Capstone Project 2015By Cronicle Nambahin 1 ....................................................................................................... 18 Table of Figures Figure 1………………………………………………………………………………………………………………………………………5 Figure 2………………………………………………………………………………………………………………………………………6 Figure 3………………………………………………………………………………………………………………………………………7 Figure 4………………………………………………………………………………………………………………………………………8 Figure 5……………………………………………………………………………………………………………………………………16 Figure 6……………………………………………………………………………………………………………………………………17 Figure 7……………………………………………………………………………………………………………………………………17 Figure 8……………………………………………………………………………………………………………………………………18 2 ................................................................................................. 16 Note from the Author ..................................................................... 9 References ................................. 8 Conclusion ........................................ 6 Small Business Network ............................................................................................................................................................................................................................................. 10 Author ............... 5 LAN Network ............................................. 11 Glossary ........................... 3 Keywords........................................................................................................................................ 3 Introduction ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ 9 Acknowledgement .................................................................................................. 11 Appendix 2 ................ 4 DWU Campus Structure ...............................................................Capstone Project 2015 Table of Contents Abstract ............................................................................................................................................................................................................................................ 11 Appendix 1 ...................... 3 Data Center ............ Furthermore. verified and secured to visualize the documentation. Wide Area Network. updating documentation is a part of change management and many daily administration activities. Keywords: Data Center. computers and servers that can communicate with each other. Understanding how it is used to help business organizations. A small network is designed. designing. Firstly. securing and documenting a SOHO network. meet their networking needs. configuring. network is understood as a connection of network devices and end devices via network media. For example. Thus. There are two parts to this paper. Good documentation must be thorough and must be kept current. It will also demonstrate the knowledge and skills of documenting an existing network. In this paper. Documentation enhances and validates security by documenting the configuration details and procedures that support a security policy. Introduction The objective of this project is to understand how to document existing data and communications network and to be familiar with the various methods that may be used to design a basic network. Network Documentation. Storage Area Network. This paper is all about the documentation of certain aspects of DWU network. Network Configuration. Pinging and Dial Peer Mapping. verifying and securing different types of networks from a small network to an enterprise network are a major technology development. it helps us to choose the appropriate configurations and security measures for a given network installation. it will discuss the DWU campus network documentation. Documentation also serves as an important part of backup and disaster recovery documentation. The first task in understanding how to design and build a computer network is to defining what a network is and how it is designed and implemented. institutions and etc. It helps us to identify network components and structures and to produce a formal report for such a project in the near future. Local Area Network. configured. This paper will demonstrate the knowledge and skills of designing. verifying.Capstone Project 2015 Abstract Documenting. 