aravinda project report

Upload: shawick

Post on 09-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 ARAVINDA PROJECT REPORT

    1/54

    City & Guilds Advanced Technician Diploma in

    Telecommunication Systems(2730)

    Implementation of a Local Area Network

  • 8/7/2019 ARAVINDA PROJECT REPORT

    2/54

    General Information

    Project Title : Local Area Network

    Institute : APSS International, 5, Harmers Avenue, Colombo 6, Sri Lanka.

    Center Number : 844022

    Contact Information:

    Name : M.A. Aravinda Lakshan Dhanapala.

    Enrolment Number : IHK3845

    Address : 166/6, Kirillawala, Weboda, Sri Lanka.Telephone : 0777336412

    E-mail Address : [email protected]

    mailto:[email protected]:[email protected]
  • 8/7/2019 ARAVINDA PROJECT REPORT

    3/54

  • 8/7/2019 ARAVINDA PROJECT REPORT

    4/54

    TABLE OF CONTENTS

    INTRODUCTION

    WHAT IS A LOCAL AREA NETWORK?

    HOW WE CAN IMPLEMENT A LOCAL AREA NETWORK?

    BENEFITS OF NETWORKING

    SCOPE OF THIS REPORT

    PROBLEMS

    SOLUTION

    TECHNICAL OVERVIEW OF THE PROPOSED NETWORK ARCHITECTURE

    SWITCHES

    TYPES OF NETWORK CONNECTORS AND CABLES

    OPTICAL FIBER TECHNOLOGY

    STRUCTURED CABLING PLANNING

    VLAN TECHNOLOGY

  • 8/7/2019 ARAVINDA PROJECT REPORT

    5/54

    ETHERNET TECHNOLOGY

    IP ADDRESSING

    PROPOSED NETWORK ARCHITECTURE

    CONCLUTION

    COST

    RELIABILITY

    TECHNOLOGY

    REDUNDANCY

  • 8/7/2019 ARAVINDA PROJECT REPORT

    6/54

    INTRODUCTION

    WHAT IS A LOCAL AREA NETWORK ?

    A computer network that spans a relatively small area. Most LANs are confined to a

    single building or group of buildings. However, one LAN can be connected to other

    LANs over any distance via telephone lines and radio waves. A system of LANs

    connected in this way is called a wide-area network (WAN) .

    Most LANs connect workstations and personal computers . Each node (individual

    computer ) in a LAN has its own CPU with which it executes programs , but it also is able

    to access data and devices anywhere on the LAN. This means that many users can shareexpensive devices, such as laser printers, as well as data. Users can also use the LAN to

    communicate with each other, by sending e-mail or engaging in chat sessions.

    There are many different types of LANs Ethernets being the most common for PCs. Most

    Apple Macintosh networks are based on Apple's AppleTalk network system , which is

    built into Macintosh computers.

    The following characteristics differentiate one LAN from another:

    Topology : The geometric arrangement of devices on the network . For

    example, devices can be arranged in a ring or in a straight line.

    Protocols : The rules and encoding specifications for sending data. The

    protocols also determine whether the network uses a peer-to-peer or client/server

    architecture .

    Media : Devices can be connected by twisted-pair wire , coaxial cables, or

    fiber optic cables. Some networks do without connecting media altogether,communicating instead via radio waves.

    LANs are capable of transmitting data at very fast rates, much faster than data can be

    transmitted over a telephone line; but the distances are limited, and there is also a limit on

    the number of computers that can be attached to a single LAN.

    http://www.webopedia.com/TERM/L/computer.htmlhttp://www.webopedia.com/TERM/L/network.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/system.htmlhttp://www.webopedia.com/TERM/L/wide_area_network_WAN.htmlhttp://www.webopedia.com/TERM/L/workstation.htmlhttp://www.webopedia.com/TERM/L/personal_computer.htmlhttp://www.webopedia.com/TERM/L/node.htmlhttp://www.webopedia.com/TERM/L/CPU.htmlhttp://www.webopedia.com/TERM/L/execute.htmlhttp://www.webopedia.com/TERM/L/program.htmlhttp://www.webopedia.com/TERM/L/access.htmlhttp://www.webopedia.com/TERM/L/data.htmlhttp://www.webopedia.com/TERM/L/device.htmlhttp://www.webopedia.com/TERM/L/user.htmlhttp://www.webopedia.com/TERM/L/laser_printer.htmlhttp://www.webopedia.com/TERM/L/e_mail.htmlhttp://www.webopedia.com/TERM/L/chat.htmlhttp://www.webopedia.com/TERM/L/Ethernet.htmlhttp://www.webopedia.com/TERM/L/Ethernet.htmlhttp://www.webopedia.com/TERM/L/PC.htmlhttp://www.webopedia.com/TERM/L/Macintosh_computer.htmlhttp://www.webopedia.com/TERM/L/Apple_Computer.htmlhttp://www.webopedia.com/TERM/L/AppleTalk.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/topology.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/protocol.htmlhttp://www.webopedia.com/TERM/L/peer_to_peer_architecture.htmlhttp://www.webopedia.com/TERM/L/client_server_architecture.htmlhttp://www.webopedia.com/TERM/L/client_server_architecture.htmlhttp://www.webopedia.com/TERM/L/media.htmlhttp://www.webopedia.com/TERM/L/twisted_pair_cable.htmlhttp://www.webopedia.com/TERM/L/coaxial_cable.htmlhttp://www.webopedia.com/TERM/L/fiber_optics.htmlhttp://www.webopedia.com/TERM/L/computer.htmlhttp://www.webopedia.com/TERM/L/network.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/system.htmlhttp://www.webopedia.com/TERM/L/wide_area_network_WAN.htmlhttp://www.webopedia.com/TERM/L/workstation.htmlhttp://www.webopedia.com/TERM/L/personal_computer.htmlhttp://www.webopedia.com/TERM/L/node.htmlhttp://www.webopedia.com/TERM/L/CPU.htmlhttp://www.webopedia.com/TERM/L/execute.htmlhttp://www.webopedia.com/TERM/L/program.htmlhttp://www.webopedia.com/TERM/L/access.htmlhttp://www.webopedia.com/TERM/L/data.htmlhttp://www.webopedia.com/TERM/L/device.htmlhttp://www.webopedia.com/TERM/L/user.htmlhttp://www.webopedia.com/TERM/L/laser_printer.htmlhttp://www.webopedia.com/TERM/L/e_mail.htmlhttp://www.webopedia.com/TERM/L/chat.htmlhttp://www.webopedia.com/TERM/L/Ethernet.htmlhttp://www.webopedia.com/TERM/L/PC.htmlhttp://www.webopedia.com/TERM/L/Macintosh_computer.htmlhttp://www.webopedia.com/TERM/L/Apple_Computer.htmlhttp://www.webopedia.com/TERM/L/AppleTalk.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/topology.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.html#%23http://www.webopedia.com/TERM/L/protocol.htmlhttp://www.webopedia.com/TERM/L/peer_to_peer_architecture.htmlhttp://www.webopedia.com/TERM/L/client_server_architecture.htmlhttp://www.webopedia.com/TERM/L/client_server_architecture.htmlhttp://www.webopedia.com/TERM/L/media.htmlhttp://www.webopedia.com/TERM/L/twisted_pair_cable.htmlhttp://www.webopedia.com/TERM/L/coaxial_cable.htmlhttp://www.webopedia.com/TERM/L/fiber_optics.html
  • 8/7/2019 ARAVINDA PROJECT REPORT

    7/54

    HOW WE CAN IMPLEMENT A LOCAL AREA NETWORK?

