Sei sulla pagina 1di 23

GAV

Enterprise

GAV Enterprise

The GAV Enterprise is an organization that is dedicated to the production


and export of a wide variety of softwares based on the needs of the
customers, which ranges from small institutes to multinational firms.

The enterprise was founded in 1969 when the visionary, Sir Edward,
realized the need for spreading awareness about the wonderful world of
computer networks that surrounds us. With its humble beginnings, it
bloomed better and better with time. Today, on the verge of its fourth
decade of its existence, it has become one of the leading software
companies in the world. In addition to it, it has continued giving
networking solutions to a variety of organizations and enterprises all over
the world. GAV Enterprise has played a vital role in moulding the present
world of computer networks.

Summer Training Report


GAV
Enterprise

GAV Enterprise
THE OFFICE
The GAV Enterprise office is a two-storey building equipped with the latest
networking technology that provides state-of-the-art communication
capabilities. Over the years, the enterprise added new equipment and
increased the number of connections with consideration towards the
overall business goals and long-term infrastructure design.

The GAV Enterprise employs over 180 people:

• 21 managers and executives

• 130 salaried personnels

• 24 staff workers

In addition, several other workers are hired on hourly basis to provide


assistance and security as per the requirements.

The office has 4 executive offices, 6 development departments, 3


consultancy and customer support offices, 5 equipment and backup
rooms and a cafeteria.

Summer Training Report


GAV
Enterprise

THE ORGANISATION
EXECUTIVE OFFICES
• MANAGER’S OFFICE:

The manager is connected to the whole office via a personal


computer or laptop and an IP phone.

• HUMAN RESOURCES DEPARTMENT

There are 6 wired connections to the LAN, with unique VLAN id and
also has access to IP phones.

• MARKETING DEPARTMENT

There are 6 wired connections to the LAN, with unique VLAN id and
also has access to IP phones.

• ACCOUNTS DEPARTMENT

There are 6 wired connections to the LAN, with unique VLAN id and
also has access to IP phones.

DEVELOPMENT DEPARTMENTS

• SPECIAL PROJECTS

There are 6 workstations connected via wired LAN connections, with


unique VLAN id and has access to IP phones.

• PROTOTYPE CONSTRUCTION

There are 10 workstations connected via wired LAN connections,


with unique VLAN id and has access to IP phones.

• TESTING & SIMULATION

There are 15 workstations connected via wired LAN connections,


with unique VLAN id and has access to IP phones.

Summer Training Report


GAV
Enterprise

• APPLICATION DEVELOPMENT

There are 20 computers connected via wired LAN connections, with


unique VLAN id and has access to IP phones.

• OPTIMISATION

There are 15 computers connected via wired LAN connections, with


unique VLAN id and has access to IP phones.

• DEBUGGING

There are 15 computers connected via wired LAN connections, with


unique VLAN id and has access to IP phones.

CONSULTANCY & CUSTOMER SUPPORT

• CONSULTANCY DEPARTMENT

There are 2 computers connected via wired LAN connections, with


unique VLAN id and has access to IP phones.

• HELP DESK

There are 20 computers connected via wired LAN connections, with


unique VLAN id and has access to IP phones.

• DOCUMENTATION DEPARTMENT

There are 10 computers connected via wired LAN connections, with


unique VLAN id and has access to IP phones.

EQUIPMENT & BACKUP ROOMS


• SERVER ROOM

There are 3 high-end blade servers (FTP server, web server & mail
server) which host different services connected via hi-speed
Ethernet cables to the core router.

• TELECOMMUNICATION ROOM

Summer Training Report


GAV
Enterprise

There are 3 high-end routers and 3 high-end core switches, vertical


and horizontal patch panels, connected via hi-speed gigabyte
Ethernet and serial cables.

• CAMERA MONITORING ROOM

It has 3 servers that monitor and store the video images of the
whole office for security purposes.

• GENERATOR ROOM

It has a 100 KW backup generator and 25 KAh of lead-acid battery


cluster capable of providing backup for approximately 16 hours.

