Network With CISCO PDF
Network With CISCO PDF
By
Mathematical Engineer
The whole is more than the sum of its parts.
Aristotle, Metaphysical
I. Computer Science & Engineering Research
There is a slight difference between Computer Science (CS) and Computer Engineering research.
The fundamental knowledge underlying computing research is from philosophy (see Figure 1).
Philosophical research is characterized by abstract academic exercise which are constrained by
reasoning and formalized in logic. At the next level is Mathematics. Mathematical research are
analytic in nature and they are constrained by theoretically provable propositions and axioms.
Computer science is at the next level of research and it derives its power of expression from
mathematics, particularly discrete mathematics.
Computer science research are constrained by what is theoretically computable.
Computer engineering research derives is power of problem solving from computer science and
its solution is constrained by technology and human needs. The technology on which computer
engineering research rests comes from electronic engineering. A key task in computer
engineering is design. This involves the use of knowledge from computer science to craft out a
solution that meets human needs.
Flow Control
The transport layer is also responsible for data flow control, which refers to how can
accept the receiving device transmissions date. Two common methods of used flow control are:
Buffering: When buffer flow control is used, the date is temporarily stored and waits for
the destination device to become available. buffering can cause a problem f the sending
device transmits data much faster can the receiving device than manage it.
Windowing: In a windowing environment, data is sent in groups and of segments
That require mends only one acknowledgment. The size of the window is defined when
the session between the two devices is established. As you can imagine, the need to have only
one acknowledgment for every, say, five can greatly reduce overhead segments.
The TCP/IP protocol suite is so named for two of its most important protocols:
Transmission Control Protocol (TCP) and Internet Protocol (IP). A less used name for it is the
Internet Protocol Suite, which is the phrase used in official Internet standards documents. In this
book, we use the more common, shorter term, TCP/IP, to refer to the entire protocol suite.
The main design goal of TCP/IP was to build an interconnection of networks, referred to
as an internetwork, or internet, that provided universal communication services over
heterogeneous physical networks. The clear benefit of such an internetwork is the enabling of
communication between hosts on different networks, perhaps separated by a large geographical
area.
The words internetwork and internet are simply a contraction of the phrase
interconnected network. However, when written with a capital “I”, the Internet refers to the
worldwide set of interconnected networks. Therefore, the Internet is an internet, but the reverse
does not apply. The Internet is sometimes called the connected Internet.
The Internet consists of the following groups of networks:
Backbones: Large networks that exist primarily to interconnect other networks. Also
known as network access points (NAPs) or Internet Exchange Points (IXPs). Currently,
the backbones consist of commercial entities.
Regional networks connecting, for example, universities and colleges.
Commercial networks providing access to the backbones to subscribers, and networks
owned by commercial organizations for internal use that also have connections to the
Internet.
Local networks, such as campus-wide university networks.
In most cases, networks are limited in size by the number of users that can belong to the
network, by the maximum geographical distance that the network can span, or by the
applicability of the network to certain environments. For example, an Ethernet network is
inherently limited in terms of geographical size. Therefore, the ability to interconnect a large
number of networks in some hierarchical and organized fashion enables the communication of
any two hosts belonging to this internetwork.
Like most networking software, TCP/IP is modeled in layers. This layered representation
leads to the term protocol stack, which refers to the stack of layers in the protocol suite. It can be
used for positioning (but not for functionally comparing) the TCP/IP protocol suite against
others, such as Systems Network Architecture (SNA) and the Open System Interconnection
(OSI) model. Functional comparisons cannot easily be extracted from this, because there are
basic differences in the layered models used by the different protocol suites.
By dividing the communication software into layers, the protocol stack allows for
division of labor, ease of implementation and code testing, and the ability to develop alternative
layer implementations. Layers communicate with those above and below via concise interfaces.
In this regard, a layer provides a service for the layer directly above it and makes use of services
provided by the layer directly below it. For example, the IP layer provides the ability to transfer
data from one host to another without any guarantee to reliable delivery or duplicate suppression.
Transport protocols such as TCP make use of this service to provide applications with reliable,
in-order, data stream delivery.
Figure 3. The TCP/IP Seven-Layer Model
IP Addressing
As with any other network-layer protocol, the IP addressing scheme is integral to the
process of routing IP datagram’s through an internetwork. Each IP address has specific
components and follows a basic format. These IP addresses can be subdivided and used to create
addresses for subnetworks.
