The document provides requirements for setting up the network infrastructure for NuggetLabs' new office, which will initially house 75 employees across two floors. Key requirements include supporting VoIP phones and both secure and public wireless access. The network design should include VLANs, IP addressing, equipment orders, switchport configurations and visio diagrams. An on-site visit is needed to conduct a wireless survey. The objective is to provide a proposal with the required elements by next Friday.
This document provides an overview of networking fundamentals, including network history, devices, topologies, protocols, and different types of networks such as LANs, WANs, MANs, and SANs. It also discusses virtual private networks, bandwidth measurements, the OSI model layers, TCP/IP model, encapsulation, and data communication using layers.
The document discusses the GSMA VoLTE profile, which specifies the minimum functions required for implementing voice over LTE (VoLTE) using the IP Multimedia Subsystem (IMS) standard. It was created by the GSMA to promote a single, internationally interoperable system for VoLTE in order to avoid issues from multiple non-interoperable systems being used. The profile specifies the interface between terminals and the core network for IMS functions and voice media coding for VoLTE calls. It aims to maximize international roaming and equipment investment by standardizing VoLTE implementation.
An introduction to Meraki as a company and a technology. Meraki have just been awarded visionary status is Gartners 2011 magic quadrant for Wireless LAN and have recently announced the MX range of Cloud-Managed Routers, Meraki, Making Branch Networking Easy.
Pbx presentation ingate_itexpoeast2014kwader Saudi
Enhance employee productivity and reduce communication costs with feature-rich IP telephony solutions from Kwader. With our solutions, your staff can count on effective, unified communications no matter where they are.
KTC scalable IP telephony solutions offer the same high-quality communications whether your enterprise has a few or 100,000 users. Our flexible architecture design offers an unparalleled range of deployment options. Our wide range of resiliency tools minimizes costs and maximizes reliability.
Configuration of bus topology in cisco packet tracer by Tanjilur RahmanTanjilurRahman6
This document provides instructions for configuring a bus topology network in Cisco Packet Tracer. It involves selecting PCs, laptops and switches, configuring the devices with valid IP addresses, and testing connectivity by sending a message and pinging between devices. The configuration was successful with 0% packet loss, demonstrating a functioning bus topology network.
The MA5600 is a multi-service access module that provides high-speed broadband access and integrated services. It supports gigabit Ethernet switching and multi-service access to meet diverse service requirements. The MA5600 also provides quality of service to support evolving next generation networks. It has abundant port types, flexible networking solutions, carrier-class IPTV capabilities, dynamic line optimization, and strict security and reliability measures.
This document provides an overview of using the OPNET network simulation software. It discusses that OPNET is required reading for the TCM-250 course and can only be accessed in the school's lab. The document then covers basic probability concepts and terminology needed to understand network simulations, such as probability distribution functions and how they are used to model things like message sizes and interarrival times. It also summarizes some of OPNET's capabilities for modeling different network types and technologies.
This document provides an overview of networking fundamentals, including network history, devices, topologies, protocols, and different types of networks such as LANs, WANs, MANs, and SANs. It also discusses virtual private networks, bandwidth measurements, the OSI model layers, TCP/IP model, encapsulation, and data communication using layers.
The document discusses the GSMA VoLTE profile, which specifies the minimum functions required for implementing voice over LTE (VoLTE) using the IP Multimedia Subsystem (IMS) standard. It was created by the GSMA to promote a single, internationally interoperable system for VoLTE in order to avoid issues from multiple non-interoperable systems being used. The profile specifies the interface between terminals and the core network for IMS functions and voice media coding for VoLTE calls. It aims to maximize international roaming and equipment investment by standardizing VoLTE implementation.
An introduction to Meraki as a company and a technology. Meraki have just been awarded visionary status is Gartners 2011 magic quadrant for Wireless LAN and have recently announced the MX range of Cloud-Managed Routers, Meraki, Making Branch Networking Easy.
Pbx presentation ingate_itexpoeast2014kwader Saudi
Enhance employee productivity and reduce communication costs with feature-rich IP telephony solutions from Kwader. With our solutions, your staff can count on effective, unified communications no matter where they are.
KTC scalable IP telephony solutions offer the same high-quality communications whether your enterprise has a few or 100,000 users. Our flexible architecture design offers an unparalleled range of deployment options. Our wide range of resiliency tools minimizes costs and maximizes reliability.
Configuration of bus topology in cisco packet tracer by Tanjilur RahmanTanjilurRahman6
This document provides instructions for configuring a bus topology network in Cisco Packet Tracer. It involves selecting PCs, laptops and switches, configuring the devices with valid IP addresses, and testing connectivity by sending a message and pinging between devices. The configuration was successful with 0% packet loss, demonstrating a functioning bus topology network.
The MA5600 is a multi-service access module that provides high-speed broadband access and integrated services. It supports gigabit Ethernet switching and multi-service access to meet diverse service requirements. The MA5600 also provides quality of service to support evolving next generation networks. It has abundant port types, flexible networking solutions, carrier-class IPTV capabilities, dynamic line optimization, and strict security and reliability measures.
This document provides an overview of using the OPNET network simulation software. It discusses that OPNET is required reading for the TCM-250 course and can only be accessed in the school's lab. The document then covers basic probability concepts and terminology needed to understand network simulations, such as probability distribution functions and how they are used to model things like message sizes and interarrival times. It also summarizes some of OPNET's capabilities for modeling different network types and technologies.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
Benjamin Bouckenooghe ingénieur support senior se propose afin de traverser en 1h IPV6, son implémentation, les bonnes pratiques et un tour sur les retours support autour d'IPV6.
DHCP is a client-server protocol that assigns network parameters like IP addresses to devices from a server's address pool. A DHCP client broadcasts a request and the DHCP server responds with an offered address via acknowledgement packets. DNS translates human-friendly hostnames to IP addresses by querying a DNS server's address records, allowing users to access resources by name instead of numeric address. Together, DHCP and DNS simplify network configuration and access.
The document describes a minor project report on creating a LAN network with redundancy that was completed by two students for their B-Tech degree. It outlines the background, methodology, requirements, and results of designing a network topology on GNS3 using routing protocols, VPN, NAT, firewalls, and Cisco phones to provide redundancy. The project implemented Cisco ASA, MPLS routing, and other protocols to create a secure and reliable network connecting different office locations.
The document discusses network management, which refers to tools and systems that help network administrators monitor, maintain, and control computer networks. It describes various network management functions like performance monitoring, configuration management, fault management, accounting, and security. Finally, it provides examples of popular network management systems used by organizations like Cisco, IBM, HP, and open source tools.