    To implement a local area network (LAN) there are several components that we

    have to consider. Those components are;

    The following are some common components you may find in a basic network:

    Computer

    General-purpose machine that processes data according to a set of instructions that are

    stored internally either temporarily or permanently. The computer and all equipment

    attached to it are called hardware. The instructions that tell it what to do are called

    software. A set of instructions that perform a particular task is called a program, or

    software program.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    8/54

    The instructions in the program direct the computer to input, process and output as

    follows:

    Input/Output - The computer can selectively retrieve data into its main memory

    (RAM) from any peripheral device (terminal, disk, tape, etc.) connected to it.

    After processing the data internally, the computer can send a copy of the results

    from its memory out to any peripheral device. The more memory it has, the more

    programs and data it can work with at the same time. Storage - By outputting data onto a magnetic disk or tape, the computer is able to

    store data permanently and retrieve it when required. A system's size is based on

    how much disk storage it has. The more disk, the more data is immediately

    available. Processing - (The 3 C's*) Once the data is in the computer's memory, the

    computer can process it by calculating, comparing and copying it.

    o Calculate - The computer can perform any mathematical operation on

    data by adding, subtracting, multiplying and dividing one set with another.

    o Compare - The computer can analyze and evaluate data by matching it

    with sets of known data that are included in the program or called in from

    storage.

    o Copy - The computer can move data around to create any kind of report or

    listing in any order.

    Computers are based on digital technology; they work on the presence or absence of a

    voltage on a wire, similar to a light switch. A value of 0 means no voltage is present, and

    a value of 1 would be equivalent to 5 volts. Therefore, data is processed in a binary (or

    base 2) numbering system. Humans are used to the decimal system (base 10). In order for

    the computer to understand a value such as 25, it would need to convert the decimal valueinto binary:

  • 8/7/2019 ARAVINDA PROJECT REPORT

    9/54

    Server / Gateways

    In client/server architecture, a server is a single, high-powered machine with a large hard

    disk set aside to function as a file server for all the client machines in the network A

    server could function as a file server, Web server, Mail server, FTP server, News server,

    and many other applications.

    A Gateway is a computer that performs protocol conversion between different types of

    networks or applications. For example, a gateway can connect a personal computer LAN

    to a mainframe network. An electronic mail gateway converts messages from two or

    more different e-mail standards.

    Network Interface Card

    The network interface card (NIC) provides the physical

    connection between the network and the computer workstation. Most NICs are internal,

    with the card fitting into an expansion slot inside the computer. Some computers, such as

    Mac Classics, use external boxes which are attached to a serial port or a SCSI port.

    Laptop computers generally use external LAN adapters connected to the parallel port or

    network cards that slip into a PCMCIA slot.

    Network interface cards are a major factor in determining the speed and performance of anetwork. It is a good idea to use the fastest network card available for the type of

    workstation you are using.

    The three most common network interface connections are Ethernet cards, LocalTalk

    connectors, and Token Ring cards. According to a International Data Corporation study,

  • 8/7/2019 ARAVINDA PROJECT REPORT

    10/54

    Ethernet is the most popular, followed by Token Ring and LocalTalk (Sant'Angelo, R.

    (1995). NetWare Unleashed, Indianapolis, IN: Sams Publishing). The network interface

    card (NIC) provides the physical connection between the network and the computer

    workstation. Most NICs are internal, with the card fitting into an expansion slot inside the

    computer. Some computers, such as Mac Classics, use external boxes which are attached

    to a serial port or a SCSI port. Laptop computers generally use external LAN adapters

    connected to the parallel port or network cards that slip into a PCMCIA slot.

    Network interface cards are a major factor in determining the speed and performance of a

    network. It is a good idea to use the fastest network card available for the type of

    workstation you are using.

    The three most common network interface connections are Ethernet cards, LocalTalk

    connectors, and Token Ring cards. According to a International Data Corporation study,

    Ethernet is the most popular, followed by Token Ring and LocalTalk (Sant'Angelo, R.

    (1995). NetWare Unleashed, Indianapolis, IN: Sams Publishing).

    Ethernet

    Local area network (LAN) developed by Xerox, Digital and Intel. It connects up to 1,024

    nodes in a bus topology at 10 Mbits per second over twisted pair, coax and optical fiber.

    Faster Ethernets are coming, including Fast Ethernet, which runs at 100 Mbits per

  • 8/7/2019 ARAVINDA PROJECT REPORT

    11/54

    second, and switched Ethernet, which gives each user a 10 Mbits/sec channel. Ethernet is

    the most widely used LAN. Token Ring is next.

    Standard Ethernet, or "Thick Ethernet" requires a thicker coax cable, but can run as far as

    1,640 feet without using repeaters. Attachment is made by clamping a transceiver, which

    is cabled to the adapter card, onto the main bus cable.

    Thin Ethernet, also "ThinNet" and "CheaperNet" uses a thinner, less-expensive coax that

    is easier to daisy chain together using T-type BNC connectors. The transceivers are built

    into the adapter cards.

    Twisted pair Ethernet allows installed telephone wire to be used, and Fiber Optic

    Ethernet is impervious to external radiation. Both use a star topology for easier

    debugging of failed nodes. Ethernet is a data link protocol and functions at the data link

    and physical levels of the OSI model (1 and 2). It uses the CSMA/CD access method and

    conforms to the IEEE 802.3 standard.

    Hub

    Central connecting device for communications lines in a star topology. "Passive hubs"

    add nothing to the data being transmitted. "Active hubs" regenerate signals and may

    monitor traffic for network management. "Intelligent hubs" are computers that provide

    network arrangement and may also include bridging, routing and gateway capabilities.

    The hub's star topology improves troubleshooting over bus topology, in which all nodes

    are connected to a common cable. Hubs can be added to Ethernet (bus) networks for

    improved network arrangement. Both hubs and routers may be inserted into the middle of

    a network in order to improve performance and network management.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    12/54

    Router

    Computer system that routes messages from one LAN (local area network) to another. It

    is used to internetwork similar and dissimilar networks and can select the most expedient

    route based on traffic load, line speeds and costs and network failures. Routers maintain

    address tables for all nodes in the network and work at OSI layer 3. Routers are used to break apart the LAN into smaller LANs for improved security, troubleshooting and

    performance. Routers with high-speed (gigabit) buses may serve as an internet backbone,

    connecting all networks in the enterprise.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    13/54

    DSU/CSU

    (Data Service Unit/Channel Service Unit) Pair of communications devices that connect

    an in house line to an external digital circuit (T1, DDS, etc.). It is similar to a modem, but

    connects a digital circuit rather than an analog one. The CSU terminates the external lineat the customer's premises. It also provides diagnostics and allows for remote testing. If

    the customer's communications devices are T1 ready and have the proper interface, then

    the CSU is not required, only the DSU. The DSU does the actual transmission and

    receiving of the signal and provides buffering and flow control. The DSU and CSU are

    often in the same unit. The DSU may also be built into the multiplexer, commonly used

    to combine digital signals for high-speed lines.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    14/54

    BENEFITS OF NETWORKING

    Most of the benefits of networking can be divided into two generic categories:connectivity and sharing . Networks allow computers, and hence their users, to be

    connected together. They also allow for the easy sharing of information and resources,

    and cooperation between the devices in other ways. Since modern business depends so

    much on the intelligent flow and management of information, this tells you a lot about

    why networking is so valuable.