Each host on a TCP/IP network is assigned a unique 32-bit logical address that is divided
into two main parts: the network number and the host number. The network number identifies a
network and must be assigned by the Internet Network Information Center (InterNIC) if the
network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of
network addresses from the InterNIC and can itself assign address space as necessary. The host
number identifies a host on a network and is assigned by the local network administrator.
IP Subnet Addressing
IP networks can be divided into smaller networks called subnetworks (or subnets).
Subnetting provides the network administrator with several benefits, including extra flexibility,
more efficient use of network addresses, and the capability to contain broadcast traffic (a
broadcast will not cross a router).
Subnets are under local administration. As such, the outside world sees an organization as
a single network and has no detailed knowledge of the organization’s internal structure.
MAC Address
MAC Address or Media Access Control Address is a unique identifier assigned to the
physical hardware of your network interface, i.e., your computer network card. Each network
card will have its own, unique MAC address. If you have a wired and wireless card, you will
have (2) MAC addresses for your machine. There can also be MAC addresses assigned to
software configured network devices as well.
IV. 1G, 2G, 3G, 4G - The Evolution of Wireless Generations
0G Wireless technology
0G refers to pre-cell phone mobile telephony technology, such as radio telephones that
some had in cars before the advent of cell phones. Mobile radio telephone systems preceded
modern cellular mobile telephony technology. Since they were the predecessors of the first
generation of cellular telephones, these systems are called 0G (zero generation) systems.
In 1984, Bell Labs developed modern commercial cellular technology, which employed
multiple, centrally controlled base stations (cell sites), each providing service to a small area (a
cell). The cell sites would be set up such that cells partially overlapped. In a cellular system, a
signal between a base station (cell site) and a terminal (phone) only need be strong enough to
reach between the two, so the same channel can be used simultaneously for separate
conversations in different cells.
As the system expanded and neared capacity, the ability to reduce transmission power
allowed new cells to be added, resulting in more, smaller cells and thus more capacity.
Some benefits of 2G were Digital signals require consume less battery power, so it helps
mobile batteries to last long. Digital coding improves the voice clarity and reduces noise in the
line. Digital signals are considered environment friendly. Digital encryption has provided
secrecy and safety to the data and voice calls. The use of 2G technology requires strong digital
signals to help mobile phones work properly.
“2.5G” using GPRS (General Packet Radio Service) technology is a cellular wireless
technology developed in between its predecessor, 2G, and its successor, 3G. GPRS could
provide data rates from 56 Kbit/s up to 115 Kbit/s. It can be used for services such as Wireless
Application Protocol (WAP) access, Multimedia Messaging Service (MMS), and for Internet
communication services such as email and World Wide Web access.
2.75 – EDGE is an abbreviation for Enhanced Data rates for GSM Evolution. EDGE
technology is an extended version of GSM. It allows the clear and fast transmission of data and
information up to 384kbit/s speed.
Bluetooth
The companies of computer science and telecommunications needed to develop an
opened, low cost interface to make easier the communication between devices without using
cables. This is the origin of the technology which key name is "Bluetooth". This is a fact
nowadays, but now another problem arises and is that there are a lot of standards and
technologies, incompatible between them. What we need now is a universal, valid device for the
connection of all kinds of peripheral, and that works in a transparent way for the user. This is
Bluetooth.
Bluetooth is a standard used in links of radio of short scope, destined to replace wired
connections between electronic devices like cellular telephones, Personal Digital Assistants
(PDA), computers, and many other devices. Bluetooth technology can be used at home, in the
office, in the car, etc. This technology allows to the users instantaneous connections of voice and
information between several devices in real time. The way of transmission used assures
protection against interferences and safety in the sending of information.
The standard Bluetooth operates in the band of 2,4 GHz. Though worldwide, this band is
available, the width of the band can differ in different countries. This is the frequency of band of
the scientific and medical industries 2.45 GHz (ISM*). The ranges of the bandwidth in The
United States and Europe are between 2.400 to 2.483,5 MHz and it covers part of France and
Spain. The ranges of the bandwidth in Japan are between 2.471 to 2.497 MHz. So the system can
be used worldwide due to that the transmitters of radio covers 2.400 and 2.500 MHz and it is
possible to select the appropriate frequency. This ISM* is opened for any system of radio and
must take care of the interferences of monitors for baby, the controls for doors of garages, the
wireless telephones and the microwave ovens (the source with higher interference).
