. An example of a three-layer hierarchical network design is displayed in the figure 21.

3.1.1. Access Layer

35

The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP). The main purpose of the access layer is to provide a means of connecting devices to the network and controlling which devices are allowed to communicate on the network. 3.1.2. Distribution Layer The distribution layer aggregates the data received from the access layer switches before it is transmitted to the core layer for routing to its final destination. The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs) defined at the access layer. VLANs allow you to segment the traffic on a switch into separate subnetworks. For example, in a university you might separate traffic according to faculty, students, and guests. Distribution layer switches are typically high-performance devices that have high availability and redundancy to ensure reliability. You will learn more about VLANs, broadcast domains, and inter-VLAN routing later in this course. 3.1.3. Core Layer The core layer of the hierarchical design is the high-speed backbone of the internetwork. The core layer is critical for interconnectivity between distribution layer devices, so it is important for the core to be highly available and redundant. The core area can also connect to Internet resources. The core aggregates the traffic from all the distribution layer devices, so it must be capable of forwarding large amounts of data quickly.

Figure 23: Logical Layout

36

Figure 24: Physical Layout

3.1.4. Benefits of a Hierarchical Network There are many benefits associated with hierarchical network designs.

Scalability

Hierarchical networks scale very well. The modularity of the design allows you to replicate design elements as the network grows. Because each instance of the module is consistent, expansion is easy to plan and implement. For example, if your design model consists of two distribution layer switches for every 10 access layer switches, you can continue to add access layer switches until you have 10 access layer switches cross-connected to the two distribution layer switches before you need to add additional distribution layer switches to the network topology. Also, as you add more distribution layer switches to accommodate the load from the access layer switches, you can add additional core layer switches to handle the additional load on the core.

Performance

Communication performance is enhanced by avoiding the transmission of data through lowperforming, intermediary switches. Data is sent through aggregated switch port links from the access layer to the distribution layer at near wire speed in most cases. The distribution layer then uses its high performance switching capabilities to forward the traffic up to the core, where it is routed to its final destination. Because the core and distribution layers perform their

37

operations at very high speeds, there is less contention for network bandwidth. As a result, properly designed hierarchical networks can achieve near wire speed between all devices.

Security

Security is improved and easier to manage. Access layer switches can be configured with various port security options that provide control over which devices are allowed to connect to the network. You also have the flexibility to use more advanced security policies at the distribution layer. You may apply access control policies that define which communication protocols are deployed on your network and where they are permitted to go. For example, if you want to limit the use of HTTP to a specific user community connected at the access layer, you could apply a policy that blocks HTTP traffic at the distribution layer. Restricting traffic based on higher layer protocols, such as IP and HTTP, requires that your switches are able to process policies at that layer. Some access layer switches support Layer 3 functionality, but it is usually the job of the distribution layer switches to process Layer 3 data, because they can process it much more efficiently.

Manageability

Manageability is relatively simple on a hierarchical network. Each layer of the hierarchical design performs specific functions that are consistent throughout that layer. Therefore, if you need to change the functionality of an access layer switch, you could repeat that change across all access layer switches in the network because they presumably perform the same functions at their layer. Deployment of new switches is also simplified because switch configurations can be copied between devices with very few modifications. Consistency between the switches at each layer allows for rapid recovery and simplified troubleshooting. In some special situations, there could be configuration inconsistencies between devices, so you should ensure that configurations are well documented so that you can compare them before deployment.

Maintainability

Because hierarchical networks are modular in nature and scale very easily, they are easy to maintain. With other network topology designs, manageability becomes increasingly complicated as the network grows. Also, in some network design models, there is a finite limit to how large the network can grow before it becomes too complicated and expensive to maintain. In the hierarchical design model, switch functions are defined at each layer, making the selection of the correct switch easier. Adding switches to one layer does not necessarily mean there will not be a bottleneck or other limitation at another layer. For a full mesh network topology to achieve maximum performance, all switches need to be high-performance switches, because each switch needs to be capable of performing all the functions on the network. In the hierarchical model, switch functions are different at each layer. You can save money by using less expensive access layer switches at the lowest layer, and spend more on the distribution and core layer switches to achieve high performance on the network.

38

3.1.5. Network Diameter When designing a hierarchical network topology, the first thing to consider is network diameter. Diameter is usually a measure of distance, but in this case, we are using the term to measure the number of devices. Network diameter is the number of devices that a packet has to cross before it reaches its destination. Keeping the network diameter low ensures low and predictable latency between devices.

Figure 25: Network Diameter

In the figure, PC1 communicates with PC3. There could be up to six interconnected switches between PC1 and PC3. In this case, the network diameter is 6. Each switch in the path introduces some degree of latency. Network device latency is the time spent by a device as it processes a packet or frame. Each switch has to determine the destination MAC address of the frame, check its MAC address table, and forward the frame out the appropriate port. Even though that entire process happens in a fraction of a second, the time adds up when the frame has to cross many switches. In the three-layer hierarchical model, Layer 2 segmentation at the distribution layer practically eliminates network diameter as an issue. In a hierarchical network, network diameter is always going to be a predictable number of hops between the source and destination devices.

3.1.6. Bandwidth Aggregation Each layer in the hierarchical network model is a possible candidate for bandwidth aggregation. Bandwidth aggregation is the practice of considering the specific bandwidth requirements of each part of the hierarchy. After bandwidth requirements of the network are known, links

39

between specific switches can be aggregated, which is called link aggregation. Link aggregation allows multiple switch port links to be combined so as to achieve higher throughput between switches. Cisco has a proprietary link aggregation technology called EtherChannel, which allows multiple Ethernet links to be consolidated.

Figure 26: Bandwidth Aggregation

In the figure, computers PC1 and PC3 require a significant amount of bandwidth because they are used for developing weather simulations. The network manager has determined that the access layer switches S1, S3, and S5 require increased bandwidth. Following up the hierarchy, these access layer switches connect to the distribution switches D1, D2, and D4. The distribution switches connect to core layer switches C1 and C2. Notice how specific links on specific ports in each switch are aggregated. In this way, increased bandwidth is provided for in a targeted, specific part of the network. Note that in this figure, aggregated links are indicated by two dotted lines with an oval tying them together. In other figures, aggregated links are represented by a single, dotted line with an oval.

3.1.7. Redundancy Redundancy is one part of creating a highly available network. Redundancy can be provided in a number of ways. For example, you can double up the network connections between devices,

40

or you can double the devices themselves. This chapter explores how to employ redundant network paths between switches.

Figure 27: Redundancy

Implementing redundant links can be expensive. Imagine if every switch in each layer of the network hierarchy had a connection to every switch at the next layer. It is unlikely that you will be able to implement redundancy at the access layer because of the cost and limited features in the end devices, but you can build redundancy into the distribution and core layers of the network. In the figure, redundant links are shown at the distribution layer and core layer. At the distribution layer, there are two distribution layer switches, the minimum required to support redundancy at this layer. The access layer switches, S1, S3, S4, and S6, are cross-connected to the distribution layer switches. This protects your network if one of the distribution switches fails. In case of a failure, the access layer switch adjusts its transmission path and forwards the traffic through the other distribution switch. Some network failure scenarios can never be prevented, for example, if the power goes out in the entire city, or the entire building is demolished because of an earthquake. Redundancy does not attempt to address these types of disasters.

