Overview of Internetworking for a Grade School Network
Verified
Added on 2023/06/11
|9
|1413
|337
AI Summary
This article provides an overview of internetworking for a grade school network, including project scope, requirements, network design, security configuration, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: OVERVIEW OF INTERNETWORKING Overview of Internetworking Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 OVERVIEW OF INTERNETWORKING Project Scope: The fundamental extent of the venture is related with the degenerating another system for a grade school that would use by the schools claim clients alongside the visitors who might visit the school periodically. The day by day clients is around 50 though the visitor who might visit the school would be not more than 10. The principle point of crating this system is to provide a restricted access to the visitor clients and to give a full access of the system to the every day clients. The visitor's clients would be confined to the utilization of the FTP Server as it were. Project requirements: The accompanying recorded things are the real necessities of the new system that will be created: The new system that would be produced would comprise of a FTP server and this server would be gotten to by the visitor clients though alternate parts of the system would stay hindered for them and for that a different LAN would be utilized that would be used by the visitor clients. Along with the utilization of a LAN for the visitor clients, another LAN should be incorporated into the new system which would be utilized by the every day clients all together have a full access of the system. This system would stay hindered for the visitor clients. In the new system there is additionally a need of including other sort of servers that would help every one of the clients in doing their day by day works. This Blocking of the visitor clients is for the most part done with a specific end goal to securing the various kind sort of touchy information that are available inside the system. General Network segments which masculine incorporates the switches and switches are to be actualized in the new system which are to be arranged with a specific end goal to control the entrance to the system. The FTP server is additionally to be arranged. The new system would have two subnets for two sort of clients. One of the subnet would be utilized by the visitor organize just while the other subnet is to be utilized by the day by day clients. The subnet utilized by the visitor would have a limited access though another subnet would be for the client which would give a full access to the system.
3 OVERVIEW OF INTERNETWORKING Network Design IP addresses table Subnet Name AddressMaskDec MaskAssignable RangeBroadcast user192.18.20.0/24255.255.255.0192.18.20.1 - 192.18.20.254 192.18.20.255 Guest192.18.30.0/24255.255.255.0192.18.30.1 - 192.18.30.254 192.18.30.255 Server192.18.10.0/24255.255.255.0192.18.10.1 - 179.18.10.254 192.18.10.255
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 OVERVIEW OF INTERNETWORKING Network Topology Diagram Switch Configuration
5 OVERVIEW OF INTERNETWORKING Router Configuration
6 OVERVIEW OF INTERNETWORKING DHCP Configuration Access Point Certain supposition have been made while considering making the new system. This presumptions principally incorporates the accompanying: The first thing that is accepted is that all the everyday clients who might utilize the new system should be available in a similar building. The day by day clients' should be available in various areas of the building yet the building ought to be the same. The second presumption can be thought to be like the main supposition yet the main distinction that lies between this two suspicions is that, the visitor clients are considered will be considered for this situation and also the visitors should be available in a similar building. Thirdly it is expected that there exists the accessibility of a top of the line web speed for the system and consequently the specialist co-op should be picked in like manner. The last supposition that is made is that the new system which is to be produced is related with the utilization of the Dynamic IP tending to and by this it for the most part implies that there should exists an intermediary server or a DHCP in the system, for the web association that will be utilized. Also the new system would comprise of different servers that are to be set in various segments of the building.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 OVERVIEW OF INTERNETWORKING Security Configuration Conclusion The plan of the system is made in Boson Netsim and for the arrangement of the system a cisco 2811 switch is utilized and it is designed by making three separate vlan on the quick Ethernet 0/0 interface. It is likewise arranged with DHCP address to such an extent that when the vlan are made in the switch the gadget are distributed with the IP address naturally. The layer three switch is utilized and designed as a server to such an extent that it can be utilized for administration of the vlan from a solitary point. The layer two switch that are utilized for the dispersion and it is designed as customer for consequently getting the subtle elements of the vlan arranged in the upper level switch. For expanding the security of the system the entrance control list design is utilized as a part of the center switch and connected in the vlan 30 for confining one of the vlan to interface with the other vlan.
8 OVERVIEW OF INTERNETWORKING Bibliography [1].Atwater, E., Bocovich, C., Hengartner, U. and Goldberg, I. Live Lesson: Netsim: Network simulation and hacking for high schoolers. In2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17). USENIX} Association}., 2017 August. [2].Benton,A.,Arora,R.andDredze,M.Learningmultiviewembeddingsoftwitterusers. InProceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)(Vol. 2, pp. 14-19)., 2016. [3].Cuppens, F. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator. InSecurity of Industrial Control Systems and Cyber Physical Systems: First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papers(Vol. 9588, p. 63). Springer., 2016, June. [4].Nayak, P. and Sinha, P. Analysis of Random Way Point and Random Walk Mobility Model for ReactiveRoutingProtocolsforMANETUsingNetSimSimulator.InArtificialIntelligence, Modelling and Simulation (AIMS), 2015 3rd International Conference on(pp. 427-432). IEEE., 2015 December. [5].Peng, J., Li, H., Wang, Y. and Chen, J. A web tool for measuring gene semantic similarities by combining Gene Ontology and gene co-function networks. InProceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics(pp. 678-679). ACM., 2015 September. [6].Saifuddin, K.M., Ahmed, A.S., Reza, K.F., Alam, S.S. and Rahman, S. Performance analysis of cognitive radio: Netsim viewpoint. InElectrical Information and Communication Technology (EICT), 2017 3rd International Conference on(pp. 1-6). IEEE., 2017 December. [7].Singh, G. and Singh, H. Performance Evaluation of MANET Routing Protocols using NETSIM.i- Manager's Journal on Information Technology,6(1), p.8., 2016. [8].Singh, G., Cheema, A.K. and Kapoor, N. Performance Evaluation of Routing Protocol in Internet of Things using Netsim.International Journal,8(3)., 2017.