Satellite communications
Satellites can provide global, ubiquitous and multipoint communications. Not
surprisingly, satellite technology has become a flexible and cost-effective solution for domestic
and international networks, irrespective of the user’s geographic location. Wire line and wireless
lack this ability to leap across continents and oceans, often linking some of the world’s most
remote spots.
Satellite technology can thus become a solution for some of the most complicated access
problems, connecting cities across a large landmass, where copper or fiber would be cost
prohibitive. Bringing broadband to the “last mile” of residences and businesses. Overcoming
regulatory issues that make alternative carriers dependent on incumbents.
Satellites also have a major role to play in designing, developing and expanding a
network. With a satellite and Earth Stations, you can create a network on a permanent or interim
basis much more rapidly than “laying cable.” An interim station will even let you test a market or
provide emergency service prior to a major infrastructure investment. You can also rapidly scale
and re-provision a satellite based network to meet increasing and changing needs.
The benefits of satellite communications have steadily expanded its usage. Today,
satellites’ diverse purposes encompass wide area network communication, cellular backhaul,
Internet trucking, television broadcasting and rural telephony. Satellites are also on the frontiers
of such advanced applications as telemedicine, distance learning, Voice over Internet Protocol
(VoIP) and video on demand (VOD).
Intelsat has created this Primer to provide an introduction to the technology used in
satellite networks. Our intention is help you understand, in general terms, why and how satellite
technology might meet your needs. For more information, we invite you to talk to our experts
and discuss your specific requirements. We hope this introductory material will be useful to you
in meeting the challenges ahead in your network.
Zibgbee Technology
ZigBee is the most popular industry wireless mesh networking standard for connecting
sensors, instrumentation and control systems. ZigBee, a specification for communication in a
wireless personal area network (WPAN), has been called the "Internet of things." Theoretically,
your ZigBee-enabled coffee maker can communicate with your ZigBee-enabled toaster. ZigBee
is an open, global, packet-based protocol designed to provide an easy-to-use architecture for
secure, reliable, low power wireless networks. ZigBee and IEEE 802.15.4 are low data rate
wireless networking standards that can eliminate the costly and damage prone wiring in
industrial control applications. Flow or process control equipment can be place anywhere and
still communicate with the rest of the system. It can also be moved, since the network doesn't
care about the physical location of a sensor, pump or valve.
The ZigBee RF4CE standard enhances the IEEE 802.15.4 standard by providing a simple
networking layer and standard application profiles that can be used to create interoperable multi-
vendor consumer electronic solutions. The benefits of this technology go far beyond, ZigBee
applications include:
What is 802.11?
The 802.11 standards are a group of evolving specifications defined by the Institute of Electrical
and Electronic Engineers (IEEE). Commonly referred to as Wi-Fi the 802.11 standards define a
through the air interface between a wireless client and a base station access point or between two
or more wireless clients. There are many other standards defined by the IEEE, such as the 802.3
Ethernet standard.
Why are standards important?
Standards are a set of specifications that all manufacturers must follow in order for their products
to be compatible. This is important to insure interoperability between devices in the market.
Standards may provide some optional requirements that individual manufacturers may or may
not implement in their products.
802.11b
In 1995, the Federal Communications Commission had allocated several bands of wireless
spectrum for use without a license. The FCC stipulated that the use of spread spectrum
technology would be required in any devices. In 1990, the IEEE began exploring a standard. In
1997 the 802.11 standard was ratified and is now obsolete. Then in July 1999 the 802.11b
standard was ratified. The 802.11 standard provides a maximum theoretical 11 Megabits per
second (Mbps) data rate in the 2.4 GHz Industrial, Scientific and Medical (ISM) band.
