DESIGN AND IMPLEMENTATION OF OPTIMIZED FEATURES IN A LOCAL AREA NETWORK FOR IMPROVED ENTERPRISE

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1791
  • Access Fee: ₦5,000 ($14)
  • Pages: 85 Pages
  • Format: Microsoft Word
  • Views: 185
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

TABLE OF CONTENTS

ACKNOWLEDGEMENTS ......................................................................................................... iv

LIST OF FIGURES ....................................................................................................................... v

TABLE OF CONTENTS ............................................................................................................. vi

ABSTRACT ................................................................................................................................... x

CHAPTER ONE ............................................................................................................................ 1

INTRODUCTION ......................................................................................................................... 1

1.0 Introduction ............................................................................................................................ !

1.1 Background Study .................................................................................................................. 1

1.2 Problem Statement ................................................................................................................. 2

1.3 Aims and Objectives ......................................... : .................................................................... 3

1.4 Significance of the study ........................................................................................................ 3

1.5 scope of the study ................................................................................................................... 3

1.7 Structure of project ................................................................................................................ 4

CHAPTER 2 ................................................................................................................................... 5

LITERATURE REVIEW ............................... .' ............................................................................. 5

2.0 Introduction ............................................................................................................................ 5

2.1 Building a Good Network ...................................................................................................... 5

2.2 Network Requirements .......................................................................................................... 6

2.3 Hierarchical Network Model ................................................................................................. 7

2.4 Hierarchical Network Design .............................................................................................. 12

2.4.1 Core Layer ........................................................................................................................ 13

2.4.2 Distribution Layer ............................................................................................................. l3

2.4.3 Access Layer ..................................................................................................................... 14

2.5 Migrating the L2/L3 Boundary to the Access Layer ........................................................... 15

2.6 Collapsed Core Design ........................................................................................................ 17

2.7 The Ente1prise Architecture ................................................................................................. IS

2.8 Smmnary .............................................................................................................................. 19

vi

CHAPTER 3 ................................................................................................................................. 20

METHODOLOGY ...................................................................................................................... 20

3.0 Overview of LAN services .................................................................................................. 21

3.1 LAN Layer 2 Technologies ................................................................................................. 22

3 .1.1 Layer 2 Addressing ........................................................................................................... 22

3 .1.2 Switching .......................................................................................................................... 23

3 .1.3 802.1 Q and Layer 2 Protocol Tunneling ........................................................................... 23

3 .1.4 CDP ................................................................................................................................... 24

3 .1.5 EtherChmmel Bundles ...................................................................................................... 24

3 .1. 6 Jumbo Frames ................................................................................................................... 24

3 .1. 7 MST .................................................................................................................................. 24

3 .1.8 PVRST + ............................................................................................................................ 25

3 .1.9 QoS ................................................................................................................................... 25

3 .1.1 0 Spanning Tree Protocol. .................................................................................................. 26

3 .1.11 sso .................. """" ............................. " .......... " " ....... " ................................................ 27

3 .1.12 UBRL .............................................................................................................................. 27

3 .1.13 UDLD ............................................................................................................................. 27

3 .1.14 Unidirectional Ethernet ................................................................................................... 28

3 .1.15 VLANs ............................................................................................................................ 28

3 .2 Layer 3 Switching Features ................................................................................................. 29

3 .2.1 Network Layer Addresses ................................................................................................. 29

3 .2.2 IPv4 Addressing ................................................................................................................ 30

3 .2.3 IPv6 Addressing ................................................................................................................ 31

3 .2.4 CEF ................................................................................................................................... 32

3.2.5 HSRP ................................................................................................................................. 32

3 .2.6 IP Routing Protocols ......................................................................................................... 33

3 .2.6.1 RIP ................................................................................................................................. 33

3 .2.6.2 OSPF .............................................................................................................................. 34

3 .2.6.3 IS-IS ............................................................................................................................... 35

3 .2.6.4 IGRP .............................................................................................................................. 36

3 .2.6.5 EIGRP ............................................................................................................................ 36

vii

3.2.6.6 BGP ................................................................................................................................ 37

3.2.7 Multicast Services ............................................................................................................. 38

3.2.8 Policy-Based Routing ....................................................................................................... 38

3.2.9 Unidirectional Link Routing ............................................................................................. 39

3.2.10 VRF-lite .......................................................................................................................... 39

3.3 Management Features .......................................................................................................... 39

3.3.1 Cisco Network Assistant and Embedded Cisco View ....................................................... 39

3.3.2 Dynamic Host Control Protocol. ...................................................................................... .40

3.3.3 Forced 10/100 Autonegotiation ....................................................................................... .40

3.3.4 Intelligent Power Management ........................................................................................ .40

3.3.5 NetFlow Statistics ............................................................................................................ .40

3.3.6 Secure Shell ...................................................................................................................... 41

3.3. 7 Simple Network Management Protocol ............................................................................ 41

3.3.8 SPAN and RSPAN ............................................................................................................ 41

3.4 Security Features .................................................................................................................. 42

3 .4.1 Network Admission Control (NAC) ................................................................................. 42

3.4.2 802.1X Identity-Based Network Security ........................................................................ .43

3.4.3 Dynamic ARP Inspection ................................................................................................. 43

3.4.4 Dynamic Host Configuration Protocol Snooping ............................................................ .43

3.4.5 Flood Blocking .................................................................................................................. 43

3.4.6 IP Source Guard ................................................................................................................ 44

3.4.7 Local Authentication, RADIUS, and TACACS+ Authentication ................................... .44

3 .4.8 Network Security with ACLs ........................................................................................... .44

