TABLE OF CONTENTS
ACKNOWLEDGEMENTS ......................................................................................................... iv
LIST OF FIGURES ....................................................................................................................... v
TABLE OF CONTENTS ............................................................................................................. vi
ABSTRACT ................................................................................................................................... x
CHAPTER ONE ............................................................................................................................ 1
INTRODUCTION ......................................................................................................................... 1
1.0 Introduction ............................................................................................................................ !
1.1 Background Study .................................................................................................................. 1
1.2 Problem Statement ................................................................................................................. 2
1.3 Aims and Objectives ......................................... : .................................................................... 3
1.4 Significance of the study ........................................................................................................ 3
1.5 scope of the study ................................................................................................................... 3
1.7 Structure of project ................................................................................................................ 4
CHAPTER 2 ................................................................................................................................... 5
LITERATURE REVIEW ............................... .' ............................................................................. 5
2.0 Introduction ............................................................................................................................ 5
2.1 Building a Good Network ...................................................................................................... 5
2.2 Network Requirements .......................................................................................................... 6
2.3 Hierarchical Network Model ................................................................................................. 7
2.4 Hierarchical Network Design .............................................................................................. 12
2.4.1 Core Layer ........................................................................................................................ 13
2.4.2 Distribution Layer ............................................................................................................. l3
2.4.3 Access Layer ..................................................................................................................... 14
2.5 Migrating the L2/L3 Boundary to the Access Layer ........................................................... 15
2.6 Collapsed Core Design ........................................................................................................ 17
2.7 The Ente1prise Architecture ................................................................................................. IS
2.8 Smmnary .............................................................................................................................. 19
vi
CHAPTER 3 ................................................................................................................................. 20
METHODOLOGY ...................................................................................................................... 20
3.0 Overview of LAN services .................................................................................................. 21
3.1 LAN Layer 2 Technologies ................................................................................................. 22
3 .1.1 Layer 2 Addressing ........................................................................................................... 22
3 .1.2 Switching .......................................................................................................................... 23
3 .1.3 802.1 Q and Layer 2 Protocol Tunneling ........................................................................... 23
3 .1.4 CDP ................................................................................................................................... 24
3 .1.5 EtherChmmel Bundles ...................................................................................................... 24
3 .1. 6 Jumbo Frames ................................................................................................................... 24
3 .1. 7 MST .................................................................................................................................. 24
3 .1.8 PVRST + ............................................................................................................................ 25
3 .1.9 QoS ................................................................................................................................... 25
3 .1.1 0 Spanning Tree Protocol. .................................................................................................. 26
3 .1.11 sso .................. """" ............................. " .......... " " ....... " ................................................ 27
3 .1.12 UBRL .............................................................................................................................. 27
3 .1.13 UDLD ............................................................................................................................. 27
3 .1.14 Unidirectional Ethernet ................................................................................................... 28
3 .1.15 VLANs ............................................................................................................................ 28
3 .2 Layer 3 Switching Features ................................................................................................. 29
3 .2.1 Network Layer Addresses ................................................................................................. 29
3 .2.2 IPv4 Addressing ................................................................................................................ 30
3 .2.3 IPv6 Addressing ................................................................................................................ 31
3 .2.4 CEF ................................................................................................................................... 32
3.2.5 HSRP ................................................................................................................................. 32
3 .2.6 IP Routing Protocols ......................................................................................................... 33
3 .2.6.1 RIP ................................................................................................................................. 33
3 .2.6.2 OSPF .............................................................................................................................. 34
3 .2.6.3 IS-IS ............................................................................................................................... 35
3 .2.6.4 IGRP .............................................................................................................................. 36
3 .2.6.5 EIGRP ............................................................................................................................ 36
vii
3.2.6.6 BGP ................................................................................................................................ 37
3.2.7 Multicast Services ............................................................................................................. 38
3.2.8 Policy-Based Routing ....................................................................................................... 38
3.2.9 Unidirectional Link Routing ............................................................................................. 39
