Network pics thread

That's pretty nice. I worked in an attic about that size, no fun. Had to move insulation to get around. So freaking hot up there too. Next time I need to do an attic job like that, I'm doing it in Winter. :p
 
Looks good bud!

I'd plug up that hole that leads up to the attic, you might get insects and shit.
 
Yeah for sure, and heat loss in form of air which can add up quick even with a small hole like that.

I'd just spray some fire rated Great Stuff.
 
That's pretty nice. I worked in an attic about that size, no fun. Had to move insulation to get around. So freaking hot up there too. Next time I need to do an attic job like that, I'm doing it in Winter. :p

I don't think you will say that LOL! It's either A to hot, or B to cold, and work never needs to be done in the middle :(


Im only 140lb's, my last job was to go to the very tip with a right angle drill some times and drill down the wall so conceal wiring for speaker cable and cat5 cable.
Only got stuck once.
 
Yeah for sure, and heat loss in form of air which can add up quick even with a small hole like that.

I'd just spray some fire rated Great Stuff.

Does Great Stuff eat PVC? I'd be concerned it would ruin the wire, maybe crush it as it expands too.

They make this pinkish/redish putty to stuff in pipe hole around cabling. I think Lowes or Home Depot carries it.
 
I've been planning on doing this for the past year that I've been in my new place and pretty soon we are going to pull the trigger and order a spool + crimping tool along with a few other goodies. Any suggestions on what else will be needed?

The modem and router will be in the basement so we will have to run a few cables upstairs with the route either being up through the cold air return or up the back wall of a closet into the attic and then dropping through the walls into the upstairs room.

I think I'm going do a few quick sketches with the floorplan of my house and perhaps make a new thread asking for some input.

[MF]Cyber_Punk;1036924734 said:
It's Been awhile since this project was completed but figure I share my install Photos.

Wanted to Run (2) CAT5e Runs to every room of the House, and my house is built on a concrete Slab ( No basement) So going through the Attic was my only option.

It took me and a buddy ( me in the attic, him down below to catch the snake to pull the cable) a good part of a Saturday Afternoon to complete the entire project.
 
I've been planning on doing this for the past year that I've been in my new place and pretty soon we are going to pull the trigger and order a spool + crimping tool along with a few other goodies. Any suggestions on what else will be needed?

The modem and router will be in the basement so we will have to run a few cables upstairs with the route either being up through the cold air return or up the back wall of a closet into the attic and then dropping through the walls into the upstairs room.

I think I'm going do a few quick sketches with the floorplan of my house and perhaps make a new thread asking for some input.

Don't think it's a good idea to run anything in your cold air return, id just run it in the center of the house somewhere all the way up to the attic or where ever you are looking to put the lines.
 
If you run wire in the HVAC system at all you need to ensure you run plenum rated cable. The whole idea of plenum rated is that it is made to run inside the HVAC system. Regular cable releases toxic fumes when it burns and putting that into your HVAC and distributing it all over the house is probably not a good idea, but if you use the correct plenum rated cable its OK to run inside the return.

In my house there the furnace vent runs inside a 30inch square insulated chase from the lower floor to the attic. Most houses are done this way. I ran a 2" pvc conduit in the corner of this area top to bottom and pulled the network cables inside it. Its secured well enough that it won't get anywhere near the (might be hot) furnace vent.
 
I don't think this is correct. A cold air return is not necessarily a duct. If it isn't a duct, no cable -- not even plenum rated cable -- can use that space as a raceway. See Section 300.22 of the NEC for the exact wording.
 
Here is some pictures that I am currently working on. Yes I am setting up my own WISP service out of my apt.

2h4j7s1.jpg


Equipment in this picture is a EOC 1650 with Omni Antenna with Nanobridge M5 22dBi going be pointing at that water tower for my tower.

2dbovwi.jpg


8 port switch with my voipo adapter

209qaut.jpg


servers for my wisp setup

j67wg2.jpg


POE's for my nanobridge m5 and EOC 1650

2823iat.jpg


my smoothwall and pfsense

23m0ck6.jpg


mail server running ubuntu 10.04 with postfix/dovecot, Webserver running ubuntu 9.04, Spam Box running Untangle.

e8oizq.jpg


I have my FTTH connection here, Dry Loop DSL (HotSpot), Vonage Phone Going To NID Box for rest of the phones in the apt, Connection to living room and bedroom then connections for POE outside along with cable connection.

2pyxjbs.jpg


vonage adapter.

352jkg6.jpg


wisp gear.
 
Last edited:
Do you have lightning protection installed? At the WISP I used to work for in the mid 2000s, our equipment got nailed several times due to lightning. Got lucky too that only our equipment was fried and not the whole tower or building burned down since a lot of it wasn't grounded by the previous employee installers and was unaccessible. Everything got lightning protection after that.
 
