Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Practice Word

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 25

objective

1|Page
our objective in these project is to understand design of different
networks using many type of connections, end devices and
networking device.
Specially here we will see how we could connect campus network.
In addition, with that this project helps us to improve better
understanding on communication system that we could use in a
real life application.

Introduction

2|Page
 Internet technology began to spread in the campus, the Internet and our
campus life has been closely linked together. as a campus to facilitate the
teaching methodology internet has been playing a big role. Campus network
should have teaching, management and communication functions. In our
network design the campus network construction, the main focus on teaching
and communication. Gondar university’s network topology uses cisco three
tier hierarchal design (core, distribution, access) which is like star topology
with all campus centrally connected to the core with single fiber having 10 GPs
speed per band width . For the VLANs per subnet variable subnet length
addressing is used.

CHAPTER ONE
3|Page
Computer networks
 A computer network is defined as the interconnection of two or more
computers. It is done to enable the computers to communicate and share
available resources.

Applications

 Sharing of resources such as printers


 Sharing of expensive software and database
 Exchange of data and information among users and soon.

The use of computer networks

 Business application
 Home application
 Mobile users.
 Social issues.

Components of computer network

Two or more computers


Cable as links between the computers.
A network interfacing card (NIC) on each computer
Switch
Software called operating system (OS).

Based on their geography Networks can be classified as:

1. LOCAL AREA NETWORK(LAN)


 LAN is a network which is designed to operate over a small physical area
such as an office, factory or a group of building.
 LAN is easy to design and troubleshoot.
 Exchange of information is easy.
 In LAN all machines are connected to a single cable.
 It is usually a privately owned network.

4|Page
2. WIDE AREA NETWORK (WAN)
 When networks spans over a large distance or when the computers to be
connected to each other are at widely separated locations a local area
network cannot be used. A wide area network is installed.
 Most wan networks are used to transfer large blocks of data between its
users.
3. PERSONAL AREA NETWORK (PAN)
 PAN is a computer network organized around an individual person.
 It generally consists of a mobile computer a cellphone or personal digital
assistant.
 It can also use for communicating among personal devices themselves for
connecting to a digital level network and internet.
 PAN can be constructed by wireless or cables.
4. CAMPUS AREA NETWORK (CAN)
 The campus area network is made up of an interconnection of LAN with
limited geographical area.
 Network equipment such as switches, routers and the transmission media
i.e. optical fiber are almost entirely owned by the campus owner.
5. METROPOLITAN AREA NETWORK (MAN)
 It is between LAN and WAN technology that covers the entire city.
 It uses similar technology as LAN.
 It can be a single network such as cable TV network or a measure of
connecting a number of LAN’S a large network so that resources can be
shared LAN to LAN as well as device to device.

Network Topologies

5|Page
 Topology is Physical and logical network layout or actual layout of the
computer cables and other network devices and it describes the way in which
the network appears to the devices that use it.

• Common topologies: – Bus, ring, star, mesh.

A. Bus topology

• Uses a trunk or backbone to which all of the computers on the network connect.
• Systems connect to this backbone using T connectors or taps.

Fig 1.1 bus topology Table1.1 bus topology advantage and disadvantage

B Ring topology

• In ring topology that data travels in circular fashion from one computer to
another on the network.

6|Page
Fig 1.2ring topology Table 1.2 ring topology advantage and disadvantage

C. Star topology

Fig 1.3-star topology Table 1.3star topology advantage and disadvantage

•In star topology all computers/devices connect to a central device called hub or
switch. Each device requires a single cable and there is a point-to-point
connection between the device and hub. Table bus topology advantage and
disadvantage

7|Page
D. Mesh topology

Fig 1.4 mesh topology Table 1.4 mesh topology advantage and disadvantage

 In this topology each computer connects to every other.it provide High


level of redundancy. since its Wiring is very complicated it is rarely used.it
creates point to point connection between specific network devices, often
seen in WAN implementation.

8|Page
CHAPTER TWO

Design of campus network structure

 The construction of the campus network design is based on the actual


situation and characteristics of university of Gondar. In the design process,
we tried to pay attention to the practicality of the campus network.