Email server configuration on cisco packet tracerArjun Das
The document provides instructions for configuring an email server on Cisco Packet Tracer. It describes building a network topology with 1 switch, 4 PCs, and 2 servers - one for email and one for DNS. It then details steps to configure IP addresses, set up mail clients on the PCs and mail service on the email server, configure a DNS server, and finally test email sending between PCs. The goal is to demonstrate how to set up an email server and allow clients to communicate on the network using email addresses that are resolved by the DNS server.
XCAP is a protocol for managing hierarchical XML documents stored on an HTTP server. The tutorial covers XML basics like elements, attributes, namespaces and schemas. It then discusses how XCAP uses HTTP methods like GET and PUT to retrieve and modify pieces of an XML document selected by XPath expressions. XCAP provides a standardized way for network applications to store and access provisioned user data on a server.
The document provides an overview of computer networking fundamentals including:
- The seven layers of the OSI reference model and their functions from physical transmission to application interfaces.
- Reasons for using a layered networking model including modularity, interoperability, and error checking.
- Key networking concepts such as MAC addresses, connection-oriented vs. connectionless transmission, and data encapsulation.
This document provides an overview and syllabus for an AIX System Administration class that will take place over 5 days from 9:30am to 5:30pm. The class will cover topics such as Unix and AIX overviews, IBM POWER servers, installing the AIX operating system, and logging into the system. Hands-on experience will be provided through virtualized AIX systems on IBM POWER7 blades in the classroom lab network.
Communications Server provides TCP/IP and SNA connectivity and services on z/OS. It combines the prior VTAM and TCP/IP products and provides common networking functions. Applications can access networks using SNA APIs, sockets APIs, or standard TCP/IP applications. Communications Server supports both SNA and TCP/IP protocols and their integration.
TCP/IP Stack Configuration with Configuration Assistant for IBM z/OS CSzOSCommserver
An overview of using the IBM Configuration Assistant for z/OS Communications Server, a z/OSMF plug-in, to configure the Communications Server TCP/IP stack. Includes updates on new functions for importing existing configuration and generating OBEY files for dynamic configuration modification, which have shipped or are shipping in new function PTFs since the General Availability of V2R2.
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...Vikas Shokeen
This document discusses the call flow process for a VoLTE call between two parties (A and B) using an LTE network. It involves the following key steps:
1. Party A's IMS network sends an SIP INVITE message to Party B's IMS network with an SDP offer to initiate the call.
2. Resources are reserved on the LTE networks for both parties. SDP negotiations take place to agree on a codec.
3. Once resources are reserved and preconditions met, Party B's phone will ring. When answered, Party B sends a SIP 200 OK message to complete the call setup.
4. The media path is then established between the two parties
The document discusses storage area networks (SANs) and fiber channel technology. It provides background on SANs and how they function as a separate high-speed network connecting storage resources like RAID systems directly to servers. It then covers SAN topologies using fiber channel, including point-to-point, arbitrated loop, and fabric switch configurations. Finally, it discusses planning, managing and the management perspective of SANs in the data center.
Waqas Mahmood is seeking a position as a senior network engineer. He has over 3 years of experience in networking including managing Cisco routers, switches, and MPLS technologies. His skills include routing protocols, network security, wireless networking, and server administration. He holds certifications in CCNA, CCNP, and CCIE and has worked as a network engineer and instructor for various companies in Pakistan.
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
Today millimeter wave (mmWave) spectrum is valued mainly because it can be used to achieve high speeds and capacities when combined with spectrum assets below 6GHz. But it can provide other benefits as well. For example, mmWave spectrum makes it possible to use a promising new wireless backhaul solution for 5G New Radio – integrated access and backhaul (IAB) – to densify networks with multi-band radio sites at street level.
This Ericsson Technology Review article explains the IAB concept at a high level, presenting its architecture and key characteristics, as well as examining its advantages and disadvantages compared with other backhaul technologies. It concludes with a presentation of the promising results of several simulations that tested IAB as a backhaul option for street sites in both urban and suburban areas.
The document provides information about the Cisco ASR 5500 chassis and hardware components. The ASR 5500 is a 21RU rack-mount chassis that uses rear cards for I/O and processing and front cards for fabric and storage. It can support a variety of card types, including Management I/O cards, Data Processing cards, Fabric and Storage cards, and System Status cards. The chassis provides redundancy and high throughput connectivity between cards using an internal midplane.
What is PCRF? – Detailed PCRF architecture and functioningMahindra Comviva
PCRF- Policy and Charging Rules Function- is a dedicated policy controller equipment standardized in 3GPP, enabling policy function for charging & bandwidth on the multimedia networks. Smart Policy Control function combines network and customer intelligence to launch tailored service offerings for business and residential customers.
Read more: http://www.mahindracomviva.com/products/internet-broadband-solutions/smart-policy-control-suite.htm
This document provides an overview and summary of a project report on the installation, commissioning, and planning of a Nokia Flexi Edge BTS (Base Transceiver Station). It was submitted by Saurabh Bansal, an electronics and communications engineering student, under the guidance of his professor Sumit Singh Dhanda. The report includes sections on the history of Nokia Siemens Networks, an overview of BTS components and functions, radio frequency details, operations, administration, maintenance, provisioning, and commissioning of the Nokia Flexi Edge BTS site.
Here are the configuration steps for the switch infrastructure:
1. Log into each switch and configure the hostname, passwords, logon banner, console timeout, synchronous logging, SSH/Telnet, HTTP disable, DNS, NTP, and management VLAN/IP according to the requirements.
2. Enter VLAN database mode on each switch:
NL_B1_SW1#vlan database
NL_B1_SW2#vlan database
NL_B1_SW3#vlan database
3. Create the necessary VLANs on each switch according to the requirements table.
4. Configure the trunk port between NL-B1-SW1 and NL-B1-SW2 for VLANs 64
NuggetLabs (Ccna labs) Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
Benjamin Bouckenooghe ingénieur support senior se propose afin de traverser en 1h IPV6, son implémentation, les bonnes pratiques et un tour sur les retours support autour d'IPV6.
DHCP is a client-server protocol that assigns network parameters like IP addresses to devices from a server's address pool. A DHCP client broadcasts a request and the DHCP server responds with an offered address via acknowledgement packets. DNS translates human-friendly hostnames to IP addresses by querying a DNS server's address records, allowing users to access resources by name instead of numeric address. Together, DHCP and DNS simplify network configuration and access.