• STORE ROOMS

It is used to store the various equipments used by the staff workers.

MISCELLANOUS

• CONFERENCE HALL

It is equipped with high-speed 309.10 g Linksys wireless integrated


routers which provides wireless connectivity to 30 terminal devices
and IP phones.

• RECEPTION & WAITING HALL

It is equipped with high-speed Linksys wireless integrated router


that is capable of providing internet access to 30 users at a time
and an IP phone.

• CAFETERIA

It is equipped with high-speed Linksys wireless integrated router


that is capable of providing internet access to 20 users at a time.

• STAFF WORKER’S ROOM

It serves as a room for the staff workers to take rest.

Summer Training Report


GAV
Enterprise

NETWORK TOPOLOGY
In a simple network consisting of a few computers, it is easy to visualize
how all of the various components connect. As networks grow, it is more
difficult to keep track of the location of each component, and how each is
connected to the network. Wired networks require lots of cabling and
network devices to provide connectivity for all network hosts.

When networks are installed, a physical topology map is created to record


where each host is located and how it is connected to the network. The
physical topology map also shows where the wiring is installed and the
locations of the networking devices that connect the hosts. Icons are used
to represent the actual physical devices within the topology map. It is very
important to maintain and update physical topology maps to aid future
installation and troubleshooting efforts.

In addition to the physical topology map, it is sometimes necessary to also


have a logical view of the network topology. A logical topology map
groups hosts by how they use the network, no matter where they are
physically located. Host names, addresses, group information and
applications can be recorded on the logical topology map.

Summer Training Report


GAV
Enterprise

PHYSICAL TOPOLOGY
EQUIPMENTS
List of all equipments required for setting up the internal network of the
building for GAV Enterprise.

EQUIPMENT QTY DESCRIPTION


CISCO 2960 Layer 2 Switch 9 24 Fast-Ethernet ports, 2 Gigabit
Ethernet ports

CISCO 2960 Gigabit Ethernet 5 10 Gigabit Ethernet ports


Switch
Linksys Wireless Integrated 3 4 Ethernet ports, 1 Internet port
Router
CISCO 2800 Integrated 3 7 Gigabit Ethernet, 2 Serial ports /
Service Router 6 Gigabit Ethernet, 3 Serial ports

HP Blade Servers 3 1 Fast-Ethernet port

HP Storage Servers 2 For camera monitoring

IBM Desktop Computers 142 1 Fast-Ethernet port

IBM Laptop Computers 32 1 Fast-Ethernet port, Integrated Wi-


Fi

HP IP Printers 5 1 Fast-Ethernet port/ Wireless

Shielded Twisted Pair Cable 2500’


(CAT-5)
Unshielded Twisted Pair 4700’
Cable (CAT-5)

Summer Training Report


GAV
Enterprise

DESCRIPTION OF DEVICES

LAYER-3 DEVICES

• Linksys Wireless Integrated Router

An ISR combines features such as routing and switching


functions, security, voice, LAN and WAN connectivity into a single
device. It is designed for small offices and home-based users. It
consists of one WAN connection (Router Port) and four 10/100
Mbps switch ports. It provides services at broadband speeds.

• CISCO 2800 Integrated Service Router

An ISR combines features such as routing and switching


functions, security, voice, LAN and WAN connectivity into a single
device. It is designed for enterprise branch offices. It supports
seven to eight 10/100/1000 Mbps Gigabit Ethernet ports and two
to three Serial ports. It provides services at broadband speeds
using T1/E1 connectioins.

LAYER-2 DEVICES

• CISCO 2960 Gigabit Ethernet Switch

A switch is a device that is able to direct a stream of messages


coming in one port, out of another port based on the destination
MAC address within the frame. It supports ten Gigabit Ethernet
ports. It is generally used for trunk lines which carry a huge
amount of traffic.

