Final presentation phases1_2_3

191 views
126 views

Published on

Published in: Real Estate, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
191
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Damien
  • Damien
  • Damien
  • Damien
  • Damien
  • Damien
  • Damien
  • Damien
  • Damien
  • Damien
  • Jason
  • Jason
  • Jason
  • Jason
  • Jason
  • Jason
  • Jason
  • Jason
  • Jason
  • Jason
  • Jason
  • Jason
  • Thomas
  • Thomas
  • Thomas
  • Thomas
  • Thomas
  • Thomas
  • Damien
  • Damien
  • Damien
  • Final presentation phases1_2_3

    1. 1. Who we are● IT Networking Company based in South Eastern Suburbs● Provide network support to hundreds of customers
    2. 2. Team members● Thomas Ballantine (Project Manager)● Damien Matthys (Technical Specialist) ● Jason Lester (Technical Specialist)
    3. 3. Our aim as a business● To provide you with quality service with round the clock support that you can rely on● There is no job to big for us to take on● We are certain that we can meet your company’s needs
    4. 4. How we plan to help your business● Implement a new network structure for your business● Allowing intercommunication between all of your sites● The transition will be as seamless as possible to minimize downtime and get the results you need
    5. 5. The Upgrade● Phase 1: Establish WAN connectivity between the two new sites Singapore and New Zealand to the HQ site. With connectivity to the internet and web server.● Phase 2: Upgrade Remote 2 (New Zealand) LAN with 3 switches for redundancy and VLANS (virtual networks) for network separation and security.● Phase 3: Add a Frame Relay Switch between Remote 2 and HQ with PPP encapsulation and CHAP authentication.
    6. 6. Subnetting scheme● We have developed a subnetting scheme to allow interconnectivity within your business without purchasing further addresses● This will save you money
    7. 7. HQ Subnets:Subnet 0 192.168.157.0 Mask 255.255.255.128First Address 192.168.157.1 Broadcast 192.168.157.127Last Address 192.168.157.129 Interface Fa 0/0Subnet 1 192.168.157.128 Mask 255.255.255.128First Address 192.168.157.129 Broadcast 192.168.157.255Last Address 192.168.157.157 Interface Fa 0/1Subnet 5 192.168.159.32 Mask 255.255.255.252First Address 192.168.159.33 Broadcast 192.168.159.35Last Address 192.168.159.34 Interface Se 0/0/0Subnet 6 192.168.159.36 Mask 255.255.255.252First Address 192.168.159.37 Broadcast 192.168.159.39Last Address 192.168.159.38 Interface Se 0/0/1
    8. 8. Remote 1 Subnets:Subnet 4 192.168.159.0 Mask 255.255.255.192Mask 192.168.159.1 Broadcast 192.168.159.31Broadcast 192.168.159.30 Interface Fa 0/0Subnet 2 192.168.158.0 Mask 255.255.255.128Mask 192.168.158.1 Broadcast 192.168.158.127Broadcast 192.168.159.126 Interface Fa 0/1Subnet 5 192.168.159.32 Mask 255.255.255.252Mask 192.168.159.33 Broadcast 192.168.159.35Broadcast 192.168.159.34 Interface Se 0/0/0Subnet 7 192.168.159.40 Mask 255.255.255.252Mask 192.168.159.41 Broadcast 192.168.159.43Broadcast 192.168.159.42 Interface Se 0/0/1
    9. 9. Remote 2 Subnets:Subnet 0 192.168.156.0 Mask 255.255.255.0Mask 192.168.156.1 Broadcast 192.168.156.255Broadcast 192.168.156.254 Interface Fa 0/0Subnet 3 192.168.158.128 Mask 255.255.255.128Mask 192.168.158.129 Broadcast 192.168.158.254Broadcast 192.168.158.254 Interface Fa 0/1Subnet 6 192.168.159.36 Mask 255.255.255.252Mask 192.168.159.37 Broadcast 192.168.159.39Broadcast 192.168.159.38 Interface Se 0/0/0Subnet 7 192.168.159.40 Mask 255.255.255.252Mask 192.168.159.41 Broadcast 192.168.159.43Broadcast 192.168.159.42 Interface Se 0/0/1
    10. 10. Technologies/Configurations that will be usedPhase 1:● DHCP (Dynamic Host Configuration Protocol) to provide IP addresses to all hosts from routers.● OSPF (Open Shortest Path First) routing protocol that supports VLSM and is a link state protocol that we believe will be the best for your network.● Switch Port Security Shutdown unused ports● VLSM (Variable Length Subnet Masking) so the different sites can have their own allocated addresses from the given network address.
    11. 11. Phase 1 Physical Topology
    12. 12. Phase 1 Logical Topology
    13. 13. Phase 1 Prototype
    14. 14. Technologies/Configurations that will be usedPhase 2:● VLANs (Virtual Local Area Networks) on the Remote 2 network for the 3 separate networks: Administration, Human-resources and Manufacturing. S1 VTP is server.● Inter-VLAN routing with subinterfaces on Remote 2 router using Dot1q trunking.● VTP Server, Clients, passwords and domains.● RSTP (Rapid Spanning Tree Protocol)
    15. 15. Phase 2 Physical Topology
    16. 16. Phase 2 Logical Topology
    17. 17. Phase 2 Prototype
    18. 18. Technologies/Configurations that will be usedPhase 3:● PPP (Point to Point Protocol) encapsulation between HQ and Remote2 routers with CHAP (Challenge Handshake Protocol) for secure connections with Authentication and Encryption.● Frame Relay between Remote 2 and HQ as a backup link between LAN networks.
    19. 19. Phase 3 Physical Topology
    20. 20. Phase 3 Logical Topology
    21. 21. Phase 3 Prototype
    22. 22. Equipment● All devices will have passwords/security configured● Replace the current mixture of networking devices to all CISCO devicesNew equipment:● Cisco 1841 routers at all sites● Cisco 2960 switches at all sites● Cisco Frame Relay Switch● 19 inch racks for mounting all equipment● Power distribution and backup devices (UPS)
    23. 23. SecurityPhysical security• Locking doors for the server room and only allow authorized personnel to enter.• Install server racks that contain locking doors on them to protect from tampering or theft of the hardware.
    24. 24. SecurityVirtual security• For Virtual security we have configured CHAP authentication for PPP encapsulation.• Disabled unused ports to stop unauthorized connections to your network• password encryption to prevent authorized access.• Sticky switch ports are set up to block any unauthorized connections from mac address that are not in its mac address table.
    25. 25. Gantt Chart
    26. 26. Testing resultsCorrect IP configuration on DHCP PCsCorrect IP configuration on RoutersCorrect PPP/CHAP configurationsCorrect Frame Relay configurationsPing from wired hosts to ISP web server
    27. 27. Summary• The benefits of this upgrade will greatly improve your businesses productivity more than you ever could before.• Your sites will be connected to each other for data transfer.• You will have new networking equipment to speed up your existing network.• You will have the advantage of security between your different networks.
    28. 28. Recommendations• If there is any future growth, to continue to use the Cisco Enterprise Architecture and follow these recommendations for growth.• We are happy to assist with any further projects and we would recommend using us again as we have an in-depth knowledge of your networking system and can use this to make upgrade as smooth as possible.
    29. 29. The End

    ×