3.2.1. General network quotation

41

Name of Number building of rooms

Room name

Function

Quotation for building

Total number of ports in a building 4 ports + 1 Printer port 2 ports 5 ports 6 ports Wireless + IPtelephone Total = 18 ports Total = 24 ports 9 ports 1 ports Total = 10 ports Total = 24 ports

A 1 (IDF)

8 rooms 1 Library

A01 A08

1 large stuff room 1 medium stuff room 5 individual stuff room Library 1 Student Study area

4 computers + 1 printer 2 computers 4 computers 4 computer + 1 printer + 1 backup

9 rooms

B01 B09 C01 C05

All classrooms

9 computer + 9 projectors 6 backup 3 computers + 3 projectors + 3 backup 1 backup for cafe 8 computer + 8 projectors + 8 backup

5 rooms

3 classrooms 1 cafeteria 1 Storage All classrooms

D 1 (MDF) E 1 (IDF)

8 rooms

D01 D08

8 rooms

E01 E08

6 classrooms 2 LABs

6 computer + 6 projectors + 6 backup 24 computers + 24 computers 4 backup for LABs 8 computer + 8 projectors + 8 backup 12 computers + 12 computers +8 backup 5 computer Printer and copier 1 computer + 1 projector 1 computer + 1 projector + 1 backup

18 ports 48 ports + 4 Backups Total = 70 ports 24 ports 24 ports Total = 48 ports 5 ports 2 ports 2 ports 3 ports Total = 12 ports

10 rooms

F01 F10

8 classrooms 2 computer labs

G Adminis tration

8 rooms

G01 G08

5 main stuff rooms 1 printer room 1 meeting room 1 Hall

Table2: General network quotation

3.2.2. Local cable:

42

3.2.2.1. General diagram cable We went around the school to see where we needed cabling for the school. In this school design the type of cables we used was Cat 6.
8 7 6 5 4 3 2 1

Building E
H 1 1 1 1 1 1 1 1

Legend Notes
1.Data media termination point. Each data termination point will contain four (4) Cat 5 UTP runs terminated on a fourplex wall mounted BIA/TIA standard outlet. All horizontal data media runs will be run and terminated at the nearest IDF or MDF. 2. Existing condult for data media cable runs.
main distribution frameMDF intermediate distribution frame-IDF
1 1 1 E H

Building F

Building D
1 1 1 F 1 1 1 1 1 1 1

1 1

1 1

Building B
E 1 1 1

Building G

1 1

1 1

Outlet main cable


1 1

local cable
S pecial S tem floor P ys s lan

Building A
C 1 D 1 1 G 1 1 F 1 D 1 B D 1 1 1 D C A 1 D

DOMINION Key Map


Building C

1 B

0m A

10m

20m

30m

Copyright Cisco Systems


A 3 2 1

Figure28: Main cable

MDF-T1 was located in the Building D which is a 42U cabinet. IDF-T2, T3 were located in the Building A, E which were 24U cabinet. The cable was used that was Cat6. T1 was connected to T2, and the length of cable it takes is 75m. T1 was connected to T3, and the length of cable it takes is 75m. T1, T2, T3 provided the network connections for all building. They used 300m Cat6.

3.2.2.2. Local cable:

43

1- Building A

Figure29: Cable diagram of building A

The building A have 8 rooms which are :


1 large stuff room - 4 computers + 1 printer 1 medium stuff room - 2 computers 5 individual stuff room -4 computers Library -4 computer + 1 printer + 1 backup 1 Student Study area

Cat5 cable was used in this case

Name room A01 A02 A03 A04 A05 A06 A07 A08 TOTAL

Length cable/port 25m 22m 17m 10m 12m 15m 26m 24m

Quality 1 1 5 6 1 2 1 1 18

Total length 25m 22m 85m 60m 12m 30m 26m 24m 284m

44

Table3: The length of cable - Building A

2- Building B

Figure30: Cable diagram of building B

The building B have 9 class rooms which are 9 computers + 9 projectors + 6 backup Cable is Cat5 and run as above figure.

Name room B01 B02 B03 B04 B05 B06 B07 B08 B09 TOTAL

Length cable/port 26m 25m 24m 17m 37m 35m 45m 43m 50m

Quality 3 3 3 3 3 3 2 2 2

Total length 78m 75m 72m 51m 111m 105m 90m 86m 100m 768m

45

Table4: The length of cable - Building B

3- Building C

Figure31: Cable diagram of building

The building C have 5 rooms which are :


3 classrooms - 3 computers + 3 projectors + 3 backup. 1 cafeteria 1 Backup. 1 Storage.

Name room C01 C02 C03 C04

Length cable/port 75m 70m 65m 55m

Quality 3 3 3 1

Total length 225m 210m 195m 55m

46

C05 Total

50

1 11

50m 735m

Table 5: Length of cable - Building C

4- Building D The building D have 8 rooms which are CLASS ROOMS.

Figure32: Cable diagram of building D

Name room D01 D02 D03 D04 D05 D06

Length cable/port 8m 10m 15m 20m 29m 30m

Quality 3 3 3 3 3 3

Total length 24m 30m 45m 60m 87m 90m

47

D07 D08 Total

37m 40m

3 3 24

111m 120m 567m

Table 6: Length of cable - Building D

5- Building E

Figure33: Cable diagram of building E

The building E have 8 rooms which are 6 class rooms and 2 labs :

Name room E01 E02 E03

Length cable/port 50m 48m 40m

Quality 3 3 3

Total length 150m 144m 120m

48

E04 E05 E06 E07 E08 Total

37m 35m 28m 10m 15m

3 26 26 3 3 70

111m 910m 728m 30m 45m 2238m

Table 7: Length of cable - Building E

6- Building F

Figure34: Cable diagram of building F

The building F have 10 rooms which are 8 class rooms and 2 labs :

Name room F01 F02 F03 F04

Length cable/port 60m 59m 56m 55m

Quality 3 3 3 3

Total length 180m 177m 168m 165m

49

F05 F06 F07 F08 F09 F10 Total

50m 49m 30m 28m 32m 30m

3 3 12 12 3 3 70

150m 147m 360m 336m 96m 90m 1869m

Table 8: Length of cable - Building F

7- Building G

Figure35: Cable diagram of building G

The building F have 10 rooms which are 8 class rooms and 2 labs :

Name room G01

Length cable/port 40m

Quality 3

Total length 120m

50

G02 G03 G04 G05 G06 G07 G08 Total

55m 50m 52m 55m 58m 56m 56m

2 2 1 1 1 1 1 12

110m 100m 52m 55m 58m 56m 56m 607m

Table9: Length of cable - Building G

3.2.1.3.Standard cable Two wires color-code standards apply: EIA/TIA 568A and EIA/TIA 568B. The standards are technically the same and operate in the same manner. The only difference between the two schemas is that the green and orange pins are terminated to different pins as shown below. There is no difference in signal. Both the 568A and 568B are used as patch cords for Ethernet connections. When you buy a roll of cable, it does not come with jacks at the ends. You will need to cut off the amount you need and then order the pairs of wires according to the type of cable you want and then crimp them to an RJ-45 jack so that the cable may be usable. The table below shows the order in which you connect the wire pairs to an RJ-45 jack. Pin numbers are read left-to-right with the connector tab facing down. This standard is more common in jumpers and in new network installations. NB- When it says White/Orange or White/Green etc, know that the wire is white with an orange strip or white with a green strip etc.

Figure36: TIA/EIA 568A Wiring

51

The table below shows the order in which you connect the wire pairs to an RJ-45 jack for 568B. This standard is more common for installed wiring and has been used previously on most off the shelf Ethernet cables.

Figure37: TIA/EIA 568B Wiring

In order to wire a crossover Ethernet cable, you will need to use both the 568A and 568B standards. Wire one end with 568A and the other end with 568B. This simply means that you switch the green set of wires with the orange set of wires. Specifically, switch the solid Green (G) with the solid Orange, and switch the green/white with the orange/white. Once the preferred schema has been selected, it should be maintained throughout design and installation. This ensures that errors are avoided during maintenance. 3.3. General Wireless

Design diagram

52

Figure38: Cable diagram of wireless

AP1 is connected to B5 which is located in building 5. Length of cable is 26 m AP2 is connected to B5 which is located in building 5. Length of cable is 14m AP3 is connected to B2 which is located in building 2. Length of cable is 5m AP4 is connected to B2 which is located in building 2. Length of cable is 20m AP5 is connected to B5 which is located in building 5. Length of cable is 12m AP6 is connected to BM which is located in Multipurpose building. Length of cable is 15m AP7 is connected to CB which is located in Computer building. Length of cable is 35 m. AP8 is connected to B3 which is located in building 3. Length of cable is 8 m AP9 is connected to B3 which is located in building 3. Length of cable is 28 m AP10 is connected to BS which is located in Science building. Length of cable is 8m

The whole school is wireless and students can roam outside the classroom as well. In this design Cisco series access point is used in all building. They will be all ceiling mounted.