• CISCO 2960 Layer 2 Switch

This type of switches does not use modules or flash card slots.
Due to this reason, their physical configuration cannot be
changed. It supports twentyfour 10/100 Mbps Fast-Ethernet ports
and two 10/100/1000 Mbps Gigabit Ethernet ports.

Summer Training Report


GAV
Enterprise

LAYER-1 (PHYSICAL) DEVICES

• Shielded Twisted Pair Cable

They are used for high-speed data transmission. The individual


pair of wires are wrapped in a shield and the entire four pairs are
wrapped in another shield. It supports data transmission at rates
as high as 1000 Mbps. It is generally used for trunk lines.

• Unshielded Twisted Pair Cable

UTP cable is inexpensive, offers a high bandwidth, and is easy to


install. This type of cable is used to connect workstations, hosts
and network devices. It can come with many different numbers of
pairs inside the jacket, but the most common number of pairs is
four. Each pair is identified by a specific color code. It supports
data transmission speeds of 100 Mbps.

END-USER DEVICES

• HP Blade Servers

These servers are high performance computers used in


businesses and other organizations. They provide the maximum
concentration of computing power and stability. It also contains
hot-swappable hard-drives.

• HP Storage Servers

These servers are used to store redundant parts of files in order


to prevent them from failing. Servers are usually kept in secure
areas where access is controlled.

• IBM Desktop Computers

These are general purpose computers which provide the basic


desktop services to users. It contains of a Fast-Ethernet port.

Summer Training Report


GAV
Enterprise

• IBM Laptop Computers

These are mobile computers which supports both LAN and WAN
connectivity.

• HP IP Printers

These are IP based printers which acts as a host on the network.


It contains either a Fast-Ethernet port or a Wireless card.

LOGICAL TOPOLOGY

PROTOTYPE OF NETWORK TOPOLOGY


The network topology of the GAV Enterprise building can be broadly
categorized into three network layers: Access, Distribution and Core
Layer.

Summer Training Report


GAV
Enterprise

ADDRESSING INFORMATION OF LAYER-3 DEVICES

ROUTERS

DEVICE INTERFACE IP ADDRESS SUBNET MASK


Core Router Serial 7/0 212.212.212.2 255.255.255.0
Serial 8/0 192.168.10.6 255.255.255.252
Serial 9/0 192.168.10.2 255.255.255.252
Gb E 0/0.27 192.168.8.2 255.255.255.240
Gb E 0/0.28 200.200.200.1 255.255.255.248

Wing A Router Serial 8/0 192.168.10.1 255.255.255.252


Gb E 0/0.15 192.168.2.225 255.255.255.224
Gb E 0/0.16 192.168.2.177 255.255.255.240
Gb E 0/0.17 192.168.2.161 255.255.255.240
Gb E 0/0.18 192.168.2.193 255.255.255.240
Gb E 0/0.19 192.168.2.209 255.255.255.240
Gb E 0/0.24 192.168.2.2 255.255.255.224
Gb E 0/0.25 192.168.2.33 255.255.255.224
Gb E 0/0.26 192.168.2.65 255.255.255.240

Wing B Router Serial 8/0 192.168.10.5 255.255.255.252


Gb E 0/0.9 192.168.2.65 255.255.255.224
Gb E 0/0.10 192.168.2.2 255.255.255.224
Gb E 0/0.11 192.168.2.33 255.255.255.224
Gb E 0/0.12 192.168.2.97 255.255.255.224
Gb E 0/0.13 192.168.2.129 255.255.255.224