    Here, in no particular order, are some of the specific advantages generally associated with

    networking:

    o Connectivity and Communication: Networks connect computers and the users

    of those computers. Individuals within a building or work group can be connected

    into local area networks (LANs) ; LANs in distant locations can be interconnected

    into larger wide area networks (WANs) . Once connected, it is possible for network

    users to communicate with each other using technologies such as electronic mail.

    This makes the transmission of business (or non-business) information easier,

    more efficient and less expensive than it would be without the network.

    o Data Sharing: One of the most important uses of networking is to allow the

    sharing of data. Before networking was common, an accounting employee who

    wanted to prepare a report for her manager would have to produce it on his PC,

    put it on a floppy disk, and then walk it over to the manager, who would transfer

    the data to her PC's hard disk. (This sort of shoe-based network was sometimes

    sarcastically called a sneakernet.)

    True networking allows thousands of employees to share data much more easily

    and quickly than this. More so, it makes possible applications that rely on the

    ability of many people to access and share the same data, such as databases, group

  • 8/7/2019 ARAVINDA PROJECT REPORT

    15/54

    software development, and much more Intranets and extranets can be used to

    distribute corporate information between sites and to business partners.

    o Hardware Sharing: Networks facilitate the sharing of hardware devices. For

    example, instead of giving each of 10 employees in a department an expensivecolor printer (or resorting to the sneakernet again), one printer can be placed on

    the network for everyone to share.

    o Internet Access: The Internet is itself an enormous network, so whenever you

    access the Internet, you are using a network. The significance of the Internet on

    modern society is hard to exaggerate, especially for those of us in technical fields.

    o Internet Access Sharing: Small computer networks allow multiple users to sharea single Internet connection. Special hardware devices allow the bandwidth of the

    connection to be easily allocated to various individuals as they need it, and permit

    an organization to purchase one high-speed connection instead of many slower

    ones.

    o Data Security and Management: In a business environment, a network allows

    the administrators to much better manage the company's critical data. Instead of

    having this data spread over dozens or even hundreds of small computers in a

    haphazard fashion as their users create it, data can be centralized on shared

    servers. This makes it easy for everyone to find the data, makes it possible for the

    administrators to ensure that the data is regularly backed up, and also allows for

    the implementation of security measures to control who can read or change

    various pieces of critical information.

    o Performance Enhancement and Balancing: Under some circumstances, a

    network can be used to enhance the overall performance of some applications by

    distributing the computation tasks to various computers on the network.

    Entertainment: Networks facilitate many types of games and entertainment. The

    Internet itself offers many sources of entertainment, of course. In addition, many multi-

  • 8/7/2019 ARAVINDA PROJECT REPORT

    16/54

    player games exist that operate over a local area network. Many home networks are set

    up for this reason, and gaming across wide area networks (including the Internet) has also

    become quite popular. Of course, if you are running a business and have easily-amused

    employees, you might insist that this is really a disadvantage of networking and not an

    advantage.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    17/54

    SCOPE OF THIS REPORT

    PROBLEMS

    The goal of this project is to provide a Local Area Network (LAN) solution for a medium

    scale company which has two buildings each with four floors. Both buildings are located

    closely.

    Currently the company has about 120 desktop computers, but does not have a computer

    network.The company needs to interconnect all computers, because it needs to enhance the

    efficiency of the company to provide services for its customers effectively.

    SOLUTION

    My work is to use this documentation to provide a Local Area Network (LAN) solution

    for the company. The initial goal is to connect all computers in each building into two

    switches separately by using VLAN (Virtual LAN) technology. The second goal is to

    connect both switches in both buildings using the fiber optic transmission medium.

    Following are the main aspects of my enterprise network solution.

    1. Use Switches

    2. Use Fiber Transmission Media

    3. Use Structured Cabling Techniques

    4. Implement Virtual LAN (VLAN)

    5. Use Ethernet Technology (IEEE 802.3)

    6. Use IP addressing

  • 8/7/2019 ARAVINDA PROJECT REPORT

    18/54

    TECHNICAL OVERVIEW OF THE

    PROPOSED NETWORK ARCHITECTURE

    SWITCH

    THE SWITCHING TECHNOLOGY

    Local Area Network is the interface between the end user and the IT world behind. The

    fundamental secret behind a good user experience is an un-congested, high performance

    LAN. I proposed the LAN with Cisco Networking Equipments to address the high

    availability, scalability, performance and security. The core switches which are in both

    buildings are connected using two fiber optic links. Access switches which are in both

    buildings are connected to core switches separately.

    There are two types of switches are proposed to use for this LAN. They are,

    1. Core Switches

    2. Access Switches

    CORE SWITCHES

    I proposed Cisco Catalyst 4506 switch (6-slot) as the core switches.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    19/54

    Resilient Layer 3 switching intelligent Layer 3 and 4 services

    240 - 10/100/1000 connectivity

    4 GbE and 2 10 GbE Uplinks

    11 RU

    108 Gbps Backplane

    Cisco Catalyst 4506 Chassis Features

    Total Number of Slots 6

    Supervisor Engine Slots 1 1

    Supervisor Engine Redundancy No

    Supervisor Engines SupportedSupervisor Engine II-Plus, II-Plus-10GE,

    IV, V, V-10GE

    Line Card Slots 5

    Number of Power Supply Bays 2

    AC Input Power Yes

    DC Input Power Yes

    Integrated Power over Ethernet Yes

    Minimum Number of Power Supplies 1

    Number of Fan Tray Bays 1Location of 19-inch Rack-Mount 2 Front

    Location of 23-inch Rack-Mount Front (option)

    1 Slot 1 is reserved for supervisor engine only; slots 2 and higher are reserved for line

    cards.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    20/54

  • 8/7/2019 ARAVINDA PROJECT REPORT

    21/54

    10/100/1000 Ethernet port and one Small Form-Factor Pluggable (SFP)-based

    Gigabit Ethernet port, with one port active at a time

    Limited Lifetime Warranty

    Network security through a wide range of authentication methods, data

    encryption technologies, and network admission control based on users, ports,

    and MAC addresses

    Auto-configuration for specialized applications using Smartports

    This switch has 24 Ethernet 10/100 ports and 2 dual-purpose Gigabit Ethernet uplink

    ports; 1 RU.

