Professional Documents
Culture Documents
Internship
report
2
CONTENTS
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. Introduction ………………………………………………………………………………….. 3
3
Introduction
This report is a brief description of what we have done in the summer. I divide the
report into 6 sections, the first one “what is internship” is about the importance of
internship training and how we can get benefit from it. The second section in name
of “a brief history of the company” is a quick survey about the very beginning and
development of Asiacell Company. What we have covered in the training course is
explained in detail in the “covered topics and subjects”, this section covers the
technologies that are used in the campus network of the company and tries to
answer what is the benefit of them and why they are used. In the next sections, I
tried to explain the network architecture of the company, and then I will
demonstrate the topology of the network and how devices are connected in this
network. The two last sections are somehow close to each other, but I will try to
separate them.
There are a lot of departments in the asiacell company, but my focus is only on the
one which I completed my internship in. I was in technology operation unit: IP
network department; I will tie to this departments and concentrate in it.
I used several software in order to clarify the purpose of the report, I will not explain
how to use these softwares and how they work, I will just use them as a figure. I used
the packet tracer simulator, GNS3 emulator, and Microsoft Visio program.
I will try to describe some technologies briefly, and then apply them in section 5 of
the report. Even though there are a lot of things and technologies to be covered, but
I will just tie to technologies which I need in order to sketch section 5.
In the end, I would like to thank my mentor, kak Assoss for giving us his time, sorry if
we distracted you from your job. In addition, thanks to my supervisor, Daban Osman,
for his collaboration. The internship would have been impossible without the aid and
support of the CDC, thanks to all.
4
What is internship
Internships offer students a hands-on opportunity to work in their desired field. They
learn how their course of study applies to the real world and build a valuable
experience that makes them stronger candidates for jobs after graduation.
Internships can help you gain valuable work experience, fulfill college requirements
and give you material to add to your resume. They can introduce you to many
aspects of full-time employment while allowing you to explore your interests and
form your personal career goals. An intern works at a company for a fixed period of
time. The daily tasks of an intern can vary widely, even within the same industry. It is
largely dependent on the company itself. In some internships, you may focus more
on administrative tasks. As an intern, you get a chance to work side by side with
accomplished industry professionals and get a pretty good idea of what an entry-
level role might entail. You’ll not only gain real work experience, but also meet and
learn from the pros. An efficient internship program can also provide a company with
a relatively inexpensive source of labor for many basic tasks. While companies
shouldn't expect interns to handle a lot of responsibility, they can use them as
valuable support and assistance to full-time employees.
5
learned its theoretical fundamental , and what is left is hands-on practice. this
internship offers me to practice what I have learnt during those days of college.
6
Covered topics and subjects
In order to manage or determine a problem and fix it, we need to have a solid
understanding on the fundamentals of networking. Firstly, we have to be familiar
with some of networking devices, what are they and how they operates, how these
devices are connected together. Then, I will cover the technologies dedicated to each
layer of networking.
7
Computer network fundamentals
Today, the world of computer networking uses one networking model: TCP/IP. The
TCP/IP model both defines and references a large collection of protocols that allow
computers to communicate.
In this figure, we can see several devices that may need some definition to
understand them. The two PC’s on the right hand is an indication of end-host, it may
be a mobile, a printer, or a PC as I used in this figure. The second important node of
networking is switch. Switch is a layer 2 device that connects end-hosts together and
will create a LAN(Local Area Network), as we can see, switch provide connectivity
between end-hosts. The third device is Router. Routers are layer 3 devices; they
provide connectivity between different LAN’s. From this definition, we can say by
connecting different LAN’s, Routers are used in WAN(Wide Area Network).
There are other details in this figure; I will just point out some of them:
8
3- Connectivity device: Any device that connects cable segments, connects two
or more small networks into a larger one, or divides a large network into small
ones.
Speed: Also called data rate, speed is how fast data is transmitted over the
network.
Cost: The general cost of network components, installation, and maintenance.
Security: Defines how secure the network and network data are.
Availability: : The measure of the likelihood that the network will be available
for use when required. Calculated using the following formula: [(525,600 –
Minutes downtime) / 525,600] * 100. 525,600 is the number of minutes in a
year.
Reliability: The dependability of the devices that make up the network (for
example, switches, routers, PCs, and so on).
