Lab 3.1.2 Creating a Logical Network Diagram
Task 1: Use Cisco IOS Commands to Obtain Information about the Network
Step 1: Discover and document the first device
record the cable connections and TCP/IP settings so that these can be restored at the conclusion of the lab.
a. Your instructor will advise you as to which PC is configured for Administrator access to the network. Access this Admin PC and issue the ipconfig command from the command prompt to discover the default gateway.
b. Telnet from the command prompt (or use a terminal program such as HyperTerminal or TeraTerm) to the IP address of the gateway device and enter privileged EXEC mode using the passwords given above.
c. Issue Cisco IOS commands, such as those shown here as well as others you choose to use, to learn about the device.
show running-config
show ip route
show interfaces
show ip interface brief
show version
Record this information in the first Device Table at the end of this lab.
d. Issue Cisco IOS commands such as those shown here to discover information about connected devices.
show cdp neighbors
show cdp neighbors detail
It may take a few minutes for the network to converge. If you do not see any neighboring devices
initially, repeat the command until you do.
Document the information you gather in the appropriate Device Tables.
e. Close the Telnet session by issuing the exit command.
Step 2: Discover the remaining devices
a. Telnet to the IP address of a device connected to the first device interrogated, and repeat the process in Step 1. Document this new device in an appropriate Device Table.
b. Repeat this process until all devices in the network are discovered and documented.
As you work through the network devices, record the details of each and sketch a diagram of the
network devices and their interconnections. When IP address information has been recorded, what other commands could be used to confirm connectivity and trace interconnections between devices?
ping
tracert dan traceroute
Can a connectivity trace be relied upon to return details of all the pathways between devices? Give
reasons for your response.
Jawab:
Tidak, semua jalur tidak akan dikembalikan karena routing pada Layer 3 dan STP pada Layer 2 akan menyebabkan hanya satu jalur antara perangkat yang akan ditampilkan jika koneksi berlebihan atau ada alternatif.
Task 2: Use Cisco Network Assistant to Obtain Information about the Network
Step 1: Launch Cisco Network Assistant
a. Launch the Cisco Network Assistant program on the PC connected to the network.
b. Network devices can be accessed for monitoring and information gathering. From the Applications menu, click Connect.
c. In the Connect dialog box, select the Connect To: option and enter the default gateway of the Admin PC in the field, as shown.
Step 2: Record the network topology
a. Record the displayed topology. The display will look similar to this sample.
b. Continue to connect to each known device. Record the topology displayed and compare it with the diagram that you created from the results of Task 1.
Step 3: Collate the network information
Assemble your completed network Device Tables and Topology Diagrams into your FilmCompany case study portfolio for use in later labs.
Step 4: Clean up
Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
Task 3: Reflection
a. These techniques were used to discover and document an enterprise LAN. Would the same techniques work for an enterprise network that included WAN links?
b. Could these techniques be used in a network that included routers and switches from a manufacturer other than Cisco? Why or why not?
Jawab :
Cisco Network Assistant hanya mendukung perangkat yang tercantum di FAQ program. Jenis-jenis perangkat lunak dapat digunakan untuk jaringan multi-brand.
Lab 3.2.2 Using show version to Create an Inventory List
Task 1: Determine the Capabilities of the IOS of a Cisco 1841 ISR
Step 1: Inspect the installed IOS
a. Referring to Topology 1, connect the console (or rollover) cable to the console port on the router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port. Ensure that power has been applied to both the host computer and router.
b. Establish a HyperTerminal or other terminal emulation program connection to the router.
c. From the privileged EXEC mode prompt of the terminal, issue the show version command. Record the following details:
IOS version , jawab : Versi 12.4(1c)
Name of the system image (IOS) file , jawab : 1841-ipbase-mz.124-1c.bin
IOS Feature Set , jawab :IP BASE
Date of code build, jawab : Compiled Tue 25-Oct-05
Where the router IOS image booted from , jawab: ROM: System Bootstrap, Version 12.4(13r)T
Type of processor board , jawab: Processor board ID FTX1118X09K
Amount of DRAM , jawab: 128 MB
Number of Ethernet interfaces jawab: 2
Number of serial interfaces , jawab: 2
Amount of NVRAM , jawab: 191K bytes of NVRAM
Amount of flash memory, jawab : 31360K bytes of ATA CompactFlash
Configuration register , jawab: 0x2102
d. Issue the show flash command. Record the following details:
The amount of flash memory available and used , jawab:
126976 bytes available (31805440 bytes used)
The size of the IOS file jawab: 13937472 bytes
e. Issue the show running-configuration command. Record features that indicate what the router is capable of.
