logo

Overview of Internetworking: Network Design, Configuration, and Security

   

Added on  2023-06-11

9 Pages1336 Words320 Views
 | 
 | 
 | 
OVERVIEW OF INTERNETWORKING
Name of the Student
Name of the University
Author’s Note
Page 1 of 9
Overview of Internetworking: Network Design, Configuration, and Security_1

2OVERVIEW OF INTERNETWORKING
Table of Contents
Project Scope:................................................................................................................................ 3
Project Requirement:.....................................................................................................................3
Network Design:............................................................................................................................ 4
IP Addressing Table........................................................................................................................4
Network Topology Diagram...........................................................................................................5
Switch Configuration..................................................................................................................... 5
Router Configuration..................................................................................................................... 8
DHCP Configuration....................................................................................................................... 8
Access Point, Server Configuration guidelines...............................................................................8
Security Configuration................................................................................................................... 9
Bibliography................................................................................................................................. 10
Overview of Internetworking: Network Design, Configuration, and Security_2

3OVERVIEW OF INTERNETWORKING
Project Scope:
Proper network implementation designing is the main scope of this project. The Do’s, Don’ts
and the criteria have to be maintained for project scope design. The implementation purpose of
the network has to be designed. The project will evaluate the creation of user protected LAN
connection that is suitable for using in a small scale business organisation. As per an overall
knowledge, a LAN connection should have to be compatible with 50 authorized user and that of
the 10 guest user. The 50 user are the different authorized personnel of the school and 10
members are the visitor of the school. The requirements of the visitors are that at the time if
visiting they want to download a number of essential files from the online drive of the school
authority. The problem is summarized in that section that, for downloading the file the guest
used have to take entry in the FTP server, through the daily user maintains their connection. If
the user gets authorized to use the same FTP connection, the other information of the school
authority became accessible to them, which have to be stopped.
Project Requirement:
Main business requirements are summarized on the following section:
For accessing the guest user, a different FTP server has to be used. Along with this the
guest server preserved for guest user have to be separate from other network that are
connected through LAN. It would be better if a different LAN network can be used for
guest use [2].
LAN network can be justified in that sector only where the working are compelled in
daily basis. It would be better if the guests are not premised to use the LAN network. At
this decision, the LAN network can be kept protected from the sensitive use of the guest
user.
For daily basis use, the LAN network have to be consists of huge application supported.
Apart from this the activities like file sharing, file receiving, file sending, Email sending
have to be compelled. Activities increasing scope should be elaborated [6].
For designing the above theme, the routers, switches have to be used. It should be
remind that, the configuration of the routers, hubs and the switches can be done
maintaining the blocked user who is out of the reach of the main LAN area.
Overview of Internetworking: Network Design, Configuration, and Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Primary School Network Design with Guest Network
|10
|1398
|238

Primary School Network Design with Guest Network
|9
|1328
|153

Primary School Network Design with Guest Network
|9
|1317
|91

Overview of Internetworking for Primary School Network Configuration
|9
|1447
|349

Primary School Network Design with Guest Network
|11
|1482
|441

Overview of Internetworking
|9
|1396
|428