53

There is a termination point for each building so that students or staffs who bring their laptops can plug their laptops into the ports.

3.4.

Non-overlapping channel:

Figure39: Overload wireless

Here as shown, we used channel1, 6 and 11 and we used different frequencies for each channel thats why we separate the same channels from each other (like we dont have channel 1 overlapping over another channel 1) and so that it wont cause interference. However, It is recommended that the adjacent BSS cells have a 10% to 15% overlap. If transmitters are closer together than channels 1, 6, and 11 overlaps between the channels will probably cause unacceptable degradation of signal quality and throughput.

3.5.

Install equipment network.

3.5.1. Network diagram

54

3.5.2. Diagram

Figure40: The physical diagram

3.5.3. Remark of diagram 3.5.3.1.The servers We used three servers in this school and they were for the following: First, Administration server: function of administration server provided all service to admin network the school such as: DHCP, DNS, WEB server, printer server, Active Directory and so on. Second, Staff server: function of staff server recorded all programmers to manage mark of student, manage database student, all service. Third, Student server: all student of school can connect student server. At that, they can save their data, to check their mark, to show timetable, and provide all notice board. However, Users have logins and an access list was programmed on the router to prevent unauthorized users from getting in the network. Also have to stop students from accessing to the staff and admin resources.

3.5.3.2.The access point

55

We used seven access points which are installed over the school. In this design, access points from AP1 to AP7 were placed in suitable places to get coverage for whole school. Moreover, Locations of access points, switches, and all other devices are explained in the figures and you can roam around the classroom or even out of the classroom using your laptop and not get disconnected, as long as the coverage is covered in that region.

3.5.3.3.Switch

We have two styles of switches which are the main switch and local switch. Basically, the Main switch is called core switch which is also known as switch Cisco 2960 and it connects all trunk-link from other local switches. The other style is the Local switches which are known as Express Switch Cisco series 500. All terminator are connected on that such computer, printer, scanner, photo, Laptop, phone, and so on.

3.5.3.4.Routers

In this school design, Cisco router series 2800 is used. It is configured to send and receive data between terminator. It also has a capacity of access list that deny or permit information transfer. The router has two port Fast Ethernet and 2 port serial.

3.6.Network Classes Overview Historically, RFC1700 grouped the unicast ranges into specific sizes called class A, class B, and class C addresses. It also defined class D (multicast) and class E (experimental) addresses, as previously presented. The unicast address classes A, B, and C defined specifically-sized networks as well as specific address blocks for these networks, as shown in the figure. A company or organization was assigned an entire class A, class B, or class C address block. This use of address space is referred to as classful addressing.

3.6.1. Class A Blocks A class A address block was designed to support extremely large networks with more than 16 million host addresses. Class A IPv4 addresses used a fixed /8 prefix with the first octet to indicate the network address. The remaining three octets were used for host addresses.

56

To reserve address space for the remaining address classes, all class A addresses required that the most significant bit of the high-order octet be a zero. This meant that there were only 128 possible class A networks, 0.0.0.0 /8 to 127.0.0.0 /8, before taking out the reserved address blocks. Even though the class A addresses reserved one-half of the address space, because of their limit of 128 networks, they could only be allocated to approximately 120 companies or organizations.

3.6.2. Class B Blocks Class B address space was designed to support the needs of moderate to large size networks with more than 65,000 hosts. A class B IP address used the two high-order octets to indicate the network address. The other two octets specified host addresses. As with class A, address space for the remaining address classes needed to be reserved. For class B addresses, the most significant two bits of the high-order octet were 10. This restricted the address block for class B to 128.0.0.0 /16 to 191.255.0.0 /16. Class B had slightly more efficient allocation of addresses than class A because it equally divided 25% of the total IPv4 address space among approximately 16,000 networks.

3.6.3. Class C Blocks The class C address space was the most commonly available of the historic address classes. This address space was intended to provide addresses for small networks with a maximum of 254 hosts. Class C address blocks used a /24 prefix. This meant that a class C network used only the last octet as host addresses with the three high-order octets used to indicate the network address. Class C address blocks set aside address space for class D (multicast) and class E (experimental) by using a fixed value of 110 for the three most significant bits of the high-order octet. This restricted the address block for class C to 192.0.0.0 /16 to 223.255.255.0 /16. Although it occupied only 12.5% of the total IPv4 address space, it could provide addresses to 2 million networks.

3.7. Limits to the Class-based System Not all organizations' requirements fit well into one of these three classes. Classful allocation of address space often wasted many addresses, which exhausted the availability of IPv4 addresses. For example, a company that had a network with 260 hosts would need to be given a class B address with more than 65,000 addresses. Even though this classful system was all but abandoned in the late 1990s, you will see remnants of it in networks today. For example, when you assign an IPv4 address to a computer, the operating system examines the address being assigned to determine if this address is a class A, class B, or class C. The operating system then assumes the prefix used by that class and makes the appropriate subnet mask assignment.

57

Another example is the assumption of the mask by some routing protocols. When some routing protocols receive an advertised route, it may assume the prefix length based on the class of the address.

3.8. Classless Addressing The system that we currently use is referred to as classless addressing. With the classless system, address blocks appropriate to the number of hosts are assigned to companies or organizations without regard to the unicast class.

Figure41: IP ADDRESS CLASSES

Subnetting allows for creating multiple logical networks from a single address block. Since we use a router to connect these networks together, each interface on a router must have a unique network ID. Every node on that link is on the same network. We create the subnets by using one or more of the host bits as network bits. This is done by extending the mask to borrow some of the bits from the host portion of the address to create additional network bits. The more host bits used, the more subnets that can be defined. For each bit borrowed, we double the number of subnet works available. For example, if we borrow 1 bit, we can define 2 subnets. If we borrow 2 bits, we can have 4 subnets. However, with each bit we borrow, fewer host addresses are available per subnet.

58

3.9. Formula for calculating subnets we this formula to calculate the number of subnets: 2^n where n = the number of bits borrowed

3.10. The number of hosts To calculate the number of hosts per network, we use the formula of 2^n - 2 where n = the number of bits left for hosts.

3.11. Variable Length Subnet Mask Subnetting a subnet, or using Variable Length Subnet Mask (VLSM) was designed to maximize addressing efficiency. When identifying the total number of hosts using traditional subnetting, we allocate the same number of addresses for each subnet. If all the subnets have the same requirements for the number hosts, these fixed size address blocks would be efficient. However, most often that is not the case. For example in our network we have five VLANs and each VLAN has a different requirements also they will be in a different subnet when we use VLSM. First we will consuder each subneting based on the number of hosts, this will has the following requirements: Students: 120 host addresses Stuff: 50 host addresses Gust: 20 host addrersses Management: 10 host addresses Servers: 4 host addresses

When we want to create an appropriate addressing scheme, we should always begin with the largest requirement. In our network, the students with 120 users, has the largest requirement. Starting with 192.168.15.0, we will need 7 hosts bits to accommodate the requirement of 120 hosts. This allows 1 additional bits for the network portion. The prefix for this network would be/25 and the subnet mask would be 255.255.255.128. We should begin by subnetting the original address block of 192.168.15.0/24. Using the usable hosts = 2n -2 formula, we calculate that 7 host bits allow 126 hosts in the subnet.