Jawab:
ip subnet-zero, ip cef, ip classless
Step 2: Examine the IOS feature set on Cisco.com (1)
b. Remember that the Cisco main website changes frequently. The steps listed here representative of the procedure for accessing the resources. If the options do not appear as listed, please check with your instructor or use the cisco.com search functions to find the IOS Software Selector.
c. Roll over the Support tab and select Support.
d. On the Support page, under Frequently Used Resources, click Tools & Resources.
e. At the bottom of the Tools & Resources page, click the Show All Tools button to display tools by category.
f. Scroll to the Software section.
g. Click Cisco IOS Software Selector.
h. Click Search by Release/Product Code/Platform.
At Platform select: 1841. Click Continue.
At Release select: 12.4(3c)
At Feature Set select: IP BASE
i. Examine the listed features. From your understanding of IOS features, group three or four features under headings such as:
Routing: EIRGP, OSPF, RIP
Security: VPN, L2TP, RADIUS
IP Services: DHCP, NAT
Converged Services: LLQ, QoS, WFQ
Network Management: SNMP, SSH, CDP
Other: WAN
Frame Relay, ISDN, PPP
Step 3: Examine the IOS feature set on Cisco.com (2)
a. If your IOS version is different than the IOS version in Step 2, repeat this search using your IOS version. Record your results.
b. Compare this list of features with the list from Step 2.
Step 4: Clean up
Erase any configurations and reload the router. Disconnect and store the cabling. For PC hosts that are
normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
Task 2: Determine the Capabilities of the IOS of a Cisco 2960 Switch
Step 1: Inspect the installed IOS
a. Referring to Topology 2, connect the console cable to the console port on the switch and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port. Ensure that power has been applied to both the host computer and switch.
b. Establish a HyperTerminal or other terminal emulation program to the switch.
c. From the privileged EXEC mode prompt of the terminal, issue the show version command. Record the following details:
Jawab:
IOS version , Version 12.2(25)SEE3
Name of the system image (IOS) file , c2960-lanbase-mz.122-25.SEE3
IOS Feature Set , LAN BASE
Date of code build , Compiled Thu 26-Dec-10
Type of processor board and processor , Processor board ID FOC1122Z4BJ, PowerPC405 processor
Amount of DRAM , 64 MB
Number of Fast Ethernet interfaces , 24
Number of Gigabit Ethernet interfaces , 2
Amount of NVRAM, 64K bytes of NVRAM
Amount of flash memory , 32514048 bytes total
Configuration register , 0xF
d. Issue the show flash command. Record the following details:
The amount of flash memory available and used, 32514048 bytes total (24804864 bytes free)
The size of the IOS file , 7709184 bytes
Step 2: Examine the IOS feature set on Cisco.com (1)
Examine the listed features. From your understanding of IOS features group 1 or 2 features under headings such as:
Jawab:
Routing: None (Layer 2 switch)
Security: RADIUS, ACL
IP Services: DHCP
Converged Services: AutoQoS
Network Management: SNMP, SSH, CDP
Other: IEEE 802.1Q, STP
Step 3: Examine the IOS feature set on Cisco.com (2)
a. If your IOS version is different than the IOS version in Step 2, repeat this search using your IOS version. Record your results.
b. Compare this list of features with the list from Step 2.
Step 4: Clean up
Erase any configurations and reload the switch. Disconnect and store the cabling. For PC hosts that are
normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
Lab 3.2.3 Using Feature Navigator
Task 1: Create a Cisco.com Guest Registration
Step 1: Access the Cisco.com registration service
b. On the top right of the page, click Register. The page that opens is Step 1 of 4 in the registration process.
c.
Step 2: Complete the registration process
Step 3: Test your Cisco.com Guest registration
Task 2: Access Cisco.com Feature Navigator
Step 1: Access and log in to Cisco.com
Step 2: Examine the Feature Navigator tools
List the six tools offered by the Feature Navigator:
Search by Feature
Search by Software
Search by Platform
Search by Image
Search by Product Code
Compare software releases
It may be necessary to use more than one tool. For example, you may not know the exact description of a
feature set, but you may know the platform and image name. In this case, a combination of the tools is
required to provide all the necessary information.
Task 3: Examine 1841 Router IOS Features
Step 1: Search by feature
Step 2: Search by platform
a. From the Cisco Feature Navigator page, click the Search by Platform link.
b. List the four search objectives available:
Software
Platform
Image Name
Product Number
c. From the Platform drop-down menu, select 1841. Click Continue.
Step 3: Search by feature set
a. From the Feature Set drop-down menu, select IP BASE.
b. Examine the list of features.
List the interior routing protocols supported.