    Floor

    number

    Building A Building B

    Number of

    computers

    required

    Number of

    Access

    switches

    Number of

    computers

    required

    Number of

    Access

    switches1st floor 15 1 15 1

    2nd

    floor 15 1 15 1

    3rd floor 15 1 15 1

    4 th floor 15 1 15 1

    Total 60 4 60 4

    TYPES OF NETWORK CONNECTORS AND CABLES

  • 8/7/2019 ARAVINDA PROJECT REPORT

    22/54

    NETWORK CONNECTORS

    RJ 45 Connector

    Fiber Connectors

    RJ 45 Connector

    The RJ-45 connector is commonly used for network cabling and for telephony

    applications. It's also used for serial connections in special cases.

    Although used for a variety of purposes, the RJ-45 connector is probably most commonly

    used for 10Base-T and 100Base-TX Ethernet connections.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    23/54

    Pin #

    Ethernet

    10BASE-T

    100BASE-TX

    EIA/TIA 568AEIA/TIA 568B or AT&T

    258A

    1 Transmit + White with green strip White with orange stripe

    2 Transmit - Green with white

    stripe or solid green

    Orange with white stripe

    or solid orange

    3 Receive + White with orange

    stripe

    White with green stripe

    4 N/A Blue with white stripe

    or solid blue

    Blue with white stripe or

    solid blue

    5 N/A White with blue stripe White with blue stripe

    6 Receive - Orange with white

    stripe or solid orange

    Green with white stripe or

    solid

    7 N/A White with brown strip

    or solid brown

    White with brown strip or

    solid brown8 N/A Brown with white

    stripe or solid brown.

    Brown with white stripe or

    solid brown.

    Because only two pairs of wires in the eight-pin RJ-45 connector are used to carry

    Ethernet signals, and both 10BASE-T and 100BASE-TX use the same pins, a crossover

    cable made for one will also work with the other.

    http://www.nullmodem.com/10BaseT-Crossover.htmhttp://www.nullmodem.com/10BaseT-Crossover.htmhttp://www.nullmodem.com/10BaseT-Crossover.htmhttp://www.nullmodem.com/10BaseT-Crossover.htm
  • 8/7/2019 ARAVINDA PROJECT REPORT

    24/54

    FIBER CONNECTORS

    F iber-to-fiber interconnection can consist of a splice , a permanent connection, or a

    connector, which differs from the splice in its ability to be disconnected and reconnected.

    Fiber optic connector types are as various as the applications for which they were

    developed. Different connector types have different characteristics, different advantages

    and disadvantages, and different performance parameters.

    http://n_window%28%27http//www.fiber-optics.info/glossary-s.htm#Splice')http://n_window%28%27http//www.fiber-optics.info/glossary-s.htm#Splice')
  • 8/7/2019 ARAVINDA PROJECT REPORT

    25/54

    Connector Insertion Loss Repeatability Fiber Type Applications

    0.50-1.00 dB 0.20 dB SM, MM Datacom,

  • 8/7/2019 ARAVINDA PROJECT REPORT

    26/54

    FC

    Telecommunications

    FDDI

    0.20-0.70 dB 0.20 dB SM, MM Fiber Optic Network

    LC

    0.15 db (SM)

    0.10 dB (MM)0.2 dB SM, MM

    High Density

    Interconnection

    MT Array

    0.30-1.00 dB 0.25 dB SM, MMHigh Density

    Interconnection

    SC

    0.20-0.45 dB 0.10 dB SM, MM Datacom

    SC Duplex

    0.20-0.45 dB 0.10 dB SM, MM Datacom

    ST

    Typ. 0.40 dB

    (SM)

    Typ. 0.50 dB

    (MM)

    Typ. 0.40 dB

    (SM)

    Typ. 0.20 dB

    (MM)

    SM, MMInter-/Intra-Building,

    Security, Navy

    ST Fiber Connector

    NETWORK CABLES

    CAT 5e UTP Cable

  • 8/7/2019 ARAVINDA PROJECT REPORT

    27/54

    Fiber Optic Cable

    CAT 5e UTP Cable

    Cat 5e cable is an enhanced version of Cat 5 that adds specifications for far end

    crosstalk . It was formally defined in 2001 in the TIA/EIA-568-B standard, which no

    longer recognizes the original Cat 5 specification. Although 1000BASE-T was designed

    for use with Cat 5 cable, the tighter specifications associated with Cat 5e cable and

    connectors make it an excellent choice for use with 1000BASE-T. Despite the stricter

    performance specifications, Cat 5e cable does not enable longer cable distances for

    Ethernet networks: cables are still limited to a maximum of 328 ft (100 m) in length

    (normal practice is to limit fixed ("horizontal") cables to 90 m to allow for up to 5 m of

    patch cable at each end). Cat 5e cable performance characteristics and test methods are

    defined in TIA/EIA-568-B.2-2001.

    CAT 5e UTP cable provides performance of up to 100 MHz, frequently used for both 100 Mbit/s

    and gigabit Ethernet networks.

    Conductor : Solid Copper Wire

    Pairing :

    http://en.wikipedia.org/wiki/Far_end_crosstalkhttp://en.wikipedia.org/wiki/Far_end_crosstalkhttp://en.wikipedia.org/wiki/TIA/EIA-568-Bhttp://en.wikipedia.org/wiki/Gigabit_Ethernet#1000BASE-Thttp://en.wikipedia.org/wiki/Far_end_crosstalkhttp://en.wikipedia.org/wiki/Far_end_crosstalkhttp://en.wikipedia.org/wiki/TIA/EIA-568-Bhttp://en.wikipedia.org/wiki/Gigabit_Ethernet#1000BASE-T
  • 8/7/2019 ARAVINDA PROJECT REPORT

    28/54

    Blue + White/Blue

    Orange + White/Orange

    Green + White/Green

    Brown + White/Brown

    Cabling : Four unshielded twisted pairs

    Connector : RJ 45

    Applications of CAT 5e Cable

    Ethernet 10/100/1000 BASE-T

    155 Mbps ATM

    4/16 Mbps Token Ring

    Analog and Digital VOIP

    100 Mbps TP-PMD

  • 8/7/2019 ARAVINDA PROJECT REPORT

    29/54

    OPTICAL FIBER TECHNOLOGY

    A fiber-optic system is similar to the copper wire system that fiber-optics is replacing.The difference is that fiber-optics use light pulses to transmit information down fiber

    lines instead of using electronic pulses to transmit information down copper lines.

    Looking at the components in a fiber-optic chain will give a better understanding of how

    the system works in conjunction with wire based systems.

    Light pulses move easily down the fiber-optic line because of a principle known as total

    internal reflection. "This principle of total internal reflection states that when the angle of

    incidence exceeds a critical value, light cannot get out of the glass; instead, the light

    bounces back in. When this principle is applied to the construction of the fiber-optic

    strand, it is possible to transmit information down fiber lines in the form of light pulses.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    30/54

    There are two main types of optical fiber cables: single mode and multimode optical

    fiber.