The document describes a minor project report on creating a LAN network with redundancy that was completed by two students for their B-Tech degree. It outlines the background, methodology, requirements, and results of designing a network topology on GNS3 using routing protocols, VPN, NAT, firewalls, and Cisco phones to provide redundancy. The project implemented Cisco ASA, MPLS routing, and other protocols to create a secure and reliable network connecting different office locations.
The document discusses network management, which refers to tools and systems that help network administrators monitor, maintain, and control computer networks. It describes various network management functions like performance monitoring, configuration management, fault management, accounting, and security. Finally, it provides examples of popular network management systems used by organizations like Cisco, IBM, HP, and open source tools.
Email server configuration on cisco packet tracerArjun Das
The document provides instructions for configuring an email server on Cisco Packet Tracer. It describes building a network topology with 1 switch, 4 PCs, and 2 servers - one for email and one for DNS. It then details steps to configure IP addresses, set up mail clients on the PCs and mail service on the email server, configure a DNS server, and finally test email sending between PCs. The goal is to demonstrate how to set up an email server and allow clients to communicate on the network using email addresses that are resolved by the DNS server.
XCAP is a protocol for managing hierarchical XML documents stored on an HTTP server. The tutorial covers XML basics like elements, attributes, namespaces and schemas. It then discusses how XCAP uses HTTP methods like GET and PUT to retrieve and modify pieces of an XML document selected by XPath expressions. XCAP provides a standardized way for network applications to store and access provisioned user data on a server.
The document provides an overview of computer networking fundamentals including:
- The seven layers of the OSI reference model and their functions from physical transmission to application interfaces.
- Reasons for using a layered networking model including modularity, interoperability, and error checking.
- Key networking concepts such as MAC addresses, connection-oriented vs. connectionless transmission, and data encapsulation.
This document provides an overview and syllabus for an AIX System Administration class that will take place over 5 days from 9:30am to 5:30pm. The class will cover topics such as Unix and AIX overviews, IBM POWER servers, installing the AIX operating system, and logging into the system. Hands-on experience will be provided through virtualized AIX systems on IBM POWER7 blades in the classroom lab network.
Communications Server provides TCP/IP and SNA connectivity and services on z/OS. It combines the prior VTAM and TCP/IP products and provides common networking functions. Applications can access networks using SNA APIs, sockets APIs, or standard TCP/IP applications. Communications Server supports both SNA and TCP/IP protocols and their integration.
TCP/IP Stack Configuration with Configuration Assistant for IBM z/OS CSzOSCommserver
An overview of using the IBM Configuration Assistant for z/OS Communications Server, a z/OSMF plug-in, to configure the Communications Server TCP/IP stack. Includes updates on new functions for importing existing configuration and generating OBEY files for dynamic configuration modification, which have shipped or are shipping in new function PTFs since the General Availability of V2R2.
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...Vikas Shokeen
This document discusses the call flow process for a VoLTE call between two parties (A and B) using an LTE network. It involves the following key steps:
1. Party A's IMS network sends an SIP INVITE message to Party B's IMS network with an SDP offer to initiate the call.
2. Resources are reserved on the LTE networks for both parties. SDP negotiations take place to agree on a codec.
3. Once resources are reserved and preconditions met, Party B's phone will ring. When answered, Party B sends a SIP 200 OK message to complete the call setup.
4. The media path is then established between the two parties
The document discusses storage area networks (SANs) and fiber channel technology. It provides background on SANs and how they function as a separate high-speed network connecting storage resources like RAID systems directly to servers. It then covers SAN topologies using fiber channel, including point-to-point, arbitrated loop, and fabric switch configurations. Finally, it discusses planning, managing and the management perspective of SANs in the data center.
Waqas Mahmood is seeking a position as a senior network engineer. He has over 3 years of experience in networking including managing Cisco routers, switches, and MPLS technologies. His skills include routing protocols, network security, wireless networking, and server administration. He holds certifications in CCNA, CCNP, and CCIE and has worked as a network engineer and instructor for various companies in Pakistan.
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
Today millimeter wave (mmWave) spectrum is valued mainly because it can be used to achieve high speeds and capacities when combined with spectrum assets below 6GHz. But it can provide other benefits as well. For example, mmWave spectrum makes it possible to use a promising new wireless backhaul solution for 5G New Radio – integrated access and backhaul (IAB) – to densify networks with multi-band radio sites at street level.
This Ericsson Technology Review article explains the IAB concept at a high level, presenting its architecture and key characteristics, as well as examining its advantages and disadvantages compared with other backhaul technologies. It concludes with a presentation of the promising results of several simulations that tested IAB as a backhaul option for street sites in both urban and suburban areas.
The document provides information about the Cisco ASR 5500 chassis and hardware components. The ASR 5500 is a 21RU rack-mount chassis that uses rear cards for I/O and processing and front cards for fabric and storage. It can support a variety of card types, including Management I/O cards, Data Processing cards, Fabric and Storage cards, and System Status cards. The chassis provides redundancy and high throughput connectivity between cards using an internal midplane.
What is PCRF? – Detailed PCRF architecture and functioningMahindra Comviva
PCRF- Policy and Charging Rules Function- is a dedicated policy controller equipment standardized in 3GPP, enabling policy function for charging & bandwidth on the multimedia networks. Smart Policy Control function combines network and customer intelligence to launch tailored service offerings for business and residential customers.
Read more: http://www.mahindracomviva.com/products/internet-broadband-solutions/smart-policy-control-suite.htm
This document provides an overview and summary of a project report on the installation, commissioning, and planning of a Nokia Flexi Edge BTS (Base Transceiver Station). It was submitted by Saurabh Bansal, an electronics and communications engineering student, under the guidance of his professor Sumit Singh Dhanda. The report includes sections on the history of Nokia Siemens Networks, an overview of BTS components and functions, radio frequency details, operations, administration, maintenance, provisioning, and commissioning of the Nokia Flexi Edge BTS site.
Here are the configuration steps for the switch infrastructure:
1. Log into each switch and configure the hostname, passwords, logon banner, console timeout, synchronous logging, SSH/Telnet, HTTP disable, DNS, NTP, and management VLAN/IP according to the requirements.
2. Enter VLAN database mode on each switch:
NL_B1_SW1#vlan database
NL_B1_SW2#vlan database
NL_B1_SW3#vlan database
3. Create the necessary VLANs on each switch according to the requirements table.
4. Configure the trunk port between NL-B1-SW1 and NL-B1-SW2 for VLANs 64
NuggetLabs (Ccna labs) Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity.
This document provides information about the Cisco XFP10GEROC192IR product, including:
- It is a 10GBASE-ER and OC192 IR2 XFP module for networking.
- Launch 3 Telecom sells this product and provides same-day shipping, payment options like credit cards, and a warranty.
