Upload
nitz3588
View
223
Download
0
Embed Size (px)
Citation preview
8/8/2019 GAV Enterprise
1/23
GAVEnterprise
GAV Enterprise
The GAV Enterprise is an organization that is dedicated to the productionand export of a wide variety of softwares based on the needs of thecustomers, which ranges from small institutes to multinational firms.
The enterprise was founded in 1969 when the visionary, Sir Edward,realized the need for spreading awareness about the wonderful world of computer networks that surrounds us. With its humble beginnings, itbloomed better and better with time. Today, on the verge of its fourthdecade of its existence, it has become one of the leading softwarecompanies in the world. In addition to it, it has continued givingnetworking solutions to a variety of organizations and enterprises all overthe world. GAV Enterprise has played a vital role in moulding the presentworld of computer networks.
Summer Training Report
8/8/2019 GAV Enterprise
2/23
GAVEnterprise
GAV Enterprise
THE OFFICE The GAV Enterprise office is a two-storey building equipped with the latestnetworking technology that provides state-of-the-art communicationcapabilities. Over the years, the enterprise added new equipment andincreased the number of connections with consideration towards theoverall business goals and long-term infrastructure design.
The GAV Enterprise employs over 180 people:
21 managers and executives 130 salaried personnels
24 staff workers
In addition, several other workers are hired on hourly basis to provideassistance and security as per the requirements.
The office has 4 executive offices, 6 development departments, 3consultancy and customer support offices, 5 equipment and backuprooms and a cafeteria.
Summer Training Report
8/8/2019 GAV Enterprise
3/23
GAVEnterprise
THE ORGANISATIONEXECUTIVE OFFICES
MANAGERS OFFICE:
The manager is connected to the whole office via a personalcomputer or laptop and an IP phone.
HUMAN RESOURCES DEPARTMENT
There are 6 wired connections to the LAN, with unique VLAN id andalso has access to IP phones.
MARKETING DEPARTMENT
There are 6 wired connections to the LAN, with unique VLAN id andalso has access to IP phones.
ACCOUNTS DEPARTMENT
There are 6 wired connections to the LAN, with unique VLAN id andalso has access to IP phones.
DEVELOPMENT DEPARTMENTS
SPECIAL PROJECTS
There are 6 workstations connected via wired LAN connections, with
unique VLAN id and has access to IP phones. PROTOTYPE CONSTRUCTION
There are 10 workstations connected via wired LAN connections,with unique VLAN id and has access to IP phones.
TESTING & SIMULATION
There are 15 workstations connected via wired LAN connections,with unique VLAN id and has access to IP phones.
Summer Training Report
8/8/2019 GAV Enterprise
4/23
GAVEnterprise
APPLICATION DEVELOPMENT
There are 20 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.
OPTIMISATION
There are 15 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.
DEBUGGING
There are 15 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.
CONSULTANCY & CUSTOMER SUPPORT
CONSULTANCY DEPARTMENT
There are 2 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.
HELP DESK
There are 20 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.
DOCUMENTATION DEPARTMENT
There are 10 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.
EQUIPMENT & BACKUP ROOMS
SERVER ROOM
There are 3 high-end blade servers (FTP server, web server & mailserver) which host different services connected via hi-speedEthernet cables to the core router.
TELECOMMUNICATION ROOM
Summer Training Report
8/8/2019 GAV Enterprise
5/23
GAVEnterprise
There are 3 high-end routers and 3 high-end core switches, verticaland horizontal patch panels, connected via hi-speed gigabyteEthernet and serial cables.
CAMERA MONITORING ROOM
It has 3 servers that monitor and store the video images of thewhole office for security purposes.
GENERATOR ROOM
It has a 100 KW backup generator and 25 KAh of lead-acid batterycluster capable of providing backup for approximately 16 hours.
STORE ROOMSIt is used to store the various equipments used by the staff workers.
MISCELLANOUS
CONFERENCE HALL
It is equipped with high-speed 309.10 g Linksys wireless integratedrouters which provides wireless connectivity to 30 terminal devicesand IP phones.