    Single Mode Fiber

    Single Mode Fiber cable is a single stand of glass fiber with a diameter of 8.3 to 10

    microns that has one mode of transmission. Single Mode Fiber with a relatively narrow

    diameter, through which only one mode will propagate typically 1310 or 1550nm. Carries

    higher bandwidth than multimode fiber, but requires a light source with a narrow spectral

    width. Synonyms mono-mode optical fiber, single-mode fiber, single-mode optical

    waveguide, uni-mode fiber.

    Single-mode fiber gives you a higher transmission rate and up to 50 times more distance

    than multimode, but it also costs more. Single-mode fiber has a much smaller core than

    multimode. The small core and single light-wave virtually eliminate any distortion that

    could result from overlapping light pulses, providing the least signal attenuation and the

    highest transmission speeds of any fiber cable type.

    Multimode fiber

    The propagation of light through a multi-mode optical fiber.

    Fiber with large (greater than 10 m ) core diameter may be analyzed by geometric optics.

    Such fiber is called multimode fiber , from the electromagnetic analysis. In a step-index

    multimode fiber, rays of light are guided along the fiber core by total internal reflection.

    Rays that meet the core-cladding boundary at a high angle (measured relative to a line

    normal to the boundary), greater than the critical angle for this boundary, are completely

    reflected. The critical angle (minimum angle for total internal reflection) is determined by

    the difference in index of refraction between the core and cladding materials. Rays that

    meet the boundary at a low angle are refracted from the core into the cladding, and do not

    convey light and hence information along the fiber. The critical angle determines the

    acceptance angle of the fiber, often reported as a numerical aperture. A high numerical

    aperture allows light to propagate down the fiber in rays both close to the axis and at

    http://en.wikipedia.org/wiki/Micrometrehttp://en.wikipedia.org/wiki/Geometric_opticshttp://en.wikipedia.org/wiki/Multi-mode_fiberhttp://en.wikipedia.org/wiki/Ray_(optics)http://en.wikipedia.org/wiki/Surface_normalhttp://en.wikipedia.org/wiki/Critical_anglehttp://en.wikipedia.org/wiki/Corehttp://en.wikipedia.org/wiki/Acceptance_anglehttp://en.wikipedia.org/wiki/Numerical_aperturehttp://en.wikipedia.org/wiki/Micrometrehttp://en.wikipedia.org/wiki/Geometric_opticshttp://en.wikipedia.org/wiki/Multi-mode_fiberhttp://en.wikipedia.org/wiki/Ray_(optics)http://en.wikipedia.org/wiki/Surface_normalhttp://en.wikipedia.org/wiki/Critical_anglehttp://en.wikipedia.org/wiki/Corehttp://en.wikipedia.org/wiki/Acceptance_anglehttp://en.wikipedia.org/wiki/Numerical_aperture
  • 8/7/2019 ARAVINDA PROJECT REPORT

    31/54

    various angles, allowing efficient coupling of light into the fiber. However, this high

    numerical aperture increases the amount of dispersion as rays at different angles have

    different path lengths and therefore take different times to traverse the fiber. A low

    numerical aperture may therefore be desirable.

    In graded-index fiber, the index of refraction in the core decreases continuously between

    the axis and the cladding. This causes light rays to bend smoothly as they approach the

    cladding, rather than reflecting abruptly from the core-cladding boundary. The resulting

    curved paths reduce multi-path dispersion because high angle rays pass more through the

    lower-index periphery of the core, rather than the high-index center. The index profile is

    chosen to minimize the difference in axial propagation speeds of the various rays in the

    fiber. This ideal index profile is very close to a parabolic relationship between the indexand the distance from the axis.

    Multimode fiber gives you high bandwidth at high speeds over medium distances. Light

    waves are dispersed into numerous paths, or modes, as they travel through the cable's

    core typically 850 or 1300nm. Typical multimode fiber core diameters are 50, 62.5, and

    100 micrometers. However, in long cable runs (greater than 3000 feet [914.4 ml),

    multiple paths of light can cause signal distortion at the receiving end, resulting in an

    unclear and incomplete data transmission.

    http://en.wikipedia.org/wiki/Dispersion_(optics)http://en.wikipedia.org/wiki/Optical_path_lengthhttp://en.wikipedia.org/wiki/Parabolahttp://en.wikipedia.org/wiki/Dispersion_(optics)http://en.wikipedia.org/wiki/Optical_path_lengthhttp://en.wikipedia.org/wiki/Parabola
  • 8/7/2019 ARAVINDA PROJECT REPORT

    32/54

    Following diagram shows the structure of a Single Mode Fiber cable.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    33/54

    STRUCTURED CABLING PLANNING

    Horizontal Cabling System

    All the UTP Data cables will be according to the star Topology. Cabling & the Termination standard will be According to TIA/EIA -568B/A

    Standard.

    All the horizontal cabling will be CAT6 UTP Giga Speed Cables.

    All the Horizontal Cabling will be within 90 meters length.

    All the Horizontal Cabling will be originated from the Switch / Patch Panel

    location from the same floor Area.

    All the Cabling Accessories (Patch Panel, Cables, Outlets, Patch cords And Fly

    cords) will be CAT6 Standard.

    Conduits are caring the UTP cables will have 40% leverage.

    Only one cross connect will have between the Outlet and the Switch on the

    cabling.

    All the Equipment Mounting cabinets will be according the 19 EIA standard,

    lockable Glass Door, Type.

    All the horizontal cabling will be over 350 MHz and 24 AWG Solid Conducting

    Cables.

    All the patch Panels designed for Gaga speed data communication , and with

    industry Standard with ANSI/TIA/EIA 568A/A compliant, 19 rack mountable

    and cables guiders on the patch panel it self , and with the cables management

    panel at the behind of the patch panel & Paper Numbering System.

    All the Outlets will be RJ45, meet with ISO/IEC 11801:2002 Class EIA/TIA

    568A/B CAT6 Compatible Fast Ethernet, And Giga Bit Ethernet.

    Dual face Plates will provide for all the Out lets, for the future expansions the 6cables access cable length will be managed every data outlet.

    All the UTP cables will be labeled from each end, patch panel, and on the face

    plates according to the Standard numbering system.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    34/54

    All the patch cords and Fly cord will be 0.9m and 3m respectively and,

    Supporting up to Giga Speeds, and Factory terminated, and tested to meet

    EIA/TIA 568 B-2.1 Standard.

    All the UTP Outlets Will is RJ45; meet with ISO/IEC 11801:2002 Class EIA/TIA

    568A/B CAT6 Compatible.

    All the Racks will ground according to the TIA/EIA -607 Standards.

    Fiber Backbone Cabling System

    All the Switch Locations /Rack Locations will be connected according to the

    Hierarchical Star Topology.

    All the Indoor Fiber Cables Are according to IEEE 802.3z standards.

    All the indoor Fiber Cables Are Riser rated, Tight Buffered and Consist with 08

    cores.

    Fiber Cables will be 50/125 microns.

    All cables are Support to communicate Fast Ethernet & 10 Gigabit Ethernet.

    All the Fiber Connectors will be Sc MM Simplex type.