TCP/IP model
The TCP/IP model is a part of the Internet Protocol Suite. This model acts as a
communication protocol for computer networks and connects hosts on the Internet.
It is a concise version of the OSI Model and comprises four layers in its structure. The
TCP/IP suite of protocols communicates across any set of interconnected networks.
These protocols, initially developed by the Defense Advanced Research Projects
Agency (DARPA), are well suited for communication across both LANs and WANs. The
protocol suite defines the following four layers:
Network access: Consists of the physical and data link OSI model layers.
Internet layer: Provides routing of data from the source to a destination and
defines addressing schemes.
Transport layer: The core of the TCP/IP suite, providing communication
services directly to the application layer.
9
Application layer: Provides specifications of applications such as e-mail, file
transfer, and network management.
The TCP/IP protocol stack closely follows the OSI reference model. When I refer to
a layer, for example layer 2, I mean this layer according to OSI reference model.
Here is a quick comparison between these two models:
1
TCP/IP compared to OSI model
I will use the OSI model as the reference model, if I pointed to layer 3, the layer 3 in
the OSI model is network layer, and layer 6 is presentation layer.
1. Layer 1 devices:
Layer 1 devices operate at the physical layer and are only involved in
transmitting signals (moving bits). Layer 1 devices are repeaters, HUBs and etc.
HUB’s are layer 1 devices, they do not know anything about other layer
1
- Wendell Odom - CCNA 200-301 Official Cert Guide, Volume 1 Premium Edition eBook and Practice Test (2019).
P29
10
technologies, and they just forward messages. A group of devices connected to
the same physical medium is known as a collision domain. f two devices
transmit a signal at the same time, a collision results. Ethernet devices use a
method called carrier sense multiple access collision detect (CSMA/CD) when
sending bits. When a collision occurs, both stations resend the signal after a
random period.
2. Layer 2 devices:
Layer 2 devices operate at the data link layer and, in most cases, isolate
endpoints, avoiding data collisions. Network interface cards (NICs) are
considered Layer 2 devices because they provide MAC addresses used by
other Layer 2 devices. Bridges keep local traffic from going to other LAN
11
segments but can filter traffic intended for other LAN segments using the
MAC address of the destination endpoint. Bridges keep track of
destinations in MAC address tables. Switches (or LAN switches) are
similar to bridges and have the same functionality as bridges but are
typically much faster than bridges. This is because the switching functions
are performed in hardware, whereas bridges use software. Switches
proved more ports than bridges and also support virtual LANs.
2
bridge
3. Layer 3 devices:
Layer 3 devices operate at the network layer of the OSI model, which uses a
different addressing scheme than Layer 2 devices. The two most common
Layer 3 devices are routers and multilayer switches. IP addresses are one type
of Layer 3 address. Internet Protocol (IP) focuses on the job of routing data, in
the form of IP packets, from the source host to the destination host. IP does
not concern itself with the physical transmission of data, instead relying on the
lower TCP/IP layers to do the physical transmission of the data. Routers and
end-user computers (called hosts in a TCP/IP network) work together to
perform IP routing. The host operating system (OS) has TCP/IP software,
including the software that implements the network layer. Routers pass data
packets between networks based on their IP.
2
- CCNA Quick Reference Sheets by Eric Rivard and Jim Doherty.
12
routers used for routing
Media types
Network media is the actual path over which an electrical signal travels as it
moves from one component to another. There are three general classes of media
types: coaxial cable, twisted pair and fiber optic cable. Let’s discuss them a little
bit:
13
are unshielded twisted-pair (UTP) and shielded twisted-pair (STP), defined
as follows:
I. UTP cable: Usually connected to equipment with an RJ-45
connector. it is prone to electrical noise and interference because
of the lack of shielding. Seven categories of UTP cable exist: CAT 1,
CAT 2, CAT 3, CAT 4, CAT 5, CAT 5e, and CAT 6.
II. STP cable: Provides much better protection against electrical noise
and interference than UTP but is thicker and more expensive. The
cable speed and maximum length are the same as for UTP (speed
is 10 to 100 Mbps, and maximum length is 100 m).