3 .4.9 Port Security ..................................................................................................................... .44

3.4.10 Storm Control... ............................................................................................................... 45

3.4.11 Utilities ............................................................................................................................ 45

3.4.11.1 Layer 2 Traceroute ...................................................................................................... .45

3.4.11.2 Time Domain Reflectometry ...................................................................................... .45

3.4.11.3 Debugging Features ..................................................................................................... 46

3.5 Sununary ............................................................................................................................. .46

viii

CHAPTER 4 ................................................................................................................................ .47

IMPLIEMTATION AND RESULT ......................................................................................... .47

4.0 Introduction ............................................................................................................................. 47

4.1 Core Switch Configuration (EIGRP) .................................................................................. .47

4.2 Distribution Switch Configuration (EIGRP) ....................................................................... 48

4.3 Access Switch Configuration (EIGRP) .............................................................................. .49

4.6 Access Switch Configuration (OSPF) .................................................................... , ............ 53

CHAPTER 5 ................................................................................................................................. 55

CONCLUSION AND RECOMMENDETION ., ....................................................................... 55

5.0 CONCLUSION .................................................................................................................... 55

5.1 RECOMMENDETION ........................................................................................................ 55

REFERENCES .............................................................................................................................. 57

APPENDIX ............................................. , ..................................................................................... 59

ABSTRACT The aim of this project was enterprise network design and implementation and also the introduction of a suitable network for most enterprise in Lagos and the rest of the world. The following project focused on three main parts: security, availability, manageability and scalability. That is, a network that is very secure, a network available 24 hour and 7 days a week, a network that is easy to manage and finally a network and can grow if need be. The enterprise campus network has evolved over the last 20 years to become a key element in this business, computing and communication infrastructure. The interrelated evolution of business and conununications technology is not slowing and the environment is currently undergoing another stage of that evolution . . It is very important for enterprise to use the latest technologies available because they provide enhanced security, increased storage capacity, high data transfer rates, real-time voice and video, and much more. Computer networking is the most crucial part of modern enterprise because this new technology takes the most important responsibilities, rather than people doing the tasks as in previous decades. It is very imp01tant for enterplise to have a well-designed network. In other to achieve that we will follow some very simple steps In Step 1, decision makers identify . requirements, and a conceptual architecture is proposed. This step occurs in the Strategy and Analysis process of the PBM Plan phase. In Step 2, the network is assessed, and a gap analysis is perf01med to detennine the infrastructure necessary to meet the requirements. The network is assessed on function, performance, and quality. In Step 3, the network topology is designed to meet the requirements and close the network gaps identified in the previous steps. A detailed design document is prepared during this phase.By the end ofthis project I must have come up with a well-structured network. That is a network that i5 well secure, easy to manage, highly available, and also a very scalable network that can support feature enterprise needs. Basically the motive for this project is just interest I developed in networking and the knowledge I got from data communication and networking

DESIGN AND IMPLEMENTATION OF OPTIMIZED FEATURES IN A LOCAL AREA NETWORK FOR IMPROVED ENTERPRISE
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1791
  • Access Fee: ₦5,000 ($14)
  • Pages: 85 Pages
  • Format: Microsoft Word
  • Views: 185
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1791
    Fee ₦5,000 ($14)
    No of Pages 85 Pages
    Format Microsoft Word

    Related Works

    The need for identification leads to the study of biometrics. Over the ages, human beings have been identified by various means, such as the Name, Complexion, Nationality, and even some uniquely assigned codes. Of all these methods, none can be used to uniquely identify an individual distinctly under all circumstances. However, research has shown... Continue Reading
    The need for identification leads to the study of biometrics. Over the ages, human beings have been identified by various means, such as the Name, Complexion, Nationality, and even some uniquely assigned codes. Of all these methods, none can be used to uniquely identify an individual distinctly under all circumstances. However, research has shown... Continue Reading
    ABSTRACT Computer image is the acquisition, processing and display of using computers.  The main purpose of this project is to design software of image transferring in a wide area network. It studies visual basic as an object oriented language, which has found a wide application in networking both local and wide areas.  This project has been... Continue Reading
    ABSTRACT Computer image is the acquisition, processing and display of using computers. The main purpose of this project is to design software of image transferring in a wide area network. It studies visual basic as an object oriented language, which has found a wide application in networking both local and wide areas. This project has been... Continue Reading
    ABSTRACT           Computer image is the acquisition, processing and display of using computers.  The main purpose of this project is to design software of image transferring in a wide area network.           It studies visual basic as an object oriented language, which has found a wide application in networking both local and wide... Continue Reading
    ABSTRACT Computer image is the acquisition, processing and display of using computers. The main purpose of this project is to design software of image transferring in a wide area network. It studies visual basic as an object oriented language, which has found... Continue Reading
    CHAPTER ONE 1.0                                     INTRODUCTION 1.1              BACKGROUND OF THE STUDY The world is fast becoming a global village and a necessary tool for this process is communication of which telecommunication is a key player. The quantum development in the telecommunications... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    The main focused of this study was to evaluate the adoption of improved rice production technologies among farmers in Kudan Local Government Area of Kaduna state. The specific objectives of the study are to: describe the socio-economic characteristics of rice farmers, identify the sources of information used by rice farmers, describe the level of... Continue Reading
    The main focused of this study was to evaluate the adoption of improved rice production technologies among farmers in Kudan Local Government Area of Kaduna state. The specific objectives of the study are to: describe the socio-economic characteristics of rice farmers, identify the sources of information used by rice farmers, describe the level of... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us