Project Computer Network Dipesh Thakur BIT Fall
Project Computer Network Dipesh Thakur BIT Fall
Sifal,Kathmandu,Nepal
XYZ company is a rapidly growing company with 100 employees spread over three
departments (i.e.,Sales, Marketing, Finance). Since they are relocating to a new location,
they require a secure and scalable network which supports facilities like Internet Protocol
telephony, wireless communication and access to the internet. A logical separation is ought
to be made using Virtual LAN and inter-VLAN routing should be possible for secure
communication. These requirements can be deduced into following points:
1. Due to rapid growth of employee numbers in the company, an IP scheme which can
accommodate more employees needs to be implemented in the network of the
company.
3. Each department needs to be separated from each other logically which requires the
concept of VLAN. This will break the broadcast domain into different segments and
prevent network congestion.
Network Requirements
1. Subnetting for more employees: Each department needs to have IPs for future
employees. This can be performed by using subnetting concepts. For example: To
accommodate over 200 employees in each department a /24 network needs to be
selected.
2. Selecting routers with IP telephony facility: Not all routers are compatible for IP
telephony services. A router like Cisco 2811 which allows IP telephony configuration
needs to be included in the network. A router has other requirements to fulfil like:
inter-VLAN routing and routing packets of internal network to other network.
3. Selecting appropriate number of Switches: Switches are layer 2 devices which are
required for network segmentation and communication between devices on layer 2.
Creation of VLAN is a core feature of switch which decreases network congestion
and segments network on layer 2.
Network Design
Extended-Star topology is used in the network to include features like trunking. XYZ
company has multiple departments so a switch is used to connect devices from multiple
departments and are segmented logically by VLAN configuration. Multiple switches are used
to demonstrate the trunking capabilities of Switch and for inter-VLAN routing, switches are
connected to routers. All of these features could be assimilated swiftly using Extended-Star
topology.
Extended-Star topology looks like multiple star topologies connected to each other
.
As it is apparent from the figure, an extended-star topology has multiple star topologies
communicating with each other. In XYZ company, not all devices are connected to the same
switch and devices from different departments are connected to a switch so extended-star
topology is the best option.
Figure:Network Topology
1. Devices used:
a. Cisco 2811 router: This router is a cornerstone of the network. It performs
tasks inter-VLAN routing and it has IP telephony capability which is different
from many routers. It has 2 fastethernet ports. In this network, Fastethernet
port 0/0 is used for inter-VLAN routing. Sub-interfaces are created for
router-on-stick. Fastethernet 0/1 is used to access the internet. A DHCP
server is created in this router for dynamic IP assignment.
b. Cisco catalyst 2960 switch:Two cisco 2960 switches are used to segment
network into three parts (i.e.,finance, management, sales). It has 24
fastethernet ports and 2 gigabit ethernet ports. It can segment networks into
Virtual LANs and enable devices from multiple departments to use a single
switch in a single location.
d. Server PT: A server is used as a reference to internet access. This device can
be configured to include IP address, default gateway, DHCP server and
access to certain domain names. Servers are used to provide services to end
hosts like access to websites and dynamic IP assignment.
e. IP telephones (Cisco 7960 series): These are the type of phones which use
IPs to communicate voice data over a network. Dynamic IP is assigned to the
IP telephones using DHCP server configured in cisco 2811 router and voice
VLAN is created for communication of voice data which is time sensitive.
f. PCs: Computers are used to represent end users like employees in different
departments. For communication between the computers, IP is assigned
dynamically through routers and inter-VLAN routing is enabled. These
computers provide you with the option to assign IP dynamically and statically.
We can configure default-gateway and IP of a dns server as well. Like a
normal computer, various features like terminal and command prompt are
also available. Using modules, you can add additional capabilities like
wireless communication.
Various security measures were implemented while configuring the device. They are as
follows:
1. Basic device Configuration:
a. Securing user exec mode: We can secure user exec mode using following
command:line console 0
password <password>
login
This prevents any unauthorised user from accessing user exec mode of
routers and switches to gain knowledge on basic info about the network.
b. Securing privileged exec mode: We can secure privileged exec mode using
two commands which are different in their encryption capabilities. They are:
Type 1: enable password <password>
Type 2: enable secret <password>
Type 1 uses an encryption method that is easy to crack so Type 2 is used to
secure privileged exec mode which uses MD5 encryption.
3. All the unused ports in switches are converted into access ports of a VLAN and are
manually shutdown to prevent unauthorised access.