59

The 126 hosts would meet the required 120 hosts of the Students VLAN and provide 1 additional network bit. Address 192.168.15.0 is 11000000.10101000.00001111.00000000 in binary. Mask 255.255.255.128 is 11111111.11111111.11111111.10000000 in binary. Borrowing 1 host bit to accommodate the Student VLAN requires a /25 bit mask. If the fixed-block addressing scheme were used, all the subnets would use this same /25 mask. That would provide the following subnetting scheme: Subnet 1: 192.168.15.0 /25, host address range 1 to 126 Subnet 2: 192.168.15.128 /25, host address range 129 to 254 This fixed-block method would allow only two subnets and therefore not allow enough address block for our network. In our subnetting, we will need to use VLSM to make the size of each subnet consistent with the hosts required in each VLAN. 3.11.1. Assigning the staff VLAN Next we examine the requirements for the next largest subnet for our network. This is the Staff VLAN, requiring 50 host addresses. We should begin with the next available address of 192.168.15.128 to create an address block for this subnet. By borrowing 1 more bit, we are able to meet the needs of Staff VLAN while limiting the wasted addresses. The borrowed bit gives us a /26 mask with the following address range: 192.168.15.128/26, host address range 129 to 190 This block of address provides 61 addresses, which meets the requirement of 50 hosts and allows room for growth for this subnet.

3.11.2. Assigning the Guest VLAN To provide the addressing for the next largest subnet, Guest VLAN we need to borrow another bit, to further extend the mask to /27. Starting with the address 192.168.15.192 we will get the useable range from 192.168.15.193 to 192.168.15.222.

3.11.4. Assigning the management VLAN to provide the addressing for the management VLAN which is required 10 hosts addresses. This subnetting requires us to borrow another bit, to further extend the mask to /28. Starting

60

with address 192.168.15.224 we will get the useable range from 192.168.15.225 to 192.168.15.238.

3.11.5. Assigning the servers VLAN To provide the addresses to the final VLAN which is required 4 hosts addresses. This subnetting requires us to borrow another bit, to further extend the mask to /29. Starting with address 192.168.15.240 we will get the useable range from 192.168.15.241 to 192.168.15.246.

Name

Required Subnet Address Number of Addresses 120 50 192.168.15.0 192.168.15.128

Address Range .1-126 129-190

Broadcas Network/Prefix t Address 127 191 192.168.15.0/25 192.168.15.128/26

Students VLAN Staff VLAN

Guest VLAN

20

192.168.15.192

193-222

223

192.168.15.192/27

Management VLAN Servers VLAN

10 4

192.168.15.224 192.168.15.240

225-238 241-246

239 247

192.168.15.224/28 192.168.15.240/29

Table10: Addressing

scheme

3.12. Benefit of VLSM:


Allows efficient use of address space. Allows the use of multiple subnet mask lengths.

61

Breaks up an address block into small custom blocks. Provides more flexibility in network design. Supports hierarchical enterprise networks.

3.13. Router Configuration:

DOMINION-SCHOOL#show running-config Building configuration...

Current configuration : 3031 bytes ! version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec service password-encryption ! hostname DOMINION-SCHOOL ! ! ! enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0 ! ! ip dhcp excluded-address 192.168.15.1 ip dhcp excluded-address 192.168.15.129 ip dhcp excluded-address 192.168.15.193 ip dhcp excluded-address 192.168.15.225 ip dhcp excluded-address 192.168.15.241 ip dhcp excluded-address 192.168.15.249 !

62

ip dhcp pool Staff network 192.168.15.128 255.255.255.192 ! ! ! ! ! ! ! ip ssh version 2 no ip domain-lookup ip domain-name dominionschool.co.nz ! ! ! ! ! ! interface FastEthernet0/0 no ip address ip nat inside duplex auto speed auto ! interface FastEthernet0/0.10 encapsulation dot1Q 10 ip address 192.168.15.129 255.255.255.192 ! interface FastEthernet0/0.20 encapsulation dot1Q 20 ip address 192.168.15.1 255.255.255.128

63

! interface FastEthernet0/0.30 encapsulation dot1Q 30 ip address 192.168.15.193 255.255.255.224 ! interface FastEthernet0/0.99 encapsulation dot1Q 99 native ip address 192.168.15.225 255.255.255.240 ! interface FastEthernet0/0.100 encapsulation dot1Q 100 ip address 192.168.15.241 255.255.255.248 ! interface FastEthernet0/0.150 encapsulation dot1Q 150 ip address 192.168.15.249 255.255.255.248 ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 description Link to Frame Relay bandwidth 2048 ip address 209.165.201.1 255.255.255.252 encapsulation frame-relay ietf frame-relay map ip 209.165.201.2 102 broadcast frame-relay interface-dlci 102 frame-relay interface-dlci 100

64

frame-relay lmi-type ansi ip access-group 10 in ip nat outside ! interface Serial0/0/1 no ip address shutdown ! interface Vlan1 no ip address shutdown ! router eigrp 100 network 192.168.15.0 0.0.0.127 network 192.168.15.128 0.0.0.63 network 192.168.15.192 0.0.0.31 network 192.168.15.224 0.0.0.15 network 192.168.15.240 0.0.0.7 network 192.168.15.248 0.0.0.7 network 209.165.201.0 0.0.0.3 no auto-summary ! ip nat inside source list 130 interface Serial0/0/0 overload ip nat inside source static tcp 192.168.15.0 80 209.165.201.1 80 ip classless ! ! access-list 10 permit 192.168.15.0 0.0.0.255 access-list 10 deny any access-list 110 permit tcp 192.168.15.224 0.0.0.31 eq telnet host 209.165.201.1 eq telnet

65

access-list 120 permit tcp any host 209.165.201.1 eq www access-list 120 permit icmp any any echo-reply access-list 120 permit tcp host 100.0.0.2 host 209.165.201.1 eq smtp access-list 130 permit ip 192.168.15.0 0.0.0.255 any access-list 2 permit host 192.168.15.225 access-list 2 deny any ! banner motd ^C ################################ UNAUTHORISED ACCESS PROHIBITED ################################ ^C ! ! ! ! line con 0 transport output none exec-timeout 0 0 password 7 0822455D0A16 login line vty 0 4 access-class 110 in ipv6 access-class vty in exec-timeout 20 0 password 7 0822455D0A16 logging synchronous login transport input ssh transport output none !

66

! ! end

3.14. Switch Configuration:

DISTRIBUTION-SWITCH#show running-config Building configuration...

Current configuration : 3231 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname DISTRIBUTION-SWITCH ! ! spanning-tree portfast default ! interface FastEthernet0/1 switchport access vlan 99 switchport trunk native vlan 99 switchport mode trunk switchport port-security violation restrict ! interface FastEthernet0/2

67

switchport trunk native vlan 99 switchport mode trunk switchport voice vlan 150 switchport port-security violation restrict ! interface FastEthernet0/3 switchport trunk native vlan 99 switchport mode trunk switchport voice vlan 150 switchport port-security violation restrict ! interface FastEthernet0/4 switchport port-security violation restrict shutdown ! interface FastEthernet0/5 switchport port-security violation restrict shutdown ! interface FastEthernet0/6 switchport port-security violation restrict shutdown ! interface FastEthernet0/7 switchport port-security violation restrict shutdown ! interface FastEthernet0/8 switchport port-security violation restrict

68

shutdown ! interface FastEthernet0/9 switchport port-security violation restrict shutdown ! interface FastEthernet0/10 switchport port-security violation restrict shutdown ! interface FastEthernet0/11 switchport port-security violation restrict shutdown ! interface FastEthernet0/12 switchport port-security violation restrict shutdown ! interface FastEthernet0/13 switchport port-security violation restrict shutdown ! interface FastEthernet0/14 switchport port-security violation restrict shutdown ! interface FastEthernet0/15 switchport port-security violation restrict shutdown

69

! interface FastEthernet0/16 switchport port-security violation restrict shutdown ! interface FastEthernet0/17 switchport port-security violation restrict shutdown ! interface FastEthernet0/18 switchport port-security violation restrict shutdown ! interface FastEthernet0/19 switchport port-security violation restrict shutdown ! interface FastEthernet0/20 switchport port-security violation restrict shutdown ! interface FastEthernet0/21 switchport port-security violation restrict shutdown ! interface FastEthernet0/22 switchport port-security violation restrict shutdown !