EIRGP
OSPF
RIP
List the exterior touting protocols supported.
tidak ada
Step 4: Compare images
Does your router have the DRAM and flash resources to support these advanced services?
How can the DRAM and flash available on your router be determined?
Jawab:
Issue show version and show flash: commands at the privileged EXEC mode prompt.
What extra Layer 3 protocol support is with the ADVANCED IP SERVICES feature set? IPv6
Examine some of the unique features listed above by clicking the links.
Describe the enhanced network services and features users could expect if an IOS upgrade to the ADVANCED IP SERVICES feature set was performed.
Jawab:
Fitur-fitur ini memungkinkan jaringan data IP untuk mengelola dan mengirimkan panggilan suara dan videophone pada LAN perusahaan dan jaringan WAN, dan ke/ dari jaringan switched publik. Perangkat mobile IP juga dapat terhubung ke jaringan dari titik yang berbeda dan VLAN.
Task 4: Examine 2960 Switch IOS Features
Step 1: Search by platform
a. Return to the Cisco Feature Navigator page and click the Search by Platform link.
b. From the Platform drop-down menu, select CAT2960 and click Continue.
Step 2: Search by feature set
Examine the list of features.
Which significant Layer 3 protocol family is included in the feature set? IP and IPv6
What is the significance of this difference between 2960 and 3560 switches?
Jawab:
Switch 2960 adalah Access Layer saklar yang beroperasi pada OSI Layer 2, sedangkan 3560 pada OSI Layer 3
Task 5: Reflection
The recording and documentation of network features and services, and the devices that provide them, are important features of network management. Consider and explore the Cisco.com resources and information that can facilitate this task.
Lab 3.2.4 Installing a Cisco IOS Software Image
Task 1: Run and Configure the TFTP Server
Step 1: Configure network connectivity
Step 2: Start the TFTP server
Step 3: Configure the TFTP server
Task 2: Back up the Current IOS
Step 1: Collect information to document the router
Issue the show flash command.
Is there an IOS image file stored in flash? Ya
Exact name of that file: c1841-ipbase-mz.124-1c.bin
Size of that file: 14 MB
Amount of flash that is available or unused? 8679422 bytes available
What attributes can be identified from codes in the Cisco IOS filename?
Jawab: Hardware platform, pengaturan fitur, format file, dan nomor versi
Issue the show version command and record the following information:
Configuration-register value: 0x 2102
Size of flash memory: 32 MB
Is there at least 16 MB of flash? Ya
Version number of boot ROM: 12.4(13r)
Is the boot ROM version 5.2 or later? Ya
Step 2: Copy IOS image to the TFTP server
Record the IP address of the TFTP server jawab : 10.0.0.254
Step 3: Verify the transfer to the TFTP server
locate the TFTP root directory. Display file details and record the file size: 13937472 bytes
Task 3: Restore or Upgrade the Current IOS
Step 1: Prepare to restore or update the IOS image
Which command is issued to confirm flash memory size? show flash: or show version
Step 2: Copy the IOS image from the TFTP server
Step 3: Test the restored IOS image
Step 4: Clean up
Erase the configurations and reload the router. Disconnect and store the cabling. For PC hosts that are
normally connected to other networks (such as the school LAN or to the Internet), delete the IOS image file from the TFTP directory, reconnect the appropriate cabling and restore the TCP/IP settings.
Task 3: Reflection / Challenge
Step 1: Switch IOS Upgrade
As a challenge lab, research and list the steps required to back up the Cisco IOS image file from a switch to a TFTP server. In addition, list how to restore or upgrade the IOS image from the TFTP server to the switch.
Jawab:
Pengaturan server TFTP dan perintah CLI yang digunakan untuk melakukan backup dan upgrade switch IOS sama seperti untuk router. Perbedaan yang signifikan adalah pengaturan dari alamat IP pada interface 1 VLAN dari sakelar
Step 2: Non-operational Device
The performance of IOS image backup and upgrade for routers and switches as described in this lab
presumes that the device has a current, fully operational IOS to allow the configuration of IP connectivity prior to copying the image file. However, there may be cases where the current IOS is corrupt or for some other reason the device will not boot with an operational IOS.
a. Research and record the ROMMON process that enables a router to be configured and its IOS uploaded if the device has this problem.
b. Research and record the X-Modem or similar process that enables the IOS of a switch to be uploaded using the serial (console) connection if the device has this problem.