RECEPTION & WAITING HALL
It is equipped with high-speed Linksys wireless integrated routerthat is capable of providing internet access to 30 users at a timeand an IP phone.
CAFETERIA
It is equipped with high-speed Linksys wireless integrated router
that is capable of providing internet access to 20 users at a time. STAFF WORKERS ROOM
It serves as a room for the staff workers to take rest.
Summer Training Report
8/8/2019 GAV Enterprise
6/23
GAVEnterprise
NETWORK TOPOLOGYIn a simple network consisting of a few computers, it is easy to visualizehow all of the various components connect. As networks grow, it is moredifficult to keep track of the location of each component, and how each isconnected to the network. Wired networks require lots of cabling andnetwork devices to provide connectivity for all network hosts.
When networks are installed, a physical topology map is created to recordwhere each host is located and how it is connected to the network. Thephysical topology map also shows where the wiring is installed and thelocations of the networking devices that connect the hosts. Icons are usedto represent the actual physical devices within the topology map. It is veryimportant to maintain and update physical topology maps to aid futureinstallation and troubleshooting efforts.
In addition to the physical topology map, it is sometimes necessary to alsohave a logical view of the network topology. A logical topology mapgroups hosts by how they use the network, no matter where they arephysically located. Host names, addresses, group information andapplications can be recorded on the logical topology map.
Summer Training Report
8/8/2019 GAV Enterprise
7/23
GAVEnterprise
PHYSICAL TOPOLOGYEQUIPMENTS
List of all equipments required for setting up the internal network of thebuilding for GAV Enterprise.
EQUIPMENT QTY DESCRIPTIONCISCO 2960 Layer 2 Switch 9 24 Fast-Ethernet ports, 2 Gigabit
Ethernet ports
CISCO 2960 Gigabit EthernetSwitch
5 10 Gigabit Ethernet ports
Linksys Wireless Integrated
Router
3 4 Ethernet ports, 1 Internet port
CISCO 2800 IntegratedService Router
3 7 Gigabit Ethernet, 2 Serial ports /6 Gigabit Ethernet, 3 Serial ports
HP Blade Servers 3 1 Fast-Ethernet port
HP Storage Servers 2 For camera monitoring
IBM Desktop Computers 142 1 Fast-Ethernet port
IBM Laptop Computers 32 1 Fast-Ethernet port, Integrated Wi-Fi
HP IP Printers 5 1 Fast-Ethernet port/ Wireless
Shielded Twisted Pair Cable(CAT-5)
2500
Unshielded Twisted PairCable (CAT-5)
4700
Summer Training Report
8/8/2019 GAV Enterprise
8/23
GAVEnterprise
DESCRIPTION OF DEVICES
LAYER-3 DEVICES
Linksys Wireless Integrated Router
An ISR combines features such as routing and switchingfunctions, security, voice, LAN and WAN connectivity into a singledevice. It is designed for small offices and home-based users. Itconsists of one WAN connection (Router Port) and four 10/100Mbps switch ports. It provides services at broadband speeds.
CISCO 2800 Integrated Service Router
An ISR combines features such as routing and switchingfunctions, security, voice, LAN and WAN connectivity into a singledevice. It is designed for enterprise branch offices. It supportsseven to eight 10/100/1000 Mbps Gigabit Ethernet ports and twoto three Serial ports. It provides services at broadband speedsusing T1/E1 connectioins.
LAYER-2 DEVICES
CISCO 2960 Gigabit Ethernet Switch
A switch is a device that is able to direct a stream of messagescoming in one port, out of another port based on the destinationMAC address within the frame. It supports ten Gigabit Ethernetports. It is generally used for trunk lines which carry a hugeamount of traffic.
CISCO 2960 Layer 2 Switch
This type of switches does not use modules or flash card slots.Due to this reason, their physical configuration cannot be
changed. It supports twentyfour 10/100 Mbps Fast-Ethernet portsand two 10/100/1000 Mbps Gigabit Ethernet ports.