Principles for overall design


The campus network covers the entire campus, and the network design follows
the following five basic principles:

 Reliability and high performance networks must be reliable, including


network-level reliability such as routing, switching aggregation, link
redundancy. The network must be of sufficient performance to meet the
needs of the business.
 scalability of the system to be scalable, with the business growth and
application level, the network of data and information flow will grow
exponentially, the need for good network scalability, and can continue to
upgrade with the development of technology.
 Easy to manage, easy maintenance as the campus backbone network
system is large, rich and complex application, the need for network
management system has good manageability, network management
system with monitoring, fault diagnosis, fault isolation, filtering settings
and other functions to facilitate the management of the system and
maintain.

Hierarchical model of campus network design

 Hierarchical model is to divide the complex network design into several


levels, each of which focuses on certain specific functions, which can make
a complex big problem into many simple small problems. Hierarchical

9|Page
model can be applied to both LAN design and WAN design.
In networking, a hierarchical design is used to group devices into multiple
networks. The networks are organized in a layered approach. The
hierarchical design model has three basic layers.

■Core layer: Connects distribution layer devices


■Distribution layer: Interconnects the smaller local networks
■Access layer: Provides connectivity for network hosts and end devices.

Fig 2.1 Hierarchical network design model.

 Core Layer Design Considerations


 The Cisco three-layer hierarchal model is composed of the core layer,
distribution layer, and access layer. Of the three layers, the core layer is
responsible for transporting large amounts of data quickly and reliably.
 Core Layer Technologies:-Technologies used at the core layer include the
following:
■Routers or multilayer switches that combine routing and switching in the
same device

10 | P a g e
■Redundancy and load balancing
■High-speed and aggregate links

 Distribution Layer Design Considerations


 The distribution layer represents a routing boundary between the access
layer and the core layer. It also serves as a connection point between
remote sites and the core layer.

Access Layer Design Considerations


 The access layer is used to control user access to the internetwork
resources. The access layer, this layer represents the edge of the network
where end devices connect. Here we implement VLAN technology.

The Dynamic Host Configuration Protocol (DHCP)


 It is a network management protocol used on TCP/IP networks whereby a
DHCP server dynamically assigns an IP address and other network
configuration parameters to each device on a network so they can
communicate with other IP networks. A DHCP server enables computers to
request IP addresses and networking parameters automatically from the
Internet service provider (ISP), reducing the need for a network
administrator or a user to manually assign IP addresses to all network
devices. In the absence of a DHCP server, a computer or other device on
the network needs to be manually assigned an IP address.

Static internet protocol address


 A static internet protocol is a permanent number assigned to a computer
by an internet service provider (ISP).static IP address are useful for gaming,
website hosting or voice over internet protocol (VoIP) services. Speed and
reliability are key advantages. Because a static address is constant system

11 | P a g e
with static IP address are vulnerable to data mining and increased security
risks.

Virtual LANs (VLANs)


 A VLAN is a group of devices on one or more LANs that are configured to
communicate as if they were attached to the same wire, when in fact they
are located on a number of different LAN segments. Because VLANs are
based on logical instead of physical connections, they are extremely
flexible.

CHAPTER THREE

DEMAND ANALYSIS OF NETWORK DESIGN


 In campus information construction professionals to communicate, due to
participate in network applications more teachers and students, and contains a
large number of multimedia information, so large-capacity, high-speed data
transmission is an important requirement for the network. Campus network
construction needs are as follows:-
 Teaching building, dormitory, laboratory building, staffs ,library and so
on the campus network, browse the WEB page, INTERNET visit the
corresponding routing strategy.

 The campus network security requirements are higher, the campus


network also has a lot of teaching and file management on the important
data, whether it is damaged, lost or stolen, will bring great losses. The
device is required to enable user identification and dynamic binding
functions such as identification of users through the dynamic binding of
the 'IP + MAC + port' triplet, such as the authentication of the access
user, the security of the access computer's computer equipment, The
security of the network switch and the control of the server cluster
access.