@ Jay_oasis as if right now I am still trying to start up on NW Ohio and I am aiming to get up to 100 customers.

@ hawk82 noting isnt installed yet on the water tower but I plan on using all equipment have lightning protection.
 
what does the end user need on there house another NanoBridge? What is the connection behind the scenes?

Cool stuff!
 
well at the tower its going have base antenna sectors with rocket m2 then I can pick between a nanostation m2, airgrid m2 hp or nanobridge m2 for the CPE.

the connection behind the scenes is going be to be a 18 mile backhaul 5ghz link to other wisp then from other wisp is connected to a fiber network and I am getting 10meg line from other wisp. I will have 128 public IP's.
 
well at the tower its going have base antenna sectors with rocket m2 then I can pick between a nanostation m2, airgrid m2 hp or nanobridge m2 for the CPE.

the connection behind the scenes is going be to be a 18 mile backhaul 5ghz link to other wisp then from other wisp is connected to a fiber network and I am getting 10meg line from other wisp. I will have 128 public IP's.

So essentially a 1:100 contention ratio on a 10MB connection??? - I hope that it is a completely symmetrical backhaul connection, else you're customers will be down to a much less than a 100K (even worse a 10K uplink it you only have a 1MB back connection) uplink equivalent at busy times (and download for that matter)

All in all looks interesting , but the contention ratio at the population levels you are talking about may lead to customer dissatisfaction (5 people watching youtube videos could swamp your back haul link)

Also watch out on the encryption - where I live I can pick up about 4 WISP services, the most amusing thing is that whilst these are encrypted, the core link they use is not! - hence I can see all traffic (I know this since I have the key for one of the encrypted links and have synced the watched packets from that link with the core link)
 
So essentially a 1:100 contention ratio on a 10MB connection??? - I hope that it is a completely symmetrical backhaul connection, else you're customers will be down to a much less than a 100K (even worse a 10K uplink it you only have a 1MB back connection) uplink equivalent at busy times (and download for that matter)

All in all looks interesting , but the contention ratio at the population levels you are talking about may lead to customer dissatisfaction (5 people watching youtube videos could swamp your back haul link)

Also watch out on the encryption - where I live I can pick up about 4 WISP services, the most amusing thing is that whilst these are encrypted, the core link they use is not! - hence I can see all traffic (I know this since I have the key for one of the encrypted links and have synced the watched packets from that link with the core link)

Gonna sum all that up with one word...

ghetto
 
I am also going to be using routeros to manage the bandwidth and limit the bandwidth at the CPE and I am going put encryption on every link.
 
well at the tower its going have base antenna sectors with rocket m2 then I can pick between a nanostation m2, airgrid m2 hp or nanobridge m2 for the CPE.

the connection behind the scenes is going be to be a 18 mile backhaul 5ghz link to other wisp then from other wisp is connected to a fiber network and I am getting 10meg line from other wisp. I will have 128 public IP's.

If you dont mind, where did you start? i have talked to our local government about setting up a small isp, but we were gonna go with dsl, what does it take for a WISP setup like that?
 
that WISP stuff reminds me off stuff we want to do here. The little crappy village next to us gets DOCSIS 3, we get 3meg ADSL. Our goal is to get 2 of those DOCSIS3 lines with 128megs down and 5 megs up for like somewhat around 50-70 customers here. Since Germany has some crappy regulations for wireless stuff, we might go with 5GHz backhaul in a range of 1/2 to 3/4 miles with a nice line of sight. We just don't know if we are using Ubiquiti since they're cheap or Lancom stuff since they're really reliable (don't know if you know them in the US). My only problem is that I have no idea how powerful the firewall needs to be to handle 256megs down and 10 megs up...do you have any idea?
 
Got some new toys. 20 Cisco WS-C3750V2-48-ps-s. Pics show stacks of 9 for IOS upgrade. I will get a pic of all of them together at some point.

deae27c8.jpg

8c8131e5.jpg


43255ac8.jpg


168d3ce1.jpg
 
My co-worker on the other side of my desk was complaining about the breeze from the fans ;)
 
Got some new toys. 20 Cisco WS-C3750V2-48-ps-s. Pics show stacks of 9 for IOS upgrade. I will get a pic of all of them together at some point.
]

Just put a few more of those in a new location the other day. They aren't THAT loud. My 2950s in my home lab are louder to me.
 
3560/3750 both use the same chassis, the fan in those is quiet, 3550 and dell 6248s are loud switches.
 