Waiting Room Internet 192.168.1.4 255.255.255.224


Wireless Router
LAN 192.168.3.2 255.255.255.0

Cafeteria Wireless Internet 192.168.1.3 255.255.255.224


Router
LAN 192.168.3.1 255.255.255.0

Conference Hall Internet 192.168.2.4 255.255.255.224

Summer Training Report


GAV
Enterprise

Wireless Router
LAN 192.168.4.1 255.255.255.0

ADDRESSING INFORMATION OF LAYER-2 DEVICES

SWITCHES

DEVICE INTERFAC MODE VLAN ID


E
Server Switch 0/1 Access 28
1/1 Access 28
2/1 Trunk 1-1005
3/1 Access 27

Wing-A Core Switch 0/1 Trunk 1-14,16,20-1005


1/1 Trunk 1-15,17,20-1005
2/1 Trunk 1-14,18-1005
3/1 Trunk 1-1005

Wing-B Core Switch 0/1 Trunk 1-1005


2/1 Trunk 1-14,20-1005

Floor 1 Switch 0/1 Access 24


1/1 Trunk 1-23,26-1005
2/1 Trunk 1-23,25,27-1005
3/1 Access 24
4/1 Trunk 1-1005

Summer Training Report


GAV
Enterprise

COMPLETE LOGICAL NETWORK TOPOLOGY

IP ADDRESSING
A host needs an IP address to participate on the Internet. The IP
address is a logical network address that identifies a particular host. It
must be properly configured and unique in order to communicate with
other devices on the Internet.

An IP address is assigned to the Network interface connection for a


host. This connection is usually a network interface card (NIC) installed
in the device. Examples of end-user devices with network interfaces
include workstations, servers, network printers and IP phones. Some
servers can have more than one NIC and each of these has its own IP
address. Router interfaces that provide connections to an IP network
will also have an IP address.

Every packet sent across the Internet has a source and destination IP
address. This information is required by networking devices to insure
the information gets to the destination and any replies are returned to
the source.

IP ADDRESSING STRUCTURE
An IP address is simply a series of 32 binary bits (ones and zeros). It is
very difficult for humans to read a binary IP address. For this reason,
the 32 bits are grouped into four 8-bit bytes called octets. An IP
address in this format is hard for humans to read, write and remember.
To make the IP address easier to understand, each octet is presented
as its decimal value, separated by a decimal point or period. This is
referred to as dotted-decimal notation.

Summer Training Report


GAV
Enterprise

The 32-bit IP address is defined with IP version 4 (IPv4) and is currently


the most common form of IP address on the Internet. There are over 4
billion possible IP addresses using a 32-bit addressing scheme.

When a host receives an IP address, it looks at all 32 bits as they are


received by the NIC. Humans, on the other hand, need to convert those
32 bits into their four octet decimal equivalent. Each octet is made up
of 8 bits and each bit has a value. The four groups of 8 bits have the
same set of values. The rightmost bit in an octet has a value of 1 and
the values of the remaining bits, from right to left, are 2, 4, 8, 16, 32,
64 and 128.

IP ADDRESS CLASSES
The IP address and subnet mask work together to determine which
portion of the IP address represents the network address and which
portion represents the host address. The class of an address can be
determined by the value of the first octet.

IP addresses are grouped into 5 classes. Classes A, B and C are


commercial addresses and are assigned to hosts. Class D is reserved
for multicast use and Class E is for experimental use.

• Class C addresses have three octets for the network portion and one
for the hosts. The default subnet mask is 24 bits (255.255.255.0).
Class C addresses are usually assigned to small networks.

• Class B addresses have two octets to represent the network portion


and two for the hosts. The default subnet mask is 16 bits
(255.255.0.0). These addresses are typically used for medium-sized
networks.

• Class A addresses have only one octet to represent the network


portion and three to represent the hosts. The default subnet mask is
8 bits (255.0.0.0). These addresses are typically assigned to large
organizations.

In the addressing scheme of GAV Enterprise, we have used Class-C


addressing scheme. In the Class-C addressing scheme, there are a total
of 256 addresses available. Out of these, 254 addresses are usable.
The remaining to addresses are reserved for network and broadcast
address.

Summer Training Report


GAV
Enterprise

IP addresses are of two types: Private addresses and Public addresses.