12 | P a g e
 The campus network WEB page can achieve the following functions:
resource sharing, information exchange, collaborative work, user Web
self-service function, the user can Web self-service page, personal
information query, password modification, Internet details query.
 The campus network requirements to achieve the dynamic control of user
bandwidth.
 The campus network to achieve multicast services.
 The campus network requirements in the school scale continues to
expand, the number of users continues to increase, requiring the network
has a very good scalability, according to the need to gradually smooth
upgrade to 10Gigabit backbone connection.
 After the completion of the campus network will achieve the following
basic functions:-
• Computer teaching, including multimedia teaching and distance
learning;
• Network downloads, mailbox login, network chat, etc. .;
• E-mail system: mainly with peer exchanges, technical cooperation,
academic exchanges and other activities;
• File transfer ftp: the main use of ftp services to obtain important
scientific and technical information and technical documents;
• Internet service: schools can set up their own home page, the use of
external web pages for school publicity,to provide various types of
consulting information, the use of internal web pages to manage, such as
issuing a notice to collect student opinions.
• Library access system for computer query, computer search, computer
reading and so on.

Network Requirements

 Most businesses actually have requirements for their network among this:-

 The network should stay up all the time, even in the event of failed
links, equipment failure, and overloaded conditions.

13 | P a g e
 The network should reliably deliver applications and provide
reasonable response times from any host to any host.

 The network should be secure. It should protect the data that is


transmitted over it and data stored on the devices that connect to it.

 The network should be easy to modify to adapt to network growth and


general business changes.

Fundamental Design Goals

 When examined carefully, these requirements translate into four fundamental


network design goals:-

 Scalability: Scalable network designs can grow to include new user


groups and remote sites and can support new applications without
impacting the level of service delivered to existing users.

 Availability: A network designed for availability is one that delivers


consistent, reliable performance, 24 hours a day, 7 days a week. In
addition, the failure of a single link or piece of equipment should not
significantly impact network performance.

 Security: Security is a feature that must be designed into the network,


not added on after the network is complete. Planning the location of
security devices, filters, and firewall features is critical to
safeguarding network resources.

 Manageability: No matter how good the initial network design is, the
available network staff must be able to manage and support the
network. A network that is too complex or difficult to maintain cannot
function effectively and efficiently.

14 | P a g e
CHAPTER FOUR

NETWORK CONSTRUCTING & IP ADDRESS

 An IP address is a unique 32- bit number which is used to identify a


network device on an IP network. Each IP address consists of two parts,
the host and the network portion.

 The network address is used for identifying the network or the subnet
where the device is located and the host address helps to identify the
individual device.
 As we expressed earlier in our project of campus networking there are
many different areas in which networking will be done.
So those areas where we use internet connections need many network
connections to perform tasks.
So in order to do this network end devices, networking devices, cabling, are used
in the packet tracer.
For instance we use the following networking requirements
 Router
 Switch
 Computer
 Server
 Printer
 Wireless devices
here in our project many areas of the campus are included such as
 library
 dormitory for male
 dormitory for female
 staffs
 laboratory class
 teaching room
 department

15 | P a g e
and we use a cisco packet tracer to accomplish our project.
From the instance we create different local networks for each different area in
the campus by using switch as a networking device and computers as an end
device.
The reason that we use switches as a networking device is that they are more
intelligent, due to the reason they unicast messages to intended end devices
based on individual MAC address.
So they make a decision based on this MAC address and unnecessary traffic will
be eliminate.
Although switches are intelligent they need a complex configuration so each
switches in different network must separately configured.
Further we use star and bus topology during we construct network on different
part of the campus. Because those topologies are easy to install and chip. Even
though there are some delay in the connection

Part1 constructing network in specific area


as we expressed above there are many campus areas which need network
connections for their tasks. So this connection performed separately for
each part.
Assuming the department office (the main block)
 There are 3 floors……... each floors have right and left side for departments.
It may be electrical, mechanical, civil or any other staff area.
 So any end devices in these area connect with both a broadband and
wireless connection.
So we used a switch as a networking device and access point pt wireless device
to connect end devices like
 computers
 printers
 mobile phones
 any other end devices

16 | P a g e
in a single network.

 Next to this those devices connect with a star connection for the reason
expressed earlier. And switches their selves connect each other in a
connection.

Fig 1 department building networking

Part2 ip addressing

So, in these project ip address for the end devices allocated dynamically
by using a server.
We have used 3 servers for this reason also DNS (which used to change
words in to respective ip address).
17 | P a g e
 Server pt
This server used for generating random ip address for any devices
connected in the network system
 DNS SERVER
As expressed above this server user for changing words to ip address that
could be recognized by the computer.

