GAV Enterprise

Embed Size (px)

Citation preview

  • 8/8/2019 GAV Enterprise

    1/23

    GAVEnterprise

    GAV Enterprise

    The GAV Enterprise is an organization that is dedicated to the productionand export of a wide variety of softwares based on the needs of thecustomers, which ranges from small institutes to multinational firms.

    The enterprise was founded in 1969 when the visionary, Sir Edward,realized the need for spreading awareness about the wonderful world of computer networks that surrounds us. With its humble beginnings, itbloomed better and better with time. Today, on the verge of its fourthdecade of its existence, it has become one of the leading softwarecompanies in the world. In addition to it, it has continued givingnetworking solutions to a variety of organizations and enterprises all overthe world. GAV Enterprise has played a vital role in moulding the presentworld of computer networks.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    2/23

    GAVEnterprise

    GAV Enterprise

    THE OFFICE The GAV Enterprise office is a two-storey building equipped with the latestnetworking technology that provides state-of-the-art communicationcapabilities. Over the years, the enterprise added new equipment andincreased the number of connections with consideration towards theoverall business goals and long-term infrastructure design.

    The GAV Enterprise employs over 180 people:

    21 managers and executives 130 salaried personnels

    24 staff workers

    In addition, several other workers are hired on hourly basis to provideassistance and security as per the requirements.

    The office has 4 executive offices, 6 development departments, 3consultancy and customer support offices, 5 equipment and backuprooms and a cafeteria.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    3/23

    GAVEnterprise

    THE ORGANISATIONEXECUTIVE OFFICES

    MANAGERS OFFICE:

    The manager is connected to the whole office via a personalcomputer or laptop and an IP phone.

    HUMAN RESOURCES DEPARTMENT

    There are 6 wired connections to the LAN, with unique VLAN id andalso has access to IP phones.

    MARKETING DEPARTMENT

    There are 6 wired connections to the LAN, with unique VLAN id andalso has access to IP phones.

    ACCOUNTS DEPARTMENT

    There are 6 wired connections to the LAN, with unique VLAN id andalso has access to IP phones.

    DEVELOPMENT DEPARTMENTS

    SPECIAL PROJECTS

    There are 6 workstations connected via wired LAN connections, with

    unique VLAN id and has access to IP phones. PROTOTYPE CONSTRUCTION

    There are 10 workstations connected via wired LAN connections,with unique VLAN id and has access to IP phones.

    TESTING & SIMULATION

    There are 15 workstations connected via wired LAN connections,with unique VLAN id and has access to IP phones.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    4/23

    GAVEnterprise

    APPLICATION DEVELOPMENT

    There are 20 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.

    OPTIMISATION

    There are 15 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.

    DEBUGGING

    There are 15 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.

    CONSULTANCY & CUSTOMER SUPPORT

    CONSULTANCY DEPARTMENT

    There are 2 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.

    HELP DESK

    There are 20 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.

    DOCUMENTATION DEPARTMENT

    There are 10 computers connected via wired LAN connections, withunique VLAN id and has access to IP phones.

    EQUIPMENT & BACKUP ROOMS

    SERVER ROOM

    There are 3 high-end blade servers (FTP server, web server & mailserver) which host different services connected via hi-speedEthernet cables to the core router.

    TELECOMMUNICATION ROOM

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    5/23

    GAVEnterprise

    There are 3 high-end routers and 3 high-end core switches, verticaland horizontal patch panels, connected via hi-speed gigabyteEthernet and serial cables.

    CAMERA MONITORING ROOM

    It has 3 servers that monitor and store the video images of thewhole office for security purposes.

    GENERATOR ROOM

    It has a 100 KW backup generator and 25 KAh of lead-acid batterycluster capable of providing backup for approximately 16 hours.

    STORE ROOMSIt is used to store the various equipments used by the staff workers.

    MISCELLANOUS

    CONFERENCE HALL

    It is equipped with high-speed 309.10 g Linksys wireless integratedrouters which provides wireless connectivity to 30 terminal devicesand IP phones.