3 . configuring. The cloud symbol is used as a metaphor for the Internet as well as an abstraction of the complex infrastructure it represents. Data center is where all the data in a network are stored. In the data center we have a Storage Area Network (SAN) where data are stored. A data center often requires extensive redundant or backup power supply systems. Equipment Rack. It is used to indicate a service when details of its functioning are not relevant to the context under present focus. every network has a data center where they use to store and retrieve data. Data center management involves ensuring the reliability of both the connections to the data center as well as the mission-critical information contained within the data center's storage.Capstone Project 2015 Part 1: Campus Network Documentation Data Center Data center is vital in all networks. which typically involve storing. server and networking systems and components for the organization networking needs. It is physical or virtual infrastructure used by organization to house computer. redundant networking connections and policy-based security systems for running the enterprise's core applications. with the VMs located on 4 physical servers thereby constituting a server cloud. There is no network without a data center or in other words. It also entails efficiently placing application workloads on the most cost-effective compute resource available. cooling systems. Overall Data Center structure of DWU network is shown below (Figure 1). processing and serving large amounts of data to clients in client server architecture. Bank of Switches (Core and Distribution Switches. 4 . There are 40 virtual servers (some shown within the cloud graphic) each on its own VM. Routers and Servers. SAN network. DWU Data Center structure showing the fiber optic connection from the equipment rack. The fiber optic cable travels undersea from Sydney through Guam and comes up out from the sea near the Kalibobo Light House and Coast Watches and to Telikom. The Satellite gets the signal from the ISP and transmits it to the satellite dish at the back of the FR Sirio’s house. The fiber optic cable that comes from Telikom also connects to the Fiber Optics Switch Port where it distributes to the whole campus. servers and network from Telikom to the bank of switches and out to the campus. The network from the Internet Service Provider (ISP) through Satellite and satellite dish is a backup internet service. it branches out to different distribution switches within the campus as shown below in Figure 3. 5 . Overall DWU Campus Structure DWU receives internet service through Satellite and from Telikom via a fiber optic cable. From the main fiber optic switch port.Capstone Project 2015 Figure 1. Telikom provides the main internet service to DWU. DWU receives internet service via a Fiber Optic cable from Telikom. The satellite dish then receives the signal and sends it through fiber optics cable to the Fiber Optics Switch Port where it distributes to the whole campus. or office building. using network media. The fiber optic cable is connected to the distribution switch in the Printing Room. It is connected to DWU network via fiber optic cable as shown in the figure below. The cloud symbol is used as a metaphor for the Internet as well as an abstraction of the complex infrastructure it represents. computer laboratory. LAN Network A Local Area Network (LAN) is a computer network that interconnects computers within a limited area such as a home. Network media are twisted-pair cable. and wireless and etc.Capstone Project 2015 Figure 2. Figure 3 shows detailed LAN network topology of Lab 101. It branches out from the junction box beside the THM Building and comes up out of the ground to the 6 . school. fiber-optic cable. Overall DWU Network Structure showing the logical connection of network devices and end devices via different network media. It is used to indicate a service when details of its functioning are not relevant to the context under present focus. coaxial cable. a Wireless Access Point. Desktop PCs and Laptops. A network is consisting of devices and end systems. From IS Lab it runs over a cable tray across to the CIC building and again runs over another cable tray across to the Radio Diwai Building and to the Printing Room. 7 . Detailed LAN Network for Lab101. It shows how the network is designed and what network media are used for the connections. The Lab 101 network consists of an Access Layer Switch (Catalyst 2950 Series). The purpose of a Distribution Layer Switch is to provide a point of connection for the building's Access Layer switches.Capstone Project 2015 building