13. ip source-address <ip address> The command "ip source-address <ip address>
port <port number> port 2000" is used in Cisco IOS devices to
specify the source IP address and port number
for certain protocols or services. This
command is often used in scenarios where
network traffic needs to be sent from a
specific IP address and port. Port 2000 is an
unassigned port in the TCP and UDP port
number registry. In networking, ports are
endpoints used by protocols to uniquely
identify different services or applications
running on a single host.
16. Option 150 ip <ip address> The command "Option 150 ip <ip address>" is
typically used in DHCP (Dynamic Host
Configuration Protocol) server configuration,
particularly in environments where Cisco IP
phones are deployed.
17. ip route <ip address> <subnet This command is used to configure a static
mask> <next-hop> route to a remote network.
2. Switch0:
line console 0
password cisco_3
login
line vty 0 4
password cisco_4
login
exit
enable secret cisco_5
service password-encryption
banner motd #Warning! Authorized Access Only!#
3. Switch1:
line console 0
password cisco_6
login
line vty 0 4
password cisco_7
login
exit
enable secret cisco_8
service password-encryption
banner motd #Warning! Authorized Access Only!#
b. Inter-VLAN routing(Router0):
interface FastEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.10.1 255.255.255.0
interface FastEthernet0/0.20
encapsulation dot1Q 20
ip address 192.168.20.1 255.255.255.0
interface FastEthernet0/0.50
encapsulation dot1Q 50 native
interface FastEthernet0/0.60
encapsulation dot1Q 60
ip address 192.168.60.1 255.255.255.0
interface FastEthernet0/0
no shutdown
ephone-dn 1
number 1010
ephone-dn 2
number 1020
ephone-dn 3
number 1030
ephone 1
device-security-mode none
mac-address 0002.1766.5A17
type 7960
button 1:1
ephone 2
device-security-mode none
mac-address 000D.BD8B.03C8
type 7960
button 1:2
ephone 3
device-security-mode none
mac-address 0040.0BC8.58C2
type 7960
e. Accessing Internet:
ip route 192.168.90.0 255.255.255.0 192.168.70.2 (Router0)
ip route 192.168.10.0 255.255.255.0 192.168.70.1(Router1)
ip route 192.168.60.0 255.255.255.0 192.168.70.1(Router1)
interface GigabitEthernet0/1
ip address 192.168.90.1 255.255.255.0
duplex auto
speed auto
Router0:
interface FastEthernet0/1
ip address 192.168.70.1 255.255.255.0
duplex auto
speed auto
g. VLAN configuration:
Switch0:
interface FastEthernet0/1
switchport access vlan 10
switchport mode access
switchport voice vlan 20
interface FastEthernet0/2
switchport access vlan 10
switchport mode access
switchport voice vlan 20
interface FastEthernet0/3
switchport access vlan 10
switchport mode access
switchport voice vlan 20
interface FastEthernet0/4
switchport trunk native vlan 50
switchport mode trunk
interface FastEthernet0/5
switchport trunk allowed vlan 10,60
switchport mode trunk
interface FastEthernet0/6
switchport trunk allowed vlan 10,60
switchport mode trunk
interface FastEthernet0/7
switchport access vlan 60
switchport mode access
interface FastEthernet0/8
switchport access vlan 60
switchport mode access
Switch1:
interface FastEthernet0/1
switchport trunk allowed vlan 10,60
switchport mode trunk
interface FastEthernet0/2
switchport trunk allowed vlan 10,60
switchport mode trunk
interface FastEthernet0/3
switchport access vlan 60
switchport mode access
interface FastEthernet0/4
switchport access vlan 60
switchport mode access
Due to proper basic device configuration, interfaces in the networking devices of the
network are secured by passwords and strong encryption. Following pictures
showcases these capabilities:
6. DHCP server is fully functional for different VLANs:
1. Segmentation of a LAN into various Virtual LANs for various departments where PCs
of multiple departments are connected through a single switch.
4. Configuring Trunk ports for data transmission of multiple VLANs through an interface
and configuring access ports to various VLANs.
5. Configuring voice VLAN and IP telephony service in switch0 and router0 respectively
for transmission of voice info for communication smoothly. Configuring voice VLAN
provides steady bandwidth for voice communication.
There is always room for improvements in the network. Some of them are as follows:
3. Provisions for IPv6 transition haven’t been configured in this network which might
limit the scalability of the company’s network in the future.
The End