Went to my clients place today, started punching down patch panels:

Installed access control panel, alarm panel and two power boxes for the doors
198436_1643341158820_1095570040_31483656_6720334_n.jpg


198172_1643341758835_1095570040_31483659_6534190_n.jpg


199622_1643342198846_1095570040_31483662_8110491_n.jpg


199250_1643342598856_1095570040_31483664_3748177_n.jpg


Wiring up patch panels... looks like a mess till i get the wire management bars in
198882_1643343038867_1095570040_31483667_1665230_n.jpg


Data runs... the orange ones go to the building next door (figured fiber is usually orange, so i made my cat5 orange)
183132_1643343438877_1095570040_31483669_3745980_n.jpg


Phones/Faxes (white/yellow)
188638_1643343718884_1095570040_31483671_1107261_n.jpg


When i left, had 3 data patches done
196963_1643344078893_1095570040_31483672_5922929_n.jpg
 
Nice cable Management:) wished mine looked as half as decent...

On a side note this is my 512th post! yay!
 
Sneak Peak of work we are doing at a client of mine... server room is going in basement and we had to get the wires down there somehow... entire first floor sits on a solid concrete slab soooo... what do ya do... well you drill some 3" holes... 4 to be precise. In the stud bay. We'll have an access panel for future wires we may need to run but heres some shots from today. We ended up drilling 4 3" holes... made a mess of water in the basement thats drying out right now.


Heres video after first hole was done (we cut a 6"x6" hole out after we knew where our holes were so we could drain the water properly.
You ever heard of a wet dry shop vac? Haha, great work as always.

Relevant post here:
Grabbed some more cisco gear, need to still get some cables and WIC's to make it of any use.
photo4cq.jpg

photo3ey.jpg

photo2ki.jpg


1 2950
2 2620's
1 3620
1 3640

Question here- should I just get an additional 2600xm/1800 router, and ditch the 3600's instead of trying to find cards for them?
I have another 2950 switch somewhere.
Thanks!
 
Last edited:
Relevant post here:
Grabbed some more cisco gear, need to still get some cables and WIC's to make it of any use.
http://img121.imageshack.us/img121/5871/photo4cq.jpg
http://img560.imageshack.us/img560/5619/photo3ey.jpg
http://img3.imageshack.us/img3/7500/photo2ki.jpg

1 2950
2 2620's
1 3620
1 3640

Question here- should I just get an additional 2600xm/1800 router, and ditch the 3600's instead of trying to find cards for them?
I have another 2950 switch somewhere.
Thanks!
Shoot I'd say keep one or both, that way when you stumble across a card for one you won't be kicking yourself for getting rid of it. That said, have a look at the following links for the 3600 and 2600 routers:
http://www.certificationkits.com/cisco-3600-router/
http://www.certificationkits.com/cisco-2600-router/
That site also has some good suggestions on how to setup a nice lab.

Also note that one of your 2600's is equipped with a very nice terminal server card. I believe it's capable of supporting 8 serial/terminal devices per port with the Cisco octopus connector for a total of 32. I love those things!! Not much use in a home environment, but if you have a lab or rack full of switches those things can really come in handy!:D:cool:
 
New server:

Specs:
MSI X58A Mobo - Intel Core i7-960 Quad Core - 24 Gigs of DDR3

Right now running three VMs, but more will be added.


vmhostsrv.png


vmhostsrvvm.png


20110303232207676.jpg


20110306114059494.jpg


Now I just have to rebuild my terminal box so I can access all that Cisco equipment via console. That box will be off all most of the time, will use a WOL if I need to get in remotely, etc.

For my lab, I plan on using two XP VMs off my server. What I am thinking of doing is enabling 802.1q off of the routers (which ever I am working on at that time) and then running that port to my core switch, enabling 802.1q off the core which will run to the vmserver. I have to enable trunking on the nics on the server and create a virtual nic for each vm so they can access the network. By doing this, I eliminate the need of having two separate physical boxes on at the same time.

I also plan on adding an Untangle VM as well to the server. I want to see how well it does will spam filtering on e-mail.

I also have a 1130G Cisco WAP. It is running off POE, and broadcasts two SSIDs. Each SSID has its own VLAN, which is ran directly to my pfsense box. From there, I have DHCP relay to one of my servers, which hands out IPs on a seperate subnet for my Wireless SSID, which can talk to the rest of my network. The other SSID is for guests, in which that VLAN only has internet access, no access to my LAN. Ofcoarse it is encrypted still, but its mostly for friends. I also plan on putting my bench switch on that same VLAN, so any PCs will only have internet access. I will prob just run DHCP off of the pfsense box for that, don't really need it speaking to my DHCP servers.
 
Last edited:
Got some new toys. 20 Cisco WS-C3750V2-48-ps-s. Pics show stacks of 9 for IOS upgrade. I will get a pic of all of them together at some point.
Are you doing a virtual chassis, or just have them cabled together for the upgrade?
 
My co-worker on the other side of my desk was complaining about the breeze from the fans ;)
lol, piles of 3750s but the desk is made of plywood... classic...

I'd ask them to spring for something that won't tear your clothes or give you splinters while you are working. :D
 
Back
Top