All hosts that connect directly to the Internet require a unique public IP
address. Because of the finite number of 32-bit addresses available,
there is a risk of running out of IP addresses. This problem can be
resolved by the use of Private addresses. They allow hosts within an
organization to communicate with one another without the need of a
unique public IP address. Table below shows a list of Private addresses:

SUBNETTING
The customer network using the single ISR is badly overloaded. The
proposed solution is to add a second networking device, a larger ISR,
and to divide the single network into two separate networks.

For security purposes, the wireless and wired users need to be on


separate local networks.

In the subnetting scheme for GAV Enterprise, we utilize the concept of


classless subnetting where we use custom subnets to differentiate the
networks.

Routers distinguish between networks by using the subnet mask to


determine which bits make up the network ID and which bits make up
the host portion of the address. When a network is partitioned, the
router needs a modified or custom subnet mask to distinguish the
subnets from each other. A default subnet mask and a custom subnet
mask differ from each other as follows: Default subnet masks only
change on octet boundaries. For instance, the default subnet mask for
a Class A network is 255.0.0.0. Custom subnet masks take bits from
the host ID portion of the IP address and add them to the default
subnet mask.

Summer Training Report


GAV
Enterprise

SWITCHING
A switch is a device that is able to direct a stream of messages coming
in one port, out of another port based on the destination MAC address
within the frame. A switch cannot route traffic between two different
local networks. In the context of the OSI model, a switch performs the
Layer 2, known as the data-link layer function.

Only one message can be sent through an Ethernet hub at a time. It is


possible for two or more hosts connected to a hub to attempt to send a
message at the same time. If this happens, the electronic signals that
make up the messages collide with each other at the hub.

A collision causes the messages to become garbled and unreadable by


the hosts. A hub does not decode the messages; therefore it does not
detect that the message is garbled and repeats it out all the ports. The
area of the network where a host can receive a garbled message
resulting from a collision is known as a collision domain.

A switch is preferred over hubs in the networking model of GAV


Enterprise because of the large collision domain associated with hubs.
Since a switch uses micro-segmentation, it narrows down the collision
domain. The network of GAV Enterprise uses 9 CISCO switches, which
can result in a huge broadcast domain. So, to minimize the domain, we
have used the concept of Virtual LAN (VLAN).

VIRTUAL LAN
A VLAN is a logical broadcast domain that can span multiple physical
LAN segments. It allows an administrator to group together stations by
logical function, by project teams, or by applications, without regard to
physical location of the users.

A VLAN has two major functions:

• A VLAN contains broadcasts.

• A VLAN groups devices. Devices located on one VLAN are not


visible to devices located on another VLAN.

Configuring a VLAN:

Summer Training Report


GAV
Enterprise

In order to configure VLAN on a switch, connect it with a terminal


device using a console cable.

Enter the privileged mode using the enable command


Switch>enable

Switch#

Enter the configuration mode using the configure terminal command

Switch# configure terminal


Switch (config) #

Enter the name and VLAN number using the commands


Switch(config)#vlan vlan_number

Switch(config-vlan)#name vlan_name

Switch(config-vlan)#exit

Use the following commands to assign individual ports to VLANs:


Switch(config)#interface fa#/#

Switch(config-if)#switchport access vlan vlan_number

Switch(config-if)# exit

Use the following commands to assign a range ports to VLANs:


Switch(config)#interface range fa#/start_of_range - end_of_range

Switch(config-if)#switchport access vlan vlan_number

Switch(config-if)#exit

To disassociate a port from a specific VLAN:


Switch(config)#interface fa#/#

Switch(config-if)#no switchport access vlan vlan_number

A switch port can function in two modes: Access and Trunk mode.

To switch between the two modes, use the following command


Switch(config)#interface fa#/#

Switch(config-if)#switchport mode <trunk/access>

Summer Training Report


GAV
Enterprise

A switchport in the trunk mode is used for a switch-switch or switch-router


connection, whereas an access mode is used for connection to terminal
devices.