The following documents are typical Cisco.com resources describing these recovery processes:
Typical router ROMMON IOS loading:
http://www.cisco.com/warp/public/471/76.pdf
Example X-modem Console Download Procedure Using ROMMON:
http://www.cisco.com/warp/public/130/xmodem_generic.pdf
Recovering Catalyst Switches from a Corrupted or Missing Image:
http://www.cisco.com/warp/public/473/192.pdf
Lab 3.2.5 Observing the Router Startup Process
Task 1: Observe and Examine the Router Startup Process
Step 1: Connect and set up the router
Step 2: Restart the router and observe the output
Step 3: Examine the router startup output
What are possible reasons for these differences? Jawab: OS yang berbeda file, perangkat yang berbeda, dll
What does the POST test in the router? Jawab: Hardware
If the POST is successful, what is loaded into RAM? jawab: The bootstrap program
What is the purpose of what is loaded into RAM? Jawab: Locate the Cisco IOS and load it into RAM
What would happen if the POST is unsuccessful, and what could this mean? Jawab; IOS tidak akan memuat dan router tidak akan berjalan
Locating and loading the IOS software
Examine the displayed output. Look at the sample output in this lab that relates to the IOS loading.
Mark any differences between your observed output and this sample.
What are possible reasons for these differences?
Jawab:
OS yang berbeda file, perangkat yang berbeda, dll
What are the three possible locations of the IOS?
Jawab:
Flash memory, TFTP server, lokasi yang ditentukan di file konfigurasi startup (lokasi jaringan)
How is the IOS location to be used specified? Jawab: Konfigurasi nilai register
After it is installed and executed, the program displays the binary and hexadecimal values of the
register that set the different router startup sequences and console communications.
What will be the result if an IOS image cannot be located and loaded?
Jawab:
Modus ROMON dimasukkan
Locating and executing the startup configuration file or entering setup mode
Examine the displayed output. Look at the sample output in this lab that relates to the startup
configuration loading. Mark any differences between your observed output and this sample.
What are possible reasons for these differences?
Jawab:
OS yang berbeda file, perangkat yang berbeda, dll.
What is the output if the router does not have a configuration to load?
Jawab:
--- System Configuration Dialog ---
Continue with configuration dialog? [yes/no]:
What is displayed if a startup configuration is loaded?
Jawab:
User EXEC prompt
Step 4: Clean up
Erase the configurations and reload the router. Disconnect and store the cabling. For PC hosts that are
normally connected to other networks (such as the school LAN or to the Internet), delete the IOS image file from the TFTP directory, reconnect the appropriate cabling, and restore the TCP/IP settings.
Task 2: Reflection / Challenge
Prepare a troubleshooting checklist based on the router startup stages and the hardware and software
features associated with each stage. Format the checklist so that if it is noted that a stage was unsuccessful, the possible problems can be readily identified. For example, for “IOS not loaded” enter “ROMON prompt displayed.” Prepare a second checklist listing possible router faults or problems. For example, “no cooling fan sound,” “LEDs not illuminated or showing unusual behavior,” or “unexpected ROMON prompt displayed.” For each problem listed, enter the stage of the router startup process that failed.
Lab 3.3.2 Determining the Router Hardware Options
Task 1: Inspect a Cisco 1841 ISR
Step 1: Physically inspect the external features of the router
Examine the router. In the table below, identify and match each item number in the figure with the description. In addition, record the number of each interface and port on the router with the description.
Is a module installed in Slot 0? No
How many Fast Ethernet interfaces does the router have? 2
WIC-2T two serial interfaces
Is a module installed in Slot 1? No
Which of the modules and ports have the potential to be upgraded to improve the router's
capabilities? Jawab :
Slot 0 dan Slot 1, flash card slot
Step 2: Use IOS show commands to inspect the router
From the privileged EXEC mode prompt of the terminal, issue show run and show flash:
commands.
Record the number and type of interfaces. Typical results are shown.
interface FastEthernet 0/0
interface FastEthernet 0/1
interface Serial 0/0/0
interface Serial 0/0/1
interface VLAN1
Record the details of the memory (DRAM, flash) modules.
Flash 32 MB
SDRAM 128 MB
Step 3: Compare the physical and IOS inspections
Are there any differences between the physical and IOS inspections? No
Task 2: Examine 1841 Router Hardware Options
After establishing the current hardware status of the router, examine the technical documentation to
determine the potential for upgrading and growth.
Step 1: Access the Cisco.com documentation
Step 2: Record the router hardware information
The number of different modules and interface cards that are supported: >30
Default memory capacity: jawab: 32 MB of flash and 128 MB of synchronous dynamic RAM (SDRAM)
Cisco IOS versions supported: jawab: 12.3T, 12.4, 12.4T Feature Sets and Beyond
From Table 6, what feature does the Advanced Integration Module (AIM) enable to be installed in an
1841 router? Jawab: VPN encryption
Step 3: Consider possible hardware options
consider when planning and designing the network upgrade.