Summer Training Report
8/8/2019 GAV Enterprise
9/23
GAVEnterprise
LAYER-1 (PHYSICAL) DEVICES
Shielded Twisted Pair Cable
They are used for high-speed data transmission. The individualpair of wires are wrapped in a shield and the entire four pairs arewrapped in another shield. It supports data transmission at ratesas high as 1000 Mbps. It is generally used for trunk lines.
Unshielded Twisted Pair Cable
UTP cable is inexpensive, offers a high bandwidth, and is easy toinstall. This type of cable is used to connect workstations, hostsand network devices. It can come with many different numbers of pairs inside the jacket, but the most common number of pairs isfour. Each pair is identified by a specific color code. It supportsdata transmission speeds of 100 Mbps.
END-USER DEVICES
HP Blade Servers
These servers are high performance computers used inbusinesses and other organizations. They provide the maximumconcentration of computing power and stability. It also contains
hot-swappable hard-drives.
HP Storage Servers
These servers are used to store redundant parts of files in orderto prevent them from failing. Servers are usually kept in secureareas where access is controlled.
IBM Desktop Computers
These are general purpose computers which provide the basicdesktop services to users. It contains of a Fast-Ethernet port.
Summer Training Report
8/8/2019 GAV Enterprise
10/23
GAVEnterprise
IBM Laptop Computers
These are mobile computers which supports both LAN and WANconnectivity.
HP IP Printers
These are IP based printers which acts as a host on the network.It contains either a Fast-Ethernet port or a Wireless card.
LOGICAL TOPOLOGY
PROTOTYPE OF NETWORK TOPOLOGY
The network topology of the GAV Enterprise building can be broadlycategorized into three network layers: Access, Distribution and CoreLayer.
Summer Training Report
8/8/2019 GAV Enterprise
11/23
GAVEnterprise
ADDRESSING INFORMATION OF LAYER-3 DEVICES
ROUTERS
DEVICE INTERFACE IP ADDRESS SUBNET MASK Core Router Serial 7/0 212.212.212.2 255.255.255.0
Serial 8/0 192.168.10.6 255.255.255.252Serial 9/0 192.168.10.2 255.255.255.252
Gb E 0/0.27 192.168.8.2 255.255.255.240Gb E 0/0.28 200.200.200.1 255.255.255.248
Wing A Router Serial 8/0 192.168.10.1 255.255.255.252Gb E 0/0.15 192.168.2.225 255.255.255.224Gb E 0/0.16 192.168.2.177 255.255.255.240Gb E 0/0.17 192.168.2.161 255.255.255.240
Gb E 0/0.18 192.168.2.193 255.255.255.240Gb E 0/0.19 192.168.2.209 255.255.255.240Gb E 0/0.24 192.168.2.2 255.255.255.224Gb E 0/0.25 192.168.2.33 255.255.255.224Gb E 0/0.26 192.168.2.65 255.255.255.240
Wing B Router Serial 8/0 192.168.10.5 255.255.255.252Gb E 0/0.9 192.168.2.65 255.255.255.224
Gb E 0/0.10 192.168.2.2 255.255.255.224Gb E 0/0.11 192.168.2.33 255.255.255.224
Gb E 0/0.12 192.168.2.97 255.255.255.224Gb E 0/0.13 192.168.2.129 255.255.255.224
Waiting RoomWireless Router
Internet 192.168.1.4 255.255.255.224
LAN 192.168.3.2 255.255.255.0
Cafeteria WirelessRouter
Internet 192.168.1.3 255.255.255.224
LAN 192.168.3.1 255.255.255.0
Conference Hall Internet 192.168.2.4 255.255.255.224
Summer Training Report
8/8/2019 GAV Enterprise
12/23
GAVEnterprise
Wireless RouterLAN 192.168.4.1 255.255.255.0
ADDRESSING INFORMATION OF LAYER-2 DEVICES
SWITCHES
DEVICE INTERFACE
MODE VLAN ID
Server Switch 0/1 Access 281/1 Access 282/1 Trunk 1-10053/1 Access 27
Wing-A Core Switch 0/1 Trunk 1-14,16,20-10051/1 Trunk 1-15,17,20-10052/1 Trunk 1-14,18-10053/1 Trunk 1-1005
Wing-B Core Switch 0/1 Trunk 1-10052/1 Trunk 1-14,20-1005
Floor 1 Switch 0/1 Access 241/1 Trunk 1-23,26-10052/1 Trunk 1-23,25,27-10053/1 Access 244/1 Trunk 1-1005
Summer Training Report
8/8/2019 GAV Enterprise
13/23
GAVEnterprise
COMPLETE LOGICAL NETWORK TOPOLOGY
IP ADDRESSING
A host needs an IP address to participate on the Internet. The IPaddress is a logical network address that identifies a particular host. Itmust be properly configured and unique in order to communicate withother devices on the Internet.