- They also offer services like repairs, maintenance contracts, installation, and recycling of telecom equipment.
This document provides a summary of Joseph V. San Severo's experience and qualifications. It outlines his extensive experience working as a senior network engineer for various companies, where he designed, implemented and supported complex network infrastructures utilizing technologies such as Cisco, Juniper, Linux and more. It also lists the various hardware, software, protocols and projects he has worked with throughout his career spanning over 20 years in the industry.
This document provides information about the Cisco XFP-10GLR-OC192SR module and how to purchase it from Launch 3 Telecom. It describes Launch 3 Telecom as a supplier of Cisco and telecom equipment, outlines the payment and shipping options for purchasing the module, and details the warranty and support services provided by Launch 3 Telecom.
The document proposes an overhaul of Agora Superstore's network infrastructure to support its expanding operations in the US, India, and China. It outlines the business objectives, organization chart, analysis of the previous network diagram, needed devices, proposed new diagram, cost-benefit analysis, project timeline, and key security features. The conclusion notes that the current network lacks redundancy and requires on-site experts for troubleshooting, which the proposed changes aim to address through a more robust and secure design.
Eng. Abd Elrhman has over 10 years of experience in network administration and seeks a challenging position to further develop his skills. He has extensive experience designing, implementing, and troubleshooting networks and infrastructures. Some of his qualifications include Cisco certifications, experience with Active Directory, WAN/LAN administration, real-time systems, security, and team leadership.
Brad Harrell has over 5 years of experience in networking including managing large fiber networks for the Georgia Department of Transportation. He is proficient with Cisco technologies like IOS, switches, routers, SDN, and Cisco Prime Infrastructure which he uses to automate configuration, monitoring, and updates. He has a bachelor's degree in information security and is CCNA certified working towards his CCNP.
The document describes a Cisco MEM-C6K-CPTFL256M part and provides information about purchasing, shipping, warranty, and services from Launch 3 Telecom. Specifically, it states that Launch 3 Telecom sells the Cisco MEM-C6K-CPTFL256M part, offers same day shipping, and provides a warranty and return policy. It also notes that Launch 3 Telecom offers services like repair, maintenance contracts, de-installation, and recycling.
This document is a resume for Abdelrhman Saad, an Egyptian network engineer seeking a challenging position to develop his communication engineering skills. It summarizes his professional experience managing networks for Cairo International Airport, Iccc-Cairo, UNICOMP, and Raya Networks. It also lists his IT certifications and provides details on networking projects he has worked on for various companies. The resume concludes with his personal and education details.
Riordan Manufacturing SR-rm-00-7 Analysis of WAN.docxjoellemurphey
Riordan Manufacturing SR-rm-00-7 Analysis of WAN
Running head: RIORDAN MANUFACTURING WAN ANALYSIS
1
RIORDAN MANUFACTURING WAN ANALYSIS
2
Riordan Manufacturing WAN Analysis
INTRODUCTION
Riordan Manufacturing is a large plastics manufacturer with 550 employees in four locations. The locations Riordan operates are San Jose, California, Albany, GA, Pontiac, Michigan, and Hangzhou, China. The San Jose, California facility is the corporate office and is connected to the other facilities through a Wide Area Network (WAN). Each location has a different telephone and data network. According to Moore’s law, the rate of technology advancement doubles every 24 months. Companies have difficult tasks with staying current with advancing WAN technology. Within the past several years, platform as a service (PaaS) and infrastructure as a service (IaaS) have emerged as a leading local area network (LAN) and WAN infrastructure option. Riordan has an existing WAN infrastructure that is outdated and expensive to maintain. Before Riordan can upgrade the existing WAN to the most current technology, Riordan needs understand their business goals and requirements, and evaluate the existing WAN for strengthens and weakness. Understanding the business goals and requirements will have a direct impact on the WAN technology that will be implemented.
Section II
Riordan is in the process of relocating their Hangzhou, China office to the Shanghai port area. The relocation of the office will result in significant cost savings, and will provide their operations with a more substantial urban infrastructure and will put them into a better position to market and ship their Chinese products throughout Europe and Asia. Currently they are spending over $100,000 on travel for training on the new intergraded systems; we can develop Riordan a distance learning solution so that we can provide effective training through teleconferencing. A new network infrastructure including workstations will have to be designed, purchased, installed and tested.
Their IT network is very slow and outdated, currently they are using outdate software and need to update to Windows 8 based environment and Microsoft upgrades to Office 10. The workstations need to be updated the RAM and hard drive space is inadequate. Instead of using the 8 separate printers I would add a print server and add two printers to the network so that all users can print from those two. We need to cut down on the number of switches and streamline the network, by installing a Cisco ASR 1006 with serial, Ethernet and Fiber modules as the core router and upgrading the switch to a Cisco 3750X 48 port switch you will be able to connect all servers, routers, VoIP phones, and workstations from one switch. The satellite connection and the T3 will be connected directly to the ASR 1006. All switches, routers and servers will either use a Cisco SFP-10G-LH for fiber connection and Cisco GLC-T 1000BASE-T SFP for Ethernet con ...
Packet processing in the fast path involves looking up bit patterns and deciding on an actions at line rate. The complexity of these functions at Line Rate, have been traditionally handled by ASICs and NPUs. However with the availability of faster and cheaper CPUs and hardware/software accelerations, it is possible to move these functions onto commodity hardware. This tutorial will talk about the various building blocks available to speed up packet processing both hardware based e.g. SR-IOV, RDT, QAT, VMDq, VTD and software based e.g. DPDK, Fd.io/VPP, OVS etc and give hands on lab experience on DPDK and fd.io fast path look up with following sessions. 1: Introduction to Building blocks: Sujata Tibrewala
This document provides information about the Cisco SFPOC48SR product, including:
1) It lists contact information for purchasing the Cisco SFPOC48SR and provides a product description noting it is a Cisco OC-48c/STM-16 Short-Reach Transceiver Module.
2) It describes the company Launch 3 Telecom that sells the product and notes they offer same-day shipping, payment options, warranty, and additional services like repair.
3) It provides an overview of the Cisco 7600 Series Internet Router, which the SFPOC48SR can be used with, highlighting its scalability, interfaces, applications for service providers and enterprises.
This document discusses the transformation of the telecommunications industry towards digital technologies and software-defined networks. It specifically focuses on software-defined wide area networks (SD-WAN) and how SD-WAN is driving the adoption of network functions virtualization infrastructure (NFVi) and universal customer premise equipment (uCPE). The document provides an overview of SD-WAN and uCPE deployment options, reference architectures, and Intel's product portfolio for enabling virtualized network functions on uCPE devices.