    RECEPTION & WAITING HALL

    It is equipped with high-speed Linksys wireless integrated routerthat is capable of providing internet access to 30 users at a timeand an IP phone.

    CAFETERIA

    It is equipped with high-speed Linksys wireless integrated router

    that is capable of providing internet access to 20 users at a time. STAFF WORKERS ROOM

    It serves as a room for the staff workers to take rest.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    6/23

    GAVEnterprise

    NETWORK TOPOLOGYIn a simple network consisting of a few computers, it is easy to visualizehow all of the various components connect. As networks grow, it is moredifficult to keep track of the location of each component, and how each isconnected to the network. Wired networks require lots of cabling andnetwork devices to provide connectivity for all network hosts.

    When networks are installed, a physical topology map is created to recordwhere each host is located and how it is connected to the network. Thephysical topology map also shows where the wiring is installed and thelocations of the networking devices that connect the hosts. Icons are usedto represent the actual physical devices within the topology map. It is veryimportant to maintain and update physical topology maps to aid futureinstallation and troubleshooting efforts.

    In addition to the physical topology map, it is sometimes necessary to alsohave a logical view of the network topology. A logical topology mapgroups hosts by how they use the network, no matter where they arephysically located. Host names, addresses, group information andapplications can be recorded on the logical topology map.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    7/23

    GAVEnterprise

    PHYSICAL TOPOLOGYEQUIPMENTS

    List of all equipments required for setting up the internal network of thebuilding for GAV Enterprise.

    EQUIPMENT QTY DESCRIPTIONCISCO 2960 Layer 2 Switch 9 24 Fast-Ethernet ports, 2 Gigabit

    Ethernet ports

    CISCO 2960 Gigabit EthernetSwitch

    5 10 Gigabit Ethernet ports

    Linksys Wireless Integrated

    Router

    3 4 Ethernet ports, 1 Internet port

    CISCO 2800 IntegratedService Router

    3 7 Gigabit Ethernet, 2 Serial ports /6 Gigabit Ethernet, 3 Serial ports

    HP Blade Servers 3 1 Fast-Ethernet port

    HP Storage Servers 2 For camera monitoring

    IBM Desktop Computers 142 1 Fast-Ethernet port

    IBM Laptop Computers 32 1 Fast-Ethernet port, Integrated Wi-Fi

    HP IP Printers 5 1 Fast-Ethernet port/ Wireless

    Shielded Twisted Pair Cable(CAT-5)

    2500

    Unshielded Twisted PairCable (CAT-5)

    4700

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    8/23

    GAVEnterprise

    DESCRIPTION OF DEVICES

    LAYER-3 DEVICES

    Linksys Wireless Integrated Router

    An ISR combines features such as routing and switchingfunctions, security, voice, LAN and WAN connectivity into a singledevice. It is designed for small offices and home-based users. Itconsists of one WAN connection (Router Port) and four 10/100Mbps switch ports. It provides services at broadband speeds.

    CISCO 2800 Integrated Service Router

    An ISR combines features such as routing and switchingfunctions, security, voice, LAN and WAN connectivity into a singledevice. It is designed for enterprise branch offices. It supportsseven to eight 10/100/1000 Mbps Gigabit Ethernet ports and twoto three Serial ports. It provides services at broadband speedsusing T1/E1 connectioins.

    LAYER-2 DEVICES

    CISCO 2960 Gigabit Ethernet Switch

    A switch is a device that is able to direct a stream of messagescoming in one port, out of another port based on the destinationMAC address within the frame. It supports ten Gigabit Ethernetports. It is generally used for trunk lines which carry a hugeamount of traffic.