An IP address is assigned to the Network interface connection for ahost. This connection is usually a network interface card (NIC) installedin the device. Examples of end-user devices with network interfacesinclude workstations, servers, network printers and IP phones. Someservers can have more than one NIC and each of these has its own IPaddress. Router interfaces that provide connections to an IP networkwill also have an IP address.
Every packet sent across the Internet has a source and destination IPaddress. This information is required by networking devices to insurethe information gets to the destination and any replies are returned tothe source.
IP ADDRESSING STRUCTURE
An IP address is simply a series of 32 binary bits (ones and zeros). It isvery difficult for humans to read a binary IP address. For this reason,the 32 bits are grouped into four 8-bit bytes called octets. An IPaddress in this format is hard for humans to read, write and remember.
To make the IP address easier to understand, each octet is presentedas its decimal value, separated by a decimal point or period. This isreferred to as dotted-decimal notation.
Summer Training Report
8/8/2019 GAV Enterprise
14/23
GAVEnterprise
The 32-bit IP address is defined with IP version 4 (IPv4) and is currentlythe most common form of IP address on the Internet. There are over 4billion possible IP addresses using a 32-bit addressing scheme.
When a host receives an IP address, it looks at all 32 bits as they arereceived by the NIC. Humans, on the other hand, need to convert those32 bits into their four octet decimal equivalent. Each octet is made upof 8 bits and each bit has a value. The four groups of 8 bits have thesame set of values. The rightmost bit in an octet has a value of 1 andthe values of the remaining bits, from right to left, are 2, 4, 8, 16, 32,64 and 128.
IP ADDRESS CLASSES
The IP address and subnet mask work together to determine whichportion of the IP address represents the network address and whichportion represents the host address. The class of an address can bedetermined by the value of the first octet.
IP addresses are grouped into 5 classes. Classes A, B and C arecommercial addresses and are assigned to hosts. Class D is reservedfor multicast use and Class E is for experimental use.
Class C addresses have three octets for the network portion and onefor the hosts. The default subnet mask is 24 bits (255.255.255.0).Class C addresses are usually assigned to small networks.
Class B addresses have two octets to represent the network portionand two for the hosts. The default subnet mask is 16 bits(255.255.0.0). These addresses are typically used for medium-sizednetworks.
Class A addresses have only one octet to represent the networkportion and three to represent the hosts. The default subnet mask is8 bits (255.0.0.0). These addresses are typically assigned to largeorganizations.
In the addressing scheme of GAV Enterprise, we have used Class-Caddressing scheme. In the Class-C addressing scheme, there are a totalof 256 addresses available. Out of these, 254 addresses are usable.
The remaining to addresses are reserved for network and broadcast
address.
Summer Training Report
8/8/2019 GAV Enterprise
15/23
GAVEnterprise
IP addresses are of two types: Private addresses and Public addresses.All hosts that connect directly to the Internet require a unique public IPaddress. Because of the finite number of 32-bit addresses available,
there is a risk of running out of IP addresses. This problem can beresolved by the use of Private addresses. They allow hosts within anorganization to communicate with one another without the need of aunique public IP address. Table below shows a list of Private addresses:
SUBNETTING
The customer network using the single ISR is badly overloaded. Theproposed solution is to add a second networking device, a larger ISR,and to divide the single network into two separate networks.