If the router is not at its limit of these features, candidates for upgrading could include:
Flash memory (if larger IOS required)
SDRAM
Slot 1 Ethernet switch 4-port module
Slot 1 WIC-2T - 2 serial interfaces
Slot 1 Other WAN technology DSL/ISDN
Step 4: Clean up
Erase any configurations and reload the router. Disconnect and store the cabling. For PC hosts that are
normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
Task 3: Reflection
Network device capabilities are continuously developing. Consider the advantages of a modular platform over that of a device with a fixed hardware platform.
Modularitas memfasilitasi kustomisasi perangkat untuk memenuhi kebutuhan jaringan lokal.
Peningkatan dan penggantian modul mengurangi biaya dan waktu dari layanan.
Perangkat Modular menyediakan desain jaringan yang fleksibel dan scalable.
Peningkatan dan penggantian modul mengurangi biaya dan waktu dari layanan.
Perangkat Modular menyediakan desain jaringan yang fleksibel dan scalable.
Lab 3.4.1 Preparing for a Site Survey
Step 1: Clarify and document the purpose of the site visit
a. List and discuss reasons for conducting a site visit.
b. List the FilmCompany personnel who are most likely to be able to answer your questions and whom you would need to talk to on site.
• Teknis jaringan & infrastruktur informasi - administrator IT & jaringan
• Sistem administrator
• Pengguna akhir – Dukungan desktop
• Kebutuhan masa depan - Manajemen dan pengguna akhir
• Untuk organisasi kecil beberapa peran mungkin digabungkan
• Sistem administrator
• Pengguna akhir – Dukungan desktop
• Kebutuhan masa depan - Manajemen dan pengguna akhir
• Untuk organisasi kecil beberapa peran mungkin digabungkan
c. Examine the existing network topology diagram at the end of this lab. List points that you want to confirm and those that need clarification.
• Konfirmasi penggunaan port switch sebenarnya
• Interkoneksi perangkat
• VLAN topologi dan alokasi alamat
• Interkoneksi perangkat
• VLAN topologi dan alokasi alamat
d. Use word processing software to create a site visit plan.
Step 2: Prepare a list of tools and equipment
a. List the tools and equipment that you need to take to the site.
• Pen dan notepad atau PDA
• Voice memo recorder
• Flashlight
• Clothing / coveralls (may need to access ceiling space)
• Portable stepladder (to inspect ceiling space, wireless Access Point installation); will a
stepladder be available on site?
• Tape measure
b. List the documentation, instrumentation, and software you need to take to the site.
• Copy persetujuan kunjungan
• Jaringan lalu lintas / pemantauan kinerja perangkat lunak dan alat uji (tidak untuk diinstal dan digunakan kecuali disetujui oleh pelanggan)
• LAN nirkabel sinyal radio pemantauan dan analisis instrumen
• Jaringan lalu lintas / pemantauan kinerja perangkat lunak dan alat uji (tidak untuk diinstal dan digunakan kecuali disetujui oleh pelanggan)
• LAN nirkabel sinyal radio pemantauan dan analisis instrumen
c. Add this list to the site visit plan.
Step 3: Arrange an appointment to visit the site
Role-play and discussion:
A site visit to FilmCompany must not disrupt the operation of the business and its network. Arrangements
must be made to set a convenient visit time and duration. Access to the premises and to the required
appropriate people must be organized.
a. Network designer role: Develop a list of questions and requests to ask when telephoning FilmCompany to arrange the site visit.
• Alamat dan akses ke tempat: parkir pengunjung atau angkutan umum?
• Tanggal dan waktu?
• Aturan kedatangan: mendaftar di resepsi atau meja keamanan, lencana pengunjung?
• Jika akses ke lokasi yang tinggi diperlukan, adalah tangga yang tersedia?
• Apa persetujuan yang diperlukan untuk mengakses dan mengukur lalu lintas jaringan atau kinerja?
• Tanggal dan waktu?
• Aturan kedatangan: mendaftar di resepsi atau meja keamanan, lencana pengunjung?
• Jika akses ke lokasi yang tinggi diperlukan, adalah tangga yang tersedia?
• Apa persetujuan yang diperlukan untuk mengakses dan mengukur lalu lintas jaringan atau kinerja?
b. Customer role: Develop a list of requirements relating to a proposed site visit by the network designer that the on-site technician can follow to ensure seamless interaction.
• Waktu terbaik untuk melakukan kunjungan
• Siapa yang akan tersedia untuk bertemu dengan perancang jaringan?
• Siapa yang harus memenuhi perancang jaringan?
• Siapa yang akan menjadi tuan rumah / guide kunjungan?