and follows the building down to the IS Lab. such as computers and servers that communicate with each other. the first task in understanding how to build a computer network is to define what a network is and understanding how it is used and what it is used for. Figure 3. Laptops can either be connected wirelessly via Wireless Access Point or by Cat-5 cable. UTP Cat-6 cable connects the distribution switch in the printing room to the access layer switch in the Lab 101 and also to other access layer switches within the building. Part 2: Basic Router & Switch Configuration Small Business Network Generally. The PCs are connected to the switch via Cat-5 cables (Category 5). Dial Peer Mapping is specifically configured to make a call from one LAN across to the other LAN. Subnetting is included as part of the addressing scheme for future expansion. Two LAN network (Local Area Network) are connected via a serial connection over a WAN (Wide Area Network). one 1960 series switch. In this small business network topology. Addresses are assigned to each network devices as shown in the logical topology below. two IP phones and two desktop PC. Logical diagram of a small business network. The devices in each network are connected via a straight through cables. Networks are separated by routers. The routers and switches configuration and the screenshots of pinging are shown in the Appendixes. IPv4 and Class C address are used in this network. WAN connection is established between the two routers by defining static route. The two LAN networks are Madang Network which is the Head Office and the Lae Network which is the branch (Lae Branch). Figure 4. The two routers in each network are configured with DHCP to provide addressing for each IP phone to be connected and to handle voice packets. Here the four IP phones are able to call one another within and across the WAN to the other network. These two networks have only one main server located in Madang where their data are stored. 8 . Each LAN network consists of one 2811 series router. It is fully configured and verified and secured. The connectivity between all phone devices within the two Local Area Networks is established by configuring Dial Peer Mapping. there are three networks altogether.Capstone Project 2015 Here is a small network topology designed using Packet Tracer. It shows connection of the Head Quarter in Madang and the Lae branch via a serial connection over WAN. Appendix 1 shows the routers and switches configuration and Appendix 2 shows the screenshots of pinging and IP phone calling each other. any errors of fact or omission rest entirely with the author. Peter K. A small network has been designed in packet tracer to show how to configured. It enhances and validates security by documenting the configuration details and procedures that support a security policy. updating documentation is a part of change management and many daily administration activities. documentation serves as an important part of backup and disaster recovery documentation. Anderson and Mr. Good documentation must be thorough and must be kept current. I want to thank God for giving me the wisdom. Cyril Sarsoruo for their concern in helping me to be competitive and a team player in the near future. knowledge and understanding and His many blessings upon my life. verifying and securing a network. The paper has also discussed how to designing. Acknowledgements I am very grateful to my instructors Prof. Ryan David for his support in contributing ideas to successfully configured and verified the small business network designed in packet tracer. verified and secured a network. I wish to take this opportunity to thank the Head of Department Prof. I would like to thank my wife Maryanne Idawa for her inspiration. Furthermore. 9 . Anderson and the Department Coordinator Mr. configuring. Thus. Peter K. Finally. Documentation is vital in all aspects of networking. I would also like to thank my fellow classmate Mr. Furthermore. However.Capstone Project 2015 Conclusion This paper has described a documentation of a certain aspects of DWU network. Cyril Sarsoruo for their technical guidance and instruction for writing this paper. in spite of being far away from me. ISBN: 0-8493-1608-1. (2014). Contemporary PNG Studies: DWU Research.. K. 10 . Satellite Communication for PNG Universities and Research Institutes: A New Design.ciscopress.php Peter. Retrieved May 13th. 11. 