For security purposes, the wireless and wired users need to be onseparate local networks.
In the subnetting scheme for GAV Enterprise, we utilize the concept of classless subnetting where we use custom subnets to differentiate thenetworks.
Routers distinguish between networks by using the subnet mask todetermine which bits make up the network ID and which bits make upthe host portion of the address. When a network is partitioned, therouter needs a modified or custom subnet mask to distinguish thesubnets from each other. A default subnet mask and a custom subnetmask differ from each other as follows: Default subnet masks onlychange on octet boundaries. For instance, the default subnet mask fora Class A network is 255.0.0.0. Custom subnet masks take bits fromthe host ID portion of the IP address and add them to the defaultsubnet mask.
Summer Training Report
8/8/2019 GAV Enterprise
16/23
GAVEnterprise
SWITCHING
A switch is a device that is able to direct a stream of messages comingin one port, out of another port based on the destination MAC addresswithin the frame. A switch cannot route traffic between two differentlocal networks. In the context of the OSI model, a switch performs theLayer 2, known as the data-link layer function.
Only one message can be sent through an Ethernet hub at a time. It ispossible for two or more hosts connected to a hub to attempt to send amessage at the same time. If this happens, the electronic signals thatmake up the messages collide with each other at the hub.
A collision causes the messages to become garbled and unreadable bythe hosts. A hub does not decode the messages; therefore it does notdetect that the message is garbled and repeats it out all the ports. Thearea of the network where a host can receive a garbled messageresulting from a collision is known as a collision domain.
A switch is preferred over hubs in the networking model of GAVEnterprise because of the large collision domain associated with hubs.Since a switch uses micro-segmentation, it narrows down the collisiondomain. The network of GAV Enterprise uses 9 CISCO switches, which
can result in a huge broadcast domain. So, to minimize the domain, wehave used the concept of Virtual LAN (VLAN).
VIRTUAL LAN
A VLAN is a logical broadcast domain that can span multiple physicalLAN segments. It allows an administrator to group together stations bylogical function, by project teams, or by applications, without regard to
physical location of the users.A VLAN has two major functions:
A VLAN contains broadcasts.
A VLAN groups devices. Devices located on one VLAN are notvisible to devices located on another VLAN.
Configuring a VLAN:
Summer Training Report
8/8/2019 GAV Enterprise
17/23
GAVEnterprise
In order to configure VLAN on a switch, connect it with a terminaldevice using a console cable.
Enter the privileged mode using the enable command
Switch>enable
Switch#
Enter the configuration mode using the configure terminal command
Switch# configure terminal
Switch (config) #
Enter the name and VLAN number using the commands
Switch(config)#vlan vlan_number
Switch(config-vlan)#name vlan_name
Switch(config-vlan)#exit
Use the following commands to assign individual ports to VLANs:
Switch(config)#interface fa#/#
Switch(config-if)#switchport access vlan vlan_number
Switch(config-if)# exit
Use the following commands to assign a range ports to VLANs:
Switch(config)#interface range fa#/start_of_range - end_of_range
Switch(config-if)#switchport access vlan vlan_number
Switch(config-if)#exit
To disassociate a port from a specific VLAN:
Switch(config)#interface fa#/#
Switch(config-if)#no switchport access vlan vlan_number
A switch port can function in two modes: Access and Trunk mode.
To switch between the two modes, use the following command
Switch(config)#interface fa#/#
Switch(config-if)#switchport mode
Summer Training Report
8/8/2019 GAV Enterprise
18/23
GAVEnterprise
A switchport in the trunk mode is used for a switch-switch or switch-routerconnection, whereas an access mode is used for connection to terminaldevices.
