没有合适的资源?快使用搜索试试~ 我知道了~
深圳市金地楼宇分公司网络规划与设计.docx
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 180 浏览量
2023-09-08
14:02:18
上传
评论
收藏 816KB DOCX 举报
温馨提示
试读
38页
深圳市金地楼宇分公司网络规划与设计.docx
资源推荐
资源详情
资源评论
I
深圳市金地楼宇分公司网络规划与设计
摘要:随着互联网高速的发展与进步,我们可发现随处都有互联网的身影,大到国家信息数
据安全,小到老百姓的衣食住行,现代互联网已经和人们的生活息息相关。特别是公司企业,
在发展中网络带来的商机越来越多,以及信息化管理和现代化办公的需要,构建一个高效、
可靠、安全的网络已经成为一流企业的标准。在传统网络中,企业网络不稳定,造成企业不
可估量的损失。网络设备需要管理人员或技术人员到达现场进行设备升级和维护,这样不但
成本较高,效率也低。而且传统无线网络一般采用的 WEP 加密方式,这种加密已经被破解不
再安全可靠且容易造成数据泄露。总而言之,这种传统的网络架构不安全、效率也有待提高,
已经不能满足现代企业的发展需求。
针对目前传统网络中存在的问题,根据金地楼宇分公司的实际情况,构建一个现代企业
网很必要的。本次的组网有线网络系统和无线网络系统各自采用一条专网出口,降低出口带
宽压力,保证网络可靠稳定运行。通过开启设备的 SSH 和 telnet 功能满足网络管理需求,
可以节省成本、降低网络管理人员的工作量、方便远程运维管理、实现高效率办公。无线采
用 WPA2 加密,WEP 加密和 WAP2 加密相比,WPA2 加密具备 CCMP 加密标准并使用 AES 加密至
少需要 8 位密钥,因此具备更高的安全性。而配置方面采用集中转发技术,用户和设备间的
数据会通过隧道协议进行封装,数据传输较为安全。本次组网需求,除了满足金地分公司网
络环境的日常办公外,还需实现金地总部的网络访问。
本次网络项目的开局都是华三的设备,可先通过华三的模拟器构建整个网络拓扑。可以
配置相关的技术配置,也可进行需求性能测试,能够很好的帮助网络工程师实现网络搭建的
开局。
关键词:企业网,网络规划与设计,交换机,路由器
II
Branch network planning and design of Gemdale in
Shenzhen
Abstract:With the Rapid Development and Progress of the Internet, We Can Find the Internet
Everywhere, From the Security of National Information and Data, to the Clothing, Food, Housing
and Transportation of the People, the Modern Internet has been Closely Linked with People's life.
In Particular, Companies in the Development of the Network Brought More and More Business
Opportunities, as well as Information Management and Modern Office Needs, the Construction of
an Efficient, Reliable, Safe of Network has Become the Standard of First-Class Enterprises. In the
Traditional Network, the Enterprise Network is Unstable, Resulting in Immeasurable Losses.
Network Equipment Requires Management or Technical Personnel to arrive at the Site for
Equipment Upgrading and Maintenance, Which is not only High Cost, but also Low Efficiency.
And Traditional Wireless Networks Generally Use WEP Encryption Method, This Encryption has
been Broken is No Longer Safe and Reliable and Easy to Cause Data Leakage. In A Word, This
Kind of Traditional Network Architecture is not Safe, the Efficiency Also Needs to Be Improved,
has not been Able to Meet the Development Needs of Modern Enterprises.
In View of the Existing Problems in the Current Traditional Network, Combined with the
Actual Situation of Gemdale Building Branch, It is Necessary to Start A Network Based on H3C
Network Equipment. The Wired Network System and the Wireless Network System Respectively
Adopt a Special Network Outlet to Reduce the Outlet Bandwidth Pressure and Ensure the Reliable
and Stable Operation of the Network. By Opening the SSH and Telnet Functions of the Equipment
to Meet the Needs of Network Management, It Can Save Costs, Reduce the Workload of Network
Managers, Facilitate Remote Operation and Maintenance Management, and Achieve High
Efficiency. Wireless USES WPA2 Encryption, WEP Encryption and WAP2 Encryption,
Compared to WPA2 Encryption, WPA2 Encryption with CCMP Encryption Standard and Use of
AES Encryption Requires at Least 8 Keys, So It has Higher Security. In Terms of Configuration,
Centralized Forwarding Technology Is Adopted, and the Data Between Users and Devices will Be
Encapsulated Through the Tunnel Protocol, So the Data Transmission is Relatively Safe. This
Networking Needs, In Addition to Meeting the Daily Office Network Environment of Gemdale
III
Branch, Also Need to Achieve Network Access to Gemdale Headquarters.