3.2.10 VRF-lite .......................................................................................................................... 39
3.3 Management Features .......................................................................................................... 39
3.3.1 Cisco Network Assistant and Embedded Cisco View ....................................................... 39
3.3.2 Dynamic Host Control Protocol. ...................................................................................... .40
3.3.3 Forced 10/100 Autonegotiation ....................................................................................... .40
3.3.4 Intelligent Power Management ........................................................................................ .40
3.3.5 NetFlow Statistics ............................................................................................................ .40
3.3.6 Secure Shell ...................................................................................................................... 41
3.3. 7 Simple Network Management Protocol ............................................................................ 41
3.3.8 SPAN and RSPAN ............................................................................................................ 41
3.4 Security Features .................................................................................................................. 42
3 .4.1 Network Admission Control (NAC) ................................................................................. 42
3.4.2 802.1X Identity-Based Network Security ........................................................................ .43
3.4.3 Dynamic ARP Inspection ................................................................................................. 43
3.4.4 Dynamic Host Configuration Protocol Snooping ............................................................ .43
3.4.5 Flood Blocking .................................................................................................................. 43
3.4.6 IP Source Guard ................................................................................................................ 44
3.4.7 Local Authentication, RADIUS, and TACACS+ Authentication ................................... .44
3 .4.8 Network Security with ACLs ........................................................................................... .44
3 .4.9 Port Security ..................................................................................................................... .44
3.4.10 Storm Control... ............................................................................................................... 45
3.4.11 Utilities ............................................................................................................................ 45
3.4.11.1 Layer 2 Traceroute ...................................................................................................... .45
3.4.11.2 Time Domain Reflectometry ...................................................................................... .45
3.4.11.3 Debugging Features ..................................................................................................... 46
3.5 Sununary ............................................................................................................................. .46
viii
CHAPTER 4 ................................................................................................................................ .47
IMPLIEMTATION AND RESULT ......................................................................................... .47
4.0 Introduction ............................................................................................................................. 47
4.1 Core Switch Configuration (EIGRP) .................................................................................. .47
4.2 Distribution Switch Configuration (EIGRP) ....................................................................... 48
4.3 Access Switch Configuration (EIGRP) .............................................................................. .49
4.6 Access Switch Configuration (OSPF) .................................................................... , ............ 53
CHAPTER 5 ................................................................................................................................. 55
CONCLUSION AND RECOMMENDETION ., ....................................................................... 55
5.0 CONCLUSION .................................................................................................................... 55
5.1 RECOMMENDETION ........................................................................................................ 55
REFERENCES .............................................................................................................................. 57
APPENDIX ............................................. , ..................................................................................... 59
ABSTRACT The aim of this project was enterprise network design and implementation and also the introduction of a suitable network for most enterprise in Lagos and the rest of the world. The following project focused on three main parts: security, availability, manageability and scalability. That is, a network that is very secure, a network available 24 hour and 7 days a week, a network that is easy to manage and finally a network and can grow if need be. The enterprise campus network has evolved over the last 20 years to become a key element in this business, computing and communication infrastructure. The interrelated evolution of business and conununications technology is not slowing and the environment is currently undergoing another stage of that evolution . . It is very important for enterprise to use the latest technologies available because they provide enhanced security, increased storage capacity, high data transfer rates, real-time voice and video, and much more. Computer networking is the most crucial part of modern enterprise because this new technology takes the most important responsibilities, rather than people doing the tasks as in previous decades. It is very imp01tant for enterplise to have a well-designed network. In other to achieve that we will follow some very simple steps In Step 1, decision makers identify . requirements, and a conceptual architecture is proposed. This step occurs in the Strategy and Analysis process of the PBM Plan phase. In Step 2, the network is assessed, and a gap analysis is perf01med to detennine the infrastructure necessary to meet the requirements. The network is assessed on function, performance, and quality. In Step 3, the network topology is designed to meet the requirements and close the network gaps identified in the previous steps. A detailed design document is prepared during this phase.By the end ofthis project I must have come up with a well-structured network. That is a network that i5 well secure, easy to manage, highly available, and also a very scalable network that can support feature enterprise needs. Basically the motive for this project is just interest I developed in networking and the knowledge I got from data communication and networking
CHIDOZIE, O (2022). Design and Implementation of Optimized Features in A Local Area Network for Improved Enterprise. Afribary. Retrieved from https://tracking.afribary.com/works/design-and-implementation-of-optimized-features-in-a-local-area-network-for-improved-enterprise
CHIDOZIE, ODINIGWE "Design and Implementation of Optimized Features in A Local Area Network for Improved Enterprise" Afribary. Afribary, 09 Aug. 2022, https://tracking.afribary.com/works/design-and-implementation-of-optimized-features-in-a-local-area-network-for-improved-enterprise. Accessed 24 Nov. 2024.
CHIDOZIE, ODINIGWE . "Design and Implementation of Optimized Features in A Local Area Network for Improved Enterprise". Afribary, Afribary, 09 Aug. 2022. Web. 24 Nov. 2024. < https://tracking.afribary.com/works/design-and-implementation-of-optimized-features-in-a-local-area-network-for-improved-enterprise >.
CHIDOZIE, ODINIGWE . "Design and Implementation of Optimized Features in A Local Area Network for Improved Enterprise" Afribary (2022). Accessed November 24, 2024. https://tracking.afribary.com/works/design-and-implementation-of-optimized-features-in-a-local-area-network-for-improved-enterprise