802.11g
In 2003, the IEEE ratified the 802.11g standard with a maximum theoretical data rate of 54
megabits per second (Mbps) in the 2.4 GHz ISM band. As signal strength weakens due to
increased distance, attenuation (signal loss) through obstacles or high noise in the frequency
band, the data rate automatically adjusts to lower rates (54/48/36/24/12/9/6 Mbps) to maintain
the connection. When both 802.11b and 802.11g clients are connected to an 802.11g router, the
802.11g clients will have a lower data rate. Many routers provide the option of allowing mixed
802.11b/g clients or they may be set to either 802.11b or 802.11g clients only.
To illustrate 54 Mbps, if you have DSL or cable modem service, the data rate offered typically
falls from 768 Kbps (less than 1 Mbps) to 6 Mbps. Thus 802.11g offers an attractive data rate for
the majority of users. The 802.11g standard is backwards compatible with the 802.11b standard.
Today 802.11g is still the most commonly deployed standard.
802.11a
Ratification of 802.11a took place in 1999. The 802.11a standard uses the 5 GHz spectrum and
has a maximum theoretical 54 Mbps data rate. Like in 802.11g, as signal strength weakens due to
increased distance, attenuation (signal loss) through obstacles or high noise in the frequency
band, the data rate automatically adjusts to lower rates (54/48/36/24/12/9/6 Mbps) to maintain
the connection. The 5 GHz spectrum has higher attenuation (more signal loss) than lower
frequencies, such as 2.4 GHz used in 802.11b/g standards. Penetrating walls provides poorer
performance than with 2.4 GHz. Products with 802.11a are typically found in larger corporate
networks or with wireless Internet service providers in outdoor backbone networks.
802.11n
In January, 2004 the IEEE 802.11 task group initiated work. There have been numerous draft
specifications, delays and lack of agreement among committee members. Yes, even in the
process of standards development, politics are involved. The Proposed amendment has now been
pushed back to early 2010. It should be noted it has been delayed many times already. Thus
802.11n is only in draft status. Therefore, it is possible that changes could be made to the
specifications prior to final ratification.
The goal of 802.11n is to significantly increase the data throughput rate. While there are a
number of technical changes, one important change is the addition of multiple-input
multiple-output (MIMO) and spatial multiplexing. Multiple antennas are used in MIMO, which
use multiple radios and thus more electrical power.
802.11n will operate on both 2.4 GHz (802.11b/b) and 5 GHz (802.11a) bands. This will require
significant site planning when installing 802.11n devices. The 802.11n specifications provide
both 20 MHz and 40 MHz channel options versus 20 MHz channels in 802.11a and 802.11b/g
standards. By bonding two adjacent 20 MHz channels, 802.11n can provide double the data rate
in utilization of 40 MHz channels. However, 40 MHz in the 2.4 GHz band will result in
interference and is not recommended nor likely which inhibits data throughput in the 2.4 GHz
band. It is recommended to use 20 MHz channels in the 2.4 GHz spectrum like 802.11b/g
utilizes. For best results of 802.11n, the 5 GHz spectrum will be the best option. Deployment of
802.11n will take some planning effort in frequency and channel selection. Some 5 GHz
channels must have dynamic frequency selection (DFS) technology implemented in order to
utilize those particular channels.
Another consideration of 802.11n is the significantly increased electrical power demand in
comparison to the current 802.11b/g or 802.11a products. This is primarily due to multiple
transmitters.
The Wi-Fi Alliance is testing and certifying compatibility of 802.11n radio draft 2.0
specifications. There are several realities to consider. They are only testing against some basic
criteria and interoperability points. Also the number of devices being tested against each other is
low. This certification does not provide any protection against changes to the 802.11n standard
prior to ratification.
1. VTP Server:
VTP servers advertise the VTP VLAN information to other switches in the
same VTP domain.
The server is where VLANs can be created, deleted, or renamed for the
domain
2. VTP Client:
The Multiple Spanning Tree Protocol (MSTP) is an STP variant that allows multiple and
independent spanning trees to be created over the same physical network. The parameters for
each spanning tree can be configured separately, so as to cause a different network devices to be
selected as the root bridge or different paths to be selected to form the loop-free topology.
Consequently, a given physical interface can be blocked for some of the spanning trees and
unblocked for others.
Traffic on a network is made up of flows, which are placed on the wire by various functions or
endpoints. Traffic may consist of applications such as Service Advertising Protocol (SAP),
CAD/CAM, e-mail, voice, video, server replication, collaboration applications, factory control
applications, branch applications, and control and systems management traffic.
