This article provides an overview of internetworking, including project scope, requirements, network design, IP addresses table, network topology diagram, switch configuration, router configuration, DHCP configuration, access point, security configuration, and conclusion.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: OVERVIEW OF INTERNETWORKING Overview of Internetworking Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 OVERVIEW OF INTERNETWORKING Project Scope: The main scope of the project is associated with the devolving a new network for a primary school that would use by the schools own users along with the guests who would be visiting the school occasionally. The daily users is around 50 whereas the guest who would be visiting the school would be not more than 10. The main aim of crating this network is for the purpose of providing a limited access to the guest users and to provide a full access of the network to the daily users. The guest’s users would be restricted to the usage of the FTP Server only. Project requirements: The following listed items are the major requirements of the new network that is to be developed: The new network that would be developed would be consisting of a FTP server and this server would be accessed by the guest users whereas the other portions of the network would remain blocked for them and for that a separate LAN would be used that would be utilized by the guest users. Along with the usage of a LAN for the guest users, another LAN needs to be included in the new network which would be used by the daily users in order have a full access of the network. This network would remain blocked for the guest users. In the new network there is also a need of including other kind of servers that would be helping all the users in doing their daily works. This Blocking of the guest users is generally done in order to securing the varios kind kind of sensitive data that are present inside the network. General Network components which manly includes the switches and routers are to be implemented in the new network which are to be configured in order to control the access to the network. The FTP server is also to be configured. The new network would have two subnets for two kind of users. One of the subnet would be used by the guest network only whereas the other subnet is to be used by the daily users. The subnet used by the guest would be having a restricted access whereas the another subnet would be for the user which would be providing a full access to the network.
3 OVERVIEW OF INTERNETWORKING Network Design IP addresses table Subnet Name AddressMaskDec MaskAssignable RangeBroadcast user192.18.2.0/24255.255.255.0192.18.2.1 - 192.18.2.254 192.18.2.255 Guest192.18.3.0/24255.255.255.0192.18.3.1 - 192.18.3.254 192.18.3.255 Server192.18.1.0/24255.255.255.0192.18.1.1 - 179.18.1.254 192.18.1.255
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 OVERVIEW OF INTERNETWORKING Network Topology Diagram Switch Configuration
5 OVERVIEW OF INTERNETWORKING Router Configuration DHCP Configuration
6 OVERVIEW OF INTERNETWORKING Access Point Certain assumption have been made while thinking about creating the new network. This assumptions mainly includes the following: The first thing that is assumed is that all the daily users who would be using the new network need to be present in the same building. The daily users’ needs to be present in different sections of the building but the building should be the same. The second assumption can be considered to be similar to the first assumption but the only difference that lies between this two assumptions is that, the guest users are considered are considered in this case and similarly the guests needs to be present in the same building. Thirdly it is assumed that there exists the availability of a high end internet speed for the network and for this reason the service provider needs to be chosen accordingly. The last assumption that is made is that the new network which is to be developed is associated with the usage of the Dynamic IP addressing and by this it generally means that there should exists a proxy server or a DHCP in the network, for the internet connection that is to be used. Additionally the new network would be consisting of other servers that are to be placed in different sections of the building. Security Configuration Conclusion The design of the network is created in Boson Netsim and for the configuration of the network a cisco 2811 router is used and it is configured by creating three separate vlan on the fast Ethernet 0/0 interface. It is also configured with DHCP address such that when the vlan are created in the switch the device are allocated with the IP address automatically. The layer three switch is used and configured as a server such that it can be used for management of the vlan from a single point. The layer two switch
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 OVERVIEW OF INTERNETWORKING that are used for the distribution and it is configured as client for automatically fetching the details of the vlan configured in the upper level switch. For increasing the security of the network the access control list configuration is used in the core switch and applied in the vlan 30 for restricting one of the vlan to connect with the other vlan.
8 OVERVIEW OF INTERNETWORKING Bibliography [1].Atwater, E., Bocovich, C., Hengartner, U. and Goldberg, I. Live Lesson: Netsim: Network simulation and hacking for high schoolers. In2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17). USENIX} Association}., 2017 August. [2].Benton,A.,Arora,R.andDredze,M.Learningmultiviewembeddingsoftwitterusers. InProceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)(Vol. 2, pp. 14-19)., 2016. [3].Cuppens, F. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator. InSecurity of Industrial Control Systems and Cyber Physical Systems: First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papers(Vol. 9588, p. 63). Springer., 2016, June. [4].Nayak, P. and Sinha, P. Analysis of Random Way Point and Random Walk Mobility Model for ReactiveRoutingProtocolsforMANETUsingNetSimSimulator.InArtificialIntelligence, Modelling and Simulation (AIMS), 2015 3rd International Conference on(pp. 427-432). IEEE., 2015 December. [5].Peng, J., Li, H., Wang, Y. and Chen, J. A web tool for measuring gene semantic similarities by combining Gene Ontology and gene co-function networks. InProceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics(pp. 678-679). ACM., 2015 September. [6].Saifuddin, K.M., Ahmed, A.S., Reza, K.F., Alam, S.S. and Rahman, S. Performance analysis of cognitive radio: Netsim viewpoint. InElectrical Information and Communication Technology (EICT), 2017 3rd International Conference on(pp. 1-6). IEEE., 2017 December. [7].Singh, G. and Singh, H. Performance Evaluation of MANET Routing Protocols using NETSIM.i- Manager's Journal on Information Technology,6(1), p.8., 2016. [8].Singh, G., Cheema, A.K. and Kapoor, N. Performance Evaluation of Routing Protocol in Internet of Things using Netsim.International Journal,8(3)., 2017.