    All the Fiber Patch Panel Couplers Will is MM Duplex Type and meets the

    Required Standard.

    All the Fiber Cables will be labeled end to end and will be tested for continuity

    before, after and will be certified for the required parameters given after the

    termination.

    Testing & Certification of the UTP Network and the Fiber back Bone

    UTP Testing & Certification will be done by Fluke DTX 1800 Series Certification

    tool & It Will test For , Wire Map, Length & Delay , NEXT, Attenuation, Return

    Loss , Power Sum ELFXT, ACR, Power Sum NEXT, ELFEXT , Propagation

    Delay, and the Delay Skew.

    Fiber back Bone System Will Be tested By OTDR Tester. For the Following

    Parameters 850, 1500 and 1550 ns.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    35/54

    General

    All the Partition areas will cover with 02 compartments PVC Trunking System.

    Ceiling Area Cables will run through the Proper bracket System and covered withConduits.

    Underground Parts will be supplied a 1X6 compartment GI Trunking System

    with a lid (Same floor Lever will be maintaining)

  • 8/7/2019 ARAVINDA PROJECT REPORT

    36/54

    VIRTUAL LOCAL AREA NETWORKS (VLANs)

    A VLAN consists of several end systems, either hosts or network equipment (such as

    switches and routers), all of which are members of a single logical broadcast domain. A

    VLAN no longer has physical proximity constraints for the broadcast domain. This

    VLAN is supported on various pieces of network equipment (for example, LAN

    switches) that support VLAN trunking protocols between them. Each VLAN supports a

    separate Spanning Tree (IEEE 802.1d).

    First-generation VLANs are based on various OSI Layer 2 bridging and multiplexing

    mechanisms, such as IEEE 802.10, LAN Emulation (LANE), and Inter-Switch Link

    (ISL), that allow the formation of multiple, disjointed, overlaid broadcast groups on a

    single network infrastructure. Figure shows an example of a switched LAN network that

    uses VLANs. Layer 2 of the OSI reference model provides reliable transit of data across a

    physical link. The data link layer is concerned with physical addressing, network

    topology, line discipline, error notification, ordered delivery frames, and flow control.

    The IEEE has divided this layer into two sub layers: the MAC sub layer and the LLC sub

    layer, sometimes simply called link layer.

    http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2012.htm#wp3386http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2012.htm#wp3386
  • 8/7/2019 ARAVINDA PROJECT REPORT

    37/54

    TYPICAL VLAN TECHNOLOGY

    In Figure 10-Mbps Ethernet connects the hosts on each floor to switches A, B, C, and D.

    100-Mbps Fast Ethernet connects these to Switch E. VLAN 10 consists of those hosts on

    http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2012.htm#wp3386http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2012.htm#wp3386
  • 8/7/2019 ARAVINDA PROJECT REPORT

    38/54

    Ports 6 and 8 of Switch A and Port 2 on Switch B. VLAN 20 consists of those hosts that

    are on Port 1 of Switch A and Ports 1 and 3 of Switch B.

    VLANs can be used to group a set of related users, regardless of their physical

    connectivity. They can be located across a campus environment or even across

    geographically dispersed locations. The users might be assigned to a VLAN because they

    belong to the same department or functional team, or because data flow patterns among

    them is such that it makes sense to group them together. Note, however, that without a

    router, hosts in one VLAN cannot communicate with hosts in another VLAN.

    VALN IMPLEMENTATION

    This section describes the different methods of creating the logical groupings (or

    broadcast domains) that make up various types of VLANs. There are three ways of

    defining a VLAN:

    By port Each port on the switch can support only one VLAN. With port-based

    VLANs, no Layer 3 address recognition takes place, so Internet Protocol (IP), Novell,

    and AppleTalk networks must share the same VLAN definition. All traffic within the

    VLAN is switched, and traffic between VLANs is routed (by an external router or by a

    router within the switch). This type of VLAN is also known as a segment-based VLAN .

    By protocol VLANs based on network addresses (that is, OSI Layer 3 addresses)

    can differentiate between different protocols, allowing the definition of VLANs to be

    made on a per-protocol basis. With network address-based VLANs, it will be possible to

    have a different virtual topology for each protocol, with each topology having its own set

    of rules, firewalls, and so forth. Routing between VLANs comes automatically, without

    the need for an external router or card. Network address-based VLANs will mean that a

    single port on a switch can support more than one VLAN. This type of VLAN is also

    known as a virtual subnet VLAN .

  • 8/7/2019 ARAVINDA PROJECT REPORT

    39/54

    By a user-defined value This type of VLAN is typically the most flexible, allowing

    VLANs to be defined based on the value of any field in a packet. For example, VLANs

    could be defined on a protocol basis or could be dependent on a particular IPX or

    NetBIOS service. The simplest form of this type of VLAN is to group users according to

    their MAC addresses.

    BENEFITS OF VLAN TECHNOLOGY

    In a flat, bridged network all broadcast packets generated by any node in the network are

    sent to and received by all other network nodes. The ambient level of broadcasts

    generated by the higher layer protocols in the networkknown as broadcast radiation

    will typically restrict the total number of nodes that the network can support. In extreme

    cases, the effects of broadcast radiation can be so severe that an end station spends all of

    its CPU power on processing broadcasts.

    VLANs have been designed to address the following problems inherent in a flat, bridgednetwork:

    Scalability issues of a flat network topology

    Simplification of network management by facilitating network reconfigurations

    VLANs solve some of the scalability problems of large flat networks by breaking a single

    bridged domain into several smaller bridged domains, each of which is a virtual LAN. It

    is insufficient to solve the broadcast problems inherent to a flat switched network by

    superimposing VLANs and reducing broadcast domains. VLANs without routers do not

    scale to large campus environments. Routing is instrumental in the building of scalable

    VLANs and is the only way to impose hierarchy on the switched VLAN internetwork.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    40/54

    VLANs offer the following features:

    Broadcast control Just as switches isolate collision domains for attached hosts and

    only forward appropriate traffic out a particular port, VLANs refine this concept further

    and provide complete isolation between VLANs. A VLAN is a bridging domain, and all

    broadcast and multicast traffic is contained within it.

    Security VLANs provide security in two ways:

    High-security users can be grouped into a VLAN, possibly on the same physical

    segment, and no users outside of that VLAN can communicate with them.

    Because VLANs are logical groups that behave like physically separate entities, inter-VLAN communication is achieved through a router. When inter-VLAN communication

    occurs through a router, all the security and filtering functionality that routers

    traditionally provide can be used because routers are able to look at OSI Layer 3

    information. In the case of non routable protocols, there can be no inter-VLAN

    communication. All communication must occur within the same VLAN.

    Performance The logical grouping of users allows, for example, an engineer

    making intensive use of a networked CAD/CAM station or testing a multicast applicationto be assigned to a VLAN that contains just that engineer and the servers he or she needs.

    The engineer's work does not affect the rest of the engineering group, which results in

    improved performance for the engineer (by being on a dedicated LAN) and improved

    performance for the rest of the engineering group (whose communications are not slowed

    down by the engineer's use of the network).