This document provides a summary of a network redesign proposal for XYZ Pty Ltd. The proposal includes:
- Designing a multi-area network with OSPF and EIGRP routing protocols to provide security, reliability, and scalability.
- Addressing the WAN with IPv4 and IPv6 addressing, including subnets for each site.
- Configuring devices with authentication, NAT, Frame Relay, ACLs, and a GRE tunnel to provide flexibility, security, and remote access.
- Recommending future designs incorporating high availability, fault tolerance, load balancing, and cloud services.
This document summarizes the network design for ABC Company which has nine offices across multiple countries. The network will use a mesh topology with redundant fiber connections between offices. Servers located in Tokyo, Paris, and Detroit will provide 24/7 connectivity. Each office will use star configurations with fiber connections to switches on each floor. Cisco routers, firewalls, and blade servers will provide routing and security. VOIP phone systems and Cisco WebEx will enable conferencing. The network aims to support file transfers within 20 seconds between workstations using 1Gbps connections where possible.
1) The document outlines a network design for ABC Company to connect its headquarters in San Francisco to remote offices around the world.
2) The design includes VPN connections from remote offices to the HQ network to allow secure sharing of resources. MPLS is used to guarantee quality of service for multimedia files.
3) The network equipment required at each location includes servers, routers, switches, firewalls, and wireless access points to establish secure VLANs and connectivity between all offices.
Mohamed Noorulla has over 10 years of experience in networking. He has extensive experience working with routers, switches, firewalls, and WAN technologies. He is proficient in routing protocols like BGP, OSPF, and EIGRP. He has worked for several companies in roles involving network design, implementation, troubleshooting and technical support. He has various networking certifications including CCNA, CCNP ROUTE, and ITIL3.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
2. Gathering Information
To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with
management.
The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office
may eventually scale to 200 employees over 5 years.
The Windows admins are planning to install a new pair of redundant servers at the new office. They plan
to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP
address range they should use.
o Windows admins: Jeff Service ‐ (602) 555‐1293, Mike Pack (480) 555‐9382.
The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of
the first floor. Because of a workman’s strike, poor planning, and other human issues, the Intermediate
Distribution Frame (IDF) on the second floor was installed in the southeast corner of the second floor,
beyond the reach of typical Ethernet standards. The majority of the employees (roughly 50) will sit on the
main floor while the remainder will sit on the second floor. The building contractor has already run the
cabling ‐ a single Cat6 Ethernet connection to each cubical / office space which terminates to patch panels
in the MDF/IDF area.
NuggetLabs is planning to use a Voice over IP (VoIP) phone system for the new office. Each user will have
an assigned IP Phone in their cubical / office space. The installation / management of the phone system
itself will be the responsibility of another company; however, the network should be prepared to support
the additional devices.
The new office will need WIFI implementations, so to keep budgets in check the company would like to
use off‐the‐shelf Cisco Small Business WAPs. These WAPs are to host two wireless networks: NL‐CORP and
NL‐PUB. Those connecting to NL‐CORP should have access to the corporate network and resources. Of
course, high‐end security is mandatory for this wireless network. Those connecting to NL‐PUB should not
be prompted for any security requirements but should be limited to Internet access only.
NuggetLabs Industries would like you to assess the network and make recommendations on Internet
connectivity options. They would also like to begin evaluating network connections between their offices.
During the discussions, NuggetLabs Industries found that you work primarily from your home office.
Because of the value NuggetLabs places on your technical prowess, they have offered to provide an office
space located in the MDF for you to use as a lab environment; a "home‐away‐from‐home” you can use.
However, this lab environment must be completely isolated from the corporate network to not cause any
interference to day‐to‐day operations.
Priority Client Task Time Assigned
1 NL Initial Meeting with NL Corporate
Create initial questionnaire for on‐site visit 30
Discuss upcoming branch office rollout (goals, staff
involvement, key contacts)
180
1 NL Create NL Proposal
Requirements Document 15
Equipment Order 240
VLAN / Subnet List 30
Switchport Connections 30
Physical Visio Diagram 30
Logical Visio Diagram 30
3. Objective
Based on this information, NuggetLabs Industries would like you to create a proposal, design, and
implementation plan for their new office by next Friday. The submission should include the following elements:
Requirements Document
Equipment Order
VLAN(s) ‐ Necessary
IP Subnet(s) ‐ Necessary
Switch Port Connections
Any Necessary Visio Diagrams
Requirements Document
Based on company meeting, November 28th, 2011
Attendees
Bob Phaman [CEO ‐ BobP@nuggetlabs.com – (602) 555.2791]
Sarah Belittle [CTO ‐ SarahB@nuggetlabs.com – (602) 555.8329]
Jeff Service [Windows Admin Lead ‐ .JeffS@nuggetlabs.com – (602) 555.1293]
Mike Pack [Desktop Support ‐ MikeP@nuggetlabs.com – (480) 555.9382]
Grapler Construction Company (various reps) [support@grapler.com]
Requirements
Network must initially handle 75 users between two floors
Network must handle both VoIP and Data traffic
Network should handle public(unsecure) and private (secure) WIFI
Private office / lab area created in MDF, separate from the network
Suggest options for Internet connectivity
Assumptions
Each user will have one workstation
Each user will have one IP phone
Network should handle 1 Gbps Ethernet connections to the desktop
Dual fiber optic cabling run completed from MDF to IDF
Internet connectivity options will be suggested, agreed upon, and installed before the move in date
All cable runs terminate to the IDF or MDF
Each cubical / office will have at least one Cat6 Ethernet connection
JeremyC Consulting Inc. will be ordering all necessary equipment and patch cables for the operation
Windows servers will have redundant connections
IDF will be initially set up with a 48 port switch (allowing approx. 48% growth)
MDF will be initially set up with two 48 port switches (allowing approx. 44% growth)
PCs and IP Phones will be located no more than 3m from the wall connection, 1.5‐2m on average.