These performance measures can vary greatly and have various effects. If you apply a service
level against these performance measures, it can be broadly positioned into four levels that drive
the strategy:
Provisioning—The first step is ensuring that the correct transport is selected. Appropriate
allocation of bandwidth ensures the proper start point for network design. Understanding
application characteristics is key—what they will use in terms of network bandwidth and
their delay, jitter, latency, and loss needs.
Best-effort service—The majority of application data flows fit this service level. Best-
effort service provides basic connectivity with no guarantee for packet delivery and
handling.
Differentiated service—Traffic at this service level can be grouped into classes based on
their individual requirements. Each class is then treated according to its configured QoS
mechanism.
Guaranteed service—Guaranteed service requires absolute allocation of specific
resources to ensure that the traffic profiled to receive this service has its specific
requirements met.
After the network’s QoS requirements have been defined, an appropriate service model must be
selected. A service model is a general approach or a design philosophy for handling the
competing streams of traffic within a network. You can choose from four service models:
Provisioning
Best-effort
Differentiated Services (DiffServ)
Guaranteed Services or Integrated Services (IntServ)
Provisioning is quite straightforward. It is about ensuring that there is sufficient base capacity to
transport current applications, with forward consideration and thinking about future growth
needs. This needs to be applied across the LANs, WANs, and MANs that will support the
enterprise. Without proper consideration to provisioning appropriate bandwidth, QoS is a wasted
exercise.
These benefits are particularly useful if your network is congested and traffic pools in
particular areas. However, if your network is not congested or if your traffic patterns do not
create pools of local traffic, then switches may cause your network performance to deteriorate.
This performance degradation occurs because switches examine the information inside each
signal on your network (to determine the addresses of the sender and receiver) and therefore
process network information more slowly than hubs (which do not examine the signal contents).
Most switches operate by examining incoming or outgoing signals for information at OSI level
2, the data link level.
XI. Hubs
The hub is a small box that gathers the signals from each individual device, optionally
amplifies each signal, and then sends the signal out to all other connected devices. Amplification
helps to ensure that devices on the network receive reliable information. You can think of an
Ethernet hub like the hub of a wheel, at the center of the spokes that connect each individual
computer or printer. Hubs are also called concentrators or repeaters.
A hub connects individual devices on an Ethernet network so that they can communicate
with one another. The hub operates by gathering the signals from individual network devices,
optionally amplifying the signals, and then sending them onto all other connected devices. You
should use a hub or a switch on your Ethernet network if the network includes more than two
clients, servers, or peripherals.
While you can connect dozens of clients, peripherals, and servers via hubs, your network
performance may degrade if too many devices try to communicate within one area of the
network. You can improve performance by adding switches, bridges, or routers to the network.
Each switch port, bridge port, or router port regulates traffic so that devices on the port are
protected from the interfering signals of devices on other ports. Most hubs operate by examining
incoming or outgoing signals for information at OSI level 1, the physical level.
XII. Routers
Routers connect two or more networks. Routers can filter traffic so that only authorized
personnel can enter restricted areas. They can permit or deny network communications with a
particular Web site. They can recommend the best route for information to travel. As network
traffic changes during the day, routers can redirect information to take less congested routes. If
your school is connected to the Internet, then you will most likely use a router to make that
connection. Routers ensure that your local area network traffic remains local, while passing onto
the Internet all your electronic mail, Web surfing connections, and other requests for Internet
resources. Routers are generally expensive to purchase and difficult to configure and maintain.
Be sure that your staff have the resources necessary to manage them well.
Routers quickly become critical components of your network. If they fail, your network
services will be significantly impaired. As part of your network plan, you should consider how
you might deal with the failure of key routers on your network. Many sites include redundant
connections- additional routers and network cable connections-configured to take over if one
router or connection fails. Most routers operate by examining incoming or outgoing signals for
information at OSI level 3, the network addressing level.
As first step in Cisco Packet Tracer and implementing application in paragraph 1 , make
her modeling based on the model to which the request aksesues for presents to us . Having places
on a regular basis and based on appropriate steps , Figure 8 provides a snapshot of the whole
scheme and built their denomination .
Figure 8. The initial scheme
Observed very clear links between the PC and switch-mails , as well as connection with
discontinued lines (lines of discontinued ) which represent long electric cords of the liaison
routers . In this scheme we will continue to do all models for the requirements following that we
want.