    CISCO 2960 Layer 2 Switch

    This type of switches does not use modules or flash card slots.Due to this reason, their physical configuration cannot be

    changed. It supports twentyfour 10/100 Mbps Fast-Ethernet portsand two 10/100/1000 Mbps Gigabit Ethernet ports.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    9/23

    GAVEnterprise

    LAYER-1 (PHYSICAL) DEVICES

    Shielded Twisted Pair Cable

    They are used for high-speed data transmission. The individualpair of wires are wrapped in a shield and the entire four pairs arewrapped in another shield. It supports data transmission at ratesas high as 1000 Mbps. It is generally used for trunk lines.

    Unshielded Twisted Pair Cable

    UTP cable is inexpensive, offers a high bandwidth, and is easy toinstall. This type of cable is used to connect workstations, hostsand network devices. It can come with many different numbers of pairs inside the jacket, but the most common number of pairs isfour. Each pair is identified by a specific color code. It supportsdata transmission speeds of 100 Mbps.

    END-USER DEVICES

    HP Blade Servers

    These servers are high performance computers used inbusinesses and other organizations. They provide the maximumconcentration of computing power and stability. It also contains

    hot-swappable hard-drives.

    HP Storage Servers

    These servers are used to store redundant parts of files in orderto prevent them from failing. Servers are usually kept in secureareas where access is controlled.

    IBM Desktop Computers

    These are general purpose computers which provide the basicdesktop services to users. It contains of a Fast-Ethernet port.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    10/23

    GAVEnterprise

    IBM Laptop Computers

    These are mobile computers which supports both LAN and WANconnectivity.

    HP IP Printers

    These are IP based printers which acts as a host on the network.It contains either a Fast-Ethernet port or a Wireless card.

    LOGICAL TOPOLOGY

    PROTOTYPE OF NETWORK TOPOLOGY

    The network topology of the GAV Enterprise building can be broadlycategorized into three network layers: Access, Distribution and CoreLayer.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    11/23

    GAVEnterprise

    ADDRESSING INFORMATION OF LAYER-3 DEVICES

    ROUTERS

    DEVICE INTERFACE IP ADDRESS SUBNET MASK Core Router Serial 7/0 212.212.212.2 255.255.255.0

    Serial 8/0 192.168.10.6 255.255.255.252Serial 9/0 192.168.10.2 255.255.255.252

    Gb E 0/0.27 192.168.8.2 255.255.255.240Gb E 0/0.28 200.200.200.1 255.255.255.248

    Wing A Router Serial 8/0 192.168.10.1 255.255.255.252Gb E 0/0.15 192.168.2.225 255.255.255.224Gb E 0/0.16 192.168.2.177 255.255.255.240Gb E 0/0.17 192.168.2.161 255.255.255.240

    Gb E 0/0.18 192.168.2.193 255.255.255.240Gb E 0/0.19 192.168.2.209 255.255.255.240Gb E 0/0.24 192.168.2.2 255.255.255.224Gb E 0/0.25 192.168.2.33 255.255.255.224Gb E 0/0.26 192.168.2.65 255.255.255.240

    Wing B Router Serial 8/0 192.168.10.5 255.255.255.252Gb E 0/0.9 192.168.2.65 255.255.255.224

    Gb E 0/0.10 192.168.2.2 255.255.255.224Gb E 0/0.11 192.168.2.33 255.255.255.224

    Gb E 0/0.12 192.168.2.97 255.255.255.224Gb E 0/0.13 192.168.2.129 255.255.255.224

    Waiting RoomWireless Router

    Internet 192.168.1.4 255.255.255.224

    LAN 192.168.3.2 255.255.255.0

    Cafeteria WirelessRouter

    Internet 192.168.1.3 255.255.255.224

    LAN 192.168.3.1 255.255.255.0

    Conference Hall Internet 192.168.2.4 255.255.255.224

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    12/23

    GAVEnterprise

    Wireless RouterLAN 192.168.4.1 255.255.255.0

    ADDRESSING INFORMATION OF LAYER-2 DEVICES

    SWITCHES

    DEVICE INTERFACE

    MODE VLAN ID

    Server Switch 0/1 Access 281/1 Access 282/1 Trunk 1-10053/1 Access 27

    Wing-A Core Switch 0/1 Trunk 1-14,16,20-10051/1 Trunk 1-15,17,20-10052/1 Trunk 1-14,18-10053/1 Trunk 1-1005