An RJ-45 connector is use with UTP cabling. The two types of connections are
straight-through and crossover. Straight-through cables are typically used to
connect different devices. Crossover cables are typically used to connect similar
devices, such as switch-to-switch connections
Fiber-optic cable: Allows the transmission of light signals. This offers a large
jump in bandwidth over other types of cables (1 Gbps or greater). The two types
of fiber-optic cables are multimode and single-mode, defined as follows:
I. Single-mode: This type of fiber has only one mode in which light
can propagate. Single-mode fiber is typically used for long-distance
and high-bandwidth applications.
II. Multimode: With this type of fiber, several modes (or
wavelengths) propagate down the fiber, each taking a slightly
different path. Multimode fiber is used primarily in systems with
short transmission distances (less than 2 km).
14
3
Components of a Fiber-Optic Cable
Ethernet involves layer 2 and layer 1 in the OSI model, since I have covered layer
1 Ethernet standards like UTP cables, this section will be about layer 2.
Ethernet frames
3
- Wendell Odom - CCNA 200-301 Official Cert Guide, Volume 1 Premium Edition eBook and Practice Test (2019).
P4.47
15
We need this information about the Ethernet header in order to comprehend
LAN switching. SRC, DST and FCS are most important fields for the purpose of
this report.
LAN switching
A switch uses its MAC address table when forwarding frames to devices. When a
switch is first powered on, it has an empty MAC address table. With an empty MAC
address table, the switch must learn the MAC addresses of attached devices. This
learning process is outlined below:
16
Step 2. Station A with the MAC address sends a frame to station C. When the
switch receives this frame, it does the following:
I. Because the MAC table is empty, the switch must flood the frame to all
other ports (except E0, the frame origin).
II. The switch notes the source address of the originating device and
associates it with port E0 in its MAC address table entry.
Step 3. The switch continues to learn addresses in this manner, continually
updating the table. As the MAC table becomes more complete, the switching
becomes more efficient, because frames are forwarded to specific ports rather
than being flooded out all ports.
4
Frame Forwarding by a Switch
MAC address learning: Switches learn the MAC addresses of devices attached
to each of their ports. These addresses are stored in a MAC database.
Forwarding and filtering: Switches determine which port a frame must be sent
out to reach its destination. If the address is known, the frame is sent only on
4
- CCNA Quick Reference Sheets by Eric Rivard and Jim Doherty. P.50
17
that port. If it’s unknown, the frame is flooded to all ports except the one from
which it originated.
Flooding: Switches flood all unknown frames, broadcasts, and multicasts to all
ports on the switch except the one from which it originated.
IP addressing
Both IPv4 and IPv6 define the same kinds of network layer functions, but with
different details. I will just discuss IPV4 here because the asiacell enterprise network
only uses IPV4. Internet Protocol (IP) focuses on the job of routing data, in the form
of IP packets. Routers and end-user computers (called hosts in a TCP/IP network)
work together to perform IP routing. Those routers make choices of where to send
the IP packet next. Together, the hosts and routers deliver the IP packet to the
correct destination, as shown below.
18
Routing Logic
The IP packet, created by PC1, goes from the top of the figure all the way to PC2 at
the bottom of the figure. PC1 analyzes the destination address and realizes that PC2’s
address (150.150.4.10) is not on the same LAN as PC1. So PC1’s logic tells it to send
the packet to a device whose job it is to know where to route data: a nearby router,
on the same LAN, called PC1’s default router. All routers use the same general
process to route the packet. Each router keeps an IP routing table. This table lists IP
address groupings, called IP networks and IP subnets. When a router receives a
packet, it compares the packet’s destination IP address to the entries in the routing
table and makes a match. This matching entry also lists directions that tell the router
where to forward the packet next. the network layer thinks about the bigger view of
the goal, like “Send this packet to the specified next router or host…,” while the data-
19
link layer thinks about the specifics, like “Encapsulate the packet in a data-link frame
and transmit it.”
Now its time to correlate all information we got about Ethernet frames and IP
packets, lets understand how it works. The following list summarizes the major steps
in a router’s internal network layer routing for each packet beginning with the a
frame arriving in a router interface:
Step 1: Use the data-link Frame Check Sequence (FCS) field to ensure that the
frame had no errors; if errors occurred, discard the frame.
Step 2: Assuming that the frame was not discarded at Step 1, discard the old
data-link header and trailer, leaving the IP packet.
Step 3: Compare the IP packet’s destination IP address to the routing table,
and find the route that best matches the destination address. This route
identifies the outgoing interface of the router and possibly the next-hop router
IP address.