    Network management The logical grouping of users, divorced from their physical or

    geographic locations, allows easier network management. It is no longer necessary to pull

    cables to move a user from one network to another. Adds, moves, and changes are

    achieved by configuring a port into the appropriate VLAN. Expensive, time-consuming

    recabling to extend connectivity in a switched LAN environment is no longer necessary

  • 8/7/2019 ARAVINDA PROJECT REPORT

    41/54

    because network management can be used to logically assign a user from one VLAN to

    another.

    ETHERNET TECHNOLOGY

    Ethernet is a large, diverse family of frame -based computer networking technologies

    that operate at many speeds for local area networks (LANs). The name comes from the

    physical concept of the ether . It defines a number of wiring and signaling standards for

    the physical layer , through means of network access at the Media Access Control

    (MAC)/ Data Link Layer , and a common addressing format.

    Ethernet has been standardized as IEEE 802.3 . The combination of the twisted pair

    versions of Ethernet for connecting end systems to the network, along with the fiber optic

    versions for site backbones, has become the most widespread wired LAN technology. It

    has been in use from the 1990s to the present, largely replacing competing LAN

    standards such as coaxial cable Ethernet, token ring , FDDI , and ARCNET. In recent

    years, Wi-Fi , the wireless LAN standardized by IEEE 802.11, has been used instead of

    Ethernet for many home and small office networks and in addition to Ethernet in larger

    installations.

    The Ethernet is covered by the IEEE 802.3 standard that defines what is commonly

    known as the CSMA/CD protocol. Three data rates are currently defined for operation

    over optical fiber and twisted-pair cables:

    10 Mbps10Base-T Ethernet

    100 MbpsFast Ethernet

    1000 MbpsGigabit Ethernet

    Ethernets protocol has the following characteristics:

    http://en.wikipedia.org/wiki/Data_framehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Luminiferous_aetherhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/As_of_2007http://en.wikipedia.org/wiki/Coaxial_cablehttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Fiber_distributed_data_interfacehttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Data_framehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Luminiferous_aetherhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/As_of_2007http://en.wikipedia.org/wiki/Coaxial_cablehttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Fiber_distributed_data_interfacehttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11
  • 8/7/2019 ARAVINDA PROJECT REPORT

    42/54

    Is easy to understand, implement, manage, and maintain

    Allows low-cost network implementations

    Provides extensive topological flexibility for network installation

    Guarantees successful interconnection and operation of standards-compliant products,

    regardless of manufacturer.

    Ethernet LANs consist of network nodes and interconnecting media. The network nodes

    fall into two major classes:

    Data terminal equipment (DTE) Devices that are either the source or the

    destination of data frames. DTEs are typically devices such as PCs, workstations, file

    servers, or print servers that, as a group, are all often referred to as end stations.

    Data communication equipment (DCE) Intermediate network devices that

    receive and forward frames across the network. DCEs may be either standalone devices

    such as repeaters, network switches, and routers, or communications interface units such

    as interface cards and modems.

    Throughout this chapter, standalone intermediate network devices will be referred to as

    either intermediate nodes or DCEs . Network interface cards will be referred to as NICs .

    The current Ethernet media options include two general types of copper cable: unshielded

    twisted-pair (UTP) and shielded twisted-pair (STP), plus several types of optical fiber

    cable.

    Ethernet Network Topologies and Structures

    LANs take on many topological configurations, but regardless of their size or complexity,

    all will be a combination of only three basic interconnection structures or network

    building blocks.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    43/54

    The simplest structure is the point-to-point interconnection, shown in Figure 7-1. Only

    two network units are involved, and the connection may be DTE-to-DTE, DTE-to-DCE,

    or DCE-to-DCE. The cable in point-to-point interconnections is known as a network link.

    The maximum allowable length of the link depends on the type of cable and the

    transmission method that is used.

    Figure 7-1 Example Point-to-Point Interconnection

    The original Ethernet networks were implemented with a coaxial bus structure, as shown

    in Figure 7-2. Segment lengths were limited to 500 meters, and up to 100 stations could

    be connected to a single segment. Individual segments could be interconnected with

    repeaters, as long as multiple paths did not exist between any two stations on the network

    and the number of DTEs did not exceed 1024. The total path distance between the most-

    distant pair of stations was also not allowed to exceed a maximum prescribed value.

    Figure 7-2 Example Coaxial Bus Topology

  • 8/7/2019 ARAVINDA PROJECT REPORT

    44/54

    Although new networks are no longer connected in a bus configuration, some older bus-

    connected networks do still exist and are still useful.

    Since the early 1990s, the network configuration of choice has been the star-connected

    topology, shown in Figure 7-3. The central network unit is either a multiport repeater

    (also known as a hub) or a network switch. All connections in a star network are point-to-

    point links implemented with either twisted-pair or optical fiber cable.

    Figure 7-3 Example Star-Connected Topology

    The IEEE 802.3 Logical Relationship to the ISO Reference Model

    Figure 7-4 shows the IEEE 802.3 logical layers and their relationship to the OSI

    reference model. As with all IEEE 802 protocols, the ISO data link layer is divided into

    two IEEE 802 sublayers, the Media Access Control (MAC) sublayer and the MAC-client

    sublayer. The IEEE 802.3 physical layer corresponds to the ISO physical layer.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    45/54

  • 8/7/2019 ARAVINDA PROJECT REPORT

    46/54

    (indicated by a 0) or locally administered (indicated by a 1). The remaining 46 bits are a

    uniquely assigned value that identifies a single station, a defined group of stations, or all

    stations on the network.

    Source addresses (SA) Consists of 6 bytes. The SA field identifies the sending

    station. The SA is always an individual address and the left-most bit in the SA field is

    always 0.

    Length/Type Consists of 2 bytes. This field indicates either the number of MAC-

    client data bytes that are contained in the data field of the frame, or the frame type ID if

    the frame is assembled using an optional format. If the Length/Type field value is less

    than or equal to 1500, the number of LLC bytes in the Data field is equal to the

    Length/Type field value. If the Length/Type field value is greater than 1536, the frame is

    an optional type frame, and the Length/Type field value identifies the particular type of

    frame being sent or received.

    Data Is a sequence of n bytes of any value, where n is less than or equal to 1500. If

    the length of the Data field is less than 46, the Data field must be extended by adding a

    filler (a pad) sufficient to bring the Data field length to 46 bytes.

    Frame check sequence (FCS) Consists of 4 bytes. This sequence contains a 32-bit

    cyclic redundancy check (CRC) value, which is created by the sending MAC and is

    recalculated by the receiving MAC to check for damaged frames. The FCS is generated

    over the DA, SA, Length/Type, and Data fields.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    47/54

    Figure 7-6 The Basic IEEE 802.3 MAC Data Frame Format

  • 8/7/2019 ARAVINDA PROJECT REPORT

    48/54

    IP ADDRESSING

    An IP address is an address used to uniquely identify a device on an IP network. The

    address is made up of 32 binary bits which can be divisible into a network portion and

    host portion with the help of a subnet mask. The 32 binary bits are broken into four octets

    (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot). For

    this reason, an IP address is said to be expressed in dotted decimal format (for example,

    172.16.81.100). The value in each octet ranges from 0 to 255 decimal, or 00000000 -

    11111111 binary.