• Apa daerah mungkin telah membatasi akses baik untuk alasan fisik dan operasional?
• Apakah staf lain akan diberi tahu tentang kunjungan dan tujuannya?
• Apa isu-isu keselamatan harus dipenuhi?
• Siapa yang harus memenuhi perancang jaringan?
• Siapa yang akan menjadi tuan rumah / guide kunjungan?
• Apa daerah mungkin telah membatasi akses baik untuk alasan fisik dan operasional?
• Apakah staf lain akan diberi tahu tentang kunjungan dan tujuannya?
• Apa isu-isu keselamatan harus dipenuhi?
c. Using the information recorded above, the student performing the network designer role simulates a telephone conversation with the student performing the customer role, to arrange a site visit that meets the requirements of both roles.
d. Record the agreed-upon terms and details of the visit.
e. Add the agreed-upon details to the site visit plan.
Step 4: Approach to site visit
a. List points and issues that the network designer should follow while actually conducting the site visit.
b. Discuss the most commonly chosen answers and the least commonly chosen answers
Persiapan:
• Memakai atau membawa kredensial perusahaan.
• Bawalah peralatan yang memadai dengan membuat daftar standar untuk memastikan bahwa semua bahan yang diperlukan dimasukkan.
Di Situs:
• Datanglah tepat waktu
• Periksa dengan staf yang tepat pada saat masuk ke stadion.
• Tanamkan rasa percaya diri pada pelanggan dengan bekerja cepat dan profesional
• Ajukan pertanyaan dengan jelas dan tepat, memungkinkan untuk penjelasan dan tindak lanjut; penggunaan yang tepat mempertanyakan teknik untuk memperoleh informasi yang relevan
• Jawablah pertanyaan pelanggan dengan sopan dan selengkap mungkin.
• Tuliskan pertanyaan yang harus dijawab oleh anggota staf lain.
• Memberikan saran kepada pelanggan prosedur survei.
• Laporan kembali ke staf pelanggan sebelum meninggalkan tempat untuk menginformasikan mereka tentang berhasil tidaknya menyelesaikan survei.
Pedoman keselamatan:
• Ikuti petunjuk keselamatan yang direkomendasikan untuk memastikan pengoperasian yang tepat dan penggunaan yang aman dari perangkat nirkabel.
• Memperoleh persetujuan pelanggan sebelum menyentuh atau memasang perangkat untuk setiap jaringan yang ada peralatannya.
Step 5: Reflection
Arranging a visit to a customer site to inspect their network and associated facilities can have many aspects. The data network of an organization is a vital part of their operations. Gaining access to inspect and record details of that network may require more detailed arrangements than this lab presents. Consider and discuss the arrangements required to visit to a high-security area such as government, aviation, or military location.
Jawab:
• Mengatur kredensial identifikasi yang tepat dan diakui dan izin.
• Membuat tujuan kunjungan situs yang sangat jelas sehingga akses ke daerah yang relevan dapat diselenggarakan di sebelum kunjungan. Mendapatkan akses ke daerah-daerah lainnya ketika pada situs mungkin tidak dapat dilakukan tanpa persetujuan terlebih dahulu.
• Memperjelas dan mengikuti protokol pengunjung: pendaftaran pada saat kedatangan, tinggal dalam batas wewenang.
• Mengetahui identitas resmi Anda untuk bertemu.
• Penandatanganan dan mematuhi Perjanjian Non-Disclosure, dan keamanan lainnya dan protokol bisnis
• Membuat tujuan kunjungan situs yang sangat jelas sehingga akses ke daerah yang relevan dapat diselenggarakan di sebelum kunjungan. Mendapatkan akses ke daerah-daerah lainnya ketika pada situs mungkin tidak dapat dilakukan tanpa persetujuan terlebih dahulu.
• Memperjelas dan mengikuti protokol pengunjung: pendaftaran pada saat kedatangan, tinggal dalam batas wewenang.
• Mengetahui identitas resmi Anda untuk bertemu.
• Penandatanganan dan mematuhi Perjanjian Non-Disclosure, dan keamanan lainnya dan protokol bisnis
Lab 3.4.3 Performing a Wireless Site Survey
Step 1: Configure the wireless client PC1
Step 2: Monitor signal strength using Network Stumbler
Step 3: Relocate the wireless AP
a. Unplug the power cord on the Wireless Router and move the device to a location outside the room, preferably more than 25 feet away, and plug the power cord into the nearest wall outlet within that area.
b. Wait for the Wireless Router to power up, and then return to PC1 to view the Signal/Noise meter. Has the signal strength been reduced? Jawab: Ya
Record the signal strength of the Wireless Router at the current location and include its distance from
PC1.
