Professional Documents
Culture Documents
Milestone - 5-6 - Template - Ananda Aditya Surya
Milestone - 5-6 - Template - Ananda Aditya Surya
You are designing a network that will be able to support the following users:
Main Office:
80 - Sales Personnel
40 - Accounting Staff
15 - Marketing Staff
5 - Research & Development Staff
The departments are separated within different floors of a 2-storey building. There are cubicles put
together for offices. All users will have a laptop or desktop computer, and IP phone. There are 2
networked shared copier printers, and 2 Servers running business software in use by the 4
departments.
The company has 2 connections to the outside world and a VPN link to two remote locations. You
are only designing for the main location, but the network has to support the voice and data links to
the remote sites. Plan for 50% growth of all network resources
The picture above is Cisco Catalyst 3560 Series Switches, is a line of fixed-configuration, enterprise-
class switches that includes IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) capability
in Fast Ethernet and Gigabit Ethernet configurations. The Catalyst 3560 is an ideal access layer
switch for small enterprise wiring closets or branch office environments that are using their LAN
infrastructure for the deployment of new products and applications such as IP telephones, wireless
access points, video surveillance, building management systems, and remote video kiosks.
Customers can deploy network-wide intelligent services, such as advanced QoS, rate limiting, access
control lists, multicast management, and high-performance IP routing-while maintaining the
simplicity of traditional LAN switching. Embedded in the Catalyst 3560 is the Cisco Cluster
Management Suite (CMS) Software, which allows users to simultaneously configure and
troubleshoot multiple Cisco Catalyst desktop switches using a standard Web browser. Other
capability of this switch is:
Availability and Scalability. The Cisco Catalyst 3560 Series is equipped with a robust set of features
that allow for network scalability and higher availability through IP routing as well as a complete
suite of Spanning Tree Protocol enhancements aimed to maximize availability in a Layer 2 network
Advanced Quality of Service. The Cisco Catalyst 3560 Series provides intelligent services to keep
everything flowing smoothly. Industry-leading mechanisms for marking, classifying, and scheduling
deliver best-in-class performance for data, voice, and video traffic-all at wire speed.
Power over Ethernet provide a lower total cost of ownership (TCO) for deployments that
incorporate Cisco IP phones, Cisco Aironet® wireless LAN (WLAN) access points, or any IEEE 802.3af-
compliant end device.
Gigabit Ethernet (GbE or 1 GigE) is the term applied to transmitting Ethernet frames at a rate of a
gigabit per second. The most popular variant, 1000BASE-T, is defined by the IEEE 802.3ab standard.
It came into use in 1999, and has replaced Fast Ethernet in wired local networks due to its
considerable speed improvement over Fast Ethernet, as well as its use of cables and equipment that
are widely available, economical, and similar to previous standards.
Task 2: Ensure the switch has the ability to support all the technologies identified in the
requirements.
The Catalyst 3560 is an ideal access layer switch for small enterprise wiring closets or branch office
environments that are using their LAN infrastructure for the deployment of new products and
applications such as IP telephones, wireless access points, video surveillance, building management
systems, and remote video kiosks. Also One of the abilities of the switch is Power over Ethernet
(PoE). PoE is a technology for implementing wired Ethernet local area networks (LANs) that enables
the electrical current necessary for opertaing each device to be carried by Ethernet data cables
Task 3: Draw a rack elevation drawing showing the switches mounted in racks located in the main or
intermediate distribution frames (closets)
Attach the brackets to the switch using the screws provided in the rack accessory, also
ensure the brackets is attached properly.
After complete mounting all of the switches in the rack, then we can connect the switch
to the power source. Remember to connect it with the correct power supply (AC input
or DC input).
• Topology - There are physical and logical topologies. The physical topology is the arrangement
of the cables, network devices, and end systems. It describes how the network devices are
actually interconnected with wires and cables. The logical topology is the path over which the
data is transferred in a network. It describes how the network devices appear connected to
network users.
• Speed - measure of the data rate in bits per second (b/s) of a given link in the network.
• Cost - indicates the general expense for purchasing of network components, and installation
and maintenance of the network. Amount that has to be paid or spent to purchase something
in network such as hardware, software, license, maintenance, and others.
• Security - indicates how protected the network from unwanted access, cyberattacks, or other
threats. Security is mandatory to prevent any threats that may incoming into the network. is,
including the information that is transmitted over the network. The subject of security is
important, and techniques and practices are constantly evolving. Consider security whenever
actions are taken that affect the network.
• Availability - measure of the probability that the network is available for use when it is
required.
• Scalability - Scalability indicates how easily the network can accommodate more users and
data transmission requirements. If a network design is optimized to only meet current
requirements, it can be very difficult and expensive to meet new needs when the network
grows.
• Reliability - Reliability indicates the dependability of the components that make up the
network, such as the routers, switches, PCs, and servers. Reliability is often measured as a
probability of failure or as the mean time between failures (MTBF).
In this scenario to establish guidelines for user network access in accordance with organisational
specifications by placing only those users who can have access to that data on a VLAN can reduce
the chances of other department from gaining access to the data. Develop network configuration in
accordance with vendor and organisational specifications
For project purpose will use Packet Tracer network simulator software.