SWITCH CONFIGURATION
Core Switches
SWITCH INTERFACE MODE VLAN IDServer Switch Gb E 0/1,1/1 Access 28
Gb E 2/1 Trunk 1-1005Gb E 3/1 Access 27
Floor-1 Switch Gb E 0/1,3/1 Trunk 241/1 Trunk 1-23,26-10052/1 Trunk 1-23,25,27-10054/1 Trunk 1-1005
Wing-A CoreSwitch
0/1 Trunk 1-14,16,20-1005
1/1 Trunk 1-15,17,20-10052/1 Trunk 1-14,18-1005
3/1 Trunk 1-1005Wing-B Core
Switch0/1 1-1005
2/1 1-14,20-1005
Other Switches
SWITCH INTERFACE MODE VLAN IDM&HR&A Switch Fa E 0/1-0/6 Access 18
Fa E 0/7-0/11 Access 19Gb E 1/1 Trunk 1-1005
AD&M Switch Fa E 0/1-0/8 Access 15Fa E 0/10-0/13 Access 17
Gb E 1/1 Trunk 1-1005
SP Switch Fa E 0/1-2/1,4/1 Access 163/1 Trunk 1-1005
T&S Switch Fa E Access 13Gb E 1/1 Trunk 1-1005
Summer Training Report
8/8/2019 GAV Enterprise
19/23
GAVEnterprise
DB Switch Fa E Access 12Gb E 1/1 Trunk 1-1005
OP Switch Fa E Access 9Gb E 1/1 Trunk 1-1005
PC Switch Fa E Access 11Gb E 1/1 Trunk 1-1005
Wing-B MainSwitch
Gb E 0/1 Trunk 1-8,11,14-1005
Gb E 1/1 Trunk 1-9,14-1005Gb E 2/1 Trunk 1-8,12,14-1005Gb E 3/1 Trunk 1-8,13-1005Gb E 4/1 Access 10Gb E 5/1 Trunk 1-1005
D Switch Fa E Access 26Gb E 1/1 Trunk 1-1005
HD Switch Fa E Access 25Gb E 1/1 Trunk 1-1005
ROUTING
Routing is the process of finding a path to the destination host. A routeris a networking device that connects a local network to other local
networks. At the Distribution Layer of the network, routers direct trafficand perform other functions critical to efficient network operation.Routers, like switches, are able to decode and read the messages thatare sent to them. Unlike switches, which only decode (unencapsulate)the frame containing the MAC address information, routers decode thepacket that is encapsulated within the frame.
Each port, or interface, on a router connects to a different localnetwork. Every router contains a table of all locally-connected networksand the interfaces that connect to them. These routing tables can also
Summer Training Report
8/8/2019 GAV Enterprise
20/23
GAVEnterprise
contain information about the routes, or paths, that the router uses toreach other remote networks that are not locally attached.
When a router receives a frame, it decodes the frame to get to thepacket containing the destination IP address. It matches the address of the destination to all of the networks that are contained in the routingtable. If the destination network address is in the table, the routerencapsulates the packet in a new frame in order to send it out. Itforwards the new frame out of the interface associated with the path,to the destination network. The process of forwarding the packetstoward their destination network is called routing.
Router interfaces do not forward messages that are addressed to the
broadcast MAC address. As a result, local network broadcasts are notsent across routers to other local networks.
Configuring a ROUTER:
In order to configure a router, the following commands can beexecuted.
Enter the privileged mode using the enable command
Router>enable
Router#
Enter the configuration mode using the configure terminal command
Router# configure terminal
Router (config) #
The host from the sending VLAN forwards traffic to the router using thedefault gateway. The sub-interface for the VLAN specifies the defaultgateway for all hosts in that VLAN. The router locates the destination IPaddress and does a routing table lookup.
If the destination VLAN is on the same switch as the source VLAN, therouter forwards the traffic back down to the source switch using thesubinterface parameters of the destination VLAN ID. This type of configuration is often referred to as a router-on-a-stick.