Step 4: Relocate the wireless AP to a secure location
a. Unplug the power cord on the wireless router and move the device to a secure wiring closet, outside the classroom. This room should be able to be locked and also provide an AC wall outlet to plug in the Wireless Router power supply.
b. Plug the power cord in and power up the Wireless Router. While waiting for the Wireless Router to power up, close the wiring closet door, and return to PC1 to view the Signal/Noise meter.
Has the signal strength been reduced? Ya
If no wiring closet can be used, the Linksys antennas can be removed to simulate a long distance.
Remove the antennas and place the router under a desk or in a cabinet.
c. Record the signal strength of the Wireless Router at the current location and include its distance from PC1.
Step 5: Clean up
Return the wireless router to the classroom. For PC hosts that are normally connected to other networks
(such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP
settings.
Lab 3.5.2 Creating an Overall Project Goal
Step 1: Gather information about the company goals that this network upgrade will facilitate
Step 2: Summarize important goals in a list
Step 3: Develop an overall project goal statement
Step 4: Obtain agreement from the company on the project goal statement
Step 5: Reflection
Consider the issue of communication between the network designer and a manager of the company considering an upgrade of the business network. The network designer is trained in network operation and performance and how to optimize network resources and technologies to best provide network services. To the manager, the network is only one of a number of business tools that the company may use. The business manager probably wants to improve profitability and sees an enhanced network as a tool to help achieve that goal. A business manager is not likely to relate to a goal that is expressed solely in technical terms, such as an upgraded LAN with higher bandwidth, less latency, and maximized server utilization. Although most designers may want to talk about network capabilities, the lifecycle approach is about customer requirements and enabling the business process.
Discuss some strategies that will enable clear communication between a network designer and a business manager so that the resulting Project Goal document represents business needs that ultimately can be met by a network design.
Jawab:
Mahasiswa yang tertarik untuk jaringan, termasuk komputer, sistem TI, dan teknologi, mungkin cenderung terlalu fokus pada aspek teknis desain jaringan. Pada tahap awal siklus desain, penting bagi siswa mengembangkan kesadaran tentang keharusan usaha yang akan meng-upgrade drive jaringan dari alam.
Lab 3.5.3 Creating a Scope Statement
Step 1: Consider how meeting the project goals will impact the existing network
Step 2: Refine and record the proposed changes to the existing network
Step 3: Define the areas of the existing network not covered by the project
Step 4: Compile and present the project scope document
Step 5: Reflection
It is important that a project have clearly defined boundaries so that all parties know what is included and
what is not. Consider the issues of ensuring that customer business and network needs are satisfied before the scope is broadened beyond what is feasible and required.
What strategies could be used to ensure that a project scope is developed that is clear and appropriate?
Jawab:
• Pastikan bahwa setiap layanan jaringan baru dan teknologi yang tidak termasuk dalam ruang lingkup semata-mata karena mereka dapat, pastikan mereka selaras dengan kebutuhan perusahaan dan tujuan.
• Apakah orang yang berbeda, baik dari perusahaan desain jaringan dan bisnis, meninjau lingkup proyek dan memberikan interpretasi mereka untuk memastikan bahwa itu berarti hal yang sama untuk semua orang.
• Apakah orang yang berbeda, baik dari perusahaan desain jaringan dan bisnis, meninjau lingkup proyek dan memberikan interpretasi mereka untuk memastikan bahwa itu berarti hal yang sama untuk semua orang.
Lab 3.5.4 Developing Network Requirements
Step 1: Record the company business goals and constraints that will influence the network design
Step 2: Record the technical requirements that will influence the network design
Step 3: Record the user requirements that will influence the network design
a. Consider the types of users that will influence the network design. These users may be onsite, in the office, in the video editing room, offsite (at the stadium), or mobile. Which types of users generate the heaviest amount of network traffic? Which types generate the lightest traffic? How might different types of users be grouped for Access Layer purposes?
b. Include these requirements in your Network Requirements document.
Step 4: Record the application requirements that will influence the network design
a. Consider the type of applications that will influence the network design.
What applications are essentially device-based, with minimal network requirements?
Which applications are network-intensive?
Which applications and services are delivered onsite, in the offices, and which may need to be delivered offsite over the WAN or to mobile users?
b. Include these requirements in your Network Requirements document.
Step 5: Develop the network requirements
a. Refine the technical requirements of the network to match user and application requirements. What compromises may have to be made to ensure that the project remains within the business
constraints?
b. Finalize the technical requirements of the network that will meet the project goals.
c. Discuss and review your Technical Requirements document with another student to ensure it addresses all the business, user, and application requirements within the Project Scope and does not unnecessarily address out-of-scope requirements. Modify the document as necessary.
d. Save and retain your Technical Requirements document for the next stage of this network design case study.