At the Beginning of This Network Project, the Equipment of H3C Can Be Used to Construct
the Entire Network Topology Through the Simulator of H3C. After the Relevant Technology
Configuration Is Configured, the Requirements Performance Test Can Be Carried Out, Which Can
Help the Network Engineer to Achieve the Start of Network Construction.
Key Words: Enterprise Network, Network Planning and Design, Switch, Router
IV
目 录
深圳市金地楼宇分公司网络规划与设计.......................................................................................II
目 录..............................................................................................................................................V
第 1 章 绪论 ....................................................................................................................................1
1.1 研究的背景和意义 ............................................................................................................1
1.1.1 研究的背景 .............................................................................................................1
1.1.2 研究的意义 .............................................................................................................1
1.2 研究的方法和研究的技术路线.........................................................................................2
1.2.1 研究的方法 .............................................................................................................2
1.2.2 研究的技术路线 .....................................................................................................2
1.3 企业网络发展状况 ............................................................................................................3
1.4 研究的内容 ........................................................................................................................3
第 2 章 网络需求分析 ....................................................................................................................4
2.1 网络拓扑结构需求分析 ....................................................................................................4
2.2 网络接入点需求分析 ........................................................................................................4
2.3 网络链路需求分析 ............................................................................................................5
2.4 网络扩展性需求分析 ........................................................................................................5
2.5 网络安全需求分析 ............................................................................................................6
2.6 网络可靠性需求分析 ........................................................................................................7
第 3 章 逻辑网络设计 ....................................................................................................................8
3.1 企业网络设计原则 ............................................................................................................8
3.2 网络拓扑设计 ....................................................................................................................8
3.3 网络 IP 地址规划 .............................................................................................................12
第 4 章 物理网络设计 ..................................................................................................................13
4.1 设备选型 ..........................................................................................................................13
4.1.1 路由器 ...................................................................................................................13
4.1.2 防火墙 ...................................................................................................................13
4.1.3 无线 AC、AP .........................................................................................................14
4.1.4 核心层交换机 .......................................................................................................17
4.1.5 汇聚层交换机 .......................................................................................................18
4.1.6 接入层交换机 .......................................................................................................19
4.2 技术应用 .........................................................................................................................19
4.2.1 地址转换技术(NAT).........................................................................................19
4.2.2 远程接入协议(IPsec VPN) ...............................................................................20
4.2.3 堆叠技术应用(IRF) ..........................................................................................20
4.2.4 虚拟局域网技术应用(VLAN)...........................................................................20
4.2.5 链路聚合应用 .......................................................................................................21
4.2.6 动态主机配置协议应用(DHCP).......................................................................21
4.2.7 访问控制技术应用(ACL) .................................................................................22
4.2.8 无线技术应用 .......................................................................................................22
第 5 章 设备连通性测试 ..............................................................................................................23
V
5.1 企业网络测试 ..................................................................................................................23
5.1.1 验证路由器上网 ...................................................................................................23
5.1.2 验证 IPsec VPN ......................................................................................................23
5.1.3 验证交换机堆叠 ...................................................................................................24
5.1.4 验证 VLAN 通讯.....................................................................................................24
5.1.5 验证 ACL 访问控制 ...............................................................................................25
5.1.6 验证链路聚合 .......................................................................................................25
5.1.7 验证无线网络配置 ...............................................................................................26
第 6 章 总结 ..................................................................................................................................27
参考文献 ........................................................................................................................................28
附录 ................................................................................................................................................29
结束语 ............................................................................................................................................33
剩余37页未读,继续阅读
资源评论
南抖北快东卫
- 粉丝: 70
- 资源: 5584
下载权益
C知道特权
VIP文章
课程特权
开通VIP
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功