If the exit interface of the router is 802.1Q-compatible, the frameretains its 4-byte VLAN tag. If the outbound interface is not 802.1Q-
Summer Training Report
8/8/2019 GAV Enterprise
21/23
GAVEnterprise
compatible, the router strips the tag from the frame and returns theframe to its original Ethernet format.
To configure inter-VLAN routing, use the following steps:
1. Configure a trunk port on the switch.
Switch(config)#interface fa0/2
Switch(config-if)#switchport mode trunk
2. On the router, configure a FastEthernet interface with no IP addressor subnet mask.
Router(config)#interface fa0/1
Router(config-if)#no ip address
Router(config-if)#no shutdown
3. On the router, configure one subinterface with an IP address andsubnet mask for each VLAN. Each subinterface has an 802.1Qencapsulation.
Router(config)#interface fa0/0.10
Router(config-subif)#encapsulation dot1q 10
Router(config-subif)#ip address 192.168.10.1 255.255.255.0
4. Use the following commands to verify the inter-VLAN routingconfiguration and functionality.
Switch#show trunk
Router#show ip interfaces
Router#show ip interfaces brief
Router#show ip route
ADDRESSING SCHEME
ROOM IP ADDRESSRANGE
SUBNETMASK
DEFAULTGATEWAY
Managers Office 192.168.2.210-222
255.255.255.240
192.168.2.209
Human Resources Dept 192.168.2.210-222 255.255.255.240 192.168.2.209
Summer Training Report
8/8/2019 GAV Enterprise
22/23
GAVEnterprise
Accounts Dept 192.168.2.194-206
255.255.255.240
192.168.2.193
ApplicationDevelopment
192.168.2.226-254
255.255.255.224
192.168.2.225
Marketing Room 192.168.2.162-174
255.255.255.240
192.168.2.161
Special Projects Room 192.168.2.178-190
255.255.255.240
192.168.2.177
Testing & SimulationRoom
192.168.2.130-158
255.255.255.224
192.168.2.129
Debugging Room 192.168.2.98-126 255.255.255.224
192.168.2.97
Optimization Room 192.168.2.66-94 255.255.255.224
192.168.2.65
Prototype Construction 192.168.2.34-62 255.255.255.224
192.168.2.33
Conference Hall 192.168.4.2-62 255.255.255.192
192.168.4.1
Waiting Room 192.168.3.2-62 255.255.255.192
192.168.3.1
Help Desk/CustomerCare
192.168.1.34-62 255.255.255.240
192.168.1.33
Documentation Room 192.168.1.66-79 255.255.255.240
192.168.1.65
Cafeteria 192.168.3.0-254 255.255.255.0
192.168.3.1
INTERNET CONNECTION
The Internet is a network of networks that connects users in every countryin the world. There are currently over one billion Internet users worldwide.
Any home, business or organization that wants to connect to the Internetmust use an Internet Service Provider (ISP). An ISP is a company thatprovides the connections and support to access the Internet. It can alsoprovide additional services such as Email and web hosting.
Summer Training Report
8/8/2019 GAV Enterprise
23/23
GAVEnterprise
ISPs are essential to gaining access to the Internet. No one gets on theInternet without a host computer, and no one gets on the Internet withoutgoing through an ISP. ISPs range in size from small to very large and differ
in terms of the area they service. ISPs also differ in the types of connection technologies and speeds they offer.
ISP LEVELS OF SERVICE
When data is transferred, it is either uploaded or downloaded.Downloading refers to information coming from the Internet to yourcomputer, while uploading indicates the reverse path, from your computerto the Internet. When the download transfer rate is different from theupload transfer rate, it is called asymmetric. When the transfer rate is thesame in both directions, it is called symmetric. ISPs can offer bothasymmetric and symmetric services.
The GAV Enterprise uses T1 symmetric connection from a reputed ISP. The advantage of using a symmetric T1 connection is that it can carrylarge amounts of data in both directions at equal rates. Moreover, it helpswhen we need to upload large amounts of traffic such as intensivegraphics, multimedia, or video.
The network for GAV Enterprise was established with an eye towards theprospects for future upgrades.
S T i i R