    Wing-B Core Switch 0/1 Trunk 1-10052/1 Trunk 1-14,20-1005

    Floor 1 Switch 0/1 Access 241/1 Trunk 1-23,26-10052/1 Trunk 1-23,25,27-10053/1 Access 244/1 Trunk 1-1005

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    13/23

    GAVEnterprise

    COMPLETE LOGICAL NETWORK TOPOLOGY

    IP ADDRESSING

    A host needs an IP address to participate on the Internet. The IPaddress is a logical network address that identifies a particular host. Itmust be properly configured and unique in order to communicate withother devices on the Internet.

    An IP address is assigned to the Network interface connection for ahost. This connection is usually a network interface card (NIC) installedin the device. Examples of end-user devices with network interfacesinclude workstations, servers, network printers and IP phones. Someservers can have more than one NIC and each of these has its own IPaddress. Router interfaces that provide connections to an IP networkwill also have an IP address.

    Every packet sent across the Internet has a source and destination IPaddress. This information is required by networking devices to insurethe information gets to the destination and any replies are returned tothe source.

    IP ADDRESSING STRUCTURE

    An IP address is simply a series of 32 binary bits (ones and zeros). It isvery difficult for humans to read a binary IP address. For this reason,the 32 bits are grouped into four 8-bit bytes called octets. An IPaddress in this format is hard for humans to read, write and remember.

    To make the IP address easier to understand, each octet is presentedas its decimal value, separated by a decimal point or period. This isreferred to as dotted-decimal notation.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    14/23

    GAVEnterprise

    The 32-bit IP address is defined with IP version 4 (IPv4) and is currentlythe most common form of IP address on the Internet. There are over 4billion possible IP addresses using a 32-bit addressing scheme.

    When a host receives an IP address, it looks at all 32 bits as they arereceived by the NIC. Humans, on the other hand, need to convert those32 bits into their four octet decimal equivalent. Each octet is made upof 8 bits and each bit has a value. The four groups of 8 bits have thesame set of values. The rightmost bit in an octet has a value of 1 andthe values of the remaining bits, from right to left, are 2, 4, 8, 16, 32,64 and 128.

    IP ADDRESS CLASSES

    The IP address and subnet mask work together to determine whichportion of the IP address represents the network address and whichportion represents the host address. The class of an address can bedetermined by the value of the first octet.

    IP addresses are grouped into 5 classes. Classes A, B and C arecommercial addresses and are assigned to hosts. Class D is reservedfor multicast use and Class E is for experimental use.

    Class C addresses have three octets for the network portion and onefor the hosts. The default subnet mask is 24 bits (255.255.255.0).Class C addresses are usually assigned to small networks.

    Class B addresses have two octets to represent the network portionand two for the hosts. The default subnet mask is 16 bits(255.255.0.0). These addresses are typically used for medium-sizednetworks.

    Class A addresses have only one octet to represent the networkportion and three to represent the hosts. The default subnet mask is8 bits (255.0.0.0). These addresses are typically assigned to largeorganizations.

    In the addressing scheme of GAV Enterprise, we have used Class-Caddressing scheme. In the Class-C addressing scheme, there are a totalof 256 addresses available. Out of these, 254 addresses are usable.

    The remaining to addresses are reserved for network and broadcast

    address.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    15/23

    GAVEnterprise

    IP addresses are of two types: Private addresses and Public addresses.All hosts that connect directly to the Internet require a unique public IPaddress. Because of the finite number of 32-bit addresses available,

    there is a risk of running out of IP addresses. This problem can beresolved by the use of Private addresses. They allow hosts within anorganization to communicate with one another without the need of aunique public IP address. Table below shows a list of Private addresses:

    SUBNETTING

    The customer network using the single ISR is badly overloaded. Theproposed solution is to add a second networking device, a larger ISR,and to divide the single network into two separate networks.