    This is sample shows an IP address represented in both binary and decimal.

    10. 1. 23. 19 (decimal)

    00001010.00000001.00010111.00010011 (binary)

    These octets are broken down to provide an addressing scheme that can accommodate

    large and small networks. There are five different classes of networks, A to E. This

    document focuses on addressing classes A to C, since classes D and E are reserved and

    discussion of them is beyond the scope of this document.

    Given an IP address, its class can be determined from the three high-order bits. Figure 1shows the significance in the three high order bits and the range of addresses that fall into

    each class. For informational purposes, Class D and Class E addresses are also shown.

    http://www.cisco.com/warp/public/701/3.html#figonehttp://www.cisco.com/warp/public/701/3.html#figone
  • 8/7/2019 ARAVINDA PROJECT REPORT

    49/54

    Figure 1

    In a Class A address, the first octet is the network portion, so the Class A example in

    Figure 1 has a major network address of 10. Octets 2, 3, and 4 (the next 24 bits) are for

    the network manager to divide into subnets and hosts as he/she sees fit. Class A addresses

    are used for networks that have more than 65,536 hosts (actually, up to 16777214 hosts!).

    In a Class B address, the first two octets are the network portion, so the Class B example

    in Figure 1 has a major network address of 172.16. Octets 3 and 4 (16 bits) are for local

    subnets and hosts. Class B addresses are used for networks that have between 256 and

    65534 hosts.

    In a Class C address, the first three octets are the network portion. The Class C example

    in Figure 1 has a major network address of 193.18.9. Octet 4 (8 bits) is for local subnets

    and hosts - perfect for networks with less than 254 hosts.

    http://www.cisco.com/warp/public/701/3.html#figonehttp://www.cisco.com/warp/public/701/3.html#figonehttp://www.cisco.com/warp/public/701/3.html#figonehttp://www.cisco.com/warp/public/701/3.html#figonehttp://www.cisco.com/warp/public/701/3.html#figonehttp://www.cisco.com/warp/public/701/3.html#figone
  • 8/7/2019 ARAVINDA PROJECT REPORT

    50/54

    Network Masks

    A network mask helps you know which portion of the address identifies the network and

    which portion of the address identifies the node. Class A, B, and C networks have default

    masks, also known as natural masks, as shown here:

    Class A: 255.0.0.0

    Class B: 255.255.0.0

    Class C: 255.255.255.0

    An IP address on a Class A network that has not been subnetted would have an

    address/mask pair similar to: 8.20.15.1 255.0.0.0. To see how the mask helps you identify

    the network and node parts of the address, convert the address and mask to binary

    numbers.

    8.20.15.1 = 00001000.00010100.00001111.00000001

    255.0.0.0 = 11111111.00000000.00000000.00000000

    Once you have the address and the mask represented in binary, then identifying the

    network and host ID is easier. Any address bits which have corresponding mask bits set

    to 1 represent the network ID. Any address bits that have corresponding mask bits set to 0

    represent the node ID.

    8.20.15.1 = 00001000.00010100.00001111.00000001

    255.0.0.0 = 11111111.00000000.00000000.00000000

    -----------------------------------

    net id | host id

    netid = 00001000 = 8

    hostid = 00010100.00001111.00000001 = 20.15.1

  • 8/7/2019 ARAVINDA PROJECT REPORT

    51/54

    Understanding Subnetting

    Subnetting allows you to create multiple logical networks that exist within a single Class

    A, B, or C network. If you do not subnet, you will only be able to use one network from

    your Class A, B, or C network, which is unrealistic.

    Each data link on a network must have a unique network ID, with every node on that link

    being a member of the same network. If you break a major network (Class A, B, or C)

    into smaller subnetworks, it allows you to create a network of interconnecting

    subnetworks. Each data link on this network would then have a unique

    network/subnetwork ID. Any device, or gateway, connecting n networks/subnetworks has

    n distinct IP addresses, one for each network / subnetwork that it interconnects.

    To subnet a network, extend the natural mask using some of the bits from the host ID

    portion of the address to create a subnetwork ID. For example, given a Class C network

    of 204.15.5.0 which has a natural mask of 255.255.255.0, you can create subnets in this

    manner:

    204.15.5.0 - 11001100.00001111.00000101.00000000

    255.255.255.224 - 11111111.11111111.11111111.11100000

    --------------------------|sub|----

    By extending the mask to be 255.255.255.224, you have taken three bits (indicated by

    "sub") from the original host portion of the address and used them to make subnets. With

    these three bits, it is possible to create eight subnets. With the remaining five host ID bits,

    each subnet can have up to 32 host addresses, 30 of which can actually be assigned to a

    device since host ids of all zeros or all ones are not allowed (it is very important to

    remember this). So, with this in mind, these subnets have been created.

    204.15.5.0 255.255.255.224 host address range 1 to 30

    204.15.5.32 255.255.255.224 host address range 33 to 62

    204.15.5.64 255.255.255.224 host address range 65 to 94

    204.15.5.96 255.255.255.224 host address range 97 to 126

    204.15.5.128 255.255.255.224 host address range 129 to 158

    204.15.5.160 255.255.255.224 host address range 161 to 190

  • 8/7/2019 ARAVINDA PROJECT REPORT

    52/54

  • 8/7/2019 ARAVINDA PROJECT REPORT

    53/54

    of 255.255.255.224 (/27) allows you to have eight subnets, each with 32 host addresses

    (30 of which could be assigned to devices). If you use a mask of 255.255.255.240 (/28),

    the break down is:

    204.15.5.0 - 11001100.00001111.00000101.00000000

    255.255.255.240 - 11111111.11111111.11111111.11110000

    --------------------------|sub |---

    Since you now have four bits to make subnets with, you only have four bits left for host

    addresses. So in this case you can have up to 16 subnets, each of which can have up to 16

    host addresses (14 of which can be assigned to devices).

    Take a look at how a Class B network might be subnetted. If you have network

    172.16.0.0 ,then you know that its natural mask is 255.255.0.0 or 172.16.0.0/16.

    Extending the mask to anything beyond 255.255.0.0 means you are subnetting. You can

    quickly see that you have the ability to create a lot more subnets than with the Class C

    network. If you use a mask of 255.255.248.0 (/21), how many subnets and hosts per

    subnet does this allow for?

    172.16.0.0 - 10101100.00010000.00000000.00000000

    255.255.248.0 - 11111111.11111111.11111000.00000000

    -----------------| sub |-----------

    You are using five bits from the original host bits for subnets. This will allow you to have

    32 subnets (2 5). After using the five bits for subnetting, you are left with 11 bits for host

    addresses. This will allow each subnet so have 2048 host addresses (2 11), 2046 of which

    could be assigned to devices.

  • 8/7/2019 ARAVINDA PROJECT REPORT

    54/54

    PROPOSED NETWORK ARCHITECTURE