Step 4: Encapsulate the IP packet inside a new data-link header and trailer,
appropriate for the outgoing interface, and forward the frame.
IP address
IP defines specific rules about which IP address should be in the same IP network or
IP subnet. IP addressing was designed to allow hosts on one network to
communicate with a host on a different network regardless of the type of LANs the
hosts are participating in. An IP address consists of 32 bits of information. These bits
are divided into four sections, referred to as octets or bytes.
IP addresses are displayed as a set of four digits- the default address may be
192.158.1.38. Each number on the set may range from 0 to 255. Therefore, the total
IP address range ranges from 0.0.0.0 to 255.255.255.255. IP address is basically
divided into two parts:
20
Network ID(network portion): It is the part of the left-hand IP address that
identifies the specific network where the device is located. In the normal
home network, where the device has an IP address 192.168.1.32, the
192.168.1 part of the address will be the network ID.
HOST ID(host portion): The host ID is part of the IP address that was not
taken by the network ID. Identifies a specific device (in the TCP / IP world,
we call devices “host”) in that network. Continuing with our example of the
IP address 192.168.1.32, the host ID will be 32- the unique host ID on the
192.168.1.0 network.
192 168 32 1
Dotted-decimal, as in 172.16.30.56
Binary, as in 10101100.00010000.00011110.00111000
21
5
Summary of the three classes of networks
5
- Todd Lammle - Understanding Cisco Networking Technologies, Volume 1_ Exam 200-301 (CCNA Certification).
Volume 1-Sybex (2019). P. 95
22
If the PC0 from network1, wants to send a message to laptop1 in network2, the
message will go through several steps. I will briefly demonstrate:
From here, one question arise: if each octet can include addresses from 0 to 255,
isn’t the above figure is wasting of IP address? For example, network1 only have
uses three addresses, two of them are used to end-hosts, and one address is used
as the default gateway. What about the other 252 addresses? They are absolutely
wasted!! There must be a way to prevent IP addressing, this method is called
subnetting.
Subnetting
An IP subnet is simply a subset of a Class A, B, or C network. In fact, the word subnet
is shortened version of the phrase subdivided network. For the subnet addressing
scheme to work, every machine on the network must know which part of the host
address will be used as the subnet address. This condition is met by assigning a
subnet mask to each machine. A subnet mask is a 32-bit value that allows the device
that’s receiving IP packets to distinguish the network ID portion of the IP address
23
from the host ID portion of the IP address. This 32-bit subnet mask is composed of 1s
and 0s, where the 1s represent the positions that refer to the network subnet
addresses. A very large company might receive class A or class B network, while a
small company might receive a class C network, this lead to many IP address
wasted. In order these problems, the IETF introduced CIDR in 1993 to replace the
classfull addressing system. With CIDR, the requirements of:
Class A = /8
Were removed.
Class B = /16
Class C = /24
This allowed larger networks to split into smaller networks, allowing greater
efficiency. These smaller networks are called “subnetworks” or “subnets”. I will
create a table to clarify how CIDR works. For this example, I considered a class C
network:
/25 255.255.255.128
/26 255.255.255..192
/27 255.255.255.224
/28 255.255.255.240
/29 255.255.255.248
/30 255.255.255.252
/31 255.255.255.252
/32 255.255.255.255
24
The IP address must be assigned according to some basic rules—and for good
reasons. To make routing work efficiently, IP addressing rules group addresses into
groups called subnets. The rules are as follows:
In the below figure, hosts A and B in one subnet and host C in another. In particular,
note that any routers do not separate hosts A and B from each other. However, host
C, separated from A and B by at least one router, must be in a different subnet.
because the routers’ main job is to forward packets from one subnet to another,
routers typically connect to multiple subnets. For example, in this case, Router R1
connects to one LAN subnet on the left and one WAN subnet on the right. To do so,
R1 will be configured with two different IP addresses, one per interface. These
addresses will be in different subnets because the interfaces connect the router to
different subnets.
We won’t deep dive into the process of subnetting and how it works, just remind
that there are two types of subnetting:
25
Another crucial point t remember, is that a router separates each subnet, and in
order to communicate between these separate subnets, we have to route between
them. As a result, we can say that subnetting is a layer 3 technology and switches
don’t have anything with subnetting. Also, switches cannot communicate between
different subnets.