 HTTP server
Each end devices in these network get their ip address dynamically starting from
some initialized ip address given from the designer.

Fig 2 server connection (for dynamically allocation of ip)


Even some other computer added to the network after we already design the
network system the DHCP assign a new random ip address for the new devices
based on the previous devices ip address.
So dynamically ip allocation (DHCP)is best and easy for ip addressing.

Part 3 connecting of different networks


from the concept of out chapter 3 lecture
 A router is a device that route/forward packets based on IP addressing.
 Connects LANs and WANs in the Internet (create large nets).

18 | P a g e
 Routers even connect networks based on different
protocols, which is important since not all networks use the
same protocol.
So router is very important here in our project.

By using router, we connect those different networks to interface each other (to
make stable connection on to other network).
Even though configuring router is very complicated when we compare it with
other networking devices its mandatory to use it for best networking interface
where different protocols were used.
The 4 routers we used in the project has their own fast internet port interface
with different switches and routers themselves.
So configuring will be done in all routers.
Routers themselves connect with bus topology so as to make the connection
much easier but this make our connection to be delayed.

Figure 3 router connection

19 | P a g e
BLOCK DIAGRAM FOR GENERAL NETWORKING

staffs

LIBRARY DEPARTMENT

CORE

ROUTERS,
SERVERS

TEACHING
DORMITARY ROOM

LABORATORY

SIMULATION OUTPUT

20 | P a g e
SAMPLE CODE CONFIGURATION
in our project we used many switch devices
assuming 1 switch
 For a fast internet assuming one port

Switch>enable
Switch#
Switch#vlan
Switch(vlan)#
Switch(vlan)#exit
Switch#configure terminal
Switch(config)#interface FastEthernet0/1
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface FastEthernet0/2
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface FastEthernet0/3
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface FastEthernet0/3
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface FastEthernet0/4
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface FastEthernet0/6
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface FastEthernet0/7
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface FastEthernet0/9
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface FastEthernet0/24
Switch(config-if)#
Switch(config-if)#exit
Switch(config)#interface GigabitEthernet0/1
Switch(config-if)#

21 | P a g e
Switch(config-if)#end
Router>enable
 To configure DHCP
Switch>enable
Switch#conf t
Switch (config) #ip dhcp pool vlan
Switch (config) #network subnet
Switch (config) #default route
Switch (config)#exit
Switch#conf t
Switch (config)#ip dhcp execlude address

 To configure TELNET
Switch>enable
Switch#conf t
Switch (config)#interface vlan
Switch (config) #no shutdown
Switch (config-if) #ip address subnet mask
Switch (config-if) #exit
Switch (config) #line vty 0 4
Switch (config)#password
Switch (config)#login
Switch (config)#exit
Switch (config) #enable secret password
Switch (config)#exit
 To configure static routing
Switch>enable
Switch#conf t
Switch (config-if)#ip route ip address subnet mask nexthop
Switch (config-if)#exit

Router
Router#
Router#configure terminal.
Router(config)#interface Serial2/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface FastEthernet0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface FastEthernet5/0
Router(config-if)#

22 | P a g e
Router(config-if)#exit
Router(config)#interface FastEthernet1/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial2/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial3/0
Router(config-if)#exit
Router(config)#interface FastEthernet4/0
Router(config-if)#
Router(config-if)#exit
Router(config)#router rip
Router(config-router)#
Router(config-router)#end
Router#configure terminal

23 | P a g e
Conclusion
 With the advent of the Internet age, the impact of our education is
unprecedented, and it also provides a rapid leap for education
opportunities, education should be oriented towards modernization, facing
the world, facing the future, we must first be facing the network. Education
can only make a combination with network in order to keep up with
progress and development of times. So, in this project we tried to design our
Campus network based on studied number of hosts in the campus. By using
many networking devices, end devices wireless devices that campus host
get used in activity many categories or places are considered (library,
laboratory dormitory, laboratory and staff) To design the network topology
we used software of cisco packet tracer. And we implement hierarchal
model to simulate the network i.e. (access, distribution and core) in order to
make the design simple and easy to understand. In each layer we used
different network protocols and technology i.e. (DHCP, VLANS, dynamic IP,
and DNS and HTTP server).

24 | P a g e
REFERENCES
Our laboratory manual

Some google free books

Data communication books

25 | P a g e

You might also like