70

interface FastEthernet0/23 switchport access vlan 100 switchport mode access switchport port-security violation restrict ! interface FastEthernet0/24 switchport access vlan 100 switchport mode access switchport port-security violation restrict ! interface GigabitEthernet1/1 switchport access vlan 100 switchport mode access switchport port-security violation restrict ! interface GigabitEthernet1/2 switchport access vlan 100 switchport mode access switchport port-security violation restrict ! interface Vlan1 no ip address shutdown ! interface Vlan99 ip address 192.168.15.234 255.255.255.240 ! no cdp run !

71

banner motd ^C ######################################### UNAUTHORISED ACCESSING PROHIBITED ######################################### ^C ! line con 0 password cisco login transport output telnet exec-timeout 15 0 ! line vty 0 4 exec-timeout 15 0 password cisco login transport input telnet line vty 5 15 login ! ! End

(Chapter 4)

Equipment list & Costing


1. Introduction
72

There are many Network Devices in the Data Center that require multi-homing (multiple network adapters) to tie in to multiple network segments. As the number of those systems increase, it becomes more and more difficult to provide the network infrastructure (due to the sheer number of Ethernet connections that need to be provided) from the perspective of cost, space, and wire management. Therefore, the quotations that can be consider reference.

2. The cost of design

Order Number 1

Name of cost Checking network place (8hours @ $200)

Description Technical performance to take the measurements of area, infrastructure, Create a technical plan base on requirement Manage project

Cost $1600.00

Technical planning (36 hours @ $50) Design project (80hours @ $80)

$1800.00

3 Total

$6400.00 $9800.00

Table11: The cost of design

2.1. The install labor

Order Name of task number Set up

Unit

Hours

Quality Total hours

73

1 2 3 4 5 6 7 8 9 10 Configure 1 2 3 4

Set up free rack Set up wall mount rack Set up UPS Set up router Set up switch Set up Access point Set up Server Set up cable and outlet Set up patch panel

Set Set Set Each Each Each Set Set Each

2 1 1 1 1 2 1 0.6 1

1 4 1 1 20 7 4 460 20

2 4 1 1 20 14 4 276 20

Router Switch Server Access point

Each Each Set Each

2 2 6 2

1 20 4 10

2 40 24 20

Exam LAN, WAN 1 2 3 Total Price $80 per hour


Table12: The labor for install network

Check LAN Check WAN Check performance server

Point Point Set

0.08 0.4 0.8

460 2 4

36.8 0.8 3.2 468.8 hours $37504.00

3. Devices specification

Order number

Description

Specification

74

HP ProLiant DL385 G6

AMD Opteron Model 2435 (6 cores, 2.6 GHz, 6MB L3, 75W) Double Down on Performance: Work faster with the latest AMD Opteron six-core processors; Integrated networking interconnects to free up PCI slots and support more virtual machin The Right Fit: Build your own I/O, choosing from three s modular configurations, including high wattage x16, ; legacy PCI-X, and dual port 10GbE riser options; LConfigurable to fit your needs with up to 16 Small Form a Factor or 6 Large Form Factor drives, reaching 8TB of r internal storage; ProLiant common power slot strategy: g choose 460W AC, 750W AC, 1200W AC or -48V DC e power supplies; Modular Smart Array storage mcontrollers e m o r y f o o t ri n t, t o 1 6 D I M M s ( 1 2 8 G B )

75

Virtual Perfection: Optimized for virtualization and consolidation: robust memory and NIC features to support more virtual machines and compute intensive business needs; Best of both worlds. Manage both virtual and physical IT through single console using HP Insight Control tools; Integrated Hypervisor to get virtual machines deployed easily and securely Focus on Energy Efficiency: Save energy costs with the industry's highest efficiency power supplies; Robust power management with HP Thermal Logic; Dynamic Power Capping, Worry-free, embedded hardware-based power capping

Cisco Catalyst energy-efficient Layer 3 Fast Ethernet switches. 3560V2-24PS These new switches support Cisco EnergyWise tech24 Ethernet nology, which helps companies manage power con10/100 ports sumption of the network infrastructure and networkattached devices, thereby reducing their energy costs with Power and their carbon footprint. over Ethernet The Cisco Catalyst 3560 v2 Series consumes less (PoE) and 2 power than its predecessors and is the ideal access SFP ports
layer switch for enterprise, retail, and branch-office environments. It maximizes productivity and provides investment protection by helping enable a unified network for data, voice, and video.

The Cisco Catalyst 3560 v2 Series are next-generation

Wireless Access point

IEEE 802.11b and IEEE 802.11g 802.11g: 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, and 54 Mbps Autosensing 802.3 10/100BASE-T Ethernet 802.11b or 802.11g: Mini-PCI (32-bit) Americas (FCC) 2.412 to 2.462 GHz; 11 channels

76

802.11g: Outdoor 110 ft (34m) @ 54 Mbps 200 ft (61 m)@ 48 Mbps 225 ft (69 m) @ 36 Mbps 325 ft (99 m) @ 24 Mbps 400 ft (122 m) @ 18 Mbps 475 ft (145 m) @ 12 Mbps 490 ft (149 m) @ 11 Mbps 550 ft (168 m) @ 9 Mbps 650 ft (198 m) @ 6 Mbps 660 ft (201 m) @ 5.5 Mbps 690 ft (210 m) @ 2 Mbps 700 ft (213 m) @ 1 Mbps

802.11g: Indoor 90 ft (27 m) @ 54 Mbps 95 ft (29 m) @ 48 Mbps 100 ft (30 m) @ 36 Mbps 140 ft (43 m) @ 24 Mbps 180 ft (55 m) @ 18 Mbps 210 ft (64 m) @ 12 Mbps 220 ft (67 m) @ 11 Mbps 250 ft (76 m) @ 9 Mbps 300 ft (91 m) @ 6 Mbps 310 ft (94 m) @ 5.5 Mbps 350 ft (107 m) @ 2 Mbps 410 ft (125 m) @ 1 Mbps

CISCO2610XM/11 XM-DC

Cisco Systems Extends Versatility, Integration, and Power of the Cisco 2600 Series Modular Access Platform series to Service Provider central offices and Data Communications Networks. The Cisco 2600XM-DC models provides the same proven technology of the previous Cisco 2600 Series

77

platforms, including Cisco IOS software mainline feature support and the modularity of Network Modules (NMs), WAN Interface Cards (WICs) and Advanced Integration Modules (AIMs). The Cisco 2691DC-U model provides the same module support as the 2600XM, increased performance (up to 70kbps), and even greater density and scalability. The modular architecture of the Cisco 2600 Series allows interfaces to be upgraded to accommodate network expansion or changes in technology as new services and applications are deployed. Service providers can integrate the functions of multiple, separate devices into a single, compact unit, thereby reducing the complexity of managing DCN infrastructures. For example, the Cisco 2600 Series supports connectivity to legacy asynchronous and X.25 devices as well as standards-based IPdevices, facilitating a graceful migration from legacy to next generation network elements. Driven by a powerful RISC processor, the Cisco 2600 Series provides the extra power needed to support the advanced quality of service (QoS), higher bandwidth and security features required for connecting to today's Network Operation Center (NOC) systems.