    For security purposes, the wireless and wired users need to be onseparate local networks.

    In the subnetting scheme for GAV Enterprise, we utilize the concept of classless subnetting where we use custom subnets to differentiate thenetworks.

    Routers distinguish between networks by using the subnet mask todetermine which bits make up the network ID and which bits make upthe host portion of the address. When a network is partitioned, therouter needs a modified or custom subnet mask to distinguish thesubnets from each other. A default subnet mask and a custom subnetmask differ from each other as follows: Default subnet masks onlychange on octet boundaries. For instance, the default subnet mask fora Class A network is 255.0.0.0. Custom subnet masks take bits fromthe host ID portion of the IP address and add them to the defaultsubnet mask.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    16/23

    GAVEnterprise

    SWITCHING

    A switch is a device that is able to direct a stream of messages comingin one port, out of another port based on the destination MAC addresswithin the frame. A switch cannot route traffic between two differentlocal networks. In the context of the OSI model, a switch performs theLayer 2, known as the data-link layer function.

    Only one message can be sent through an Ethernet hub at a time. It ispossible for two or more hosts connected to a hub to attempt to send amessage at the same time. If this happens, the electronic signals thatmake up the messages collide with each other at the hub.

    A collision causes the messages to become garbled and unreadable bythe hosts. A hub does not decode the messages; therefore it does notdetect that the message is garbled and repeats it out all the ports. Thearea of the network where a host can receive a garbled messageresulting from a collision is known as a collision domain.

    A switch is preferred over hubs in the networking model of GAVEnterprise because of the large collision domain associated with hubs.Since a switch uses micro-segmentation, it narrows down the collisiondomain. The network of GAV Enterprise uses 9 CISCO switches, which

    can result in a huge broadcast domain. So, to minimize the domain, wehave used the concept of Virtual LAN (VLAN).

    VIRTUAL LAN

    A VLAN is a logical broadcast domain that can span multiple physicalLAN segments. It allows an administrator to group together stations bylogical function, by project teams, or by applications, without regard to

    physical location of the users.A VLAN has two major functions:

    A VLAN contains broadcasts.

    A VLAN groups devices. Devices located on one VLAN are notvisible to devices located on another VLAN.

    Configuring a VLAN:

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    17/23

    GAVEnterprise

    In order to configure VLAN on a switch, connect it with a terminaldevice using a console cable.

    Enter the privileged mode using the enable command

    Switch>enable

    Switch#

    Enter the configuration mode using the configure terminal command

    Switch# configure terminal

    Switch (config) #

    Enter the name and VLAN number using the commands

    Switch(config)#vlan vlan_number

    Switch(config-vlan)#name vlan_name

    Switch(config-vlan)#exit

    Use the following commands to assign individual ports to VLANs:

    Switch(config)#interface fa#/#

    Switch(config-if)#switchport access vlan vlan_number

    Switch(config-if)# exit

    Use the following commands to assign a range ports to VLANs:

    Switch(config)#interface range fa#/start_of_range - end_of_range

    Switch(config-if)#switchport access vlan vlan_number

    Switch(config-if)#exit

    To disassociate a port from a specific VLAN:

    Switch(config)#interface fa#/#

    Switch(config-if)#no switchport access vlan vlan_number

    A switch port can function in two modes: Access and Trunk mode.

    To switch between the two modes, use the following command

    Switch(config)#interface fa#/#

    Switch(config-if)#switchport mode

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    18/23

    GAVEnterprise

    A switchport in the trunk mode is used for a switch-switch or switch-routerconnection, whereas an access mode is used for connection to terminaldevices.