2015 from http://www. (2 nd. Orbit-Computer Solution. 2015 from http://orbit-computer-solutions. Anderson. (2013). Retrieved May 13th.Network Design: Management and Technical Perspectives. Teresa. Cisco Networking Academy’s Introduction to Routing Concepts.Com.asp?p=2180208&seqNum=6 Peter. Anderson.Ed). (2013). Piliouras. Contemporary PNG Studies: DWU Research. (2009). United State of America: CRC Press LLC. (2005). Visualization for local cloud computing: DWU Data Center.Capstone Project 2015 References Cisco Networking Academy. 18.com/How-to-Configure-Static-Routes. How to Configure Static Routes. C.com/articles/article. K... ac.pg / [email protected]. 2017.Capstone Project 2015 Author Cronicle Nambahin is a Third Year Mathematics and Computing Science student at Divine Word University. He will be graduating with a Bachelor Degree on March.dwu. His interests include programming computer program solution of a given problem and network configuration. Mobile Phone: (+675) 73 435 313 or Email: cnambahin@student. Glossary WAN LAN SAN F/O Cat -5 IP DHCP IPv4 UTP VM Wide Area Network Land Area Network Storage Area Network Fiber Optic Category 5 Internet Protocol Dynamic Host Configuration Protocol Internet Protocol Version 4 Unshielded Twisted Pair Virtual Machine Appendix 1 Madang Router Configuration Router>enable Router#configure terminal Router(config)#hostname Madang_Router Madang_Router(config)#no ip domain-lookup Madang_Router(config)#enable password capstone Madang_Router(config)#line console 0 Madang_Router(config-line)#password project Madang_Router(config-line)#login Madang_Router(config-line)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#line vty 0 4 Madang_Router(config-line)#password project Madang_Router(config-line)#login Madang_Router(config-line)#exit Madang_Router(config)# Madang_Router(config)# 11 . 1 port 2000 Madang_Router(config-telephony)#auto assign 4 to 6 Madang_Router(config-telephony)#auto assign 1 to 5 Madang_Router(config-telephony)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#ephone-dn 1 Madang_Router(config-ephone-dn)#number 6401 Madang_Router(config-ephone-dn)#ephone-dn 2 Madang_Router(config-ephone-dn)#number 6402 12 .1.255.2.255.168.168.168.3.2.0 Madang_Router(config-if)#no shutdown Madang_Router(config-if)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#interface s0/0/1 Madang_Router(config-if)#description Link to Lae_Router Madang_Router(config-if)#ip address 10.168.0 255.2.168.2 Madang_Router(config)#interface s0/0/1 Madang_Router(config-if)#clock rate 64000 Madang_Router(config-if)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#ip dhcp pool PHONE Madang_Router(dhcp-config)#network 192.255.Capstone Project 2015 Madang_Router(config)#service password-encryption Madang_Router(config)#banner motd # AUTHORIZED ACCESS ONLY.255.255..1 Madang_Router(dhcp-config)#option 150 ip 192.2..255.2.1 255.1.168.255.255.1 Madang_Router(dhcp-config)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#telephony-service Madang_Router(config-telephony)#max-ephones 5 Madang_Router(config-telephony)#max-dn 5 Madang_Router(config-telephony)#ip source-address 192.! # Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#interface f0/0 Madang_Router(config-if)#description Link to Madang_Router Madang_Router(config-if)#ip address 192.2.1 255.0 255.252 Madang_Router(config-if)#no shutdown Madang_Router(config-if)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#ip route 192.0 10.0 Madang_Router(dhcp-config)#default-router 192.2. ! # Madang_Switch(config)# Madang_Switch(config)# Madang_Switch(config)#interface range f0/1 .24 Madang_Switch(config-if-range)#switch mode access Madang_Switch(config-if-range)#switch voice vlan 1 Madang_Switch(config-if-range)#end Madang_Switch# Madang_Switch#copy running-config startup-config Madang_Switch#exit Lae Router Configuration Router>enable Router#configure terminal 13 ..1 Madang_Router(config-dial-peer)#end Madang_Router#copy running-config startup-config Madang_Router#exit Madang Switch Configuration Switch>enable Switch#configure terminal Switch(config)#hostname Madang_Switch Madang_Switch(config)#no ip domain-lookup Madang_Switch(config)#enable password capstone Madang_Switch(config)#line console 0 Madang_Switch(config-line)#password project Madang_Switch(config-line)#login Madang_Switch(config-line)#exit Madang_Switch(config)# Madang_Switch(config)# Madang_Switch(config)#line vty 0 4 Madang_Switch(config-line)#password project Madang_Switch(config-line)#login Madang_Switch(config-line)#exit Madang_Switch(config)# Madang_Switch(config)# Madang_Switch(config)#service password-encryption Madang_Switch(config)#banner motd # AUTHORIZED ACCESS ONLY.Capstone Project 2015 Madang_Router(config-ephone-dn)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#dial-peer voice 1 voip Madang_Router(config-dial-peer)#destination-pattern 64. Madang_Router(config-dial-peer)#session target ipv4:192...168.3. 