SWITCH CONFIGURATION
Core Switches

SWITCH INTERFACE MODE VLAN ID


Server Switch Gb E 0/1,1/1 Access 28
Gb E 2/1 Trunk 1-1005
Gb E 3/1 Access 27

Floor-1 Switch Gb E 0/1,3/1 Trunk 24


1/1 Trunk 1-23,26-1005
2/1 Trunk 1-23,25,27-1005
4/1 Trunk 1-1005

Wing-A Core 0/1 Trunk 1-14,16,20-1005


Switch
1/1 Trunk 1-15,17,20-1005
2/1 Trunk 1-14,18-1005
3/1 Trunk 1-1005

Wing-B Core 0/1 1-1005


Switch
2/1 1-14,20-1005

Other Switches

SWITCH INTERFACE MODE VLAN ID


M&HR&A Switch Fa E 0/1-0/6 Access 18
Fa E 0/7-0/11 Access 19
Gb E 1/1 Trunk 1-1005

AD&M Switch Fa E 0/1-0/8 Access 15


Fa E 0/10-0/13 Access 17
Gb E 1/1 Trunk 1-1005

SP Switch Fa E 0/1-2/1,4/1 Access 16


3/1 Trunk 1-1005

T&S Switch Fa E <all> Access 13


Gb E 1/1 Trunk 1-1005

Summer Training Report


GAV
Enterprise

DB Switch Fa E <all> Access 12


Gb E 1/1 Trunk 1-1005

OP Switch Fa E <all> Access 9


Gb E 1/1 Trunk 1-1005

PC Switch Fa E <all> Access 11


Gb E 1/1 Trunk 1-1005

Wing-B Main Gb E 0/1 Trunk 1-8,11,14-1005


Switch
Gb E 1/1 Trunk 1-9,14-1005
Gb E 2/1 Trunk 1-8,12,14-1005
Gb E 3/1 Trunk 1-8,13-1005
Gb E 4/1 Access 10
Gb E 5/1 Trunk 1-1005

D Switch Fa E <all> Access 26


Gb E 1/1 Trunk 1-1005

HD Switch Fa E <all> Access 25


Gb E 1/1 Trunk 1-1005

ROUTING
Routing is the process of finding a path to the destination host. A router
is a networking device that connects a local network to other local
networks. At the Distribution Layer of the network, routers direct traffic
and perform other functions critical to efficient network operation.
Routers, like switches, are able to decode and read the messages that
are sent to them. Unlike switches, which only decode (unencapsulate)
the frame containing the MAC address information, routers decode the
packet that is encapsulated within the frame.

Each port, or interface, on a router connects to a different local


network. Every router contains a table of all locally-connected networks
and the interfaces that connect to them. These routing tables can also

Summer Training Report


GAV
Enterprise

contain information about the routes, or paths, that the router uses to
reach other remote networks that are not locally attached.

When a router receives a frame, it decodes the frame to get to the


packet containing the destination IP address. It matches the address of
the destination to all of the networks that are contained in the routing
table. If the destination network address is in the table, the router
encapsulates the packet in a new frame in order to send it out. It
forwards the new frame out of the interface associated with the path,
to the destination network. The process of forwarding the packets
toward their destination network is called routing.

Router interfaces do not forward messages that are addressed to the


broadcast MAC address. As a result, local network broadcasts are not
sent across routers to other local networks.

Configuring a ROUTER:

In order to configure a router, the following commands can be


executed.

Enter the privileged mode using the enable command


Router>enable

Router#

Enter the configuration mode using the configure terminal command


Router# configure terminal

Router (config) #

The host from the sending VLAN forwards traffic to the router using the
default gateway. The sub-interface for the VLAN specifies the default
gateway for all hosts in that VLAN. The router locates the destination IP
address and does a routing table lookup.

If the destination VLAN is on the same switch as the source VLAN, the
router forwards the traffic back down to the source switch using the
subinterface parameters of the destination VLAN ID. This type of
configuration is often referred to as a router-on-a-stick.

If the exit interface of the router is 802.1Q-compatible, the frame


retains its 4-byte VLAN tag. If the outbound interface is not 802.1Q-

Summer Training Report


GAV
Enterprise

compatible, the router strips the tag from the frame and returns the
frame to its original Ethernet format.