    SWITCH CONFIGURATION

    Core Switches

    SWITCH INTERFACE MODE VLAN IDServer Switch Gb E 0/1,1/1 Access 28

    Gb E 2/1 Trunk 1-1005Gb E 3/1 Access 27

    Floor-1 Switch Gb E 0/1,3/1 Trunk 241/1 Trunk 1-23,26-10052/1 Trunk 1-23,25,27-10054/1 Trunk 1-1005

    Wing-A CoreSwitch

    0/1 Trunk 1-14,16,20-1005

    1/1 Trunk 1-15,17,20-10052/1 Trunk 1-14,18-1005

    3/1 Trunk 1-1005Wing-B Core

    Switch0/1 1-1005

    2/1 1-14,20-1005

    Other Switches

    SWITCH INTERFACE MODE VLAN IDM&HR&A Switch Fa E 0/1-0/6 Access 18

    Fa E 0/7-0/11 Access 19Gb E 1/1 Trunk 1-1005

    AD&M Switch Fa E 0/1-0/8 Access 15Fa E 0/10-0/13 Access 17

    Gb E 1/1 Trunk 1-1005

    SP Switch Fa E 0/1-2/1,4/1 Access 163/1 Trunk 1-1005

    T&S Switch Fa E Access 13Gb E 1/1 Trunk 1-1005

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    19/23

    GAVEnterprise

    DB Switch Fa E Access 12Gb E 1/1 Trunk 1-1005

    OP Switch Fa E Access 9Gb E 1/1 Trunk 1-1005

    PC Switch Fa E Access 11Gb E 1/1 Trunk 1-1005

    Wing-B MainSwitch

    Gb E 0/1 Trunk 1-8,11,14-1005

    Gb E 1/1 Trunk 1-9,14-1005Gb E 2/1 Trunk 1-8,12,14-1005Gb E 3/1 Trunk 1-8,13-1005Gb E 4/1 Access 10Gb E 5/1 Trunk 1-1005

    D Switch Fa E Access 26Gb E 1/1 Trunk 1-1005

    HD Switch Fa E Access 25Gb E 1/1 Trunk 1-1005

    ROUTING

    Routing is the process of finding a path to the destination host. A routeris a networking device that connects a local network to other local

    networks. At the Distribution Layer of the network, routers direct trafficand perform other functions critical to efficient network operation.Routers, like switches, are able to decode and read the messages thatare sent to them. Unlike switches, which only decode (unencapsulate)the frame containing the MAC address information, routers decode thepacket that is encapsulated within the frame.

    Each port, or interface, on a router connects to a different localnetwork. Every router contains a table of all locally-connected networksand the interfaces that connect to them. These routing tables can also

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    20/23

    GAVEnterprise

    contain information about the routes, or paths, that the router uses toreach other remote networks that are not locally attached.

    When a router receives a frame, it decodes the frame to get to thepacket containing the destination IP address. It matches the address of the destination to all of the networks that are contained in the routingtable. If the destination network address is in the table, the routerencapsulates the packet in a new frame in order to send it out. Itforwards the new frame out of the interface associated with the path,to the destination network. The process of forwarding the packetstoward their destination network is called routing.

    Router interfaces do not forward messages that are addressed to the

    broadcast MAC address. As a result, local network broadcasts are notsent across routers to other local networks.

    Configuring a ROUTER:

    In order to configure a router, the following commands can beexecuted.

    Enter the privileged mode using the enable command

    Router>enable

    Router#

    Enter the configuration mode using the configure terminal command

    Router# configure terminal

    Router (config) #

    The host from the sending VLAN forwards traffic to the router using thedefault gateway. The sub-interface for the VLAN specifies the defaultgateway for all hosts in that VLAN. The router locates the destination IPaddress and does a routing table lookup.

    If the destination VLAN is on the same switch as the source VLAN, therouter forwards the traffic back down to the source switch using thesubinterface parameters of the destination VLAN ID. This type of configuration is often referred to as a router-on-a-stick.

    If the exit interface of the router is 802.1Q-compatible, the frameretains its 4-byte VLAN tag. If the outbound interface is not 802.1Q-

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    21/23

    GAVEnterprise

    compatible, the router strips the tag from the frame and returns theframe to its original Ethernet format.