Single Internet router (no redundancy) is acceptable
Single core L3 switch (no redundancy) is acceptable
PSTN calling for VoIP network will be handled via SIP Trunk over the Internet
MDF and IDF have sufficient power and cooling for the equipment to be installed
4. Phase 1: Brainstorming
Requirements
Two stories
o First Floor MDF ‐ initially housing 50 users, servers, etc...
o Second Floor lDF ‐ initially housing 25 users
WIFI
o Full coverage for first and second floor
o Need to perform a wireless site survey (onsite)
o Power over Ethernet switches or couplers
VoIP
o IP Phone per cubical / office
o Need additional 1.5‐3m Cat 5E / 6 Ethernet cabling as PC patch
Priority Client Task Time Assigned
2 NL Onsite Visit
WiFi Site Survey 120
Get with Windows guys to determine cabinet 60
Items Needed
MDF ‐ two 48‐port PoE switches, one of them should be Layer 3 capable
o Cisco LAN Access Switches
o Cisco 2960 Model Comparison
o Cisco 3750‐X Model Comparison
o First Choice L2 Switch ‐ WS‐C2960S‐48FPS‐L
48‐port, L2 switching
740W PoE (15W per port)
(4) 1G SFP Uplinks
o First Choice L3 Switch ‐ WS‐C3750X—48PF‐S
48‐port, L3 Switching
740W PoE (1.5W per port)
(4) 1G SFP Uplinks
o Mounting‐ wall mount? Server cabinet? (determine server needs)
o Cabling‐ need plenty of spare 1.5m, 2m, and 3m cables for cubicles. Offices, server connections
o Fiber optic connection: Patch cables and two SFPs
MDF ‐ one Internet router
o Cisco Routers
o Cisco 2900 Series
o First Choice Router — Cisco 2901
(2) 1 Gbps built‐in interfaces
(4) card slots (expansion using serial, ethernet, etc...)
Voice capabilities (on‐board DSPs)
IDF ‐ one 48‐port PoE switch
o First Choice L2 Switch ‐ WS‐C2960S‐48FPS‐L
48‐port, L2 switching
740W PoE (15W per port)
(4) 1G SFP Uplinks
Building ‐ Wireless access points
o Cisco Small Business WIFI options
o First Choice ‐ WAP4410N
802.11n/g/b
1Gbps, PoE Capable (802.3af)
Supports 4 VLANs, 4 SSlDs
5. Equipment List
Name Device Function Location T1 1G 10G
NL‐B1‐SW1 3750X Core L3 Switch MDF 48
NL‐B1‐SW2 2960S L2 Switch MDF 48
NL‐B1‐SW3 2960S L2 Switch IDF 48
NL‐B1‐RT1 2901 Internet Router MDF 2
NL‐B1‐WI1 WAP4410N WiFi Access Point Ceiling 1
NL‐B1‐WI2 WAP4410N WiFi Access Point Ceiling 1
NL‐B1‐WI3 WAP4410N WiFi Access Point Ceiling 1
Name Device Qty Function T1 1G 10G
NL‐B1‐SW1 WS‐C3750X‐48PF‐S 1 Core L3 Switch 48
4 Port Gigabit SFP C3KX‐NM‐1G 1 4
Redundant PSU C3KX‐PWR‐715WAC 1
SMARTnet 1
Fibre SFP (SX) GLC‐SX‐MM 4
Rack Mount Kit C3KX‐RACK‐KIT 1
IP Addressing Scheme
Network Mask VLAN Description
10.1.1‐63.0 255.255.192.0 Corporate Office
10.1.64.0 255.255.254.0 VLAN 64 Client VoIP
10.1.65.0
10.1.66.0 255.255.254.0 VLAN 66 Client Data
10.1.67.0
10.1.68.0 255.255.255.0 VLAN 68 Server
10.1.69.0 255.255.255.0 VLAN 69 Public WiFi
10.1.70.0 255.255.255.0 VLAN 70 Lab
10.1.71.0 255.255.255.0 VLAN 71 Network Management
107.20.176.240 255.255.255.240 VLAN 10 Internet DMZ
Branch 1 Summary: 10.1.64.0/21 (255.255.248.0)
VLAN 64 – Client VoIP
IP Address Mask VLAN Description
10.1.64.0 255.255.254.0 64 Client VoIP Network
10.1.64.1 NL‐B1‐SW1 VLAN 64 IP (Default Gateway)
10.1.64.2‐10 Reserved
10.1.64.11 to
10.1.65.245
Client VoIP DHCP Scope
10.1.65.246‐254 Reserved
10.1.65.255 Client VoIP Broadcast
VLAN 66 – Client Data
IP Address Mask VLAN Description
10.1.66.0 255.255.254.0 66 Client Data Network
10.1.66.1 NL‐B1‐SW1 VLAN 66 IP (Default Gateway)
10.1.66.2‐10 Reserved
10.1.66.11 to
10.1.67.245
Client Data DHCP Scope
10.1.67.246‐254 Reserved
10.1.67.255 Client Data Broadcast
10. Requirements
To help guide this initial configuration, you've assembled a list of requirements.
Each switch will need a base configuration, which includes:
o Hostname
o Passwords (CON, VTY, Enable) should be set to cisco
o Logon banner
o Three hour console port timeout
o Synchronous logging on the console port
o Telnet / SSH enabled (use nuggetlabs.com as your domain and admin / cisco for SSH credentials)
o HTTP management disabled
o DNS name resolution set to 4.2.2.2 and 4.2.2.3
o Clock set, NTP configured (use 64.73.32.135 as the NTP sewer)
o Management VLAN / IP address (use the following table)
VLAN 71 – Network Management
IP Address Mask VLAN Description
10.1.71.1 255.255.255.0 71 NL‐B1‐SW1
10.1.71.2 255.255.255.0 71 NL‐B1‐SW2
10.1.71.3 255.255.255.0 71 NL‐B1‐SW3
Configure the necessary VLANs on SW1, SW2, and SW3. If a VLAN is not necessary on a switch, it should
not be configured.
o VLAN 64: Client Voice
o VLAN 66: Client Data
o VLAN 68: Server
o VLAN 69: Public WIFI
o VLAN 70: Private LAB
o VLAN 71: Management
o VLAN 10: Internet DMZ
NL‐B1‐SW1 NL‐B1‐SW2 NL‐B1‐SW3
All VLANs
VLAN 64, 66, 69, 71
VLAN 64, 66, 69, 71
Configure Etherchannel connections between (SW1 and SW2) and (SW1 and SW3). Use GNS3 to
determine appropriate physical connections. The Etherchannel should be hardcoded as ON (does not use
any LACP or PAGP negotiation).
Configure the links between the switches to forward traffic for all necessary VLANs. lf a VLAN does switch,
the trunk should not forward traffic for it.
Assign the necessary ports to VLANs based on the following table.