2. Configure the trunks in all interfaces between all switches. Configure the two distribution
switches as VTP servers and two access switches as VTP clients. Create a VTP domain
different from the default and protect it with a password of your choice. Create 4 VLANs
in switch D1 with id 10, 20, 30 and 40. Verify that the VLANs will be distributed through
VTP in other 3 switches automatically. Write down the configuration and provide the
screenshots to show this verification. After completing this make sure that:
2.1 D1 should be the root bridge for vlan 10 and 30, D2 should be the backup. D2 should
be the root bridge for vlan 20 and 40, D1 should be the backup.
2.2 The trunk between two distributions switches should be configured first as layer2 port
channel using LACP. Show the configuration for this port channel configuration. After
doing this, configure it as a routed port. Change the port channel so it’s a layer3 link
instead of layer2. You can use the 192.168.12.0 / 30 subnet. D1 can use .1 and D2 can use
.2
2.3 For both access switches A1 and A2, assign ports into the VLANs as following:
Configure A1 on interface F0/24 to allow only 2 MAC addresses. The port should not be
error-disabled but you should see the counter increase when mac address number 3 shows
up. Mac addresses should be learned dynamically.
The requirements set out in paragraph 2 , seek to build 4 VLANs in the switch . This
thing is presented in Figure 9 . The introduction to the 4 villas modeled on the basis of the
relevant name such as 10 , 20 , 30 , 40 . Also points of require that the gates to the respective
lines by Vlan . This thing is presented in Figure 9 and Figure 10 .
Another requirement is to set the IP for the switch , but this request would submit the
following . Thus we have reached the step of setting the lines based on initial Vlant for our
scheme given as in Figure 8 .
3. Configure IP addresses for the four PCs. PC1 should be in VLAN 10 with IP address
172.16.10.51/24, PC2 should be in VLAN 20 with IP address 172.16.20.52/24, PC3 should
be in VLAN 30 with IP address 172.16.10.53/24, PC4 should be in VLAN 20 with IP address
172.16.20.54/24. The gateway should be the Layer 3 switches D1 or D2 where HSRP will
define which one will be the active gateway. The gateway for each VLAN should be the first
IP address for the IP segment. The STP and HSRP should be configured in such a way that
layer 2 traffic for VLAN 10 and 30 should be directed to D1 and D1 should be active HSRP
gateway for these two IP segments. The same, VLAN 20 and 40 should be directed towards
D2 and D2 should be active HSRP gateway for these two IP segments. Show the
configuration and make sure you will be able to ping from each PC its gateway. Verify the
STP and HSRP configuration is done correctly by activating the auto-capturing by sending
ping packets from PCs toward its gateway. Show the verification you’ll do by using
screenshots.
Let's take the configuration of the IP address to 4 our PC . This configuration will appear
on the images of as Figures 11 , 12 , 13 , 14 . To set the IP address on each PC should be the PC
by click on the icon of our scheme and step in . Desktop icon and go to IP configuration by
clicking the icon . So show us presentations to set the IP address and subnet masks.
A question that arises is to what subnet masks will operate our PC ? The following table
listing the value of the subnet masks to 24 bits selected .
After we set IP address and subnet mask for each PC , supported by 2 points above will
gain a glimpse of the scheme as in Figure 15 . This figure explains all connections and settings of
the PC by the VLAN lines .
Figure 15. Benefit schemed after setting the IP address on PC and VLAN line.
Figure 15. Benefit schemed after setting the IP address on PC and VLAN line.
4. Router R1 and R2 are the routers which the company uses to access the Internet by
connecting to two separate ISPs. The link between R1 and D1 should use the IP segment
192.168.11.0/29. Configure the D1 f0/1 interface used to connect to R1 as routed interface.
The link between R2 and D2 should use the IP segment 192.168.22.0/29. Configure the D2
f0/1 interface used to connect to R1 as routed interface. To simulate the Internet access
configure one loopback interface in each router with IP address 1.1.1.2/30 for router R1 and
2.2.2.2/30 for router R2. Configure the default routes in each router towards 1.1.1.1 and
2.2.2.2 in each router respectively and make sure that these routes will be distributed using
RIP in the two layer 3 switches. Show the RIP configuration for R1, R2, D1 and D2. Show
the configuration for each step and show the verifying process using screenshots.