Rack

19" AMPC Network Cabinet 27U, - 1300 x 600 x 800 mm ( High x width x Deep ). 19" AMPC Wall Mount Rack 4U 176 x 600 x 400 mm 19" AMPC Wall Mount Rack 6U 350 x 600 x 400 mm 19" AMPC Wall Mount Rack 9U 480 x 600 x 400 mm 19" AMPC Wall Mount Rack 12U 620 x 600 x 400 mm Common feature: The frame is welded to ensure a very stiff construction Made of 2mm electro galvanized steel sheet Fixing of second frame possible.
Material: 2mm electro galvanized sheet steel. Frame: Welded construction, second frame optional Surface Finish: Podwer structure paint, standard colour Plinth dark grey, Frame light grey Standard : IEC 60297 Delivery includes: Frame Plinth, leveling feet

AMP RJ45 Connectors

AMP All the benefits of the RJ45 connector o 4-pair connectivity that's compatible with Power over Ethernet (PoE)

78

Jacks can be installed with the SL Series Installation Tool for fast termination o RJ45 SECURE jacks have the same fit and form as non-SECURE RJ45 jacks - mix and match in the same patch panels and faceplates A complete line of RJ45 SECURE cable assemblies, including hybrids

Cable5, Cable 6

APC Smart-UPS 2200VA USB & Serial RM 2U 230V

Stanmore -- AMP's NETCONNECT Class D (2000)/Enhanced Category 5 Momentum System has become the first cabling system to receive independent certification to the requirements of the proposed ISO/IEC -11801 (2000), CENELEC EN 50173 (2000) and Draft 11 of the USA TIA SP4195: "Additional Transmission Performance Specifications for 4-Pair 100 Ohm Category 5e Cabling." The Telecommunications Industry Association (TIA) certification was granted by Intertek Testing Services of Cortland, N.Y., also known as ETL/Semko, the world's largest products and commodities testing company. Test results will be available upon request from AMP. Cat6 UTP Network Cable, Reel-in-a-Box, Blue, 1000ft Connectivity Connector Bare wire Network Cable Type Network Connectivity Technology Unshielded twisted pair (UTP) General Length 1000 ft Color Blue Standards Compliant Standards Category 6 (EIA/TIA-568) Actual Weight 26.00 lb(s) Contents Cable, documentation Physical Dimensions 1000'l Ports/Connectors Bare wire APC Smart-UPS, 1980 Watts / 2200 VA,Input 230V / Output 230V, Interface Port DB-9 RS232, SmartSlot, USB, Rack Height 2 U

Table 13: The table equipment specification

4. The price of equipment

79

Order number 1

Name of equipment

Unit

Cost/1 unit

Quality

Price

HP ProLiant DL385 G6

Set

$7995.00

$31980. 00 $33730. 00

Cisco Catalyst 3560V2-24PS 24 Ethernet 10/100 ports with Power over Ethernet (PoE) and 2 SFP ports

Each

$3373.00

10

Cisco Aironet 1200 Series Set AIR-AP1231G-x-K9

$189.00

10

$1890.0 0 $4699.0 0 $1999.0 0 $5994.0 0 $12000. 00 $7000.0 0 $2985.0 0

6 7 8 9 10 11

Router- CISCO 7204VXR 19" AMP Network Cabinet 21U


19" AMP Wall Mount Rack 12U

each Set Set 300m/B ox 300m/B ox 100 each/bo x each each each set set

$4699.00 $1999.00 $999.00 $150.00 $280.00 $199.00

1 1 6 80 20 15

AMP Cable Cat 5 AMP Cable Cat 6 AMP Rj45 connector

12 13 14 15 16

IBM xSesies 235 Servers Catalyst 6500 Patch panel 24 port UPS Microsoft Windows 2003 server Enterprise Edition 10 CALs + CD Kit Labour

$3500.00 $4600.00 $80.00 $2500.00 $500.00

4 3 20 1 1

$14000. 00 $13800. 00 $1600.0 0 $2500.0 0 $500.00

17

$47304. 00

80

Total
Table 14: The equipment cost

$181981.00

(Chapter 5)

Conclusion & Implication


1 .Discussion

81

The main purpose of the investigative report is to make an effective and efficient network and serve its purpose to the school. Having an ISP and a valid and good WAN connection allows the networks users to connect to the internet by use of ADSL connection, which is not only safe but fast as well. Technically, the school network could be termed as a MAN (Metropolitan Area Network) and in a campus architecture setup, in terms of a Virtual Private Network connecting the school to the external networking world. The limited privileges and the presence of a WAN connection though security level 3 routers as per the OSI model, enables staff, students as well as any other user of the school network to gain resources of the internet depending on what they need to access that is not attainable within the schools network in a very secure fashion leading to efficient engineered model which solves the purposes of the school. In terms of external communication beyond the schools Intranet as well as network boundary, the WAN connection offers a gateway through which any user of the schools network is put on main network and registered the machines on the Internet as well to gain the resources which might not be available in the MAN of the campus. (Partridge and Blumenthal, 2006, p.17). This would help in the case the school head would want to communicate with his or her counterparts in the other branches concerning important matters. This reduces the cumbersome process of physically delivering of such material to or from the school. This increases the efficiency and the speed of content delivery as well as response of urgent information. However the mere existence of the WAN connection poses the security risks from the outside. This could be a wide range of attacks from virus/Trojan horse attacks to hackers. (ANSI T1.413-2008, 2008, p. 31). Introduction of any Malicious software components might infect the schools information and corrupt the database and corrupt files and important documents causing damage to the system. Staff and students might lose their work or may end up on sites which are not relevant for academic purposes. This security issue demands extra measures and tasks that will require presence of technical persons and look at the overall security of the network The LAN (Ethernet) of the school provides an interconnection of the computers and other registered devices and network capability within the school. This interconnects the building, branches of school on leased lines and various departments, offices and the people within the school enabling them to communicate. The exchange of data as well as sharing resources will include information in the schools database. This requires strict and tough security measures. Software applications shareable via the schools server will be accessible to those in need of such services. The cabling techniques used in making the LAN are CAT5 cables. A CAT5 cable, which supports longer length, runs and works well for fixed wiring configurations like office buildings. While stranded CAT5 cables, on the other hand, are more pliable and better suited for shorter-distance (Pountain, 2008, p. 7). CAT 6 was also used in the interconnection of buildings within the school. However, the interconnection of various LANs in the school allows access to different departments and information, there is sensitive data such as administration records, financial records and examination records or sources. A skilled hacker can easily make sure of its skills to hack into the resources of an insecure network. This demands an overhaul of the security measures. Users will also used the network to mail each other

82

or access a local or internet social site which is not exactly the priority of the network. There needs to be strict monitoring of the bits and bytes and to where they are going and who is accessing or using the resources of the network. (Andersen, et.al, 2005, p. 56). Certain equipment will have to be reconfigured based on the new network configuration according to the changes in security measures. A wireless network is also present within the school which enables cable free and mobile distribution and access to resources. This reduces the need for a labyrinth of extensive cabling, bearing the fact that instructions are to avoid need of reconstruction based on expansion of a wing or natural obstruction. As observed above, the whole school is wireless and students as well as staff can roam outside the classroom as well. A wireless Cisco series access point is used in all building bearing termination points in each building such that a user can plug in his/her portable computer into the network if need be. The use of an OSI model level 3 devices like a router offers great network administration. It removes the collision domains and the broadcast domains and help maintains efficient transfer of data in packets. This means that from any switch connection, users will use the network simultaneously without great delay of service caused by collisions and have faster and safer connections.

CONCLUSIONS
The advent of networking technologies and advancement in Information Technology has led to enormous changes in the networking world. All departments of field of IT can take the advantage of these technological innovations and inventions to achieve sustainable and ergonomic and exponential expansion in the networks and their security. Resource sharing and data transfer are the most important information distribution and ease of its access. By using wireless networking, we can avoid the need of any expanding the cables and any obstruction caused by them. Having said this, the CAT5 cables used within buildings are maneuverable thus ease in installing them inside walls of the schools buildings. Enough stress cannot be laid on the importance of the wireless network. It enables students and staff to bring their own laptops to school to do their work. Use of the five VLANs has helped the better use of departments and their networking and ensured that students do not get unauthorized access to resources like accessing

83

exam material. The position of access point is also very strategic and ensures that there is no interfere with signals. This issue has been addressed by the clever positioning in our design.