Port NL‐B1‐SW1 NL‐B1‐SW2 NL‐B1‐SW3
Fa1/0 Trunk Trunk Trunk
1 Trunk Trunk Trunk
2 Trunk VLANs 64, 66 (Client) VLANs 64, 66 (Client)
3 Trunk VLANs 64, 66 (Client) VLANs 64, 66 (Client)
4 – 13 VLAN 68 (Server) VLANs 64, 66 (Client) VLANs 64, 66 (Client)
14 VLAN 70 (Lab) VLANs 64, 66 (Client) VLANs 64, 66 (Client)
15 Routed Port VLANs 66, 69, 71 (WAP) VLANs 66, 69, 71 (WAP)
Create a routed interface on NL‐B1‐SW1 for each of the VLANs. This interface should be assigned the first
IP address from each of the VLAN subnets listed in the following table. Ensure each interface is functional
(not shut down).
Note: The 10.1.254.0/30 subnet should be configured as a routed interface on F1/15
11. Network Mask VLAN Description
10.1.64.0 255.255.254.0 VLAN 64 Client VoIP
10.1.65.0
10.1.66.0 255.255.254.0 VLAN 66 Client Data
10.1.67.0
10.1.68.0 255.255.255.0 VLAN 68 Server
10.1.69.0 255.255.255.0 VLAN 69 Public WiFi
10.1.70.0 255.255.255.0 VLAN 70 Lab
10.1.71.0 255.255.255.0 VLAN 71 Network Management
10.1.254.0 255.255.255.252 n/a Point‐to‐Point
Configure NL_B1_SW1 as the root of the Spanning Tree network for all VLANs. Enable all interfaces not
being used for a switch uplink for Portfast.
Configure the Server and PC with the following configuration:
Server PC1 PC2
Interface: NIC NIC NIC
IP Address: 10.1.68.50 10.1.66.50 10.1.66.51
Gateway: 10.1.68.1 10.1.66.1 10.1.66.1
Testing
o PC1 should be able to ping PC2
o PC1 and PC2 should both be able to perform a ping and traceroute to the Server
o The show spanning‐tree output should reveal that NL_B1_SW1 is the root bridge
o You should be able to Telnet and SSH to each switch, PC, or Server using the management interface IP
13. Requirements
To help guide this initial configuration, you’ve assembled the following list of objectives:
The NuggetLabs branch office router (NL_B1_RT1) needs a base configuration which includes the
following:
o Hostname
o Passwords (CON, VTY, AUX, Enable) should be set to cisco
o Logon banner
o Three hour console port timeout
o Synchronous logging on the console port
o Telnet / SSH enabled (use nuggetlabs.com as your domain and admin/cisco for SSH credentials)
o HTTP management disabled
o DNS name resolution set to 4.2.2.2 and 4.2.2.3
o Clock set, NTP configured (use 64.73.32.135 as the NTP server)
The IP addresses for NL_B1_RT1 should be configured as follows:
Fa 0/0 Fa 0/1
10.1.254.2 / 30
172.30.100.230 / 24
Configure a static default route on NL_B1_RT1 using the IP address of the ISP router (172.30.100.1) to
reach the Internet. Once this default route is in place, NL_B1_RT1 should be able to ping Internet address
(i.e. 4.2.2.2, 8.8.8.8)
Configure a static default route on NL_B1_SW1 using the inside IP address of NL_B1_RT1 to reach the
Internet.
Configure NAT in such a way that the following requirements are met:
o Subnets provisioned for the branch office are able to reach the Internet using a pool of public BP
addresses from 172.30.100.231 to 172.30.100.235 (simulated public for purposes of the lab).
o NOTE: NAT should be configured so only the specific subnets at the Branch office are processed by
NAT on NL_B1_RT1
o The email server (10.1.68.S0) is reachable from the public IP address 172.30.100.236.
Testing ‐ at this point. you should be able to accomplish the following:
o Ping the Internet address 4.2.2.2 or 8.8.8.8 from any device in the NL branch network (test using PC1)
o Verify NAT entries appear for the connections oh NL_B1_RT1
o Telnet to the Server (10.1.68.50) from its public IP address (172.30.101.236) from the corporate office
(NL_CORP_RT1).
NOTE: Since the server does not have a VTY password configured, the message, "Password required but none
set" is expected and indicates a successful test.
16. Requirements
To help guide this configuration, you’ve assembled the following list of objectives:
Configure the NuggetLabs corporate office to support OSPF
o The NL_CORP_RT1 router (the OSPF ABR) should use the Router‐
o OSPF should run on both NL_CORP_RT1 and NL_CORP_SW1 (Router ID 1.1.1.2).1
o All VLAN interfaces on NL_CORP_SW1 should be configured as passive with the exception of VLAN 1.
o All networks internal to the corporate office should be in Area 0. Networks connecting to the branch
office should be in Area 1.
o Devices should use secure (hashed) OSPF authentication to ensure rogue devices cannot join as an
OSPF neighbor. Use the password "cisco" when forming all neighbor relationships. Only non‐passive
interfaces need be configured for OSPF authentication.
o Use only one OSPF network statement with an exact wildcard mask to advertise the corporate
network. Use one additional OSPF network statement with a wildcard mask of 0.0.0.0 to form
neighbors in Area 1.
Configure the NuggetLabs branch office to support OSPF.
o The NL_B1_RT1 router should use the Router ID 1.1.2.1.
o OSPF should run on both NL_B1_RT1 and NL_B1_SW1 (Router ID 1.1.2.2).
o All networks in use at the branch office should be in Area 1. You may not use network commands
under the OSPF routing process to advertise these networks.
o All VLAN interfaces on NL_B1_SW1 should be configured as passive with the exception of F1/15.
o Devices should use secure (hashed) OSPF authentication to ensure rogue devices cannot join as an
OSPF neighbor. Use the password "cisco" when forming all neighbor relationships. Only non‐passive
interfaces need be configured for OSPF authentication.
Testing
o Verify OSPF neighbors have formed between all relevant Cisco devices
o Verify all OSPF ‐ appear on all relevant Cisco devices
Advertise a default route from both routers
o Remove the static default route from both NL_B1_SW1 and NL_CORP _SW1
o Configure NL_B1_RT1 and NL_CORP_RT1 to advertise a default route unconditionally to NL_B1_SW1
and NL_CORP_SW1.
o Verify an OSPF default route now exists on both L3 switches.
On the OSPF ABR, configure two‐way summarization
o The corporate office should summarize all internal, Area 0 networks into a single route when
advertise to other OSPF areas.
o Devices internal to the corporate office should receive a single, summarized branch office route
representing all internal branch office networks (with the exception of the 10.1.254.0/30 link
between NL_CORP_SW1 and NL_CORP_RT1).
Optimize OSPF
o Ensure NL_CORP_RT1 and NL_B1_RT1 become the designated OSPF router for their respective
Ethernet segments. NL_CORP_SW1 and NL_B1_SW1 should be exempted from the DR election
completely.
o Use an OSPF hello timer of 1 second between all OSPF neighbors.