2..168.168..255.2 255.252 Lae_Router(config-if)#no shutdown Lae_Router(config)#exit Lae_Router(config)# Lae_Router(config)#ip route 192.1.0 255.1 Lae_Router(config)#interface s0/0/0 Lae_Router(config-if)#exit Lae_Router(config)# Lae_Router(config)# Lae_Router(config)#ip dhcp pool PHONE 14 .1 255.0 10.Capstone Project 2015 Router(config)#hostname Lae_Router Lae_Router(config)#no ip domain-lookup Lae_Router(config)#enable password capstone Lae_Router(config)#line console 0 Lae_Router(config-line)#password project Lae_Router(config-line)#login Lae_Router(config-line)#exit Lae_Router(config)# Lae_Router(config)# Lae_Router(config)#line vty 0 4 Lae_Router(config-line)#password project Lae_Router(config-line)#login Lae_Router(config-line)#exit Lae_Router(config)# Lae_Router(config)# Lae_Router(config)#service password-encryption Lae_Router(config)#banner motd # AUTHORIZED ACCESS ONLY.0 Lae_Router(config-if)#no shutdown Lae_Router(config-if)#exit Lae_Router(config)# Lae_Router(config)# Lae_Router(config)#interface s0/0/0 Lae_Router(config-if)#description Link to Madang_Router Lae_Router(config-if)#ip address 10.2.255.255.3.2.255.255.255.1.! # Lae_Router(config)# Lae_Router(config)# Lae_Router(config)#interface f0/0 Lae_Router(config-if)#description Link to Lae_Switch Lae_Router(config-if)#ip address 192. 3. End with CNTL/Z.168.1 Lae_Router(config-dial-peer)#end Lae_Router# Lae_Router#copy running-config startup-config Lae_Router#exit Lae Switch Configuration Switch>enable Switch#configure terminal Enter configuration commands.1 port 2000 Lae_Router(config-telephony)#auto assign 4 to 6 Lae_Router(config-telephony)#auto assign 1 to 5 Lae_Router(config-telephony)#exit Lae_Router(config)# Lae_Router(config)# Lae_Router(config)#ephone-dn 3 Lae_Router(config-ephone-dn)#number 6403 Lae_Router(config-ephone-dn)#ephone-dn 4 Lae_Router(config-ephone-dn)#number 6404 Lae_Router(config-ephone-dn)#exit Lae_Router(config)# Lae_Router(config)# Lae_Router(config)#dial-peer voice 1 voip Lae_Router(config-dial-peer)#destination-pattern 64. Switch(config)#hostname Lae_Switch Lae_Switch(config)#no ip domain-lookup Lae_Switch(config)#enable password capstone Lae_Switch(config)#line console 0 Lae_Switch(config-line)#password project 15 .3.1 Lae_Router(dhcp-config)#option 150 ip 192.Capstone Project 2015 Lae_Router(dhcp-config)#network 192.1 Lae_Router(dhcp-config)#exit Lae_Router(config)# Lae_Router(config)# Lae_Router(config)#telephony-service Lae_Router(config-telephony)#max-ephones 5 Lae_Router(config-telephony)#max-dn 5 Lae_Router(config-telephony)#ip source-address 192. Lae_Router(config-dial-peer)#session target ipv4:192.0 255.168.0 Lae_Router(dhcp-config)#default-router 192.168.255..255.3.3. one per line.168.2.168. It shows that the ping is successful because there is 0% loss.Capstone Project 2015 Lae_Switch(config-line)#login Lae_Switch(config-line)#exit Lae_Switch(config)# Lae_Switch(config)# Lae_Switch(config)#line vty 0 4 Lae_Switch(config-line)#password project Lae_Switch(config-line)#login Lae_Switch(config-line)#exit Lae_Switch(config)# Lae_Switch(config)# Lae_Switch(config)#service password-encryption Lae_Switch(config)#banner motd # AUTHORIZED ACCESS ONLY.! # Lae_Switch(config)# Lae_Switch(config)# Lae_Switch(config)#interface range f0/1 .. Pinging from Madang PC 1 to Lae router.. 16 .24 Lae_Switch(config-if-range)#switch mode access Lae_Switch(config-if-range)#switch voice vlan 1 Lae_Switch(config-if-range)#end Lae_Switch# Lae_Switch#copy running-config startup-config Lae_Switch#exit Appendix 2 Figure 5. Capstone Project 2015 Figure 6. Pinging Madang PC2 from Lae PC 2. 17 . It shows that the ping is successful because there is 0% loss. Pinging from Lae PC 1 to Madang router. Figure 7. It shows that the ping is successful because there is 0% loss. Note from the Author This paper can be used as instructions for students to write a research paper. Madang Phone1 calling the Lae Phone2.Capstone Project 2015 Figure 8. The two phones are connected as shown above. 18 .