We have the latest application as the setting of IP and IP segment for the purpose Routers
connection lines under router. Figure 16, 17 have a presentation of IP for each route and the
communication line connecting the following lines.
Also we do and simulation which requires us our request submitted in Figure 18 . So bear
the Understanding a line communication using and conduction through the message router . A
very important requirement presented above in point was the configuration between 2 switch-
mails , link HSRP .
Another requirement was the definition of switch-s as 2 types : type a client and server
type . Figure 19 is given for the appearance of type 2 server switches and Figure 20 give the
appearance of type customer .
In this project you will configure IPSec VPN to secure path of the data passing over the Internet
by using encryption of the IPsec VPN.
In the diagram below is shown the connectivity of the Tirana (Head Quarter) network of the
Company XYZ with Durres branch using router Br01 and Elbasan branch using router Br02. The
Headquarters Network has two local LAN networks 192.168.1.0/24 and 192.168.2.0/24. The
local LAN network of Durres branch is 192.168.3.0/24 and Elbasan local LAN network is
192.168.4.0/24. Your task is to create two IPSec VPN tunnels over Internet, one tunnel for the
traffic between Br01 and HQ, and the second one for the traffic between Br02 and HQ.
In order to simulate the Internet cloud the router ISP will be used which is equipped with 3 serial
interfaces. Each router of the company will use the serial interface to connect to Internet (ISP
router).
The traffic between headquarter networks and each branch network should be protected with
IPSec encryption. The HeadQuarter router HQ is connected in Internet with /30 subnet
123.123.123.0/30 where 123.123.123.2 is the IP address of the router HQ. The branch Br01
router is connected in the Internet with /30 subnet 123.123.123.4/30 where 123.123.123.6 is the
IP address of the router Br01. The Elbasan branch Br02 router is connected in the Internet with
/30 subnet 123.123.123.8/30 where 123.123.123.10 is the IP address of the router Br01.
1. Build the network in GNS3 emulator (www.gns3.com) using emulated Cisco router. For
switches use the one provided from GNS3 software. As a PC use VPCS of the GNS3.
Configure the IP addresses and default routes for the four routers in GNS3 and assure that
the nodes for each link are able to communicate with each other. Note here that private
networks are not reachable from ISP. Show the required commands and their output that you
will use to verify the completion of the task.
In project 2 have done a conversion to the scheme required in the emulator using the
emulator GNS3 Cisco router . using independent components and build a scheme for switches
and router undefined regarding the content of the number of gates , we get to converting our
request depending on the communication lines . Thus in Figure 21 we have a generalized
representation of the scheme required by our project .
2. Configure NAT-ing for both network (HQ) subnets and for branch Br01 and Br02
network in order for them to have access in Internet. Use ACL for selecting which
network will be NAT-ed having this way access to Internet. Show the required commands
and their output that you will use to verify the completion of the task.
Let's take regarding IP configuration for routers as well as for our PC. Based on the data
presented by the request in relation to IP, we show in Figure 22, 23, 24 all the IP settings of the
router and PC connections.
Figure 22: Router Bro1
Figure 24:Router HQ
Figures 25 , 26 have shown and IP settings for each PC . Having done and links each PC
with the appropriate router to benefit a communication (message escort ) .
Diffie-hellman group 2
Encryption 3DES
Hash md5
b. Phase 2:
ESP Encryption AES 256
Make sure the traffic is encrypted between HQ and Br01 and HQ and Br02 router. Show the
output of the commands you will use to test and show the encrypted traffic.
It should be noted we do and the links between routers but we know that the work in the
network cloud . So make configuration for each router using cloud network connections done to
benefit a communication line of the routers . Figure 27 , 28 appear coding expressing the
connection between routers . So we managed to make a full Configure a cloud connection .
https://www.cisco.com/web/learning/netacad/course_catalog/docs/Cisco_PacketTracer_AAG.pd
f
http://networklab-ju.ucoz.com/Experiments/VTP.pdf
Dix, John. (2001, April 9). VPN is integrated in your future? Network World. Retrieved October
1, 2002, by http://www.itworld.com/Net/2553/NWW010409edit/