VLAN
■ To reduce security risks by reducing the number of hosts that receive copies of
frames that the switches flood (broadcasts, multicasts, and unknown unicasts).
■ To improve security for hosts through the application of different security policies
per VLAN.
■ To reduce the workload for the Spanning Tree Protocol (STP) by limiting a VLAN to
a single access switch.
A LAN is a single broadcast domain, including all devices in this broadcast domain.
Broadcast domain is a group of devices, which will receive a broadcast frame. Even If
we separate a network into smaller subnets(on layer 3), they are sharing the same
broadcast domain(layer 2). In order to fix this problem, we must separate them into
different VLANs. So we can say: VLANs Logically separate end hosts at layer 2.
26
Now, I will separate them logically, into different broadcast domain, by using VLAN.
27
VLAN tagging
To support VLANs, a special “tag” needs to be applied to packets so that network
devices can know how to forward those packets correctly. TRUNK Ports are used
to carry traffic from multiple VLANs over a single interface. Switches will tag all
frames that they send over a trunk link, this allow the receiving switch to know
which VLAN the frame belongs to.
802.1Q has a feature called native VLAN, which is VLAN1 by default on all trunk
ports. The switch doesn’t add an 8021.Q tag to the frames in the native VLAN.
Inter-VLAN Routing
Inter-VLAN routing can be defined as a way to forward traffic between different VLAN by
implementing a router in the network. As we learnt previously, VLANs logically segment
the switch into different subnets, when a router is connected to the switch, an
administrator can configure the router to forward the traffic between the various VLANs
configured on the switch. There are two ways in which inter-VLAN routing can be
accomplished.
28
Traditional inter-VLAN routing: In this type of inter-VLAN routing, a router is
usually connected to the switch using multiple interfaces. One for each VLAN. The
interfaces on the router are configured as the default gateways for the VLANs
configured on the switch. For example, if we have three VLAN(10 , 20 , 30), and
we want to connect to a router, normally we will use three physical ports on the
router. However, this is not and efficient way to do so, because routers do not
have much interface.
29
ROAS(Router on a stick): by using ROAS, we can divide a single physical interface,
into several sub-interface, this allows us to perform inter-vlan routing with only
one interface.
Types of Routing
30
reconfigure static routes when the network changes. It uses low
bandwidth as compared to the dynamic maps. It can be used in those
areas where the network traffic is predictable & designed. It can’t be used
in the vast and continuously changing network because they can’t react to
the network change. It is applicable for small networks; thus, it is easy to
configure. The configuration of the system depends on the size of the net.
The small networks are accessible to, but as the web grows, applying
changes to all the routes can be difficult.
31
send this packet to the destination network; a Static route will be configured
manually to the destination network.
32
Now configuring static routes for router R3:
R3(config)#ip route 192.168.10.0 255.255.255.0 172.16.10.2
R3(config)#ip route 192.168.20.0 255.255.255.0 172.16.10.6
Here, provided the route for 192.168.10.0 network where 192.168.10.0 is its
network I’d and 172.16.10.2 and 172.16.10.6 are the next-hop address.
Now, configuring for R2:
R2(config)#ip route 192.168.20.0 255.255.255.0 172.16.10.1
R2(config)#ip route 10.10.10.0 255.255.255.0 172.16.10.1
R2(config)#ip route 172.16.10.0 255.255.255.0 172.16.10.1
Similarly for R1:
R1(config)#ip route 192.168.10.0 255.255.255.0 172.16.10.5
R1(config)#ip route 10.10.10.0 255.255.255.0 172.16.10.5
R1(config)#ip route 172.16.10.0 255.255.255.0 172.16.10.5
33
types of dynamic routing
Dynamic routing protocols can be divided into two main categories:
IS-IS
1) Distance vector: distance vector protocols were invented before link state
protocols. Early examples are RIPv1 and cisco proprietary protocol IGRP
which was updated to EIGRP. Distance vector protocols operate by
sending the following to their directly connected networks: 1-their known
destination networks. 2-their metrics to reach their known destination
networks.
2) Link state: when using a link state routing protocols, every router creates a
connectivity map of the network. To allow this, each router advertises
information about its interfaces(connected networks) to its neighbor.