    To configure inter-VLAN routing, use the following steps:

    1. Configure a trunk port on the switch.

    Switch(config)#interface fa0/2

    Switch(config-if)#switchport mode trunk

    2. On the router, configure a FastEthernet interface with no IP addressor subnet mask.

    Router(config)#interface fa0/1

    Router(config-if)#no ip address

    Router(config-if)#no shutdown

    3. On the router, configure one subinterface with an IP address andsubnet mask for each VLAN. Each subinterface has an 802.1Qencapsulation.

    Router(config)#interface fa0/0.10

    Router(config-subif)#encapsulation dot1q 10

    Router(config-subif)#ip address 192.168.10.1 255.255.255.0

    4. Use the following commands to verify the inter-VLAN routingconfiguration and functionality.

    Switch#show trunk

    Router#show ip interfaces

    Router#show ip interfaces brief

    Router#show ip route

    ADDRESSING SCHEME

    ROOM IP ADDRESSRANGE

    SUBNETMASK

    DEFAULTGATEWAY

    Managers Office 192.168.2.210-222

    255.255.255.240

    192.168.2.209

    Human Resources Dept 192.168.2.210-222 255.255.255.240 192.168.2.209

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    22/23

    GAVEnterprise

    Accounts Dept 192.168.2.194-206

    255.255.255.240

    192.168.2.193

    ApplicationDevelopment

    192.168.2.226-254

    255.255.255.224

    192.168.2.225

    Marketing Room 192.168.2.162-174

    255.255.255.240

    192.168.2.161

    Special Projects Room 192.168.2.178-190

    255.255.255.240

    192.168.2.177

    Testing & SimulationRoom

    192.168.2.130-158

    255.255.255.224

    192.168.2.129

    Debugging Room 192.168.2.98-126 255.255.255.224

    192.168.2.97

    Optimization Room 192.168.2.66-94 255.255.255.224

    192.168.2.65

    Prototype Construction 192.168.2.34-62 255.255.255.224

    192.168.2.33

    Conference Hall 192.168.4.2-62 255.255.255.192

    192.168.4.1

    Waiting Room 192.168.3.2-62 255.255.255.192

    192.168.3.1

    Help Desk/CustomerCare

    192.168.1.34-62 255.255.255.240

    192.168.1.33

    Documentation Room 192.168.1.66-79 255.255.255.240

    192.168.1.65

    Cafeteria 192.168.3.0-254 255.255.255.0

    192.168.3.1

    INTERNET CONNECTION

    The Internet is a network of networks that connects users in every countryin the world. There are currently over one billion Internet users worldwide.

    Any home, business or organization that wants to connect to the Internetmust use an Internet Service Provider (ISP). An ISP is a company thatprovides the connections and support to access the Internet. It can alsoprovide additional services such as Email and web hosting.

    Summer Training Report

  • 8/8/2019 GAV Enterprise

    23/23

    GAVEnterprise

    ISPs are essential to gaining access to the Internet. No one gets on theInternet without a host computer, and no one gets on the Internet withoutgoing through an ISP. ISPs range in size from small to very large and differ

    in terms of the area they service. ISPs also differ in the types of connection technologies and speeds they offer.

    ISP LEVELS OF SERVICE

    When data is transferred, it is either uploaded or downloaded.Downloading refers to information coming from the Internet to yourcomputer, while uploading indicates the reverse path, from your computerto the Internet. When the download transfer rate is different from theupload transfer rate, it is called asymmetric. When the transfer rate is thesame in both directions, it is called symmetric. ISPs can offer bothasymmetric and symmetric services.

    The GAV Enterprise uses T1 symmetric connection from a reputed ISP. The advantage of using a symmetric T1 connection is that it can carrylarge amounts of data in both directions at equal rates. Moreover, it helpswhen we need to upload large amounts of traffic such as intensivegraphics, multimedia, or video.

    The network for GAV Enterprise was established with an eye towards theprospects for future upgrades.

    S T i i R