Recommendations
The system is designed and strives to ensure that it incorporates all the principle design concepts discussed initially in the requirements analysis to enhance the efficiency of the system. The systems are dynamic and hence, can be further developed to provide more services that the developer was not able to achieve due to project parameters. System Database can be designed in a way that would allow students and their parents to access students results record. A good web design interface could work well for the network and the database can go online where the resources can be shared with limited accessibility. With the availability of the latest developmental tools, compatible with new network devices, a lot of dynamic features can be added to the web content to make it easier for the novice users and add more functionality to it like SMS capability. Online payment structure. This would mean that the system will have to expand on servers and enhance its security with SSL 3.0 128 bit encryption systems to make sure that credit card payments are safe to be used.

Glossary
ATM, "Asynchronous Transfer Mode" - A type of data-link protocol built on a switched
physical architecture. So net/ATM OC3 is designed to run at 155 megabits/second, with OC12 rated at 622 Mb/s. ATM standards are still evolving, making ATM equipment availability low and costs relatively high for end-user applications.

AUI, "Attachment Unit Interface" - the Ethernet term for the interface between a MAU and a Station. Also known as "DIX" (for Digital, Intel, Xerox) connector. An "AUI Cable" can attach a
MAU to a station at a distance (up to 50 meters), or a "micro" MAU may be plugged directly into a computer/station's AUI port. Occasionally (and erroneously) called "Thick-Net".

Bridge - A Bridge is a (Ethernet level-2) gateway between 2 Local Area Networks or network
segments. Bridges transfer MAC-layer packets from one network to another, performing frame-level format conversion if needed. Commonly, bridges auto-configure, building mapping tables for stations on opposite sides of the bridge from each other.

Bus Network - A type of network configuration where multiple nodes share access at the physical
level. Each node must therefore wait until the medium (the wire or bus) is free before sending its data packet. Also known as a Daisy-Chained network. thin-net is an example of a daisy-chained network.

84

Coupler, ST Fiber Coupler - A coupler is a device used to splice (or couple) two optical fibers together. The Lab uses ST style couplers. [Picture] Couplers are typically found in distribution frames ( LDFs, IDFs, and the MDF). ETHERNET - A LAN data-link protocol developed by a consortium of vendors; later standardized
as IEEE 802.3 with a few modifications. Most of the Media-Labs hosts are networked via Ethernet. "Raw" data rate for Ethernet/802.3 is 10 megabits/second, hence the term "10base" used in describing Ethernet running over various media: "10base2" = Thin net "10baseT" = Twisted-Pair "10baseFL" = Multi-Mode Fiber "10base5" = Thick Net There also exists an extended version of Ethernet which runs at 100 Megabits per second, called 100baseT (AKA 'fast Ethernet'), and connections which auto-switch, 10/100baseT.

FDC, Fiber Drop Card (Rayland) - A small 10baseFL Ethernet interface card which resides in a
Rayland model 1600 Concentrator and connects to a particular host. Each host is connected to its own Fiber Drop Card. An indicator LED on the FDC indicates the Link Status of that fiber connection: Green = Carrier received. Yellow = No Carrier. Red = FAULT. A red FAULT light indicates that the SNMP management card has locked out that particular concentrator slot.

FDDI, Fiber Distributed Data Interface - A LAN data-link protocol with a nominal 100
megabit/second data rate. FDDI is a point-to-point protocol, but is usually used in a token-ring arrangement (SAS) or dual token ring (DAS) configuration.

FTP, File Transport Protocol - An application-level communications protocol that allows the user
to move files and navigate directories on remote machines, typically called "FTP hosts". FTP allows for both anonymous and user-specific permissions, as well as file-drop and batch moves. See the Unix command ftp.

Fetch - A shareware application, most commonly used on Macintoshes, to allow File Transport Protocol access to files on other systems or sites. Fileserver - A computer which exports some of its disk drives over its network connection to other
computers, which use these disks as if they were 'local' disks. Fileservers typically have high I/O bandwidth, fast network interfaces, and many Gigabytes of storage. The main Lab fileservers are hub, Campbell, cga, garden, Heathrow, mc, spinach, and vlw.

Gateway - A Gateway is a network device that connects multiple networks together. Gateways are classified depending on what Network Layer they operate at: A level-1 Gateway is a Repeater; A level-2 Gateway is a Bridge; A level-3 Gateway is a Router; A level-4 Gateway is a Transport Layer
Gateway.

85

Hub - The generic name for a device at which several or many connections meet, such as a repeater, concentrator, switch, or router. The center of a star-type network is called a hub. IDF, Intermediate Distribution Frame - The IDF is a set of racks containing fiber patch panels and shared network hardware for an entire floor. This is where network feeds from the MDF ('vertical' runs) are patched through to the various LDFs (via 'horizontal' runs), and also where homerun hosts patch into their concentrators. Vertical trunks from each IDF run to the MDF in E15-040. IP, Internet Protocol - The Internet Protocol, usually referred to as the TCP/IP protocol stack,
allows computers residing on different networks to connect across gateways on wide-area networks. Each node on an IP network is assigned an IP address, typically expressed as 'xx.xx.xx.xx' All IP addresses at the Media Lab begin with 'XX.XX.'

The INTERNET We use the term Internet to indicate the collection of all "public" networks interconnected across the world accessible via TCP/IP protocol. It is comprised of thousands of
colleges and universities, tens of thousands of businesses, and millions of personal computers worldwide.

LAN, Local Area Network - The extent of network which connects computers that are physically close together, typically within a single room or building. Ethernet, TM, and FDDI are protocols
typically used in LANs. (Compare with WAN)

LDF, Local Distribution Frame - The LDF is a rack cabinet containing fiber patch panels and
network hardware for a workgroup area. Typically, it consists of one or two 19" racks, from 4 to 8 feet tall. The LDF is where most Ethernet concentrators are installed, and is logically one step up from wall-boxes and drop-boxes. Horizontal trunks from each LDF run to the IDF on that floor.

Local Talk Local talk was the original network standard developed by Apple Computer for the Macintosh. It was optimized for ease of use and low cost. It uses either Phone Net (TP ) or Local Talk Cable (STP) cabling, is a daisy-chained, shared-access medium that is connected to a MAC's printer or modem serial port. MDF, Master Distribution Frame - The MDF is the hub of the entire Media Laboratory. It is located in 6 rack cabinets in E15-040, with over 1400 vertical trunk fibers running to the 3 IDFs. The
MDF contains our main routers, switches, and communications hardware, as well as 'building-wide' concentrators.

Multimode Fiber - A type of fiber mostly used for shorter, e.g. campus distances. It can easily carry
100 megabits/second for typical campus distances, with the maximum speed dependent upon the protocol used. The entire Media Lab is cabled with multimode fiber.

Network Layers - A network is implemented by dividing the various functions it performs into a
number of layers, in order to simplify and streamline its design and interoperability. It is built from the physical layer (layer 1) on up, with each layer supporting all the layers above it. Separation into such layers allows the substitution of one implementation of that layer for another without requiring a redesign of other layers, for example, TCP/IP runs the same over thin-net or 10baseT, with no need to reconfigure the upper layers.

86

Patch Cable (Fiber Patch Cable) - A fiber optic cable, typically from 1 to 5 meters in length and terminated with an ST connector at each end. Patch cables are used in fiber patch panels to interconnect devices or cables. See also drop cable. Patch Panel (Fiber Patch Panel) - A small cabinet containing fiber optic couplers, used to allow easy interconnection of different fiber optic cables or devices. The Lab's patch panels all use ST connectors, so one may patch any fiber in a panel to any other fiber with a fiber patch cable; patches
may also connect to nearby network devices such as concentrators or switches; typically several patch panels and concentrators are located in each LDF.