Step 6: Reflection
Developing the technical requirements of a network that meets the project goals, while remaining within
scope, requires knowledge of the available and appropriate technologies and services.
Discuss strategies that will ensure that a network design team is up-to-date with networking technologies and their applications.
Jawab:
• Berlangganan ke jurnal teknis dan industri (baik hardcopy dan online)
• Menghadiri peluncuran dan demonstrasi produk
• Menghadiri seminar pelatihan dan kursus
• Menyusun dan melaksanakan rencana pengembangan diri profesional
• Memelihara industri saat ini dan sertifikasi vendor
• Menghadiri peluncuran dan demonstrasi produk
• Menghadiri seminar pelatihan dan kursus
• Menyusun dan melaksanakan rencana pengembangan diri profesional
• Memelihara industri saat ini dan sertifikasi vendor
Lab 3.5.5 Analyzing an Existing Network
Step 1: Document and confirm existing network topology, addressing, and naming schemes
a. Examine the existing network topology diagram.
Record the current addressing scheme in a table.
Associate device names with addresses on the table.
b. Highlight any inconsistencies in the naming and addressing schemes.
For example:
• Naming some devices by location and others by function
• Inconsistent or confusing use of abbreviations
• Some gateway addresses as the first address of a subnet, others as the last address
c. Use word processing software to create a Current Network document.
Step 2: Identify those parts of the existing network that currently meet the project technical requirements
a. Examine the network topology and specifications.
Record which current features meet the technical requirements of the proposed network upgrade.
• Capacity (bandwidth, address ranges, VLANs)
• Redundant links
• Router and switch interfaces and ports
• Router and switch feature sets, memory, and processing capability
• WAN
• Wireless
• QoS
b. Include these strengths and capabilities in your Current Network document.
Potential strengths may include:
• New wiring and adequate communications closets
• Adequate space for a new data center
• Servers and PCs are current models and will not need replacement
• Some existing network switches and routers can be used in the new design
Step 3: Identify those parts of the existing network that can be scaled to meet the project
technical requirements
a. Examine the network topology and specifications.
Record which current features do not meet the technical requirements of the proposed network
upgrade but can be scaled within the capacity of the network to do so.
• Capacity (bandwidth, address ranges, VLANs)
• Redundant links
• Router and switch interfaces and ports
• Router and switch feature sets, memory, and processing capability
• WAN
• Wireless
• QoS
b. Include these scalable features and capabilities in your Current Network document.
Step 4: Identify those parts of the existing network that do not to meet the project technical requirements
a. Examine the network topology and specifications.
Record which current features do not meet the technical requirements of the proposed network
upgrade and what additional networking resources are required.
• Capacity (bandwidth, address ranges, VLANs)
• Redundant links
• Router and switch interfaces and ports
• Router and switch feature sets, memory, and processing capability
• WAN
• Wireless
• QoS
b. Include these weaknesses and shortfalls in your Current Network document.
Possible weaknesses include:
• Flat network design
• Insufficient bandwidth at Distribution Layer, no true Core Layer
• Servers poorly located
• Multiple networks, difficult to maintain
• Poor IP addressing structure
• No dedicated bandwidth for WAN connectivity
• Limited wireless implementation
• Limited security implementations
Step 5: Obtain agreement and authorization from the company to continue with the network upgrade design
a. Finalize the Current Network document so that the strengths and shortfalls are clearly and precisely
presented.
b. Discuss and review your Current Network document with another student to ensure that it clearly
states which parts of the network meet the technical requirements of the upgrade project and which
parts do not. Amend the document as necessary to clarify any areas that could be misunderstood. At
this stage of the network design process, a meeting with the FilmCompany management would be
held to obtain their agreement and authorization to continue with the design of the upgrade.
c. Save and retain your Current Network document so that it can be incorporated with the previous
documents to complete this network design case study.
Step 6: Reflection
Consider the resources and information that will facilitate the task of analyzing a current network.
• Having up-to-date documentation showing such information as addressing, device names,
VLAN allocations, switch port assignments
• Systematic and consistent host names, descriptions, and addressing schemes
• Software tools that record data flows and device identification
• Efficient and accurate fault and incidence reporting and clearance documentation to highlight
and record problems
• sistematis dan nama host yang konsisten, deskripsi, dan skema pengalamatan
• Software tools yang merekam aliran data dan identifikasi perangkat
• Software tools yang merekam aliran data dan identifikasi perangkat
Tidak ada komentar:
Posting Komentar