To configure inter-VLAN routing, use the following steps:

1. Configure a trunk port on the switch.


Switch(config)#interface fa0/2

Switch(config-if)#switchport mode trunk

2. On the router, configure a FastEthernet interface with no IP address


or subnet mask.
Router(config)#interface fa0/1

Router(config-if)#no ip address

Router(config-if)#no shutdown

3. On the router, configure one subinterface with an IP address and


subnet mask for each VLAN. Each subinterface has an 802.1Q
encapsulation.
Router(config)#interface fa0/0.10

Router(config-subif)#encapsulation dot1q 10

Router(config-subif)#ip address 192.168.10.1 255.255.255.0

4. Use the following commands to verify the inter-VLAN routing


configuration and functionality.
Switch#show trunk

Router#show ip interfaces

Router#show ip interfaces brief

Router#show ip route

ADDRESSING SCHEME
ROOM IP ADDRESS SUBNET DEFAULT
RANGE MASK GATEWAY
Manager’s Office 192.168.2.210- 255.255.255. 192.168.2.2
222 240 09

Human Resources Dept 192.168.2.210- 255.255.255. 192.168.2.2


222 240 09

Summer Training Report


GAV
Enterprise

Accounts Dept 192.168.2.194- 255.255.255. 192.168.2.1


206 240 93

Application 192.168.2.226- 255.255.255. 192.168.2.2


Development 254 224 25

Marketing Room 192.168.2.162- 255.255.255. 192.168.2.1


174 240 61

Special Projects Room 192.168.2.178- 255.255.255. 192.168.2.1


190 240 77
Testing & Simulation 192.168.2.130- 255.255.255. 192.168.2.1
Room 158 224 29

Debugging Room 192.168.2.98-126 255.255.255. 192.168.2.9


224 7
Optimization Room 192.168.2.66-94 255.255.255. 192.168.2.6
224 5
Prototype Construction 192.168.2.34-62 255.255.255. 192.168.2.3
224 3
Conference Hall 192.168.4.2-62 255.255.255. 192.168.4.1
192
Waiting Room 192.168.3.2-62 255.255.255. 192.168.3.1
192
Help Desk/Customer 192.168.1.34-62 255.255.255. 192.168.1.3
Care 240 3

Documentation Room 192.168.1.66-79 255.255.255. 192.168.1.6


240 5
Cafeteria 192.168.3.0-254 255.255.255. 192.168.3.1
0

INTERNET CONNECTION
The Internet is a network of networks that connects users in every country
in the world. There are currently over one billion Internet users worldwide.

Any home, business or organization that wants to connect to the Internet


must use an Internet Service Provider (ISP). An ISP is a company that
provides the connections and support to access the Internet. It can also
provide additional services such as Email and web hosting.

Summer Training Report


GAV
Enterprise

ISPs are essential to gaining access to the Internet. No one gets on the
Internet without a host computer, and no one gets on the Internet without
going through an ISP. ISPs range in size from small to very large and differ
in terms of the area they service. ISPs also differ in the types of
connection technologies and speeds they offer.

ISP LEVELS OF SERVICE


When data is transferred, it is either uploaded or downloaded.
Downloading refers to information coming from the Internet to your
computer, while uploading indicates the reverse path, from your computer
to the Internet. When the download transfer rate is different from the
upload transfer rate, it is called asymmetric. When the transfer rate is the
same in both directions, it is called symmetric. ISPs can offer both
asymmetric and symmetric services.

The GAV Enterprise uses T1 symmetric connection from a reputed ISP.


The advantage of using a symmetric T1 connection is that it can carry
large amounts of data in both directions at equal rates. Moreover, it helps
when we need to upload large amounts of traffic such as intensive
graphics, multimedia, or video.

The network for GAV Enterprise was established with an eye towards the
prospects for future upgrades.

Summer Training Report

Potrebbero piacerti anche