Repeater - A simple network hub that serves as an Ethernet level 1 (Physical Layer) gateway
between different subnetork segments. Typically, a repeater merely amplifies and passes through all information to all of its ports. More sophisticated repeaters sense physical-layer subnet faults and deactivate those ports.

Router - A sophisticated network hub which serves as an Ethernet level 3 (Network Layer) gateway between different segments and networks. Our routers connect via several protocols-Ethernet, FDDI, ATM--and can perform bridging and certain filtering operations. Our building routers live in E15-040.

SMTP, Simple Mail Transport Protocol - A communications protocol used for implementing electronic mail over the Internet. It operates using sockets on the Session Layer. SNMP, Simple Network Management Protocol - A communications protocols used at the intermediate Network Layers to debug and manage network devices and connectivity. ST Connector - The type of fiber-optic connector most commonly used at the Media Lab. An ST
connector is has a 2.5mm shaft and bayonet locking ring, and allows quickly connect and disconnect of our 125 micron multi-mode fiber. All LDFs, IDFs, and the MDF use ST connectors and couplers.

Station - A node on a network; archaic. Stations are now called network nodes. STP, "Shielded Twisted Pair" - A type of cable containing two twisted wires with a foil or braid
shield wrapped around them. Apple's Local Talk is uses STP media, for example. STP is not as common as UTP, "Unshielded Twisted Pair".

Shared Access Medium A type of network or protocol where multiple interconnections all send their signals over the same physical medium. In 10base2, copper-based thin-net for example, many network nodes are daisy-chained onto a single wire. The single wire carries at most one packet at a
time, and all other nodes must wait until that packet ends before transmitting their own packet onto the medium. The nodes share the available bandwidth by using the medium one at a time; this method is called Time Domain Multiplexing.

Single-Mode Fiber A type of fiber optic cable in which there is only one mode for the light to
follow, thereby minimizing dispersion (smearing in the time domain). Single Mode is mainly used for long runs (>10km) and fed with lasers. It is more difficult to splice and patch than Multimode Fiber, but its limit on (speed x distance) is higher.

Star, Star Network - The descriptive name of any network which is configured with many branches attaching to a common point. The common point, also known as the parent node, is the hub of the

87

star,

and

the

outer,

or

child,

nodes

are

the

branches,

or

leaves.

10baseT is an example of a physical star network, while thin net is, instead, a bus-based network. Switch - Generically, a switch is a device that turns current on and off. In the networking world, it's
data connections that are being made and broken. A switch is a network hub device which, instead of putting packets onto a shared 'backbone' bus, creates a direct connection to the destination port.

TCP/IP, Transport Control Protocol / Internet Protocol - TCP and IP are communications
protocols, that is, structured languages in which data is communicated between one process and another, and between one network and another. TCP/IP is implemented in a multi-level layered structure.TCP/IP is the 'glue' that that ties together the many heterogeneous networks that make up the Internet.

TP, "Twisted Pair" - The type of wire used by the phone company to wire telephones -- at least
over distances like between your house and the central office. It has two conductors, which are twisted. The twists are important: they give it electrical characteristics which allow some kinds of communications otherwise not possible. Ordinary telephone cables are UTP (unshielded twisted pair).

Termination - The "proper end" of a network segment which operates as a transmission line.
Proper termination simulates an ideal transmission line by exactly matching the impedance of the medium. Improper termination, such as a complete open circuit, a complete short or non-matching resistance, causes signals on the medium to bounce off the impedance discontinuity. Such reflections usually result in lowered Signal-to-Noise ratio, slower data rates, and eventual data loss.

Thick-Net - An archaic form of Ethernet, using a 5/8" diameter coax cable, and either N-type screw connectors or "vampire taps". Also known as 10base5, and useful for runs up to 500 meters in length. A station would connect to Thick-Net via a "MAU" and an "AUI" cable. WAN, Wide Area Network - A network that connects computers in different cities or countries,
also known as long-haul-networks. WANs often use telephone company equipment such as leased lines or fiber connections to hook up to distant net nodes or gateways.

Reference
ANSI T1.413-2008. (2008). Network and Customer Installation Interfaces Asymmetric Digital Subscriber Line (ADSL) Metallic Interface. American National Standards Institute. Craig Partridge and S. Blumenthal. (2006). "Data networking at BBN". IEEE Annals of the History of Computing, Volume 28, Issue 1; January-March. D. Andersen, H. Balakrishnan, M. Kaashoek, and R. Morris. (2005). Resilient Overlay Networks. In Proc. ACM: SOSP. Pountain, Dick (2008). The New Penguin Dictionary of Computing. New York: Penguin Books.

88

American Registry for Internet Numbers(ARIN), http://www.arin.net Asia-Pacific Network Information Center(APNIC), http://www.apnic.net Answers.com. Operating system. Retrieved July 17, 2010

http://www.answers.com/topic/operating-system
Computer Plug. IEEE 802.1. Retrieved July 28, 2010, from

http://www.computerplug.com/tech_guide.php?topic=IEEE+802.11
[RIPE-NCC] Rseaux IP Europens-Network Coordination Center (RIPE-NCC),

http://www.ripe.net
[RFC4012] Blunk, L., Damas, J., Parent, F. and Robachevsky, A., Routing Policy Specification Language Next Generation (RPSLng), RFC 4012, March 2005. Gast, M.(Eds.).(2005, April 25). Wireless Networks: The Definitive Guide (2nd ed.). Oreilly Media, INC. Geier, E.(2008, October 24). Enhancing your Network with Voice and Video Gadgets. Cisco Press. Groth, D., & MCBee, J.(2000, May 15). Cabling: The Complete Guide to Network Wiring. Sybex Inc. Keisler, G.(2004). Local Area Networks. New York: McGraw-Hill. Lewis, W.(2008). LAN Switching and Wireless, CCNA exploration Companion Guide. Cisco Press. LWC Training Corp. Network+ Online Course. Retrieved July 21, 2010, from

http://www.lrgnetworks.com/net+/net+01/net+01b.htm
Matthews, M. S. (Eds.).(2003, April 11). Windows Server 2003: A Beginners Guide (2nd ed.). McGraw-Hill Osborne Media. McQuerry, S.(Eds.).(2007, December 27). Interconnecting Cisco Network Devices: Part 1 (2nd ed.). Cisco Press. McQuerry, S.(Eds.).(2008, February 13). Interconnecting Cisco Network Devices: Part 2 (3rd ed.). Cisco Press. Metler, J. & Denoia, L.(1999). Layer 3 Switching. Prentice-Hall. Mitchell, B.(1999). LAN - Local Area Network. Retrieved July 20, 2010, from

http://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htm
Naugle, M.(1994). Network Protocol Handbook. New York: McGraw-Hill. Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G. and Lear, E., Address Allocation for Private Internets, BCP 5, RFC 1918, February 1996.

89

Ross, J.(2003). The book of Wi-Fi: install, configure, and Use 802.11b Wireless Networking. No Starch Press. Stallings, W.(Eds.).(2000). Local and Metropolitan Area Networks (6th ed.). Prentice-Hall. techFAQ. Physical Layer. Retrieved September 10, 2010, from http://www.tech-faq.com/. techFAQ. What is Vlan?. Retrieved September 9, 2010, from http://www.tech-faq.com/vlan.shtml Trulove, J.(Eds.).(1999). LAN wiring (2nd ed.). New York: McGraw-Hill. WirelessLans.org. What is a Wireless LAN?. Retrieved September 9, 2010, from

http://www.wirelesslans.org/

90

Das könnte Ihnen auch gefallen