These advertisements are passed along to other routers, until all routers in
the network develop the same map of the network. Each router
34
independently uses this map to calculate the best routes to each
destination. Link state protocols use more resources(CPU) on the router,
because more information is shared.
there have been a number of dynamic routing protocols released since 1982. I
have listed these below:
1982 EGP
1985 IGRP
1988 RIPv1
1990 IS-IS
1991 OSPFv2
1992 EIGRP
1994 RIPv2
1995 BGP
1997 RIPng
2000 IS-ISv6
OSPF
Asiacell uses OSPF dynamic routing protocol to advertise networks between the
routers, so our focus will be on this protocol. Open Shortest Path First (OSPF) is
one of the Interior Gateway Protocol (IGP), which helps to find the best routing
35
path between the source and the destination router using its own shortest path
first (SPF) algorithm. It is a Link-state routing protocol that is used to distribute
routing information about data packets within a large Autonomous System. OSPF
has a reputation as a protocol that it is quite difficult to set up.
When it is configured, it listens to its neighbors in the networks, and it gathers all
the link state data available. This data is then used to make a topology map that
contains all available paths in the network. This database is saved for use, and we
call it Link State Database. Once the Link State Database is made, it is used to
calculate the shortest path to subnets/networks using an algorithm known as
Shortest Path First, developed by Edsger W Dijkstra. OSPF creates 3 tables:
Routing Table: It contains currently working best paths that will be used to
forward traffic between two neighbors.
Neighbor Table: This contains all discovered Open Short Path First
neighbors.
Topology Table: This one contains the entire road map of the network.
This road map includes all the available Open Short Path First routers and
keeps calculated data about best and alternative paths.
OSPF is the first widely deployed routing protocol. It can converge with a
network in a few seconds, and it is one of the protocols that can provide loop-
free paths. Aside from these features, Open Short Path First allows the
imposition of policies for the propagation of routes in the network. Open Short
Path First is better at load sharing on external links compared to other IGPs.
Considering these benefits, it can found widespread use.
OSPF routers can form adjacencies with certain neighbor routers. The routers
that OSPF routers build adjacencies with are determined by the data link media
type. After adjacencies have been formed, each router sends link-state
advertisements (LSA) to all adjacent routers. These LSAs describe the state of
each of the router’s links. Because of the varying types of link-state information,
OSPF defines multiple LSA types. Finally, routers receiving an LSA from neighbors
36
record the LSA in a link-state database and flood a copy of the LSA to all other
neighbors. OSPF organizes topology information using LSAs and the link-state
database (LSDB). Each LSA is a data structure with some specific information
about the network topology; the LSDB is simply the collection of all the LSAs
known to a router.
The below figure shows the general idea of the flooding process, with R8 creating
and flooding its router LSA. The router LSA for Router R8 describes the router
itself, including the existence of subnet 172.16.3.0/24, as seen on the right side
of the figure.
this figure shows the rather basic flooding process, with R8 sending the original
37
LSA for itself, and the other routers flooding the LSA by forwarding it until every
router has a copy. The flooding process causes every router to learn the contents
of the LSA while preventing. the LSA from being flooded around in circles.
Basically, before sending an LSA to yet another neighbor, routers communicate,
asking “Do you already have this LSA?,” and then sending the LSA to the next
neighbor only if the neighbor has not yet learned about the LSA. Once flooded,
routers do occasionally reflood each LSA. Routers reflood an LSA when some
information changes (for example, when a link goes up or comes down). They
also reflood each LSA based on each LSA’s separate aging timer (default 30
minutes).
38
Designing the network architecture of the company
In this section, I will try to explain how campus networks are made by depending
on these fundamentals, which I explained. This section is a something like
virtually designing a simple network.
39
The hierarchical network design model breaks the complex flat network into
multiple smaller and more manageable networks. Each level or tier in the
hierarchy is focused on a specific set of roles. This design approach offers network
designers a high degree of flexibility to optimize and select the right network
hardware, software, and features to perform specific roles for the different network
layers. A typical hierarchical enterprise campus network design includes the
following three layers:
This design model, illustrated in the figure below, is typically used in large enterprise
campus networks, which are constructed of multiple functional distribution layer
blocks.
40
In HQ of the company, nearly 18 switches are distributed among the floors; they
are cisco catalyst 3650-48 port model. And in two switches, catalyst 6800, are
used in the distribution layer. These two switches are combined by using VSS
technology.
41
On the network layer, 2 routers are in use, their model is ASR1000. One of them
is active, and the other one is standby, in order to improve the network
redundancy at layer 3.