18. Requirements
To help guide this configuration, y0u’ve assembled the following list of objectives:
Remove all OSPF configuration from NL_CORP_RT1, NL_CORP_SW1, NL_B1_RT1, and NL_B1_SW1.
o Configure the NuggetLabs corporate office to support EIGRP
o EIGRP should run in autonomous system 7 on both NL_CORP_RT1 and NL_CORP_SW1 advertising all
corporate networks
o EIGRP should not use automatic summarization
o All interfaces on NL_CORP_RT1 and NL_CORP_SW1 should be set as passive with the exception of
WAN interfaces and interfaces in VLAN1.
o Devices should use secure EIGRP authentication to ensure rogue devices cannot join as an EIGRP
neighbor. Use the password "cisco" when forming all neighbor relationships. It is not necessary to
configure authentication on passive interfaces.
Configure the NuggetLabs branch office to support EIGRP.
o EIGRP should run autonomous system 7 on both NL_B1_RT1 and NL_B1_SW1.
o EIGRP should not use automatic summarization
o All networks in use at the branch office should be added to the EIGRP routing process.
o All interfaces on NL_B1_$W1 should be set as passive with the exception of the interface used to
communicate with NL_B1_RT1.
o Devices should use secure EIGRP authentication to ensure rogue devices cannot join as an EIGRP
neighbor. Use the password "cisco" when forming all neighbor relationships. It is not necessary to
configure authentication on passive interfaces.
Testing
o Verify EIGRP neighbors have formed between all relevant Cisco devices
o Verify all EIGRP routes appear on all relevant Cisco devices
Advertise a default route from both routers
o Configure NL_B1_RT1 and NL_CORP_RT1 to advertise a default route using redistribution to
NL_B1_SW1 and NL_CORP_SW1.
o Verify an EIGRP default route now exists on both L3 switches.
Configure two‐way summarization using NL_B1_RT1 and NL_CORP_RT1
o The corporate office should summarize all internal networks as a single route when advertising to the
branch office.
o The branch office should summarize all internal networks as a single route when advertising to the
corporate office.
20. Requirements
To help guide this configuration, you’ve assembled the following list of objectives:
For testing purposes, assign PC1 to the voice VLAN (64) while keeping PC2 assigned to the data VLAN (66)
Configure NL_B1_SW1 as a DHCP server for the branch office network using the following parameters:
o VLANs 64, 66, 69, and 70 should support DHCP services
o In the initial testing phase, each VLAN should initially support DHCP assigned addresses from the
range 10.1.X.10 ‐ 10.1.X.100 with the correct subnet mask and default gateway.
o The voice VLAN should also support DHCP Option 150 (TFTP) to the address 10.1.68.8.
o All devices should use 4.2.2.2 and 4.2.2.3 as their primary and secondary DNS server respectively.
o Once you have configured DHCP, configure PC1 and PC2 as DHCP clients and verify they receive the
expected IP address assignment.
Configure the following security restrictions for the branch office:
o The Voice VLAN (64) should only be able to access (all else is restricted):
The NuggetLabs Corporate voice subnet (10.1.1.0/24)
The Voice VLAN default gateway (10.1.64.1)
The Internet
o The Data VLAN (66) should only be able to access (all else is restricted):
10.1.68.6 (Full Access ‐ NL—B1‐DC01)
10.1.68.7 (Full Access ‐ NL—B1‐DC02)
10.1.68.8 (TCP 21, 80, 443 ‐ NL‐B1‐WEBO1)
The Data VLAN default gateway (10.1.66.1)
The Internet
o The Public WIFI VLAN (69) and Private Lab VLAN (70) should only be able to access (all restricted):
Their default gateways
The Internet
Testing
o From PC1 (VLAN 64)
Ping 10.1.64.1 (Voice VLAN gateway ‐ should succeed)
Ping 10.1.66.1 (Data VLAN gateway ‐ should fail)
Ping 10.1.1.1 (Corporate Voice VLAN gateway ‐ should succeed)
Ping 4.2.2.2 (Internet DNS server ‐ should succeed)
o From PC2 (VLAN 66)
Ping 10.1.64.1 (Voice VI.AN gateway ‐ should fail)
Ping 10.1.66.1 (Data VLAN gateway ‐ should succeed)
Ping 10.1.1.1 (Corporate Voice VLAN gateway ‐ should fail)
Ping 4.2.2.2 (Internet DNS server ‐ should succeed)
Access TCP port 80 for 10.1.68.6, 10.1.68.7, and 10.1.68.8. The connection will timeout (fail), but
the access‐Iist should register hits on the corresponding entries.
o Move PC1 to VLAN 69 and renew the DHCP‐assigned address
o From PC1 (VLAN 69)
Ping 10.1.69.1 (Public WIFI VLAN gateway ‐ should succeed)
Ping 10.1.66.1 (Data VLAN gateway ‐ should fail)
Ping 10.1.1.1 (Corporate Voice VLAN gateway ‐ should fail)
Ping 4.2.2.2 (lnternet DNS server ‐ should succeed)
21. Appendix A: Configuring IKE
Documentation:
1. Document your IKE Phase 1 negotiation criteria (example below)
Encryption algorithm: AES‐128
Hashing: SHA‐1
Authentication: pre‐shared
Key exchange: Diffie‐Hellman Group 2
2. Document your IPSec (IKE Phase 2) negotiation criteria (example below)
Encryption algorithm: esp‐aes 128
Authentication: esp‐sha‐hmac
Configuring IKE Phase 1:
1. Enable ISAKMPE
crypto isakmp enable
2. Create ISAKMP Policy
crypto isakmp policy 100
encryption aes 128
authentication pre‐shared
group 2
hash sha
3. Configure ISAKMP Identity
crypto isakmp identity <ip address>|<hostname>
4. Configure pre‐shared keys
crypto isakmp key <key> address <rempte ip address>
Configuring IKE Phase 2:
1. Create transform sets
crypto ipsec transform‐set <name> <methods>
crypto ipsec transform‐set JEREMY esp‐aes 128 esp‐sha‐hmac
2. Configure IPSec lifetime (optional)
crypto ipsec security‐association lifetime <secs>|<kbytes>
3. Create mirrored ACLs defining traffic to be encrypted and the traffic expected to be received
encrypted
4. Configure IPSec crypto‐map
crypto map <name> <seq> ipsec‐isakmp
crypto map MAP 100 ipsec‐isakmp
match address <acl>
set peer <remote ip addr>
set pfs <group1|2|5>
set transform‐set <set>
Verify:
show crypto isakmp policy