ASR 1000
These devices will be places in a cool room, in these rooms there is something
called RACK. A computer rack (commonly called a rack) is a metal frame used to
hold various hardware devices such as servers, hard disk drives, modems and
other electronic equipment. Some may refer to a rack as “LAN or network
42
furniture” as resembles a shelving structure where components can be attached
vertically, stacked on top of one another. A computer rack can also be called a
relay rack or open rack. As with everything in IT, the success of your rack mount
project will depend on diligent preparation. There are several details of which
you'll want to be sure before attempting to mount a device.
Power: Check that adequate power outlets of the right nature (AC or DC)
and amperage are available.
Air flow: Many racks, particularly in data centers, have been arranged for
predominantly front-to-back or side-to-side air flow.
Cabling: Check that all stray cables have been removed or repositioned
prior to mounting.
43
Access layer
The access layer is the last layer of three-tier architecture of a datacenter. The actual
servers are connected to this layer. The access layer communicates with its upper layer
using several switches (like Layer 2 and Layer 3) and hubs. This layer generally uses
uplinks bandwidth of up to 10 GE (A. Headquarters). The access layer maintains some
sort of extra backup servers to provide the services to end-users. Each server contains
thousands of racks, VMs, a large processing capability, a huge storage facility.
Behind the scenes, the Network Access Layer is responsible for several things; including
error checking, formatting data into frames, and interfacing with network adapters. See
44
the box below for the full list of responsibilities of the Network Access Layer.
Responsibilities of the Network Access Layer:
Checks for errors on incoming frames, and sends error checking information on
outgoing frames so receiving computers can check for errors.
Acknowledgement of received frames is another feature. If a frame isn’t
received correctly, it will be resent to the appropriate destination.
Formats outgoing data into frames, and then converts the data into electrical
pulses for transmission. The receiving computer will rebuild the frame, and send
the data up to the next layer.
Switches connected in this layer are known as access switches. End-devices connect to
the LAN network through the access switches. In other words, an access switch
forwards traffic between connected devices and the rest of the LAN.
Distribution layer
The distribution layer is the second layer of the Cisco three-layer hierarchical
model. Switches connected in this layer are known as the distribution switches.
Unlike access switches, distribution switches do not provide any service to end
devices. Distribution switches connect the access switches.
45
The main functions of the distribution layer switches are the following:
46
Core layer
This is the third layer of the Cisco three-layer hierarchical model. Switches that
work in this layer are known as the core switches. Core switches connect
distribution switches. In a complex and large network, core switches reduce
cabling needs and switch ports while still allowing all devices to send data to all
other devices in the LAN. To connect all distribution switches, a LAN requires
N*N-1 connections and N-1 available ports on each distribution switch. For
example, if the LAN has 8 distribution switches, it needs 8*8-1 = 56 links and 8-1
= 7 ports on each distribution switch. This requirement is without redundancy.
For redundancy, if the LAN adds additional connections, the number of required
connections will also increase in parallel. The LAN can reduce the required
number of connections and ports by connecting distribution switches through a
47
few extra switches. A switch that connects the distribution switches is known as
the core switch.
Unlike the access and distribution layers, the core layer does not provide many
services. The core layer has a single dedicated role in the Cisco three-layer
model. The core layer is responsible for forwarding traffic between the
distribution switches.
Applying technologies
48
In the enterprise network, several technologies are used in order to provide
services. Each enterprise has its own aim, so different types of technologies are
used, and even different style of network architecture is used based on the
demand of the company. For the scope of this report, even though there are a
large number of technologies like (STP, SD-WAN , token ring and etc.), I have just
focused on the outstanding technologies like (VLAN, Ethernet, and etc.)
As I discussed before, 18 access switches are distributed among the floors. VLAN
technology is used to provide much more efficiency. For each department, a
VLAN is created. For example, 6 end-hosts/nodes are dedicated to VLAN 10,
another 9 nodes to VLAN 20 and tec. Here is a figure to explain it:
There are much more VLAN in the company, here are some of them:
I. Market
II. Security
III. Customer
IV. Printer
V. commercial
In the distribution layer, 2 switches are used, their model is cisco catalyst 6800. I
will show how they are connected to other 18 switches in the access layer.
49
2 ASR 1000 routers are used in core layer, one of them is active, and the other
one is standby.
50